default search action
ISDF 2009: London, UK
- Dasun Weerasinghe:
Information Security and Digital Forensics - First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 41, Springer 2010, ISBN 978-3-642-11529-5 - Divya, Sanjeev Kumar:
Analysis of Denial of Service Attacks in IEEE 802.11s Wireless Mesh Networks. 1-10 - Fei Peng, Re-Si Guo, Chang-Tsun Li, Min Long:
A Semi-fragile Watermarking Algorithm for Authenticating 2D Engineering Graphics Based on Log-Polar Transformation. 11-18 - Chang-Tsun Li, Chih-Yuan Chang, Yue Li:
On the Repudiability of Device Identification and Image Integrity Verification Using Sensor Pattern Noise. 19-25 - Monis Akhlaq, Faeiz Alserhani, Irfan-Ullah Awan, John Mellor, Andrea J. Cullen, Pravin Mirchandani:
Virtualization Efficacy for Network Intrusion Detection Systems in High Speed Environment. 26-41 - Ziheng Zhou, Samuel Chindaro, Farzin Deravi:
Face Recognition Using Balanced Pairwise Classifier Training. 42-49 - Qin Zhou, Nigel R. Poole:
Forensic Investigation of the Soft-Modded PlayStation Portable (PSP). 50-56 - Ahsan Subhan, Monis Akhlaq, Faeiz Alserhani, Irfan-Ullah Awan, John Mellor, Andrea J. Cullen, Pravin Mirchandani:
Smart Logic - Preventing Packet Loss in High Speed Network Intrusion Detection Systems. 57-65 - Dasun Weerasinghe, Muttukrishnan Rajarajan, Veselin Rakocevic:
Parameter Based Access Control Model for Mobile Handsets. 66-75 - Brian C. Tompsett:
Ethical Dilemmas in Teaching Computer and Internet Security. 76-81 - Fadi El-Moussa, Parmindher Mudhar, Andy Jones:
Overview of SIP Attacks and Countermeasures. 82-91 - Divya, Sanjeev Kumar:
Security Challenges in Multihop Wireless Mesh Networks-A Survey. 92-101 - Clive Blackwell:
A Security Architecture to Protect Against Data Loss. 102-110 - Joshua Ojo Nehinbe:
A Simple Method for Improving Intrusion Detections in Corporate Networks. 111-122 - K. Haribabu, Chittaranjan Hota, Saravana:
Detecting Sybils in Peer-to-Peer File Replication Systems. 123-134 - Joshua Ojo Nehinbe:
Adaptive Clustering Method for Reclassifying Network Intrusions. 135-146 - Dimitrios Frangiskatos, Mona Ghassemian, Diane Gan:
Technology Perspective: Is Green IT a Threat to IT Security? 147-154 - Samuel Chindaro, Ziheng Zhou, Ming W. R. Ng, Farzin Deravi:
An Adaptive Fusion Framework for Fault-Tolerant Multibiometrics. 155-162 - Tanko Ishaya, Jason R. C. Nurse:
Cross-Enterprise Policy Model for e-Business Web Services Security. 163-171 - Rajanish Dass, Sujoy Pal:
Challenges of Identity Management - A Context in Rural India. 172-183
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.