Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
199 | Tangjianfeng, Huangxianbin, Wangjicheng |
Research of mainframe CICS application integration using CICS SCA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS 2009), Seoul, Korea, 24-26 November 2009, pp. 1274-1277, 2009, ACM, 978-1-60558-710-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
SOA, integration, SCA, CICS, mainframe |
105 | Nandita Chaudhri, Shefali S. Dash |
Community information centers: e-governance at subdistrict level: a case study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEGOV ![In: Proceedings of the 1st International Conference on Theory and Practice of Electronic Governance, ICEGOV 2007, Macao, China, December 10-13, 2007, pp. 366-369, 2007, ACM, 978-1-59593-822-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
citizen services, internet kiosks, permanent account number (PAN), telecentres, education, e-governance, IT, entertainment, information services |
84 | Shefali S. Dash, Nandita Chaudhri |
Community information centres---enabling e-governance in India: lessons learnt. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEGOV ![In: Proceedings of the 2nd International Conference on Theory and Practice of Electronic Governance, ICEGOV 2008, Cairo, Egypt, December 1-4, 2008, pp. 478-479, 2008, ACM, 978-1-60558-386-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
citizen services, internet kiosks, tele-centres, education, e-governance, entertainment, information services |
65 | Leo Freitas, Konstantinos Mokos, Jim Woodcock 0001 |
Verifying the CICS File Control API with Z/Eves: An Experiment in the Verified Software Repository. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICECCS ![In: 12th International Conference on Engineering of Complex Computer Systems (ICECCS 2007), 10-14 July 2007, Auckland, New Zealand, pp. 290-298, 2007, IEEE Computer Society, 978-0-7695-2895-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
63 | Kun Lu, Fengqi Li, Jizhen Niu, Ling Xie |
Design and Realization of High-Reliability Courses Selection System Based on Mainframe. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (5) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 5: E-learning and Knowledge Management / Socially Informed and Instructinal Design / Learning Systems Platforms and Architectures / Modeling and Representation / Other Applications , December 12-14, 2008, Wuhan, China, pp. 753-756, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
50 | Alex Sellink, Chris Verhoef, Harry M. Sneed |
Restructuring of COBOL/CICS Legacy Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSMR ![In: 3rd European Conference on Software Maintenance and Reengineering (CSMR '99), 3-5 March 1999, Amsterdam, The Netherlands, pp. 72-82, 1999, IEEE Computer Society, 0-7695-0090-0. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Teleprocessing system, Control-flow normalization, Repartitioning, Reengineering, COBOL, Transaction processing system, System renovation, Remodularization, CICS |
50 | Kenneth Fussichen |
Ada and CICS: or (yes! Ada can be done on an IBM Mainframe). ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRI-Ada ![In: Conference Proceedings on TRI-Ada 1992, Orlando, Florida USA, November 17-20, 1992., pp. 415-422, 1992, ACM, 0-89791-529-1. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
Ada, CICS |
47 | |
2014 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2014, Orlando, FL, USA, December 9-12, 2014 ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![IEEE, 978-1-4799-4522-1 The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
47 | Eray Balkanli, Jander Alves, Nur Zincir-Heywood |
Supervised learning to detect DDoS attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2014 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2014, Orlando, FL, USA, December 9-12, 2014, pp. 50-57, 2014, IEEE, 978-1-4799-4522-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
47 | Khalid Shahbar, Nur Zincir-Heywood |
Benchmarking two techniques for Tor classification: Flow level and circuit level classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2014 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2014, Orlando, FL, USA, December 9-12, 2014, pp. 58-65, 2014, IEEE, 978-1-4799-4522-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
47 | Sebastian Obermeier 0001, Michael Wahler, Thanikesavan Sivanthi, Roman Schlegel, Aurelien Monot |
Automatic attack surface reduction in next-generation industrial control systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2014 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2014, Orlando, FL, USA, December 9-12, 2014, pp. 42-49, 2014, IEEE, 978-1-4799-4522-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
47 | Foaad Khosmood, Phillip L. Nico, Jonathan Woolery |
User identification through command history analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2014 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2014, Orlando, FL, USA, December 9-12, 2014, pp. 19-25, 2014, IEEE, 978-1-4799-4522-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
47 | Mohiuddin Solaimani, Mohammed Iftekhar, Latifur Khan, Bhavani Thuraisingham, Joey Burton Ingram |
Spark-based anomaly detection over multi-source VMware performance data in real-time. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2014 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2014, Orlando, FL, USA, December 9-12, 2014, pp. 66-73, 2014, IEEE, 978-1-4799-4522-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
47 | Ugur Pehlivan, Nuray Baltaci, Cengiz Acartürk, Nazife Baykal |
The analysis of feature selection methods and classification algorithms in permission based Android malware detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2014 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2014, Orlando, FL, USA, December 9-12, 2014, pp. 81-88, 2014, IEEE, 978-1-4799-4522-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
47 | El-Sayed M. El-Alfy, Ali A. Al-Hasan |
A novel bio-inspired predictive model for spam filtering based on dendritic cell algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2014 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2014, Orlando, FL, USA, December 9-12, 2014, pp. 89-95, 2014, IEEE, 978-1-4799-4522-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
47 | Carlos A. S. Assis, Adriano César Machado Pereira, Marconi de Arruda Pereira, Eduardo G. Carrano |
A genetic programming approach for fraud detection in electronic transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2014 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2014, Orlando, FL, USA, December 9-12, 2014, pp. 96-103, 2014, IEEE, 978-1-4799-4522-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
47 | Arisoa S. Randrianasolo, Larry D. Pyeatt |
A theoretical Q-learning temporary security repair. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2014 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2014, Orlando, FL, USA, December 9-12, 2014, pp. 74-80, 2014, IEEE, 978-1-4799-4522-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
47 | Anis Ben Aissa, Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili 0001 |
Quantifying the impact of unavailability in cyber-physical environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2014 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2014, Orlando, FL, USA, December 9-12, 2014, pp. 26-33, 2014, IEEE, 978-1-4799-4522-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
47 | Karel P. Bergmann, Jörg Denzinger |
Automated testing for cyber threats to ad-hoc wireless networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2014 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2014, Orlando, FL, USA, December 9-12, 2014, pp. 34-41, 2014, IEEE, 978-1-4799-4522-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
47 | Dipankar Dasgupta, Denise Ferebee, Sanjib Kumar Saha, Abhijit Kumar Nag, Kul Prasad Subedi, Alvaro Madero, Abel Sanchez, John R. Williams |
G-NAS: A grid-based approach for negative authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2014 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2014, Orlando, FL, USA, December 9-12, 2014, pp. 9-18, 2014, IEEE, 978-1-4799-4522-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
47 | El-Sayed M. El-Alfy, Asem A. Ghaleb |
Biobjective NSGA-II for optimal spread spectrum watermarking of color frames: Evaluation study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2014 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2014, Orlando, FL, USA, December 9-12, 2014, pp. 1-8, 2014, IEEE, 978-1-4799-4522-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
47 | |
Proceedings of the 2013 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2013, IEEE Symposium Series on Computational Intelligence (SSCI), 16-19 April 2013, Singapore ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![IEEE, 978-1-4673-5867-5 The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
47 | Hossein Rahimi, Nur Zincir-Heywood, Bharat Gadher |
Indoor geo-fencing and access control for wireless networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: Proceedings of the 2013 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2013, IEEE Symposium Series on Computational Intelligence (SSCI), 16-19 April 2013, Singapore, pp. 1-8, 2013, IEEE, 978-1-4673-5867-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
47 | Kesav Kancherla, Srinivas Mukkamala |
Image visualization based malware detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: Proceedings of the 2013 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2013, IEEE Symposium Series on Computational Intelligence (SSCI), 16-19 April 2013, Singapore, pp. 40-44, 2013, IEEE, 978-1-4673-5867-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
47 | Sanjay Rawat 0001, Fabien Duchene, Roland Groz, Jean-Luc Richier |
Evolving indigestible codes: Fuzzing interpreters with genetic programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: Proceedings of the 2013 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2013, IEEE Symposium Series on Computational Intelligence (SSCI), 16-19 April 2013, Singapore, pp. 37-39, 2013, IEEE, 978-1-4673-5867-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
47 | Hector M. Lugo-Cordero, Ratan K. Guha |
What defines an intruder? An intelligent approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: Proceedings of the 2013 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2013, IEEE Symposium Series on Computational Intelligence (SSCI), 16-19 April 2013, Singapore, pp. 31-36, 2013, IEEE, 978-1-4673-5867-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
47 | Mahendra Piraveenan, Shahadat Uddin, Kon Shing Kenneth Chung, Dharshana Kasthurirathna |
Quantifying encircling behaviour in complex networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: Proceedings of the 2013 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2013, IEEE Symposium Series on Computational Intelligence (SSCI), 16-19 April 2013, Singapore, pp. 9-14, 2013, IEEE, 978-1-4673-5867-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
47 | Marcos Álvares Barbosa Junior, Tshilidzi Marwala, Fernando Buarque de Lima Neto |
Applications of computational intelligence for static software checking against memory corruption vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: Proceedings of the 2013 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2013, IEEE Symposium Series on Computational Intelligence (SSCI), 16-19 April 2013, Singapore, pp. 59-66, 2013, IEEE, 978-1-4673-5867-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
47 | Simon Miller, Jonathan M. Garibaldi, Susan Appleby |
Evolving OWA operators for cyber security decision making problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: Proceedings of the 2013 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2013, IEEE Symposium Series on Computational Intelligence (SSCI), 16-19 April 2013, Singapore, pp. 15-22, 2013, IEEE, 978-1-4673-5867-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
47 | S. Ganesh Babu, Ilango Paramasivam |
Higher dimensional chaos for Audio encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: Proceedings of the 2013 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2013, IEEE Symposium Series on Computational Intelligence (SSCI), 16-19 April 2013, Singapore, pp. 52-58, 2013, IEEE, 978-1-4673-5867-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
47 | Shubhalaxmi Kher, Victor Nutt, Dipankar Dasgupta |
Resilient hybrid overlay model for smart grid: RHM for smart grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: Proceedings of the 2013 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2013, IEEE Symposium Series on Computational Intelligence (SSCI), 16-19 April 2013, Singapore, pp. 45-51, 2013, IEEE, 978-1-4673-5867-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
47 | Chirag Modi 0001, Dhiren R. Patel |
A novel hybrid-network intrusion detection system (H-NIDS) in cloud computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: Proceedings of the 2013 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2013, IEEE Symposium Series on Computational Intelligence (SSCI), 16-19 April 2013, Singapore, pp. 23-30, 2013, IEEE, 978-1-4673-5867-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
47 | |
2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011 ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![IEEE, 978-1-4244-9904-5 The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
47 | Robert K. Abercrombie, Erik M. Ferragut, Frederick T. Sheldon, Michael R. Grimaila |
Addressing the need for independence in the CSE model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 68-75, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
47 | Scott Musman, Mike Tanner, Aaron Temin, Evan Elsaesser, Lewis Loren |
A systems engineering approach for crown jewels estimation and mission assurance decision making. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 210-216, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
47 | Anita Zakrzewska, Erik M. Ferragut |
Modeling cyber conflicts using an extended Petri Net formalism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 60-67, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
47 | Erik M. Ferragut, David M. Darmon, Craig Aaron Shue, Stephen Kelley |
Automatic construction of anomaly detectors from graphical models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 9-16, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
47 | Ran Liu, Wenjian Luo, Xufa Wang |
A Hybrid of the prefix algorithm and the q-hidden algorithm for generating single negative databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 31-38, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
47 | Justin M. Beaver, Robert M. Patton, Thomas E. Potok |
An approach to the automated determination of host information value. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 92-99, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
47 | Amal Ben Hamida, Mohamed Koubàa, Chokri Ben Amar, Henri Nicolas |
Hierarchical traceability of multimedia documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 108-113, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
47 | Yi Hu, Charles E. Frank, James Walden, Emily Crawford, Dhanuja Kasturiratna |
Profiling file repository access patterns for identifying data exfiltration activities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 122-128, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
47 | Paul K. Harmer, Ryan W. Thomas, Brady Christel, Richard K. Martin, Clifton Watson |
Wireless security situation awareness with attack identification decision support. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 144-151, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
47 | James L. Miller, Robert F. Mills, Michael R. Grimaila, Michael W. Haas |
A scalable architecture for improving the timeliness and relevance of cyber incident notifications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 76-83, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
47 | Justin Zhan, Xing Fang, Peter Killion |
Trust optimization in task-oriented social networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 137-143, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
47 | Omar Al-Ibrahim, Suku Nair |
Security fusion based on state machine compositions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 39-46, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
47 | Harkeerat Singh Bedi, Sankardas Roy, Sajjan G. Shiva |
Game theory-based defense mechanisms against DDoS attacks on TCP/TCP-friendly flows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 129-136, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
47 | Stephen M. Woskov, Michael R. Grimaila, Robert F. Mills, Michael W. Haas |
Design considerations for a case-based reasoning engine for scenario-based cyber incident notification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 84-91, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
47 | Dean Lee, Samuel N. Hamilton, Wendy L. Hamilton |
Modeling Cyber Knowledge uncertainty. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 25-30, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
47 | Sara Hajian, Josep Domingo-Ferrer, Antoni Martínez-Ballesté |
Discrimination prevention in data mining for intrusion and crime detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 47-54, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
47 | Martin Rehák, Jan Stiborek, Martin Grill |
Intelligence, not integration: Distributed regret minimization for IDS Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 217-224, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
47 | Senhua Yu, Dipankar Dasgupta |
An effective network-based Intrusion Detection using Conserved Self Pattern Recognition Algorithm augmented with near-deterministic detector generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 17-24, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
47 | Justin Zhan, Lijo Thomas |
Phishing detection using stochastic learning-based weak estimators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 55-59, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
47 | Justin Zhan, Xing Fang, Naveen Bandaru |
Location privacy protection on social networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 160-163, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
47 | Jennifer T. Jackson, Sadie Creese, Mark S. Leeson |
Biodiversity: A security approach for ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 186-193, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
47 | David L. Hancock, Gary B. Lamont |
Multi agent systems on military networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 100-107, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
47 | Ferdous A. Barbhuiya, Santosh Biswas, Neminath Hubballi, Sukumar Nandi |
A host based DES approach for detecting ARP spoofing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 114-121, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
47 | Denise Ferebee, Dipankar Dasgupta, Michael Schmidt, Qishi Wu |
Security visualization: Cyber security storm map and event correlation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 171-178, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
47 | Carlos Bacquet, Nur Zincir-Heywood, Malcolm I. Heywood |
Genetic optimization and hierarchical clustering applied to encrypted traffic identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 194-201, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
47 | Patrick LaRoche, Nur Zincir-Heywood, Malcolm I. Heywood |
Exploring the state space of an application protocol: A case study of SMTP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 152-159, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
47 | Ondrej Linda, Milos Manic, Todd Vollmer, Jason L. Wright |
Fuzzy logic based anomaly detection for embedded network security cyber sensor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 202-209, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
47 | Todd Vollmer, Jim Alves-Foss, Milos Manic |
Autonomous rule creation for intrusion detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 1-8, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
47 | |
2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009 ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![IEEE, 978-1-4244-2769-7 The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
47 | Masanoei Hara, Akira Yamada 0001, Yutaka Miyake |
Visual similarity-based phishing detection without victim site information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, pp. 30-36, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Hoin Kim, Inyong Lee, Jaeik Cho, Jongsub Moon |
Visualization of network components for attack analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, pp. 1-8, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Bobby D. Birrer, Richard A. Raines, Rusty O. Baldwin, Mark E. Oxley, Steven K. Rogers |
Using qualia and multi-layered relationships in malware detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, pp. 91-98, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Suvasini Panigrahi, Shamik Sural, Arun K. Majumdar |
Detection of intrusive activity in databases by combining multiple evidences and belief update. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, pp. 83-90, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Qishi Wu, Denise Ferebee, Yunyue Lin, Dipankar Dasgupta |
Visualization of security events using an efficient correlation technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, pp. 61-68, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Eric S. Imsand, Deon Garrett, John A. Hamilton Jr. |
User identification using GUI manipulation patterns and artificial neural networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, pp. 130-135, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Li Yang 0001, Feiqiong Liu, Joseph M. Kizza, Raimund K. Ege |
Discovering topics from dark websites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, pp. 175-179, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Joseph A. Brown, Sheridan K. Houghten, Beatrice M. Ombuki-Berman |
Genetic algorithm cryptanalysis of a substitution permutation network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, pp. 115-121, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Nikolaos Chatzis, Radu Popescu-Zeletin, Nevil Brownlee |
Email worm detection by wavelet analysis of DNS query streams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, pp. 53-60, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Dipankar Dasgupta |
Tutorial: computational intelligence in cyber security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Hilmi Günes Kayacik, Nur Zincir-Heywood, Malcolm I. Heywood, Stefan Burschka |
Generating mimicry attacks using genetic programming: A benchmarking study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, pp. 136-143, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Siddharth Gujral, Estefan Ortiz, Vassilis L. Syrmos |
An unsupervised method for intrusion detection using spectral clustering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, pp. 99-106, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Sourour Meharouech, Adel Bouhoula, Tarek Abbes |
Environmental awareness intrusion detection and prevention system toward reducing false positives and false negatives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, pp. 107-114, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Eric M. Holloway, Gary B. Lamont, Gilbert L. Peterson |
Network security using self organized multi agent swarms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, pp. 144-151, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Chet Langin, Hongbo Zhou 0001, Shahram Rahimi 0001, Bidyut Gupta, Mehdi R. Zargham, Mohammad R. Sayeh |
A self-organizing map and its modeling for discovering malignant network traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, pp. 122-129, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Stephen Torri, Winard Britt, John A. Hamilton Jr. |
A compiler classification framework for use in reverse engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, pp. 159-166, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Jiang Bian 0001, Remzi Seker |
JigDFS: A secure distributed file system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, pp. 76-82, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Manhyun Chung, Jaeik Cho, Jongsub Moon |
An effective denial of service detection method using kernel based data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, pp. 9-12, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Archana Bhattarai, Vasile Rus, Dipankar Dasgupta |
Characterizing comment spam in the blogosphere through content analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, pp. 37-44, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Minsoo Lee, Xiaohui Ye, Samuel D. Johnson, Dan Marconett, Chaitanya S. K. Vadrevu, Rao Vemuri 0001, S. J. Ben Yoo |
Cognitive security management with reputation based cooperation schemes in heterogeneous networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, pp. 19-23, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili 0001 |
Managing complex IT security processes with value based measures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, pp. 69-75, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Ran Tao, Li Yang 0001, Lu Peng 0001, Bin Li 0008, Alma Cemerlic |
A case study: Using architectural features to improve sophisticated denial-of-service attack detections. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, pp. 13-18, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Riyad Alshammari, Nur Zincir-Heywood |
Generalization of signatures for SSH encrypted traffic identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, pp. 167-174, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Ochul Kwon, Seongjae Bae, Jaeik Cho, Jongsub Moon |
Study of fuzzy clustering methods for malicious codes using native API call frequency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, pp. 24-29, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Sahin Renckes, Huseyin Polat 0001, Yusuf Oysal |
Finding the state sequence maximizing P(O; I|λ) on distributed HMMs with Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, pp. 152-158, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Rajesh Kumar Pal, Indranil Sengupta 0001 |
Enhancing file data security in linux operating system by integrating secure file system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, pp. 45-52, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Fred Stefan, Paul Herrmann 0001, Wilhelm G. Spruth |
Was geschrieben ist, ist geschrieben - Legacy CICS-Anwendungen im neuen Gewand (What is written, is written - Modern Legacy CICS-Applications). ![Search on Bibsonomy](Pics/bibsonomy.png) |
it Inf. Technol. ![In: it Inf. Technol. 51(1), pp. 57-61, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Ted C. Keller |
CPU Usage in CICS/ESA and CICS/MVS Measures, Meanings, and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. CMG Conference ![In: 18th International Computer Measurement Group Conference, December 7-11, 1992, Reno, Nevada, USA, Proceedings, pp. 1144-1153, 1992, Computer Measurement Group. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP BibTeX RDF |
|
47 | H. W. Barry Merrill |
Performance Evaluation of CICS Using SAS and the CICS Performance Analyzer Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. CMG Conference ![In: Fifth International Computer Measurement Group Conference, Dallas, TX, USA, December 4-7, 1979, Proceedings, pp. 235-247, 1979, Computer Measurement Group. The full citation details ...](Pics/full.jpeg) |
1979 |
DBLP BibTeX RDF |
|
44 | Johanna Ekua Awotwi, George Owusu |
Ghana's community information centers (CiCs): e-governance success or mirage? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEGOV ![In: ICEGOV 2009, Proceedings of the 3rd International Conference on Theory and Practice of Electronic Governance, Bogota, Colombia, November 10-13, 2009, pp. 305-310, 2009, ACM, 978-1-60558-663-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
community information centres, telecentres, e-governance, digital divide, mobile telephony, illiteracy |
44 | Tang Jianfeng, Zhang Xianing |
Mainframe Application Transition to SOA Environment Using CICS Service Flow Feature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (2) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 2: Software Engineering, December 12-14, 2008, Wuhan, China, pp. 404-408, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
44 | Jonathan Hoare, Jeremy Dick, David Neilson, Ib Holm Sørensen |
Applying the B Technologies on CICS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FME ![In: FME '96: Industrial Benefit and Advances in Formal Methods, Third International Symposium of Formal Methods Europe, Co-Sponsored by IFIP WG 14.3, Oxford, UK, March 18-22, 1996, Proceedings, pp. 74-84, 1996, Springer, 3-540-60973-3. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
44 | Hilton Chen, Wayne Summers |
IBM 3270 full screen interactive programming without CICS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 19th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 1988, Atlanta, Georgia, USA, February 25-26, 1988, pp. 219-222, 1988, ACM, 978-0-89791-256-3. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
COBOL |
42 | C. Mohan 0001 |
Tutorial: application servers and associated technologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, Madison, Wisconsin, USA, June 3-6, 2002, pp. 636, 2002, ACM, 1-58113-497-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Java, XML |
27 | Marc Beyerle, Joachim Franz, Wilhelm G. Spruth |
Persistent Reusable Java Virtual Machine unter z/OS und Linux. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inform. Forsch. Entwickl. ![In: Inform. Forsch. Entwickl. 20(1-2), pp. 102-111, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
ACID, Persistent Reusable Java Virtual Machine, PRJVM, OS/390, Serial Reusability, zLinux, z/OS, zSeries, Transaction, JVM, IMS, J2EE, DB2, EJB, WebSphere, CICS |
27 | Olaf Zimmermann, Sven Milinski, Michael Craes, Frank Oellermann |
Second generation web services-oriented architecture in production in the finance industry. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OOPSLA Companion ![In: Companion to the 19th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA 2004, October 24-28, 2004, Vancouver, BC, Canada, pp. 283-289, 2004, ACM, 1-58113-833-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
core banking, web services, XML, service-oriented architecture, software architecture, compression, web application, business process, HTTP, XML schema, SOAP, enterprise application integration, WSDL, application server, UDDI, webSphere, CICS |
27 | Harry M. Sneed |
Generation of Stateless Components from Procedural Programs for Reuse in a Distributed System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSMR ![In: 4th European Conference on Software Maintenance and Reengineering, CSMR 2000, Zurich, Switzerland, February 29 - March 3, 2000., pp. 183-188, 2000, IEEE Computer Society, 0-7695-0546-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Stateless Components, Host Networking, Reengineering, Intranet, COBOL, Client/Server, Wrapping, CICS |
27 | J. H. Chang, H. H. Chao, K. Lewis, M. Holland |
Control store implementation of a high performance VLSI CISC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MICRO ![In: Proceedings of the 21st Annual Workshop and Symposium on Microprogramming and Microarchitecture, 1988, San Diego, California, USA, November 28 - December 2, 1988, pp. 79-82, 1988, ACM/IEEE, 0-8186-1919-8. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP BibTeX RDF |
CICS/VS |