

Publisher: Taylor & Francis Ltd
ISSN: 1939-3555
Source: Information Security Journal: A Global Perspective, Vol.22, Iss.5-6, 2013-11, pp. : 226-236
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Related content




Defending against cache-based side-channel attacks
By Page D.
Information Security Technical Report, Vol. 8, Iss. 1, 2003-03 ,pp. :






Statistical anomaly detection via httpd data analysis
By Naiman D.Q.
Computational Statistics and Data Analysis, Vol. 45, Iss. 1, 2004-02 ,pp. :