-
Title:Contents
-
Published in:Computers & security ; 31, 3 ; iii
-
Publisher:
- New search for: Elsevier
-
Place of publication:Kidlington, Oxford
-
Publication date:2012
-
ISSN:
-
ZDBID:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 54.38
- Further information on Basic classification
-
Keywords:
-
Classification:
BKL: 54.38 Computersicherheit -
Source:
Table of contents – Volume 31, Issue 3
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 271
-
Editorial| 2012
- 273
-
Operational experiences with anomaly detection in backbone networksMolina, Maurizio / Paredes-Oliva, Ignasi / Routly, Wayne / Barlet-Ros, Pere et al. | 2012
- 286
-
Polite sender: A resource-saving spam email countermeasure based on sender responsibilities and recipient justificationsVorakulpipat, Chalee / Visoottiviseth, Vasaka / Siwamogsatham, Siwaruk et al. | 2012
- 299
-
A methodology for integrating access control policies within database developmentAbramov, Jenny / Anson, Omer / Dahan, Michal / Shoval, Peretz / Sturm, Arnon et al. | 2012
- 315
-
Applying security policies and service level agreement to IaaS service model to enhance security and transitionKaradsheh, Louay et al. | 2012
- 327
-
Evaluating a migration-based response to DoS attacks in a system of distributed auctionsLent, Ricardo et al. | 2012
- 344
-
Have things changed now? An empirical study on input validation vulnerabilities in web applicationsScholte, Theodoor / Balzarotti, Davide / Kirda, Engin et al. | 2011
- 357
-
Toward developing a systematic approach to generate benchmark datasets for intrusion detectionShiravi, Ali / Shiravi, Hadi / Tavallaee, Mahbod / Ghorbani, Ali A. et al. | 2011
- IFC
-
IFC - Editorial Board| 2012
- iii
-
Contents| 2012