Abstract is missing.
- An intruder model for trust negotiationPhilippe Balbiani, Yannick Chevalier, Marwa El Houri. 1-8 [doi]
- Mitigation of topology control traffic attacks in OLSR networksGimer Cervera, Michel Barbeau, Joaquín García-Alfaro, Evangelos Kranakis. 1-8 [doi]
- SAFE-OS: A secure and usable desktop operating systemFrançois Lesueur, Ala Rezmerita, Thomas Hérault, Sylvain Peyronnet, Sébastien Tixeuil. 1-7 [doi]
- Performance assessment of a distributed intrusion detection system in a real network scenarioSalvatore D'Antonio, Valerio Formicola, Claudio Mazzariello, Francesco Oliviero, Simon Pietro Romano. 1-8 [doi]
- Towards Internet voting security: A threat tree for risk assessmentJ. Harold Pardue, Alec Yasinsac, Jeffrey P. Landry. 1-7 [doi]
- Not so fast flux networks for concealing scam serversTheodore O. Cochran, James Cannady. 1-8 [doi]
- A new payment protocol over the InternetPierre Girard, Karine Villegas, Jean-Louis Lanet, Aude Plateaux. 1-6 [doi]
- Solution to the wireless evil-twin transmitter attackPayal Bhatia, Christine Laurendeau, Michel Barbeau. 1-7 [doi]
- Satisfiability of general intruder constraints with a set constructorTigran Avanesov, Yannick Chevalier, Michaël Rusinowitch, Mathieu Turuani. 1-8 [doi]
- A multi-view approach for embedded information system securityManuel Munier. 1-8 [doi]
- Insights from the analysis of the Mariposa botnetProsenjit Sinha, Amine Boukhtouta, Victor Heber Belarde, Mourad Debbabi. 1-9 [doi]
- Host-based anomaly detection for pervasive medical systemsBiniyam Asfaw, Dawit Bekele, Birhanu Eshete, Adolfo Villafiorita, Komminist Weldemariam. 1-8 [doi]