2008 | ||
---|---|---|
5 | EE | Bon Sy: Secure Computation for Privacy Preserving Biometric Data Retrieval and Authentication. EuroISI 2008: 143-154 |
2006 | ||
4 | Bon Sy: 2006 International Workshop on the Application of Data Mining to Security Control: Foreword. DMIN 2006: 267-268 | |
3 | Bon Sy, Negmat Mullodzhanov: Extracting Forensic Explanation from Intrusion Alerts. DMIN 2006: 283-289 | |
2 | Mohammad Chowdhury, Bon Sy, Rasheed Ahmad: Application of Gaussian Estimation for Devising Reliable Vulnerability Assessment on SIP-based VoIP Infrastructure. Security and Management 2006: 293-299 | |
2005 | ||
1 | Bon Sy, HingHeung Chan: Anomaly Detection: A Signature-based Approach. DMIN 2005: 193-199 |
1 | Rasheed Ahmad | [2] |
2 | HingHeung Chan | [1] |
3 | Mohammad Chowdhury | [2] |
4 | Negmat Mullodzhanov | [3] |