Current Search:  Computers--Access control (x)

View All Items

  • CSV Spreadsheet
(1 - 6 of 6)
proposal for a binary stream cipher based on chaos theory
Resource-sensitive intrusion detection models for network traffic
Techniques for combining binary classifiers: A comparative study in network intrusion detection systems
authorization model for object-oriented and semantic databases
method for adding multimedia knowledge for improving intrusion detection systems
A Study on Partially Homomorphic Encryption Schemes