ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
2011 Conference on Network and Information Systems Security
Latest Publications
TOTAL DOCUMENTS
44
(FIVE YEARS 0)
H-INDEX
7
(FIVE YEARS 0)
Published By IEEE
9781457707353
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Decisive Heuristics to Differentiate Legitimate from Phishing Sites
2011 Conference on Network and Information Systems Security
◽
10.1109/sar-ssi.2011.5931389
◽
2011
◽
Cited By ~ 15
Author(s):
Sophie Gastellier-Prevost
◽
Gustavo Gonzalez Granadillo
◽
Maryline Laurent
Download Full-text
A Posterior Distribution for Anti-Spam Bayesian Statistical Model
2011 Conference on Network and Information Systems Security
◽
10.1109/sar-ssi.2011.5931393
◽
2011
◽
Author(s):
Youcef Begriche
◽
Houda Labiod
Keyword(s):
Statistical Model
◽
Posterior Distribution
Download Full-text
A Secure Web Service-Based Platform for Wireless Sensor Network Management and Interrogation
2011 Conference on Network and Information Systems Security
◽
10.1109/sar-ssi.2011.5931400
◽
2011
◽
Author(s):
Ahmed Amokrane
◽
Yacine Challal
◽
Amar Balla
Keyword(s):
Wireless Sensor Network
◽
Network Management
◽
Web Service
◽
Sensor Network
◽
Wireless Sensor
Download Full-text
SeNsIM-SEC: Security in Heterogeneous Sensor Networks
2011 Conference on Network and Information Systems Security
◽
10.1109/sar-ssi.2011.5931360
◽
2011
◽
Cited By ~ 6
Author(s):
Valentina Casola
◽
Alessandra De Benedictis
◽
Antonino Mazzeo
◽
Nicola Mazzocca
Keyword(s):
Sensor Networks
◽
Heterogeneous Sensor Networks
Download Full-text
Trusted Platform Module as an Enabler for Security in Cloud Computing
2011 Conference on Network and Information Systems Security
◽
10.1109/sar-ssi.2011.5931361
◽
2011
◽
Cited By ~ 8
Author(s):
Mohammed Achemlal
◽
Said Gharout
◽
Chrystel Gaber
Keyword(s):
Cloud Computing
◽
Trusted Platform Module
◽
Trusted Platform
Download Full-text
Sponsors
2011 Conference on Network and Information Systems Security
◽
10.1109/sar-ssi.2011.5931371
◽
2011
◽
Download Full-text
Enhanced Authentication Protocol in IMS Environment
2011 Conference on Network and Information Systems Security
◽
10.1109/sar-ssi.2011.5931394
◽
2011
◽
Cited By ~ 1
Author(s):
M. Maachaoui
◽
A. Abou El Kalam
◽
C. Fraboul
◽
A. Ait Ouahman
Keyword(s):
Authentication Protocol
Download Full-text
Towards a Formal Data Flow Oriented Model for Network Security Policies Analysis
2011 Conference on Network and Information Systems Security
◽
10.1109/sar-ssi.2011.5931390
◽
2011
◽
Author(s):
Hicham El Khoury
◽
Romain Laborde
◽
Francois Barrere
◽
Abdelmalek Benzekri
Keyword(s):
Network Security
◽
Data Flow
◽
Security Policies
Download Full-text
A Semantic Information Model Based on the Privacy Legislation
2011 Conference on Network and Information Systems Security
◽
10.1109/sar-ssi.2011.5931375
◽
2011
◽
Cited By ~ 2
Author(s):
Kheira Bekara
◽
Maryline Laurent
Keyword(s):
Semantic Information
◽
Information Model
◽
Model Based
◽
Privacy Legislation
Download Full-text
Title Page
2011 Conference on Network and Information Systems Security
◽
10.1109/sar-ssi.2011.5931366
◽
2011
◽
Keyword(s):
Title Page
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close