Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
26
click to vote
COMPSEC
2010
81
views
more
COMPSEC 2010
»
On the symbiosis of specification-based and anomaly-based detection
13 years 11 months ago
Download
www.cs.unb.ca
Natalia Stakhanova, Samik Basu, Johnny Wong
claim paper
Read More »
43
click to vote
COMPSEC
2010
146
views
more
COMPSEC 2010
»
An intruder model with message inspection for model checking security protocols
13 years 11 months ago
Download
users.auth.gr
Model checking security protocols is based on an intruder model that represents the eavesdropping or interception of the exchanged messages, while at the same time performs attack...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
claim paper
Read More »
31
click to vote
COMPSEC
2010
67
views
more
COMPSEC 2010
»
Hybrid spam filtering for mobile communication
13 years 11 months ago
Download
www.cl.cam.ac.uk
Ji Won Yoon, Hyoungshick Kim, Jun Ho Huh
claim paper
Read More »
« first
‹ previous
1
2