International Journal of Information and Computer Security
2008 Vol.2 No.2
Pages | Title and author(s) |
107-139 | Unsupervised anomaly detection using an evolutionary extension of k-means algorithmWei Lu, Issa Traore DOI: 10.1504/IJICS.2008.018513 |
140-174 | On security issues in embedded systems: challenges and solutionsLyes Khelladi, Yacine Challal, Abdelmadjid Bouabdallah, Nadjib Badache DOI: 10.1504/IJICS.2008.018515 |
175-196 | CVC-STAR: Protecting data confidentiality while increasing flexibility and quality of responsesDaniel O. Rice, Robert Garfinkel, Ram Gopal DOI: 10.1504/IJICS.2008.018517 |
197-217 | Attack recovery from malicious transactions in distributed database systemsA. Chakraborty, M.K. Garg, A.K. Majumdar, S. Sural DOI: 10.1504/IJICS.2008.018519 |
218-234 | Genetic-clustering algorithm for intrusion detection systemChien-Chuan Lin, Ming-Shi Wang DOI: 10.1504/IJICS.2008.018521 |