- Pascal Urien, Mesmin Dandjinou, Mohamad Badra:
Introducing trusted EAP module for security enhancement in WLANs and VPNs. Communication, Network, and Information Security 2006: 191-198 - Bei Wang, Jim Alves-Foss:
An MSLS-EMM for enforcing confidentiality in malicious environments. Communication, Network, and Information Security 2006: 126-131 - Aliaa A. A. Youssif, Atef Z. Ghalwash, Samir Mohamed:
Artificial immune using multi-level negative selection approach to anomaly detection. Communication, Network, and Information Security 2006: 113-118 - Jianming Yu, Quan Huang, Yibo Xue:
Optimizing multi-thread string matching for network processor based intrusion management system. Communication, Network, and Information Security 2006: 199-204 - Longjiang Yu, Sheng-He Sun:
Slantlet transform-based image fingerprints. Communication, Network, and Information Security 2006: 41-43 - Yuan Zhang, Richard J. Enbody, John R. Lloyd:
Proactive, content-aware, sensitive data protection framework for enterprises. Communication, Network, and Information Security 2006: 34-40 - Sanguthevar Rajasekaran:
Proceedings of the Third IASTED International Conference on Communication, Network, and Information Security, October 9-11, 2006, Cambridge, MA, USA. IASTED/ACTA Press 2006, ISBN 0-88986-636-8 [contents]