![]() | ![]() |
2005 | ||
---|---|---|
2 | Grigorios Fragkos, Andrew Blyth: Architecture for Near Real-Time Threat Assessment Using IDS Data. ECIW 2005: 91-98 | |
1 | Grigorios Fragkos, Konstantinos Xynos, Andrew Blyth: The use of Computers Idle-Time and Parallel Processing Over a Network to Perform Password Threat Assessment. ECIW 2005: 99-106 |
1 | Andrew Blyth | [1] [2] |
2 | Konstantinos Xynos | [1] |