The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Protector with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1972-2009 (15) 2010-2015 (15) 2016-2020 (18) 2021-2024 (14)
Publication types (Num. hits)
article(26) inproceedings(36)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 23 occurrences of 19 keywords

Results
Found 62 publication records. Showing 62 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
169Jongmoo Choi, Seungjae Baek, Sung Y. Shin Design and implementation of a kernel resource protector for robustness of Linux module programming. Search on Bibsonomy SAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF loadable module, reclaim, resource protector, slab allocator, fault tolerance, robustness, memory leak, linux kernel
115Marios Mavronicolas, Vicky G. Papadopoulou, Anna Philippou, Paul G. Spirakis Network Game with Attacker and Protector Entities. Search on Bibsonomy ISAAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
89Marios Mavronicolas, Vicky G. Papadopoulou, Anna Philippou, Paul G. Spirakis A Graph-Theoretic Network Security Game. Search on Bibsonomy WINE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
66Fu-Hong Yang, Chi-Hung Chi, Lin Liu 0001 A Risk Assessment Model for Enterprise Network Security. Search on Bibsonomy ATC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
59Chang-yong Zhang, Gui-he Hao Design of Mine LV Switch Protector Based on Dual-CPU of ARM and DSP. Search on Bibsonomy MVHI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Feed switch, Protector, DS, Real-time data acquisition, ARM
44Jing Tian, Zhi Yang 0001, Wei Chen 0013, Ben Y. Zhao, Yafei Dai Probabilistic Failure Detection for Efficient Distributed Storage Maintenance. Search on Bibsonomy SRDS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Renjie Pi, Tianyang Han, Yueqi Xie, Rui Pan, Qing Lian, Hanze Dong, Jipeng Zhang, Tong Zhang MLLM-Protector: Ensuring MLLM's Safety without Hurting Performance. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
26Derya Tama Birkocak, Pedro Gomes, Helder Carvalho Flexible Pressure Sensors for Integration into Karate Body Protector. Search on Bibsonomy Sensors The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26Hao Wu, Bo Yang, Xiaopeng Ke, Siyi He, Fengyuan Xu, Sheng Zhong 0002 GAPter: Gray-Box Data Protector for Deep Learning Inference Services at User Side. Search on Bibsonomy ICASSP The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26P. Kanimozhi, Muthukumaran Kannan, Christo Ananth, T. Ananth Kumar, S. Parkavi Design of IoT Based Agricultural Farm Protector Drone Using Raspberry Pi. Search on Bibsonomy IC3I The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26Xin Zhou 0012, Yi Lu, Ruotian Ma, Tao Gui, Yuran Wang, Yong Ding, Yibo Zhang, Qi Zhang 0001, Xuanjing Huang 0001 TextObfuscator: Making Pre-trained Language Model a Privacy Protector via Obfuscating Word Representations. Search on Bibsonomy ACL (Findings) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26Mohamed Byari, Abdessamed Bernoussi, Mustapha Ouardouz, Mina Amharref Protector Control of 3D Cellular Automata via Space Attributes: Application to Wildland Fire. Search on Bibsonomy J. Cell. Autom. The full citation details ... 2022 DBLP  BibTeX  RDF
26Tipu Sultan Haque, Shariful Alam, Avishek Chakraborty Selection of most effective COVID-19 virus protector using a novel MCGDM technique under linguistic generalised spherical fuzzy environment. Search on Bibsonomy Comput. Appl. Math. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
26Fayez Qureshi, Sridhar Krishnan 0001 Design and Analysis of Electronic Head Protector for Taekwondo Sports. Search on Bibsonomy Sensors The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
26Jiaxin Zhao, Xupeng Wang Evaluation study on comfort of flexible Knee Joint Protector. Search on Bibsonomy ISAIMS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
26Young Bi Lee, Jae Hyuk Suk, Dong Hoon Lee 0001 Bypassing Anti-Analysis of Commercial Protector Methods Using DBI Tools. Search on Bibsonomy IEEE Access The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
26Kim-Ngoc-Khanh Nguyen, Yuta Kojio, Shintaro Noda, Fumihito Sugai, Kunio Kojima, Yohei Kakiuchi, Kei Okada, Masayuki Inaba Dynamic Fall Recovery Motion Generation on Biped Robot With Shell Protector. Search on Bibsonomy IEEE Robotics Autom. Lett. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
26Aaisha Makkar, Neeraj Kumar 0001 PROTECTOR: An optimized deep learning-based framework for image spam detection and prevention. Search on Bibsonomy Future Gener. Comput. Syst. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
26Yuyang Wang 0002, Jean-Rémy Chardonnet, Frédéric Mérienne Development of a speed protector to optimize user experience in 3D virtual environments. Search on Bibsonomy Int. J. Hum. Comput. Stud. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
26Gerald P. Otoide, Blake A. Hoppe, Nicole P. Ackley, Richard Matovu, Ariana Aliasso, Olivia Collins, Bronwyn Brocklehurst, Norman Stark, Ikechukwu P. Ohu IMU-Based Recurrence Quantification Analysis of the Signal Dampening Effect of a Thumb Protector in Deep Tendon Reflex Tests. Search on Bibsonomy NER The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
26Alberto Huertas Celdrán, Manuel Gil Pérez, Izidor Mlakar, José M. Alcaraz Calero, Félix J. García Clemente, Gregorio Martínez Pérez, Md. Zakirul Alam Bhuiyan PROTECTOR: Towards the protection of sensitive data in Europe and the US. Search on Bibsonomy Comput. Networks The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
26Aaisha Makkar, Neeraj Kumar 0001, Albert Y. Zomaya, Shalini Dhiman SPAMI: A cognitive spam protector for advertisement malicious images. Search on Bibsonomy Inf. Sci. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
26Jae-Hyung Jung, Seong-Kwan Hong, Oh-Kyong Kwon A Highly Reliable SIMO Converter Using Hybrid Starter and Overcharging Protector for Energy Harvesting Systems. Search on Bibsonomy IEEE Access The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
26Zahir Alsulaimawi Gaussian Privacy Protector for Online Data Communication in a Public World. Search on Bibsonomy BigDataSecurity/HPSC/IDS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
26Taehoon Kim, Jihoon Yang Latent-Space-Level Image Anonymization With Adversarial Protector Networks. Search on Bibsonomy IEEE Access The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
26Selman Kulac A New Externally Worn Proxy-Based Protector for Non-Secure Wireless Implantable Medical Devices: Security Jacket. Search on Bibsonomy IEEE Access The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
26Jaeyoung Choi 0001, Jinwoo Shin, Yung Yi Information source localization with protector diffusion in networks. Search on Bibsonomy J. Commun. Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
26Akshay Agarwal 0001, Akarsha Sehwag, Mayank Vatsa, Richa Singh 0001 Deceiving the Protector: Fooling Face Presentation Attack Detection Algorithms. Search on Bibsonomy ICB The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
26Lahiru J. Ekanayake, Ruwan D. Nawarathna, Prabhath Gunathilake, Roshan D. Yapa, Amalka J. Pinidiyaarachchi Smart Protector: A Real-time Theft Prevention System for Transportation Management. Search on Bibsonomy ICIIS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
26Seungkwang Lee, Yousung Kang Crypto-Protector: Multi-threaded RSA to Prevent EM Attacks. Search on Bibsonomy ICTC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
26Bruno Bierbaumer, Julian Kirsch, Thomas Kittel 0001, Aurélien Francillon, Apostolis Zarras Smashing the Stack Protector for Fun and Profit. Search on Bibsonomy SEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26Donald Privitera, Hossain Shahriar Design and Development of Smart TV Protector. Search on Bibsonomy NCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26Ru Kang, Huaxin Liu, Fei Meng 0005, Runming Zhang, Xiaoshuai Ma, Botao Liu, Aiguo Ming, Qiang Huang 0002 An Overload Protector Inspired by Joint Dislocation and Reduction for Shoulder of Humanoid Robot. Search on Bibsonomy ROBIO The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26Ahmed Saeed 0003, Ali Ahmadinia, Mike Just Tag-Protector: An Effective and Dynamic Detection of Illegal Memory Accesses through Compile Time Code Instrumentation. Search on Bibsonomy Adv. Softw. Eng. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
26S. Boujaada, Youssef Qaraai, Said Agoujil, Mohoha Hajar Protector Control PC-AODV-BH in The Ad Hoc Networks. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
26Lynne M. Coventry, Pam Briggs Mobile Technology for Older Adults: Protector, Motivator or Threat? Search on Bibsonomy HCI (24) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
26Muhammad Rizwan Asghar, César Bernardini, Bruno Crispo PROTECTOR: Privacy-preserving information lookup in content-centric networks. Search on Bibsonomy ICC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
26Ahmed Saeed 0003, Ali Ahmadinia, Mike Just Tag-Protector: An Effective and Dynamic Detection of Out-of-bound Memory Accesses. Search on Bibsonomy CS2@HiPEAC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
26Risa Hiyama, Mondo Saito, Yasuto Nakanishi, Yuka Hirose, Sho Arisumi BabyBumper: protector/communication wearable device for pregnant women. Search on Bibsonomy UbiComp/ISWC Adjunct The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
26C. Venkatesh, D. Nagaraju, T. Sunil Kumar Reddy Binary Protector: Intrusion Detection in Multitier Web Applications. Search on Bibsonomy CoRR The full citation details ... 2014 DBLP  BibTeX  RDF
26Katherine R. Evans, Edmond Lou, Chris Woloschuk, Doug L. Hill, Meng Li, Man-Sang Wong Quantitative measurement of hip protector use and compliance. Search on Bibsonomy Medical Biol. Eng. Comput. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
26Wen-Hong Wu, Chun-Li Chang, Chi-Hung Hwang Automatic prismatic refractive power measuring instrument for eye-protector. Search on Bibsonomy I2MTC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
26Jayathu Fernando, Nihal Kularatna, W. Howell Round, Sadhana Talele Implementation of the supercapacitor-assisted surge absorber (SCASA) technique in a practical surge protector. Search on Bibsonomy IECON The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
26Yundi Qian, William B. Haskell 0001, Albert Xin Jiang, Milind Tambe Online planning for optimal protector strategies in resource conservation games. Search on Bibsonomy AAMAS The full citation details ... 2014 DBLP  BibTeX  RDF
26Omar Jellouli, Abdessamed Bernoussi, Mina Amharref, Samira El Yacoubi Vulnerability and Protector Control: Cellular Automata Approach. Search on Bibsonomy ACRI The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
26Jan Stanek, Lukas Kencl SIP Protector: Defense architecture mitigating DDoS flood attacks against SIP servers. Search on Bibsonomy ICC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
26Chih-Lin Chen, Sheng-Chih Lin, Chua-Chin Wang, Chun-Ying Juan A digital over-temperature protector for FlexRay systems. Search on Bibsonomy ISCAS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
26Zhi Yang 0001, Jing Tian, Ben Y. Zhao, Wei Chen 0013, Yafei Dai Protector: A Probabilistic Failure Detector for Cost-Effective Peer-to-Peer Storage. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF P2P storage, replication management, availability, Failure detector
26Bechara al Bouna, Richard Chbeir, Alban Gabillon The Image Protector - A Flexible Security Rule Specification Toolkit . Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
26Abdes-Samed Bernoussi Spreadability, vulnerability, regional viability and protector control. Search on Bibsonomy MMAR The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
26Youssef Qaraai, Abdes-Samed Bernoussi Protector control: Extension to a class of nonlinear distributed systems. Search on Bibsonomy Int. J. Appl. Math. Comput. Sci. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
26José Antonio Martín H., Javier de Lope Asiaín, Darío Maravall Analysis and solution of a predator-protector-prey multi-robot system by a high-level reinforcement learning architecture and the adaptive systems theory. Search on Bibsonomy Robotics Auton. Syst. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
26Harri Hakonen, Ville Leppänen Object-Oriented Design Pattern: Access Protector. Search on Bibsonomy Software Engineering Research and Practice The full citation details ... 2009 DBLP  BibTeX  RDF
26Ian A. Gravagne, Robert J. Marks II Emergent Behaviors of Protector, Refugee, and Aggressor Swarms. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Part B The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Amr Ali Eldin, René W. Wagenaar Towards a Component based Privacy Protector Architecture. Search on Bibsonomy CAiSE Short Paper Proceedings The full citation details ... 2003 DBLP  BibTeX  RDF
26Rein Turn, Norman Z. Shapiro Privacy and security in databank systems: measures of effectiveness, costs, and protector-intruder interactions. Search on Bibsonomy AFIPS Fall Joint Computing Conference (1) The full citation details ... 1972 DBLP  DOI  BibTeX  RDF
22Marios Mavronicolas, Vicky Papadopoulou, Anna Philippou, Paul G. Spirakis A Network Game with Attackers and a Defender. Search on Bibsonomy Algorithmica The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Attacks and defenses, Security, Game theory, Graph theory, Nash equilibria
22Joshua Lifton, Mark Feldmeier, Yasuhiro Ono, Cameron Lewis, Joseph A. Paradiso A platform for ubiquitous sensor deployment in occupational and domestic environments. Search on Bibsonomy IPSN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Josep Domingo-Ferrer, Antoni Martínez-Ballesté, Josep Maria Mateo-Sanz, Francesc Sebé Efficient multivariate data-oriented microaggregation. Search on Bibsonomy VLDB J. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Privacy, Anonymity, Statistical disclosure control, Statistical databases, Microaggregation, Microdata protection
22Evan E. Anderson, Joobin Choobineh, Michael R. Grimaila An Enterprise Level Security Requirements Specification Model. Search on Bibsonomy HICSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Josep Domingo-Ferrer, Josep Maria Mateo-Sanz Practical Data-Oriented Microaggregation for Statistical Disclosure Control. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF genetic algorithms, hierarchical clustering, statistical disclosure control, statistical databases, microaggregation, microdata protection
22Silke Holtmanns Privacy in a Mobile Environment. Search on Bibsonomy DEXA Workshops The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #62 of 62 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license