1

Software issues in digital forensics

Year:
2008
Language:
english
File:
PDF, 1.28 MB
english, 2008
10

On the credibility of manet simulations

Year:
2006
Language:
english
File:
PDF, 615 KB
english, 2006
12

Centers of academic excellence: a case study

Year:
2005
Language:
english
File:
PDF, 72 KB
english, 2005
13

Formal analysis of modern security protocols

Year:
2005
Language:
english
File:
PDF, 243 KB
english, 2005
14

Help! Is There a Trustworthy-Systems Doctor in the House?

Year:
2013
Language:
english
File:
PDF, 533 KB
english, 2013
15

Computer forensics education

Year:
2003
Language:
english
File:
PDF, 342 KB
english, 2003
21

Application Security Models for Mobile Agent Systems

Year:
2006
Language:
english
File:
PDF, 796 KB
english, 2006
25

E-Voting Risk Assessment

Year:
2011
Language:
english
File:
PDF, 392 KB
english, 2011
28

Adaptive gossip protocols: Managing security and redundancy in dense ad hoc networks

Year:
2007
Language:
english
File:
PDF, 293 KB
english, 2007
30

Realities of E-voting Security

Year:
2012
Language:
english
File:
PDF, 521 KB
english, 2012
32

Adaptive Threat Modeling for Secure Ad Hoc Routing Protocols

Year:
2008
Language:
english
File:
PDF, 276 KB
english, 2008
36

The Dynamics of Counting and Recounting Votes

Year:
2008
Language:
english
File:
PDF, 949 KB
english, 2008
37

Surveying security analysis techniques in manet routing protocols

Year:
2007
Language:
english
File:
PDF, 368 KB
english, 2007
39

Metadata for anomaly-based security protocol attack deduction

Year:
2004
Language:
english
File:
PDF, 575 KB
english, 2004