ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
18th Annual Computer Security Applications Conference, 2002. Proceedings.
Latest Publications
TOTAL DOCUMENTS
44
(FIVE YEARS 0)
H-INDEX
16
(FIVE YEARS 0)
Published By IEEE Comput. Soc
0769518281
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Enterprise engineering and security
18th Annual Computer Security Applications Conference, 2002. Proceedings.
◽
10.1109/csac.2002.1176300
◽
2005
◽
Author(s):
J. Heaney
◽
D. Hybertson
◽
A. Reedy
◽
S. Chapin
◽
M. Kirwan
Keyword(s):
Enterprise Engineering
Download Full-text
Wireless security: vulnerabilities and countermeasures
18th Annual Computer Security Applications Conference, 2002. Proceedings.
◽
10.1109/csac.2002.1176282
◽
2005
◽
Cited By ~ 1
Author(s):
D.M. Johnson
Keyword(s):
Wireless Security
◽
Security Vulnerabilities
Download Full-text
Intrusion detection: current capabilities and future directions
18th Annual Computer Security Applications Conference, 2002. Proceedings.
◽
10.1109/csac.2002.1176308
◽
2005
◽
Cited By ~ 4
Author(s):
K. Levitt
Keyword(s):
Intrusion Detection
◽
Future Directions
Download Full-text
Themes and highlights of the new security paradigms workshop 2002
18th Annual Computer Security Applications Conference, 2002. Proceedings.
◽
10.1109/csac.2002.1176301
◽
2005
◽
Author(s):
C. Serban
◽
O.S. Saydjari
Download Full-text
A financial institution's legacy mainframe access control system in light of the proposed NIST RBAC standard
18th Annual Computer Security Applications Conference, 2002. Proceedings.
◽
10.1109/csac.2002.1176310
◽
2003
◽
Cited By ~ 1
Author(s):
A.D. Marshall
Keyword(s):
Control System
◽
Access Control
◽
Access Control System
Download Full-text
Regulating e-commerce through certified contracts
18th Annual Computer Security Applications Conference, 2002. Proceedings.
◽
10.1109/csac.2002.1176276
◽
2003
◽
Cited By ~ 1
Author(s):
V. Ungureanu
Download Full-text
Gender-preferential text mining of e-mail discourse
18th Annual Computer Security Applications Conference, 2002. Proceedings.
◽
10.1109/csac.2002.1176299
◽
2003
◽
Cited By ~ 29
Author(s):
M. Corney
◽
O. de Vel
◽
A. Anderson
◽
G. Mohay
Keyword(s):
Text Mining
◽
E Mail
Download Full-text
Representing TCP/IP connectivity for topological analysis of network security
18th Annual Computer Security Applications Conference, 2002. Proceedings.
◽
10.1109/csac.2002.1176275
◽
2003
◽
Cited By ~ 35
Author(s):
R. Ritchey
◽
B. O'Berry
◽
S. Noel
Keyword(s):
Network Security
◽
Topological Analysis
Download Full-text
Throttling viruses: restricting propagation to defeat malicious mobile code
18th Annual Computer Security Applications Conference, 2002. Proceedings.
◽
10.1109/csac.2002.1176279
◽
2003
◽
Cited By ~ 107
Author(s):
M.M. Williamson
Keyword(s):
Mobile Code
Download Full-text
Reusable components for developing security-aware applications
18th Annual Computer Security Applications Conference, 2002. Proceedings.
◽
10.1109/csac.2002.1176295
◽
2003
◽
Cited By ~ 4
Author(s):
S. Probst
◽
W. Essmayr
◽
E. Weippl
Keyword(s):
Reusable Components
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close