International Journal of Information and Computer Security
2011 Vol.4 No.4
Pages | Title and author(s) |
295-315 | Anomaly detection via statistical learning in industrial communication networksJulian L. Rrushi DOI: 10.1504/IJICS.2011.044821 |
316-331 | Digital fingerprinting: problems and solutionsDefa Hu; Juanjuan Luo DOI: 10.1504/IJICS.2011.044822 |
332-344 | Image encryption method based on using least square error techniques at the decryption stageMahmood Al-khassaweneh DOI: 10.1504/IJICS.2011.044823 |
345-364 | A countermeasure algorithm for password guessing attacksAdesina S. Sodiya; A.A. Afolorunso; Omoniyi P. Ogunderu DOI: 10.1504/IJICS.2011.044824 |
365-388 | A logical framework for reasoning about delegation policies in workflow management systemsKhaled Gaaloul; H.A. Proper; Ehtesham Zahoor; François Charoy; Claude Godart DOI: 10.1504/IJICS.2011.044825 |