Filter your results
- 4
- 4
- 4
- 4
- 4
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
A Study of SLA-Based Defense Resource Management Strategy in Network Security Defense System9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.336-348, ⟨10.1007/978-3-642-35606-3_40⟩
Conference papers
hal-01551361v1
|
||
|
Cryptanalysis of Goriparthi et al.’s Bilinear Pairing Based Remote User Authentication Scheme9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.581-588, ⟨10.1007/978-3-642-35606-3_69⟩
Conference papers
hal-01551363v1
|
||
|
Detection and Mitigation of Web Application Vulnerabilities Based on Security Testing9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.138-144, ⟨10.1007/978-3-642-35606-3_16⟩
Conference papers
hal-01551360v1
|
||
|
Dempster-Shafer Theory to Identify Insider Attacker in Wireless Sensor Network9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.94-100, ⟨10.1007/978-3-642-35606-3_11⟩
Conference papers
hal-01551336v1
|