Browse By Publication: Computers & Security

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Volume | Authors/Creators
Number of items: 8.

Allinson, Caroline (2001) Information Systems Audit Trails in Legal Proceedings as Evidence. Computers & Security, pp. 409-421.
Number of citations in Scopus 4
Number of citations in Web of Science® 3

Boyd, Colin, Dawson, Edward, & Viswanathan, Kapaleeswaran (2002) Hybrid Key Escrow: A New Paradigm. Computers & Security, 21(1), pp. 77-100.

Davis, Jonathan J. & Foo, Ernest (2016) Automated feature engineering for HTTP tunnel detection. Computers & Security, 59, pp. 166-185.

Davis, Jonathan Jeremy & Clark, Andrew J. (2011) Data preprocessing for anomaly based network intrusion detection : a review. Computers & Security, 30(6-7), pp. 353-375.
Number of citations in Scopus 78
Number of citations in Web of Science® 50

Djamaludin, Chris, Foo, Ernest, Camtepe, Seyit A., & Corke, Peter (2016) Revocation and update of trust in autonomous delay tolerant networks. Computers & Security, 60, pp. 15-36.

Djamaludin, Chris, Foo, Ernest, & Corke, Peter (2013) Establishing initial trust in autonomous delay tolerant networks without centralised PKI. Computers & Security.
Number of full-text downloads 105
Number of citations in Scopus 5
Number of citations in Web of Science® 3

Pham, Quan, Reid, Jason F., McCullagh, Adrian, & Dawson, Edward (2009) On a taxonomy of delegation. Computers & Security, 29(5), pp. 565-579.
Number of full-text downloads 160
Number of citations in Scopus 7
Number of citations in Web of Science® 2

Salim, Farzad, Reid, Jason F., Dulleck, Uwe, & Dawson, Edward (2013) Budget-aware role based access control. Computers & Security, 35, 37-50.
Number of full-text downloads 89
Number of citations in Scopus 3

This list was generated on Sun May 21 14:48:04 2017 AEST.