Items where Division is "Faculty of Computing, Engineering and the Built Environment > School of Computing and Digital Technology > Cyber Security" and Year is 2010

Up a level
Export as [feed] RSS
Group by: Creators | Item Type | No Grouping
Jump to: B | C | H | M
Number of items: 5.

B

Brücker, A.D. and Brügger, L. and Kearney, Paul and Wolff, B. (2010) Verified firewall policy transformations for test case generation. In: Third Conference on Software Testing, Verification and Validation, Paris.

C

Chehab, Maya I. and Abdallah, Ali E. (2010) Assurance in identity management systems. In: Information Assurance and Security (IAS), 2010 Sixth International Conference. IEEE Conference Publications, pp. 216-221. ISBN 978-1-4244-7409-7

H

Haidar, A. N. and Zasada, Stefan J. and Coveney, P. V. and Abdallah, Ali E. and Beckles, B. (2010) Audited credential delegation - a user-centric identity management solution for computational grid environments. In: Information Assurance and Security (IAS), 2010 Sixth International Conference. IEEE Conference Publications, pp. 222-227. ISBN 978-1-4244-7409-7

M

Mansour, Nashat and Chehab, Maya I. and Faour, Ahmad (2010) Filtering intrusion detection alarms. Cluster Computing, 13 (1). pp. 19-29. ISSN 1386-7857

Möckel, Caroline and Abdallah, Ali E. (2010) Threat modeling approaches and tools for securing architectural designs of an e-banking application. In: Information Assurance and Security (IAS), 2010 Sixth International Conference. IEEE Conference Publications, pp. 149-154. ISBN 978-1-4244-7409-7

This list was generated on Mon Oct 25 04:27:59 2021 UTC.

Research

In this section...