The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Intruder with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1972-1995 (16) 1996-1999 (15) 2000 (16) 2001-2002 (39) 2003 (35) 2004 (40) 2005 (47) 2006 (51) 2007 (59) 2008 (66) 2009 (43) 2010 (18) 2011-2012 (28) 2013-2014 (27) 2015 (15) 2016-2017 (29) 2018-2019 (18) 2020 (15) 2021 (18) 2022 (15) 2023 (16) 2024 (3)
Publication types (Num. hits)
article(160) book(1) incollection(1) inproceedings(464) phdthesis(3)
Venues (Conferences, Journals, ...)
CoRR(29) ACC(7) CSFW(7) ESORICS(7) RTA(7) CDC(6) EUROCRYPT(6) ARES(5) Formal Aspects in Security and...(5) ICC(5) SMC(5) ACSAC(4) ICCSA (1)(4) ICRA(4) Int. J. Inf. Sec.(4) IROS(4) More (+10 of total 415)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 387 occurrences of 262 keywords

Results
Found 629 publication records. Showing 629 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
103Jan Cederquist, Muhammad Torabi Dashti An intruder model for verifying liveness in security protocols. Search on Bibsonomy FMSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Dolev-Yao intruder, intruder models, security protocols, liveness properties
100Bin Tong, Santosh Panchapakesan, Wensheng Zhang 0001 A Three-Tier Framework for Intruder Information Sharing in Sensor Networks. Search on Bibsonomy SECON The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
92Alwen Tiu, Rajeev Goré A Proof Theoretic Analysis of Intruder Theories. Search on Bibsonomy RTA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF AC convergent theories, intruder deduction, security protocols, sequent calculus
92Lali Barrière, Paola Flocchini, Pierre Fraigniaud, Nicola Santoro Capture of an intruder by mobile agents. Search on Bibsonomy SPAA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF network intruder, mobile agent, graph-searching
84Mourad Debbabi, Mohamed Mejri, Nadia Tawbi, I. Yahmadi From Protocol Specifications to Flaws and Attack Scenarios: An Automatic and Formal Algorithm. Search on Bibsonomy WETICE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF authentication protocol specifications, flaws, automatic formal algorithm, protocol roles, intruder communication abilities, intruder computational abilities, protocol instrumentations, formal verification, encryption, message authentication, decryption, attack scenarios, deductive system
81Flaminia L. Luccio Intruder Capture in Sierpinski Graphs. Search on Bibsonomy FUN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF intruder capture, Sierpi?ski graphs, Mobile agents
81Paul Hankes Drielsma, Sebastian Mödersheim, Luca Viganò 0001 A Formalization of Off-Line Guessing for Security Protocol Analysis. Search on Bibsonomy LPAR The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
70Yannick Chevalier, Michaël Rusinowitch Combining Intruder Theories. Search on Bibsonomy ICALP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
62Flaminia L. Luccio Contiguous Search Problem in Sierpinski Graphs. Search on Bibsonomy Theory Comput. Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Intruder capture, Sierpi?ski graphs, Mobile agents
62Heejin Jang, Sangwook Kim A Self-Extension Monitoring for Security Management. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF self-extension monitoring, information security patterns, active security protection, intruder identification system, authorisation, security management, hackers, information infrastructures, computer crime, information warfare
60Yannick Chevalier, Mounira Kourjieh A Symbolic Intruder Model for Hash-Collision Attacks. Search on Bibsonomy ASIAN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
60Heejin Jang, Sangwook Kim An intruder tracing system based on a shadowing mechanism. Search on Bibsonomy ISCC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
60Heejin Jang, Sangwook Kim Real-Time Intruder Tracing through Self-Replication. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
52Yannick Chevalier, Laurent Vigneron Strategy for Verifying Security Protocols with Unbounded Message Size. Search on Bibsonomy Autom. Softw. Eng. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF intruder model, automatic strategies, verification, security protocols, flaw detection
52Mourad Debbabi, Nancy A. Durgin, Mohamed Mejri, John C. Mitchell Security by typing. Search on Bibsonomy Int. J. Softw. Tools Technol. Transf. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Intruder abilities, Authentication, Integrity, Type System, Cryptographic Protocols, Secrecy
51N. E. Venkatesan, Tarun Agarwal, P. Vijay Kumar On the Average Case Communication Complexity for Detection in Sensor Networks. Search on Bibsonomy DCOSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
51Stéphanie Delaune, Florent Jacquemard Decision Procedures for the Security of Protocols with Probabilistic Encryption against Offline Dictionary Attacks. Search on Bibsonomy J. Autom. Reason. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF verification, formal methods, cryptographic protocols, dictionary attacks, probabilistic encryption
51Ping Yi, Zhoulin Dai, YiPing Zhong, Shiyong Zhang Resisting Flooding Attacks in Ad Hoc Networks. Search on Bibsonomy ITCC (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
49Navid Imani, Hamid Sarbazi-Azad, Albert Y. Zomaya Capturing an Intruder in Product Networks. Search on Bibsonomy HiPC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
49Pooya Shareghi, Navid Imani, Hamid Sarbazi-Azad Capturing an Intruder in the Pyramid. Search on Bibsonomy CSR The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
49Yannick Chevalier, Michaël Rusinowitch Hierarchical Combination of Intruder Theories. Search on Bibsonomy RTA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
49James N. K. Liu, Meng Wang 0005, Bo Feng iBotGuard: an Internet-based Intelligent Robot security system using Invariant Face Recognition against intruder. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Part C The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
49Paola Flocchini, Miao Jun Huang, Flaminia L. Luccio Contiguous Search in the Hypercube for Capturing an Intruder. Search on Bibsonomy IPDPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
49Hubert Comon-Lundh, Ralf Treinen Easy Intruder Deductions. Search on Bibsonomy Verification: Theory and Practice The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
42Jurek Czyzowicz, Evangelos Kranakis, Danny Krizanc, Ioannis Lambadaris, Lata Narayanan, Jaroslav Opatrny, Ladislav Stacho, Jorge Urrutia, Mohammadreza Yazdani On Minimizing the Maximum Sensor Movement for Barrier Coverage of a Line Segment. Search on Bibsonomy ADHOC-NOW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Intruder, Optimal Movement, Sensors, NP-complete, Coverage, Detection, PTAS, Barrier, Line Segment
42Paola Flocchini, Amiya Nayak, Arno Schulz Cleaning an Arbitrary Regular Network with Mobile Agents. Search on Bibsonomy ICDCIT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Intruder Capture, Mobile Agents, Mesh, Graph Search
42Theodoros Balopoulos, Stefanos Gritzalis, Sokratis K. Katsikas Specifying electronic voting protocols in typed MSR. Search on Bibsonomy WPES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Dolev-Yao intruder, typed MSR, privacy, specification, security protocols, electronic voting
42Kymie M. C. Tan, Blair R. Collie Detection and Classification of TCP/IP Network Services. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF TCP/IP network service classification, computer intruders, remote terminal software, undetectable access, system audit, intruder activity detection, unauthorised network services, network connection signature, neural network, learning, monitoring, experiment, transport protocols, data security, network traffic, generalisation, Australia, law enforcement
41Gitae Kim, Tony J. Bogovic, Dana Chee ACtive edge-Tagging (ACT): An Intruder Identification & Isolation Scheme in Active Networks. Search on Bibsonomy ISCC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Intruder Identification & Isolation, Distributed Denial of Service (DDoS) Attacks, Active (or Programmable) Networks, Network Security, Traffic Monitoring
41Rimvydas Ruksenas, Paul Curzon, Ann Blandford Modelling and analysing cognitive causes of security breaches. Search on Bibsonomy Innov. Syst. Softw. Eng. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security, Formal verification, Human error, Cognitive architecture, SAL
41Tiago Sak, Jacques Wainer, Siome Klein Goldenstein Probabilistic Multiagent Patrolling. Search on Bibsonomy SBIA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
41Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani An NP Decision Procedure for Protocol Insecurity with XOR. Search on Bibsonomy LICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
41James Heather, Steve A. Schneider Equal To The Task? Search on Bibsonomy ESORICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF inequality tests, formal methods in security, RSA, cryptographic protocols, security models, rank functions, data independence, security verification, strand spaces
41Lawrence H. Ozarow, Aaron D. Wyner Wire-Tap Channel II. Search on Bibsonomy EUROCRYPT The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
39Sergio de Oliveira, Hao Chi Wong, José Marcos S. Nogueira NEKAP: Intruder Resilient and Energy Efficient Key Establishment in Sensor Networks. Search on Bibsonomy ICCCN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
39David A. Basin, Sebastian Mödersheim, Luca Viganò 0001 Algebraic Intruder Deductions. Search on Bibsonomy LPAR The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
39Hubert Comon-Lundh Intruder Theories (Ongoing Work). Search on Bibsonomy FoSSaCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
39Hubert Comon-Lundh, Vitaly Shmatikov Intruder Deductions, Constraint Solving and Insecurity Decision in Presence of Exclusive or. Search on Bibsonomy LICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
39Dongxi Liu, Xiaoyong Li, Yingcai Bai An Intelligent Intruder Model for Security Protocol Analysis. Search on Bibsonomy ICICS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
38Shivam Kainth, Subham Sahoo, Rajtilak Pal, Shashi Shekhar Jha Chasing the Intruder: A Reinforcement Learning Approach for Tracking Intruder Drones. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
30Siva Anantharaman, Hai Lin 0005, Christopher Lynch, Paliath Narendran, Michaël Rusinowitch Cap unification: application to protocol security modulo homomorphic encryption. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF secrecy analysis, protocol, rewriting, unification
30Navid Imani, Hamid Sarbazi-Azad, Albert Y. Zomaya, Paria Moinzadeh Detecting Threats in Star Graphs. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
30Bijan Soleymani, Muthucumaru Maheswaran Social Authentication Protocol for Mobile Phones. Search on Bibsonomy CSE (4) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
30Sebastian Mödersheim, Luca Viganò 0001 The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols. Search on Bibsonomy FOSAD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
30Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryption. Search on Bibsonomy ACM Trans. Comput. Log. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Diffie-Hellman exponentiation, Dolev-Yao model, complexity, protocols, Algebraic properties
30Xuehou Tan, Bo Jiang 0004 Searching a Polygonal Region by Two Guards. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF polygon search problem, two-guard problem, robotics, computational geometry, visibility
30Assane Gueye, Jean C. Walrand Security in networks: A game-theoretic approach. Search on Bibsonomy CDC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
30Stylianos Basagiannis, Panagiotis Katsaros, Andrew Pombortsis Intrusion Attack Tactics for the Model Checking of e-Commerce Security Guarantees. Search on Bibsonomy SAFECOMP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF intrusion attacks, e-commerce protocols, model checking, SPIN
30Siva Anantharaman, Paliath Narendran, Michaël Rusinowitch Intruders with Caps. Search on Bibsonomy RTA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30Damas P. Gruska Information-Flow Attacks Based on Limited Observations. Search on Bibsonomy Ershov Memorial Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF process algebras, information flow, timing attacks
30Olivier Dousse, Christina Tavoularis, Patrick Thiran Delay of intrusion detection in wireless sensor networks. Search on Bibsonomy MobiHoc The full citation details ... 2006 DBLP  DOI  BibTeX  RDF sensor networks, intrusion detection, delay, percolation
30Mark Moors, Dirk Schulz 0001 Improved Markov Models for Indoor Surveillance. Search on Bibsonomy IROS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Giovanni Di Crescenzo, Richard J. Lipton, Shabsi Walfish Perfectly Secure Password Protocols in the Bounded Retrieval Model. Search on Bibsonomy TCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Vaibhav Mehta, Constantinos Bartzis, Haifeng Zhu 0001, Edmund M. Clarke, Jeannette M. Wing Ranking Attack Graphs. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Google PageRank, Model Checking, security metric, Attack Graph, Attack Model
30S. Prasanna, V. Vetri Selvi An Improved Intrusion Detection Technique for Mobile Adhoc Networks. Search on Bibsonomy ICDCIT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Ping Yi, YiPing Zhong, Shiyong Zhang Applying Mobile Agent to Intrusion Response for Ad Hoc Networks. Search on Bibsonomy International Conference on Computational Science (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Jae-Ha Lee, Sang-Min Park, Kyung-Yong Chwa Equivalence of Search Capability Among Mobile Guards with Various Visibilities. Search on Bibsonomy ESA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
30Yongjian Li, Rui Xue Using SPIN to Model Cryptographic Protocols. Search on Bibsonomy ITCC (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
30Catherine Meadows 0001 A Procedure for Verifying Security Against Type Confusion Attacks. Search on Bibsonomy CSFW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
30Hui-Feng Huang, Chin-Chen Chang 0001 An Efficient Convertible Authenticated Encryption Scheme and Its Variant. Search on Bibsonomy ICICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
30Somesh Jha, Oleg Sheyner, Jeannette M. Wing Two Formal Analys s of Attack Graphs. Search on Bibsonomy CSFW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
30Kenji Masui, Masahiko Tomoishi, Naoki Yonezaki Design of UNIX System for the Prevention of Damage Propagation by Intrusion and Its Implementation Based on 4.4BSD. Search on Bibsonomy ISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
30Xuehou Tan Efficient Algorithms for Searching a Polygonal Room with a Door. Search on Bibsonomy JCDCG The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
29Hernando Fernandez-Canque, Sorin Hintea, John Freer, Ali Ahmadinia Machine Vision Application to Automatic Intruder Detection Using CCTV. Search on Bibsonomy KES (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF CCTV, human posture recognition, image processing, Machine vision
29ChingSeong Tan, Aryuanto Soetedjo Feasibility Study on An Automated Intruder Detection for Tropical Fish Farm. Search on Bibsonomy RAM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Stijn B. J. Van Dam, Max Mulder, M. M. van Paassen Airborne self-separation display with turn dynamics and intruder intent-information. Search on Bibsonomy SMC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Vincent Bernat, Hubert Comon-Lundh Normal Proofs in Intruder Theories. Search on Bibsonomy ASIAN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Pascal Lafourcade 0001, Denis Lugiez, Ralf Treinen Intruder Deduction for AC-Like Equational Theories with Homomorphisms. Search on Bibsonomy RTA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
29Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani, Laurent Vigneron Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number of Sessions. Search on Bibsonomy CSL The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
22Alwen Tiu, Jeremy E. Dawson Automating Open Bisimulation Checking for the Spi Calculus. Search on Bibsonomy CSF The full citation details ... 2010 DBLP  DOI  BibTeX  RDF open bisimulation, symbolic trace analysis, intruder deduction, spi-calculus
22Theodoros Balopoulos, Stefanos Gritzalis, Sokratis K. Katsikas Specifying and implementing privacy-preserving cryptographic protocols. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Specification of Security Protocols, Dolev-Yao Intruder, Security-typed language, Typed MSR, Jif, Privacy, Linkability
22Yuliy M. Baryshnikov, Edward G. Coffman Jr., Kyung Joon Kwak High Performance Sleep-Wake Sensor Systems Based on Cyclic Cellular Automata. Search on Bibsonomy IPSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF intruder detection, cyclic cellular automata, self-organizing, Sleep schedule
22Youssef Hanna, Hridesh Rajan, Wensheng Zhang 0001 Slede: a domain-specific verification framework for sensor network security protocol implementations. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF intruder generation, sensor networks, model checking, security protocols
22Paola Flocchini, Amiya Nayak, Arno Schulz Decontamination of Arbitrary Networks using a Team of Mobile Agents with Limited Visibility. Search on Bibsonomy ACIS-ICIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Network Decontamination, Intruder Capture, Mobile Agents
22Tarak Gandhi, Mohan M. Trivedi Motion analysis for event detection and tracking with a mobile omnidirectional camera. Search on Bibsonomy Multim. Syst. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Intruder detection, Mobile robots, Optical flow, Surveillance, Motion detection, Dynamic vision, Panoramic vision
20Fida Kamal Dankar, Khaled El Emam A method for evaluating marketer re-identification risk. Search on Bibsonomy EDBT/ICDT Workshops The full citation details ... 2010 DBLP  DOI  BibTeX  RDF identity disclosure, re-identification risk, privacy, disclosure control
20Boting Yang, Yi Cao Standard directed search strategies and their applications. Search on Bibsonomy J. Comb. Optim. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Oriented grids, Pursuit-evasion problem, Digraph, Directed search
20Binay K. Bhattacharya, Tsunehiko Kameda, John Z. Zhang Surveillance of a polygonal area by a mobile searcher from the boundary: Searchability testing. Search on Bibsonomy ICRA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Jan Platos, Václav Snásel, Pavel Krömer, Ajith Abraham Detecting Insider Attacks Using Non-negative Matrix Factorization. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Bo Jiang 0004, Xuehou Tan Searching a Circular Corridor with Two Flashlights. Search on Bibsonomy TAMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Adnan Nadeem, Michael P. Howarth Adaptive intrusion detection & prevention of denial of service attacks in MANETs. Search on Bibsonomy IWCMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF intrusion detection & prevention, ad-hoc network security
20Bogdan Groza, Marius Minea A Calculus to Detect Guessing Attacks. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Rohit Chadha, Stéphanie Delaune, Steve Kremer Epistemic Logic for the Applied Pi Calculus. Search on Bibsonomy FMOODS/FORTE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Nicola Basilico, Nicola Gatti 0001, Francesco Amigoni Leader-follower strategies for robotic patrolling in environments with arbitrary topologies. Search on Bibsonomy AAMAS (1) The full citation details ... 2009 DBLP  BibTeX  RDF leader-follower strategies, robotic patrolling
20Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano Efficient representation of the attacker's knowledge in cryptographic protocols analysis. Search on Bibsonomy Formal Aspects Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Knowledge representation, Cryptographic protocols, State space exploration
20Stephen Kloder, Seth Hutchinson 0001 Partial barrier coverage: Using game theory to optimize probability of undetected intrusion in polygonal environments. Search on Bibsonomy ICRA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20YuanYuan Li, Lynne E. Parker Detecting and monitoring time-related abnormal events using a wireless sensor network and mobile robot. Search on Bibsonomy IROS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Aaron Hunter 0001 Dissecting the Meaning of an Encrypted Message: An Approach to Discovering the Goals of an Adversary. Search on Bibsonomy EuroISI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20John Z. Zhang, Tsunehiko Kameda A Linear-Time Algorithm for Finding All Door Locations That Make a Room Searchable. Search on Bibsonomy TAMC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Michael J. Ocean, Azer Bestavros Wireless and physical security via embedded sensor networks. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF sensor networks, intrusion detection, wireless, physical security
20Xuehou Tan Searching a Polygonal Region by Two Guards. Search on Bibsonomy TAMC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Vivek K. Singh 0001, Mohan S. Kankanhalli Towards Adversary Aware Surveillance Systems. Search on Bibsonomy ICME The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Oscar García Morchon, Heribert Baldus, Tobias Heer, Klaus Wehrle Cooperative security in distributed sensor networks. Search on Bibsonomy CollaborateCom The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Yannick Chevalier, Mounira Kourjieh Key Substitution in the Symbolic Analysis of Cryptographic Protocols. Search on Bibsonomy FSTTCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Guoqiang Shu, David Lee 0001 Message Confidentiality Testing of Security Protocols - Passive Monitoring and Active Checking. Search on Bibsonomy TestCom The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Yohan Boichut, Pierre-Cyrille Héam, Olga Kouchnarenko Handling Algebraic Properties in Automatic Analysis of Security Protocols. Search on Bibsonomy ICTAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Andrew D. Gordon 0001 Provable Implementations of Security Protocols. Search on Bibsonomy LICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Giorgio Delzanno, Javier Esparza, Jirí Srba Monotonic Set-Extended Prefix Rewriting and Verification of Recursive Ping-Pong Protocols. Search on Bibsonomy ATVA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Satoshi Kawabata, Shinsaku Hiura, Kosuke Sato Real-Time Detection of Anomalous Objects in Dynamic Scene. Search on Bibsonomy ICPR (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Urs Hengartner, Peter Steenkiste Securing Information Gateways with Derivation-Constrained Access Control. Search on Bibsonomy SPC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 629 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license