The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for IMF with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2002-2004 (16) 2005-2006 (25) 2007 (15) 2008 (25) 2009 (18) 2011-2013 (32) 2014-2015 (24) 2016-2019 (15) 2021-2023 (21)
Publication types (Num. hits)
article(36) inproceedings(146) proceedings(9)
Venues (Conferences, Journals, ...)
IMF(110) Sensors(5) CoRR(4) Ann. Oper. Res.(2) Axioms(2) ICPR (2)(2) IEEE Access(2) ACM Multimedia(1) Appl. Intell.(1) BIBE(1) CCECE(1) CCS(1) CSSE (1)(1) Dublin Core Conference(1) EMBC(1) Entropy(1) More (+10 of total 71)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 19 occurrences of 14 keywords

Results
Found 191 publication records. Showing 191 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
109Fang Dai, Nanning Zheng 0001, Jianru Xue Integrating EMD and Gradient for Generating Primal Sketch of Natural Images. Search on Bibsonomy ICPR (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
88Dennis Leech Voting Power in the Governance of the International Monetary Fund. Search on Bibsonomy Ann. Oper. Res. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF power indices, Banzhaf index, Coleman index, IMF, Keynes
73Tung-Chieh Chen, Yao-Wen Chang, Shyh-Chang Lin A New Multilevel Framework for Large-Scale Interconnect-Driven Floorplanning. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
73Denis Donnelly Enhanced Empirical Mode Decomposition. Search on Bibsonomy ICCSA (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Hilbert spectral analysis, proto-intrinsic mode functions, time-series, empirical mode decomposition, Hilbert-Huang transform
59José M. Alonso-Meijide, C. Bowles Generating Functions for Coalitional Power Indices: An Application to the IMF. Search on Bibsonomy Ann. Oper. Res. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF coalitional value, IMF, generating function, simple game
49Jana Dittmann, Holger Morgenstern (eds.) Ninth International Conference on IT Security Incident Management & IT Forensics, IMF 2015, Magdeburg, Germany, May 18-20, 2015 Search on Bibsonomy IMF The full citation details ... 2015 DBLP  BibTeX  RDF
49Ulf Losche, Maik Morgenstern, Hendrik Pilz Platform Independent Malware Analysis Framework. Search on Bibsonomy IMF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
49Felix C. Freiling, Michael Gruhn What is Essential Data in Digital Forensic Analysis? Search on Bibsonomy IMF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
49Stefan Kiltz, Jana Dittmann, Claus Vielhauer Supporting Forensic Design - A Course Profile to Teach Forensics. Search on Bibsonomy IMF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
49Christof Kier, Gerald Madlmayr, Alexander Nawratil, Michael Schafferer, Christian Schanes, Thomas Grechenig Mobile Payment Fraud: A Practical View on the Technical Architecture and Starting Points for Forensic Analysis of New Attack Scenarios. Search on Bibsonomy IMF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
49Felix Ramisch, Martin Rieger Recovery of SQLite Data Using Expired Indexes. Search on Bibsonomy IMF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
49Michael Gruhn Windows NT pagefile.sys Virtual Memory Analysis. Search on Bibsonomy IMF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
49Michael Schiefer Smart Home Definition and Security Threats. Search on Bibsonomy IMF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
49Sven Ossenbuhl, Jessica Steinberger, Harald Baier Towards Automated Incident Handling: How to Select an Appropriate Response against a Network-Based Attack? Search on Bibsonomy IMF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
49Andreas Dewald Characteristic Evidence, Counter Evidence and Reconstruction Problems in Forensic Computing. Search on Bibsonomy IMF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
49Ronny Merkel Latent Fingerprint Aging from a Hyperspectral Perspective: First Qualitative Degradation Studies Using UV/VIS Spectroscopy. Search on Bibsonomy IMF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
49Knut Bellin, Reiner Creutzburg Conception of a Master Course for IT and Media Forensics Part II: Android Forensics. Search on Bibsonomy IMF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
49Simon Thurner, Marcel Grun, Sven Schmitt, Harald Baier Improving the Detection of Encrypted Data on Storage Devices. Search on Bibsonomy IMF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
49Felix C. Freiling, Holger Morgenstern, Sandra Frings, Oliver Göbel 0001, Detlef Günther, Jens Nedon, Dirk Schadt (eds.) Eighth International Conference on IT Security Incident Management & IT Forensics, IMF 2014, Münster, Germany, May 12-14, 2014 Search on Bibsonomy IMF The full citation details ... 2014 DBLP  BibTeX  RDF
49Niklas Fechner, Matthias Kirchner The Humming Hum: Background Noise as a Carrier of ENF Artifacts in Mobile Device Audio Recordings. Search on Bibsonomy IMF The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
49Harald Baier, Julian Knauer AFAUC - Anti-forensics of Storage Devices by Alternative Use of Communication Channels. Search on Bibsonomy IMF The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
49Cathrine Hove, Marte Tarnes, Maria B. Line, Karin Bernsmed Information Security Incident Management: Identified Practice in Large Organizations. Search on Bibsonomy IMF The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
49Robert Altschaffel, Jana Dittmann, Christian Krätzer, Stefan Kiltz A Hierarchical Model for the Description of Internet-Based Communication. Search on Bibsonomy IMF The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
49Maria B. Line, Inger Anne Tøndel, Martin Gilje Jaatun Information Security Incident Management: Planning for Failure. Search on Bibsonomy IMF The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
49Alexander Harsch, Steffen Idler, Simon Thurner Assuming a State of Compromise: A Best Practise Approach for SMEs on Incident Response Management. Search on Bibsonomy IMF The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
49Christian Hilgers, Holger Macht, Tilo Müller, Michael Spreitzenbarth Post-Mortem Memory Analysis of Cold-Booted Android Devices. Search on Bibsonomy IMF The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
49Holger Morgenstern, Ralf Ehlert, Felix C. Freiling, Sandra Frings, Oliver Göbel 0001, Detlef Günther, Stefan Kiltz, Jens Nedon, Dirk Schadt (eds.) Seventh International Conference on IT Security Incident Management and IT Forensics, IMF 2013, Nuremberg, Germany, March 12-14, 2013 Search on Bibsonomy IMF The full citation details ... 2013 DBLP  BibTeX  RDF
49Stefan Rass, Sebastian Kurowski On Bayesian Trust and Risk Forecasting for Compound Systems. Search on Bibsonomy IMF The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
49Sven Kälber, Andreas Dewald, Felix C. Freiling Forensic Application-Fingerprinting Based on File System Metadata. Search on Bibsonomy IMF The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
49Stefan Vömel, Hermann Lenz Visualizing Indicators of Rootkit Infections in Memory Forensics. Search on Bibsonomy IMF The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
49Matthias Trojahn, Lei Pan 0002, Fabian Schmidt Developing a Cloud Computing Based Approach for Forensic Analysis Using OCR. Search on Bibsonomy IMF The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
49Martin Wundram, Felix C. Freiling, Christian Moch Anti-forensics: The Next Step in Digital Forensics Tool Testing. Search on Bibsonomy IMF The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
49Johannes Stüttgen, Andreas Dewald, Felix C. Freiling Selective Imaging Revisited. Search on Bibsonomy IMF The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
49Frank Breitinger, Knut Petter Astebol, Harald Baier, Christoph Busch 0001 mvHash-B - A New Approach for Similarity Preserving Hashing. Search on Bibsonomy IMF The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
49Robert Floodeen, John Haller, Brett C. Tjaden Identifying a Shared Mental Model Among Incident Responders. Search on Bibsonomy IMF The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
49Maria B. Line A Case Study: Preparing for the Smart Grids - Identifying Current Practice for Information Security Incident Management in the Power Industry. Search on Bibsonomy IMF The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
49Robert Altschaffel, Robert Clausing, Christian Kraetzer, Tobias Hoppe, Stefan Kiltz, Jana Dittmann Statistical Pattern Recognition Based Content Analysis on Encrypted Network: Traffic for the TeamViewer Application. Search on Bibsonomy IMF The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
49Karin Bernsmed, Inger Anne Tøndel Forewarned is Forearmed: Indicators for Evaluating Information Security Incident Management. Search on Bibsonomy IMF The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
49Holger Morgenstern, Ralf Ehlert, Sandra Frings, Oliver Göbel 0001, Detlef Günther, Stefan Kiltz, Jens Nedon, Dirk Schadt (eds.) Sixth International Conference on IT Security Incident Management and IT Forensics, IMF 2011, Stuttgart, Germany, May 10-12, 2011 Search on Bibsonomy IMF The full citation details ... 2011 DBLP  BibTeX  RDF
49Andreas Dewald, Felix C. Freiling, Tim Weber Design and Implementation of a Documentation Tool for Interactive Commandline Sessions. Search on Bibsonomy IMF The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
49Mario Hildebrandt, Stefan Kiltz, Jana Dittmann A Common Scheme for Evaluation of Forensic Software. Search on Bibsonomy IMF The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
49Gerhard Koschorreck Automated Audit of Compliance and Security Controls. Search on Bibsonomy IMF The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
49Hanan Hibshi, Timothy Vidas, Lorrie Faith Cranor Usability of Forensics Tools: A User Study. Search on Bibsonomy IMF The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
49Stefan Metzger, Wolfgang Hommel, Helmut Reiser Integrated Security Incident Management - Concepts and Real-World Experiences. Search on Bibsonomy IMF The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
49Rainer Poisel, Simon Tjoa Forensics Investigations of Multimedia Data: A Review of the State-of-the-Art. Search on Bibsonomy IMF The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
49Stefan Rass Towards a Rapid-Alert System for Security Incidents. Search on Bibsonomy IMF The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
49Rafael Accorsi, Claus Wonnemann, Thomas Stocker Towards Forensic Data Flow Analysis of Business Process Logs. Search on Bibsonomy IMF The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
49Harald Baier, Frank Breitinger Security Aspects of Piecewise Hashing in Computer Forensics. Search on Bibsonomy IMF The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
49Terrence Ziemniak Use of Machine Learning Classification Techniques to Detect Atypical Behavior in Medical Applications. Search on Bibsonomy IMF The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
49Sebastian Kurowski, Sandra Frings Computational Documentation of IT Incidents as Support for Forensic Operations. Search on Bibsonomy IMF The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
49Oliver Goebel 0001, Ralf Ehlert, Sandra Frings, Detlef Günther, Holger Morgenstern, Dirk Schadt (eds.) IMF 2009, Fifth International Conference on IT Security Incident Management and IT Forensics, Stuttgart, Germany, 15-17 September 2009 Search on Bibsonomy IMF The full citation details ... 2009 DBLP  BibTeX  RDF
49Christian Moch, Felix C. Freiling The Forensic Image Generator Generator (Forensig2). Search on Bibsonomy IMF The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
49Guido Schryen A Comprehensive and Comparative Analysis of the Patching Behavior of Open Source and Closed Source Software Vendors. Search on Bibsonomy IMF The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
49Antonio Grillo, Alessandro Lentini, Gianluigi Me, Matteo Ottoni Fast User Classifying to Establish Forensic Analysis Priorities. Search on Bibsonomy IMF The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
49Mark Wozar Technique to Interrogate an Image of RAM. Search on Bibsonomy IMF The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
49Muhammad Kamran Ahmed, Mukhtar Hussain, Asad Raza An Automated User Transparent Approach to log Web URLs for Forensic Analysis. Search on Bibsonomy IMF The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
49Stephen D. Wolthusen Overcast: Forensic Discovery in Cloud Environments. Search on Bibsonomy IMF The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
49Robert Altschaffel, Stefan Kiltz, Jana Dittmann From the Computer Incident Taxonomy to a Computer Forensic Examination Taxonomy. Search on Bibsonomy IMF The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
49Serguei A. Mokhov, Emil Vassev Self-Forensics Through Case Studies of Small-to-Medium Software Systems. Search on Bibsonomy IMF The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
49Rafael Accorsi Safe-Keeping Digital Evidence with Secure Logging Protocols: State of the Art and Challenges. Search on Bibsonomy IMF The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
49Jan Kohlrausch Experiences with the NoAH Honeynet Testbed to Detect new Internet Worms. Search on Bibsonomy IMF The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
49Kamol Kaemarungsi, Nawattapon Yoskamtorn, Kitisak Jirawannakool, Nuttapong Sanglerdsinlapachai, Chanin Luangingkasut Botnet Statistical Analysis Tool for Limited Resource Computer Emergency Response Team. Search on Bibsonomy IMF The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
49Ziyad S. Al-Salloum, Stephen D. Wolthusen Semi-autonomous Link Layer Vulnerability Discovery and Mitigation Dissemination. Search on Bibsonomy IMF The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
49Muhammad Yasin, Muhammad Arif Wahla, Firdous Kausar Analysis of Download Accelerator Plus (DAP) for Forensic Artefacts. Search on Bibsonomy IMF The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
49Oliver Göbel 0001, Sandra Frings, Detlef Günther, Jens Nedon, Dirk Schadt (eds.) IT-Incidents Management & IT-Forensics - IMF 2008, Conference Proceedings, September 23-25, 2008, Mannheim, Germany Search on Bibsonomy IMF The full citation details ... 2008 DBLP  BibTeX  RDF
49Felix C. Freiling, Thorsten Holz, Martin Mink Reconstructing People's Lives: A Case Study in Teaching Forensic Computing. Search on Bibsonomy IMF The full citation details ... 2008 DBLP  BibTeX  RDF
49Serguei A. Mokhov, Mourad Debbabi File Type Analysis Using Signal Processing Techniques and Machine Learning vs. File Unix Utility for Forensic Analysis. Search on Bibsonomy IMF The full citation details ... 2008 DBLP  BibTeX  RDF
49Chakravarthy Gundabattula, Vinay G. Vaidya Building a State Tracing Linux Kernel. Search on Bibsonomy IMF The full citation details ... 2008 DBLP  BibTeX  RDF
49Udo Helmbrecht New Challenges for IT-Security Research in ITC (Keynote). Search on Bibsonomy IMF The full citation details ... 2008 DBLP  BibTeX  RDF
49Felix Lindner 0003 Network Infrastructure Forensics (Invited). Search on Bibsonomy IMF The full citation details ... 2008 DBLP  BibTeX  RDF
49Tsvetomir Tsvetanov, Stanislav Simeonov Network Flow Security Baselining. Search on Bibsonomy IMF The full citation details ... 2008 DBLP  BibTeX  RDF
49Steven W. Wood A Forensic Computing Framework to Fit Any Legal System. Search on Bibsonomy IMF The full citation details ... 2008 DBLP  BibTeX  RDF
49Wu Liu, Hai-Xin Duan, Tao Lin, Xing Li 0001, Jian-Ping Wu Attacking Test and Online Forensics in IPv6 Networks. Search on Bibsonomy IMF The full citation details ... 2008 DBLP  BibTeX  RDF
49Meng-Da Wu, Stephen D. Wolthusen Network Forensics of Partial SSL/TLS Encrypted Traffic Classification Using Clustering Algorithms. Search on Bibsonomy IMF The full citation details ... 2008 DBLP  BibTeX  RDF
49Jack Cole Incident Management and Forensics Put in Context (Invited). Search on Bibsonomy IMF The full citation details ... 2008 DBLP  BibTeX  RDF
49Thomas Richard McEvoy, Stephen D. Wolthusen Using Observations of Invariant Behaviour to Detect Malicious Agency in Distributed Environments. Search on Bibsonomy IMF The full citation details ... 2008 DBLP  BibTeX  RDF
49Serguei A. Mokhov, Joey Paquet, Mourad Debbabi Formally Specifying Operational Semantics and Language Constructs of Forensic Lucid. Search on Bibsonomy IMF The full citation details ... 2008 DBLP  BibTeX  RDF
49Fred-Mario Silberbach Investigations and Prosecution in Cases of Computer Crime (Invited). Search on Bibsonomy IMF The full citation details ... 2008 DBLP  BibTeX  RDF
49Marthie Lessing Live Forensic Acquisition as Alternative to Traditional Forensic Process. Search on Bibsonomy IMF The full citation details ... 2008 DBLP  BibTeX  RDF
49Sandra Frings, Oliver Göbel 0001, Detlef Günther, Hardo Hase, Jens Nedon, Dirk Schadt, Arslan Brömme (eds.) IT-Incidents Management & IT-Forensics - IMF 2007, Conference Proceedings, September 11-13, 2007, Stuttgart, Germany Search on Bibsonomy IMF The full citation details ... 2007 DBLP  BibTeX  RDF
49Sandra Frings IT Incident Management and Structured Documentation. Search on Bibsonomy IMF The full citation details ... 2007 DBLP  BibTeX  RDF
49Carlos C. Solari The Security Landscape in a Converged IP World. Search on Bibsonomy IMF The full citation details ... 2007 DBLP  BibTeX  RDF
49Felix C. Freiling, Bastian Schwittay A Common Process Model for Incident Response and Computer Forensics. Search on Bibsonomy IMF The full citation details ... 2007 DBLP  BibTeX  RDF
49Joseph C. Sremack, Alexandre V. Antonov Taxonomy of Anti-Computer Forensics Threats. Search on Bibsonomy IMF The full citation details ... 2007 DBLP  BibTeX  RDF
49Klaus Brunnstein About the Role of IT Security in the Information Society. Search on Bibsonomy IMF The full citation details ... 2007 DBLP  BibTeX  RDF
49Vijay K. Gurbani, Debra L. Cook, Lawrence E. Menten, Thomas B. Reddington A Case Study on Constructing a Security Event Management System. Search on Bibsonomy IMF The full citation details ... 2007 DBLP  BibTeX  RDF
49Tohru Sato, Jumpei Watase Information-Sharing System for Vulnerability Information Dissemination in Large-Scale Organization. Search on Bibsonomy IMF The full citation details ... 2007 DBLP  BibTeX  RDF
49Felix C. Freiling, Bastian Schwittay Towards Reliable Rootkit Detection in Live Response. Search on Bibsonomy IMF The full citation details ... 2007 DBLP  BibTeX  RDF
49Harish Daiya, Maximillian Dornseif, Felix C. Freiling Testing Forensic Hash Tools on Sparse Files. Search on Bibsonomy IMF The full citation details ... 2007 DBLP  BibTeX  RDF
49Fritjof Haft, Pascal Hassenpflug, Hans Lecker Proposal of a System for Computer-Based Case and Evidence. Search on Bibsonomy IMF The full citation details ... 2007 DBLP  BibTeX  RDF
49Oliver Göbel 0001, Dirk Schadt, Sandra Frings, Hardo Hase, Detlef Günther, Jens Nedon (eds.) IT-Incidents Management & IT-Forensics - IMF 2006, Conference Proceedings, October, 18th-19th, 2006, Stuttgart. Search on Bibsonomy IMF The full citation details ... 2006 DBLP  BibTeX  RDF
49Andrea Rigioni Incident Response and the Role of External Services (Invited Speech). Search on Bibsonomy IMF The full citation details ... 2006 DBLP  BibTeX  RDF
49Philip Anderson 0002, Maximillian Dornseif, Felix C. Freiling, Thorsten Holz, Alastair Irons, Christopher Laing, Martin Mink A Comparative Study of Teaching Forensics at a University Degree Level. Search on Bibsonomy IMF The full citation details ... 2006 DBLP  BibTeX  RDF
49Andreas Schuster Pool Allocations as an Information Source in Windows Memory Forensics. Search on Bibsonomy IMF The full citation details ... 2006 DBLP  BibTeX  RDF
49Johannes Wiik, Jose J. Gonzalez, Klaus-Peter Kossakowski Effectiveness of Proactive CSIRT Services. Search on Bibsonomy IMF The full citation details ... 2006 DBLP  BibTeX  RDF
49Rolf Schulz Technical Development of Cyber Crime. Search on Bibsonomy IMF The full citation details ... 2006 DBLP  BibTeX  RDF
49Jochen Kaiser, Alexander Vitzthum, Peter Holleczek, Falko Dressler Automated Resolving of Security Incidents as a Key Mechanism to Fight Massive Infections of Malicious Software. Search on Bibsonomy IMF The full citation details ... 2006 DBLP  BibTeX  RDF
49Thorsten Voss, Klaus-Peter Kossakowski Detecting New Patterns of Attacks - Results and Applications of Large Scale Sensoring Networks. Search on Bibsonomy IMF The full citation details ... 2006 DBLP  BibTeX  RDF
49Bernd Grobauer, Jens Ingo Mehlau, Jürgen Sander CarmentiS: A Co-Operative Approach Towards Situation Awareness and Early Warning for the Internet. Search on Bibsonomy IMF The full citation details ... 2006 DBLP  BibTeX  RDF
49James R. Lyle The Contribution of Tool Testing to the Challenge of Responding to an IT Adversary (Keynote). Search on Bibsonomy IMF The full citation details ... 2006 DBLP  BibTeX  RDF
Displaying result #1 - #100 of 191 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license