AAAAAA

   
Results: 1-7 |
Results: 7

Authors: SOH BC YOUNG S
Citation: Bc. Soh et S. Young, DISTRIBUTED COMPUTING - AN EXPERIMENTAL INVESTIGATION OF A MALICIOUS DENIAL-OF-SERVICE APPLET, Computer communications, 21(7), 1998, pp. 670-674

Authors: SOH BC YOUNG S
Citation: Bc. Soh et S. Young, NETWORK SYSTEM AND WORLD-WIDE-WEB SECURITY, Computer communications, 20(16), 1998, pp. 1431-1436

Authors: SOH BC DILLON TS
Citation: Bc. Soh et Ts. Dillon, SYSTEM INTRUSION PROCESSES - A SIMULATION-MODEL, Computers & security, 16(1), 1997, pp. 71-79

Authors: SOH BC DILLON TS
Citation: Bc. Soh et Ts. Dillon, HARDWARE FAULT LATENCY - PROBLEM FORMULATION AND SOLUTION, Microelectronics and reliability, 36(9), 1996, pp. 1223-1230

Authors: SOH BC DILLON TS
Citation: Bc. Soh et Ts. Dillon, HARDWARE FAULT LATENCY - MODEL VALIDATION, Microelectronics and reliability, 36(9), 1996, pp. 1231-1235

Authors: SOH BC DILLON TS COUNTY P
Citation: Bc. Soh et al., QUANTITATIVE RISK ASSESSMENT OF COMPUTER VIRUS ATTACKS ON COMPUTER-NETWORKS, Computer networks and ISDN systems, 27(10), 1995, pp. 1447-1456

Authors: SOH BC DILLON TS
Citation: Bc. Soh et Ts. Dillon, SETTING OPTIMAL INTRUSION-DETECTION THRESHOLDS, Computers & security, 14(7), 1995, pp. 621-631
Risultati: 1-7 |