


default search action
ISDF 2009: London, UK
- Dasun Weerasinghe:

Information Security and Digital Forensics - First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 41, Springer 2010, ISBN 978-3-642-11529-5 - Divya, Sanjeev Kumar:

Analysis of Denial of Service Attacks in IEEE 802.11s Wireless Mesh Networks. 1-10 - Fei Peng

, Re-Si Guo, Chang-Tsun Li
, Min Long:
A Semi-fragile Watermarking Algorithm for Authenticating 2D Engineering Graphics Based on Log-Polar Transformation. 11-18 - Chang-Tsun Li

, Chih-Yuan Chang, Yue Li:
On the Repudiability of Device Identification and Image Integrity Verification Using Sensor Pattern Noise. 19-25 - Monis Akhlaq, Faeiz Alserhani, Irfan-Ullah Awan, John Mellor, Andrea J. Cullen, Pravin Mirchandani:

Virtualization Efficacy for Network Intrusion Detection Systems in High Speed Environment. 26-41 - Ziheng Zhou, Samuel Chindaro, Farzin Deravi:

Face Recognition Using Balanced Pairwise Classifier Training. 42-49 - Qin Zhou

, Nigel R. Poole:
Forensic Investigation of the Soft-Modded PlayStation Portable (PSP). 50-56 - Ahsan Subhan, Monis Akhlaq, Faeiz Alserhani, Irfan-Ullah Awan, John Mellor, Andrea J. Cullen, Pravin Mirchandani:

Smart Logic - Preventing Packet Loss in High Speed Network Intrusion Detection Systems. 57-65 - Dasun Weerasinghe, Muttukrishnan Rajarajan, Veselin Rakocevic:

Parameter Based Access Control Model for Mobile Handsets. 66-75 - Brian C. Tompsett

:
Ethical Dilemmas in Teaching Computer and Internet Security. 76-81 - Fadi El-Moussa, Parmindher Mudhar, Andy Jones:

Overview of SIP Attacks and Countermeasures. 82-91 - Divya, Sanjeev Kumar:

Security Challenges in Multihop Wireless Mesh Networks-A Survey. 92-101 - Clive Blackwell:

A Security Architecture to Protect Against Data Loss. 102-110 - Joshua Ojo Nehinbe

:
A Simple Method for Improving Intrusion Detections in Corporate Networks. 111-122 - K. Haribabu

, Chittaranjan Hota
, Saravana:
Detecting Sybils in Peer-to-Peer File Replication Systems. 123-134 - Joshua Ojo Nehinbe:

Adaptive Clustering Method for Reclassifying Network Intrusions. 135-146 - Dimitrios Frangiskatos, Mona Ghassemian, Diane Gan:

Technology Perspective: Is Green IT a Threat to IT Security? 147-154 - Samuel Chindaro, Ziheng Zhou, Ming W. R. Ng, Farzin Deravi:

An Adaptive Fusion Framework for Fault-Tolerant Multibiometrics. 155-162 - Tanko Ishaya

, Jason R. C. Nurse:
Cross-Enterprise Policy Model for e-Business Web Services Security. 163-171 - Rajanish Dass, Sujoy Pal:

Challenges of Identity Management - A Context in Rural India. 172-183

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














