Works matching IS 10184864 AND DT 2010 AND VI 45 AND IP 2/3
Results: 13
Defending the weakest link: phishing websites detection by analysing user behaviours.
- Published in:
- Telecommunication Systems, 2010, v. 45, n. 2/3, p. 215, doi. 10.1007/s11235-009-9247-9
- By:
- Publication type:
- Article
Towards the realisation of context-risk-aware access control in pervasive computing.
- Published in:
- Telecommunication Systems, 2010, v. 45, n. 2/3, p. 127, doi. 10.1007/s11235-009-9240-3
- By:
- Publication type:
- Article
GTHBAC: A Generalized Temporal History Based Access Control Model.
- Published in:
- Telecommunication Systems, 2010, v. 45, n. 2/3, p. 111, doi. 10.1007/s11235-009-9239-9
- By:
- Publication type:
- Article
Conception approach of access control in heterogeneous information systems using UML.
- Published in:
- Telecommunication Systems, 2010, v. 45, n. 2/3, p. 177, doi. 10.1007/s11235-009-9243-0
- By:
- Publication type:
- Article
Analysis of IPv6 handovers in IEEE 802.16 environment.
- Published in:
- Telecommunication Systems, 2010, v. 45, n. 2/3, p. 191, doi. 10.1007/s11235-009-9244-z
- By:
- Publication type:
- Article
Packet level performance analysis of a packet scheduler exploiting multiuser diversity.
- Published in:
- Telecommunication Systems, 2010, v. 45, n. 2/3, p. 249, doi. 10.1007/s11235-009-9250-1
- By:
- Publication type:
- Article
Analysis of service platforms by a portfolio approach.
- Published in:
- Telecommunication Systems, 2010, v. 45, n. 2/3, p. 227, doi. 10.1007/s11235-009-9249-7
- By:
- Publication type:
- Article
Guest editorial.
- Published in:
- Telecommunication Systems, 2010, v. 45, n. 2/3, p. 93, doi. 10.1007/s11235-009-9238-x
- By:
- Publication type:
- Article
Information system security compliance to FISMA standard: a quantitative measure.
- Published in:
- Telecommunication Systems, 2010, v. 45, n. 2/3, p. 139, doi. 10.1007/s11235-009-9248-8
- By:
- Publication type:
- Article
LACK—a VoIP steganographic method.
- Published in:
- Telecommunication Systems, 2010, v. 45, n. 2/3, p. 153, doi. 10.1007/s11235-009-9245-y
- By:
- Publication type:
- Article
A new worm propagation threat in BitTorrent: modeling and analysis.
- Published in:
- Telecommunication Systems, 2010, v. 45, n. 2/3, p. 95, doi. 10.1007/s11235-009-9241-2
- By:
- Publication type:
- Article
Developing wireless sensor network applications in a virtual environment.
- Published in:
- Telecommunication Systems, 2010, v. 45, n. 2/3, p. 165, doi. 10.1007/s11235-009-9246-x
- By:
- Publication type:
- Article
Real-time automated risk assessment in protected core networking.
- Published in:
- Telecommunication Systems, 2010, v. 45, n. 2/3, p. 205, doi. 10.1007/s11235-009-9242-1
- By:
- Publication type:
- Article