|
Conferences in DBLP
Pushing Boulders Uphill: The Difficulty of Network Intrusion Recovery. [Citation Graph (, )][DBLP]
Two-Person Control Administation: Preventing Administation Faults through Duplication. [Citation Graph (, )][DBLP]
The Water Fountain vs. the Fire Hose: An Examination and Comparison of Two Large Enterprise Mail Service Migrations. [Citation Graph (, )][DBLP]
Crossbow Virtual Wire: Network in a Box. [Citation Graph (, )][DBLP]
EVA: A Framework for Network Analysis and Risk Assessment. [Citation Graph (, )][DBLP]
An Analysis of Network Configuration Artifacts. [Citation Graph (, )][DBLP]
Secure Passwords Through Enhanced Hashing. [Citation Graph (, )][DBLP]
SEEdit: SELinux Security Policy Configuration System with Higher Level Language. [Citation Graph (, )][DBLP]
An SSH-based Toolkit for User-based Network Services. [Citation Graph (, )][DBLP]
Federated Access Control and Workflow Enforcement in Systems Configuration. [Citation Graph (, )][DBLP]
CIMDIFF: Advanced Difference Tracking Tool for CIM Compliant Devices. [Citation Graph (, )][DBLP]
Transparent Mobile Storage Protection in Trusted Virtual Domains. [Citation Graph (, )][DBLP]
|