![]() |
| 2005 | ||
|---|---|---|
| 2 | Grigorios Fragkos, Andrew Blyth: Architecture for Near Real-Time Threat Assessment Using IDS Data. ECIW 2005: 91-98 | |
| 1 | Grigorios Fragkos, Konstantinos Xynos, Andrew Blyth: The use of Computers Idle-Time and Parallel Processing Over a Network to Perform Password Threat Assessment. ECIW 2005: 99-106 | |
| 1 | Andrew Blyth | [1] [2] |
| 2 | Konstantinos Xynos | [1] |