S. Shaikh, Howard Chivers, P. Nobles, J. A. Clark, Hao Chen
{"title":"Intrusion Detection: Towards scalable intrusion detection","authors":"S. Shaikh, Howard Chivers, P. Nobles, J. A. Clark, Hao Chen","doi":"10.1016/S1353-4858(09)70064-9","DOIUrl":"https://doi.org/10.1016/S1353-4858(09)70064-9","url":null,"abstract":"","PeriodicalId":120600,"journal":{"name":"Network Security archive","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"118338222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Virtualisation: Real security for virtual machines","authors":"Ulf T. Mattsson","doi":"10.1016/S1353-4858(09)70041-8","DOIUrl":"https://doi.org/10.1016/S1353-4858(09)70041-8","url":null,"abstract":"","PeriodicalId":120600,"journal":{"name":"Network Security archive","volume":"110 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117437812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MD5: The death of MD5","authors":"Dario V. Forte","doi":"10.1016/S1353-4858(09)70020-0","DOIUrl":"https://doi.org/10.1016/S1353-4858(09)70020-0","url":null,"abstract":"","PeriodicalId":120600,"journal":{"name":"Network Security archive","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120711577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Board's Role: Executive and board roles in information security","authors":"P. Williams","doi":"10.1016/S1353-4858(07)70073-9","DOIUrl":"https://doi.org/10.1016/S1353-4858(07)70073-9","url":null,"abstract":"","PeriodicalId":120600,"journal":{"name":"Network Security archive","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"118977769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}