
International Journal of Information and Computer Security
2008 Vol.2 No.2
| Pages | Title and author(s) |
| 107-139 | Unsupervised anomaly detection using an evolutionary extension of k-means algorithmWei Lu, Issa Traore DOI: 10.1504/IJICS.2008.018513 |
| 140-174 | On security issues in embedded systems: challenges and solutionsLyes Khelladi, Yacine Challal, Abdelmadjid Bouabdallah, Nadjib Badache DOI: 10.1504/IJICS.2008.018515 |
| 175-196 | CVC-STAR: Protecting data confidentiality while increasing flexibility and quality of responsesDaniel O. Rice, Robert Garfinkel, Ram Gopal DOI: 10.1504/IJICS.2008.018517 |
| 197-217 | Attack recovery from malicious transactions in distributed database systemsA. Chakraborty, M.K. Garg, A.K. Majumdar, S. Sural DOI: 10.1504/IJICS.2008.018519 |
| 218-234 | Genetic-clustering algorithm for intrusion detection systemChien-Chuan Lin, Ming-Shi Wang DOI: 10.1504/IJICS.2008.018521 |