Works matching IS 15541010 AND DT 2013 AND VI 8 AND IP 6
Results: 5
Method for a Two Dimensional Honeypot to Deter Web Bots in Commerce Systems.
- Published in:
- Journal of Information Assurance & Security, 2013, v. 8, n. 6, p. 260
- By:
- Publication type:
- Article
Modeling Security Risk Factors in a Cloud Computing Environment.
- Published in:
- Journal of Information Assurance & Security, 2013, v. 8, n. 6, p. 279
- By:
- Publication type:
- Article
A Review of the Risk Factors in Computational Grid.
- Published in:
- Journal of Information Assurance & Security, 2013, v. 8, n. 6, p. 270
- By:
- Publication type:
- Article
Crowded scene Face Recognition using Multi layered clutter filtering and Independent Component Analysis.
- Published in:
- Journal of Information Assurance & Security, 2013, v. 8, n. 6, p. 240
- By:
- Publication type:
- Article
CADLA: An efficient cluster-based anomaly nodes detection for mobile ad-hoc networks: A learning automata approach.
- Published in:
- Journal of Information Assurance & Security, 2013, v. 8, n. 6, p. 250
- By:
- Publication type:
- Article