ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Third International Symposium on Information Assurance and Security
Latest Publications
TOTAL DOCUMENTS
164
(FIVE YEARS 0)
H-INDEX
9
(FIVE YEARS 0)
Published By IEEE
0769528767
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Cyber Threat Trend Analysis Model Using HMM
Third International Symposium on Information Assurance and Security
◽
10.1109/ias.2007.19
◽
2007
◽
Cited By ~ 5
Author(s):
Do Hoon Kim
◽
Taek Lee
◽
Sung-Oh David Jung
◽
Hoh Peter In
◽
Hee Jo Lee
Keyword(s):
Trend Analysis
◽
Analysis Model
◽
Cyber Threat
Download Full-text
A Secure Authenticated Key Agreement Protocol For Wireless Security
Third International Symposium on Information Assurance and Security
◽
10.1109/ias.2007.56
◽
2007
◽
Cited By ~ 5
Author(s):
Pierre E. Abi-Char
◽
Abdallah Mhamed
◽
Bachar El-Hassan
Keyword(s):
Key Agreement
◽
Wireless Security
◽
Authenticated Key Agreement
◽
Key Agreement Protocol
Download Full-text
A Weighted Stego Image Detector for Sequential LSB Replacement
Third International Symposium on Information Assurance and Security
◽
10.1109/ias.2007.71
◽
2007
◽
Cited By ~ 3
Author(s):
Andrew D. Ker
Keyword(s):
Stego Image
◽
Image Detector
◽
Lsb Replacement
Download Full-text
IP protection: Detecting Email based breaches of confidence
Third International Symposium on Information Assurance and Security
◽
10.1109/ias.2007.24
◽
2007
◽
Author(s):
Neil Cooke
◽
Lee Gillam
◽
Ahmet Kondoz
Keyword(s):
Ip Protection
Download Full-text
CCARCH: Architecting Common Criteria Security Requirements
Third International Symposium on Information Assurance and Security
◽
10.1109/isias.2007.4299798
◽
2007
◽
Author(s):
Jose Romero-Mariona
◽
Hadar Ziv
◽
Debra J. Richardson
Keyword(s):
Security Requirements
◽
Common Criteria
Download Full-text
On Detecting Packets Droppers in MANET: A Novel Low Cost Approach
Third International Symposium on Information Assurance and Security
◽
10.1109/ias.2007.47
◽
2007
◽
Cited By ~ 4
Author(s):
Tarag Fahad
◽
Djamel Djenouri
◽
Robert Askwith
Keyword(s):
Low Cost
◽
Cost Approach
Download Full-text
Information-theoretical comparison of likelihood ratio methods of forensic evidence evaluation
Third International Symposium on Information Assurance and Security
◽
10.1109/ias.2007.63
◽
2007
◽
Cited By ~ 1
Author(s):
Daniel Ramos
◽
Joaquin Gonzalez-Rodriguez
◽
Grzegorz Zadora
◽
Janina Zieba-Palus
◽
Colin Aitken
Keyword(s):
Likelihood Ratio
◽
Forensic Evidence
◽
Theoretical Comparison
◽
Evidence Evaluation
Download Full-text
Building Trustworthy Intrusion Detection through VM Introspection
Third International Symposium on Information Assurance and Security
◽
10.1109/isias.2007.4299776
◽
2007
◽
Cited By ~ 5
Author(s):
Fabrizio Baiardi
◽
Daniele Sgandurra
Keyword(s):
Intrusion Detection
Download Full-text
Inclusion of a Montgomery Multiplier Unit into an Embedded Processor's Datapath to Speed-up Elliptic Curve Cryptography
Third International Symposium on Information Assurance and Security
◽
10.1109/ias.2007.81
◽
2007
◽
Author(s):
S. Bartolini
◽
G. Castagnini
◽
E. Martinelli
Keyword(s):
Elliptic Curve
◽
Elliptic Curve Cryptography
◽
Speed Up
Download Full-text
Levels of Authentication Assurance: an Investigation
Third International Symposium on Information Assurance and Security
◽
10.1109/isias.2007.4299767
◽
2007
◽
Cited By ~ 2
Author(s):
Aleksandra Nenadic
◽
Ning Zhang
◽
Li Yao
◽
Terry Morrow
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close