Cited By
View all- Sanguanpong SKanlayasiri U(2019)Worm damage minimization in enterprise networksInternational Journal of Human-Computer Studies10.1016/j.ijhcs.2006.09.00165:1(3-16)Online publication date: 1-Jan-2019
- Beaumont-Gay MEustice KReiher PBeznosov KKeromytis A(2008)Information protection via environmental data tethersProceedings of the 2007 Workshop on New Security Paradigms10.1145/1600176.1600188(67-73)Online publication date: 15-Jul-2008
- Traynor PChien MWeaver SHicks BMcDaniel P(2008)Noninvasive Methods for Host CertificationACM Transactions on Information and System Security10.1145/1341731.134173711:3(1-23)Online publication date: 1-Mar-2008
- Show More Cited By