Font Size: a A A
Keyword [Computer Security]
Result: 81 - 98 | Page: 5 of 5
81. The adoption of computer security: An analysis of home personal computer user behavior using the health belief model
82. Improving computer security using extended static checking
83. Network security: A theory for securing computer networks against denial of service attacks
84. Machine learning techniques for the computer security domain of anomaly detection
85. Static analysis and computer security: New techniques for software assurance
86. Approaches to computer security: Filtering, testing, and detection
87. A comparative analysis of mainframe and network computer security: From 1975 to present
88. A data mining framework for constructing features and models for intrusion detection systems (Computer security, Network security)
89. An immunological model of distributed detection and its application to computer security
90. Understanding and Leveraging Virtualization Technology for Computer Security
91. A method for recommending computer-security training for software developers
92. A common approach to extending computer security concepts to the universal distributed non-trusted environment
93. Securing a personal computer
94. An assessment of the National Computer Security Center's approach for computer network security and a recommended alternative systems approac
95. COVERT-CHANNEL ANALYSIS IN SECURE COMPUTER SYSTEMS
96. Examining the End-user Perspective of Personal Computer Security: A Qualitative Q Methodology Stud
97. Automated security analysis of the home computer
98. Progressive Privilege Escalation Detection For Windows Operating System
  <<First  <Prev  Next>  Last>>  Jump to