researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Computers & Security
Home
Index
Info
Issue
Volume
26
, Issue
7-8
445
--
451
Steven Furnell
.
An assessment of website password practices
452
--
458
Ik Rae Jeong
,
Dong-Hoon Lee
.
Key agreement for key hypergraph
459
--
467
Yang Li
,
Li Guo
.
An active learning based TCM-KNN algorithm for supervised network intrusion detection
468
--
478
P. M. Rodwell
,
Steven Furnell
,
Paul L. Reynolds
.
A non-intrusive biometric authentication mechanism utilising physiological characteristics of the human head
479
--
484
Jianhua Yang
,
Shou-Hsuan Stephen Huang
.
Mining TCP/IP packets to detect stepping-stone intrusion
485
--
487
Danny Bradbury
.
The security challenges inherent in VoIP
488
--
495
Alok Sharma
,
Arun K. Pujari
,
Kuldip K. Paliwal
.
Intrusion detection using text processing techniques with a kernel based similarity measure
496
--
513
Florian P. Buchholz
,
Eugene H. Spafford
.
Run-time label propagation for forensic audit data