Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
117 | Jung-Ho Eom, Sang-Hun Lee, Hyung-Jin Lim, Tai-Myoung Chung |
Qualitative Method-Based the Effective Risk Mitigation Method in the Risk Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part II, pp. 239-248, 2006, Springer, 3-540-34072-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
52 | Sandro Bologna, Claudio Balducelli, Giovanni Dipoppa, Giordano Vicoli |
Dependability and Survivability of Large Complex Critical Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAFECOMP ![In: Computer Safety, Reliability, and Security, 22nd International Conference, SAFECOMP 2003, Edinburgh, UK, September 23-26, 2003, Proceedings, pp. 342-353, 2003, Springer, 3-540-20126-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
48 | Yinghai Wang, Wenxin Xiang |
Role of Information Security Risk Assessment in Establishing Electronic Archives Safeguard Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNSC ![In: Proceedings of the IEEE International Conference on Networking, Sensing and Control, ICNSC 2008, Hainan, China, 6-8 April 2008, pp. 1320-1325, 2008, IEEE, 978-1-4244-1685-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
46 | In-Jung Kim, Yoon Jung Chung, YoungGyo Lee, Eul-Gyu Im, Dongho Won |
Information System Modeling for Analysis of Propagation Effects and Levels of Damage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part III, pp. 54-63, 2006, Springer, 3-540-34075-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Damage propagation, Safeguard, Risk analysis, Intrusion, Epidemic |
46 | Young-Hwan Bang, Yoon-Jung Jung, In-Jung Kim, Namhoon Lee, Gang-Soo Lee |
The Design and Development for Risk Analysis Automatic Tool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part I, pp. 491-499, 2004, Springer, 3-540-22054-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Safeguard, Vulnerability, Risk Analysis, Interview, Threat, Asset, Inquiry |
45 | Erna S. Hoover, R. A. Jacoby |
Safeguard data-processing system: Safeguard data reduction system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Bell Syst. Tech. J. ![In: Bell Syst. Tech. J. 54(10), pp. S181-S189, 1975. The full citation details ...](Pics/full.jpeg) |
1975 |
DBLP DOI BibTeX RDF |
|
35 | Thomas Neubauer, Christian Stummer, Edgar R. Weippl |
Workshop-based Multiobjective Security Safeguard Selection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The First International Conference on Availability, Reliability and Security, ARES 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria, pp. 366-373, 2006, IEEE Computer Society, 0-7695-2567-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Bob Mungamuru, Hector Garcia-Molina, Subhasish Mitra |
How To Safeguard Your Sensitive Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SRDS ![In: 25th IEEE Symposium on Reliable Distributed Systems (SRDS 2006),2-4 October 2006, Leeds, UK, pp. 199-211, 2006, IEEE Computer Society, 0-7695-2677-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Mikhail V. Solodov |
Global convergence of an SQP method without boundedness assumptions on any of the iterative sequences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Math. Program. ![In: Math. Program. 118(1), pp. 1-12, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (2000) 90C30, 65K05 |
26 | Jung-Ho Eom, Seon-Ho Park, Young-Ju Han, Tai-Myoung Chung |
Risk Assessment Method Based on Business Process-Oriented Asset Evaluation for Information System Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (3) ![In: Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27 - 30, 2007, Proceedings, Part III, pp. 1024-1031, 2007, Springer, 978-3-540-72587-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Stephen Flowerday, Rossouw von Solms |
Trust: An Element of Information Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy in Dynamic Environments, Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden, pp. 87-98, 2006, Springer, 0-387-33405-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Kihwal Lee, Lui Sha |
A Dependable Online Testing and Upgrade Architecture for Real-Time Embedded Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RTCSA ![In: 11th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA 2005), 17-19 August 2005, Hong Kong, China, pp. 160-165, 2005, IEEE Computer Society, 0-7695-2346-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Yoon Jung Chung, In-Jung Kim, Namhoon Lee, Taek Lee, Hoh Peter In |
Security Risk Vector for Quantitative Asset Assessment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part II, pp. 274-283, 2005, Springer, 3-540-25861-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Xabier Echeberria-Barrio, Amaia Gil-Lerchundi, Iñigo Mendialdua, Raul Orduna Urrutia |
Topological safeguard for evasion attack interpreting the neural networks' behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pattern Recognit. ![In: Pattern Recognit. 147, pp. 110130, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
22 | Ömer Sen, Tarek Hassan, Andreas Ulbig, Martin Henze |
Enhancing SCADA Security: Developing a Host-Based Intrusion Detection System to Safeguard Against Cyberattacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.14599, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
22 | Xabier Echeberria-Barrio, Amaia Gil-Lerchundi, Iñigo Mendialdua, Raul Orduna Urrutia |
Topological safeguard for evasion attack interpreting the neural networks' behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.07480, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
22 | Jiazhi Guan, Yi Zhao, Zhuoer Xu, Changhua Meng, Ke Xu 0002, Youjian Zhao |
Adversarial Robust Safeguard for Evading Deep Facial Manipulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI ![In: Thirty-Eighth AAAI Conference on Artificial Intelligence, AAAI 2024, Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence, IAAI 2024, Fourteenth Symposium on Educational Advances in Artificial Intelligence, EAAI 2014, February 20-27, 2024, Vancouver, Canada, pp. 118-126, 2024, AAAI Press. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
22 | Shiyuan Liu, Anna Essén, Magnus Mähring |
Going Digital First as an Incumbent: Reaching Outwards and Anchoring Inwards to Safeguard the Incumbent Physical Core. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 57th Hawaii International Conference on System Sciences, HICSS 2024, Hilton Hawaiian Village Waikiki Beach Resort, Hawaii, USA, January 3-6, 2024, pp. 6191-6200, 2024, ScholarSpace, 978-0-9981331-7-1. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
22 | Mengwei Xu, Louise A. Dennis, Mustafa A. Mustafa |
Safeguard Privacy for Minimal Data Collection with Trustworthy Autonomous Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: Proceedings of the 23rd International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2024, Auckland, New Zealand, May 6-10, 2024, pp. 1966-1974, 2024, ACM. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
22 | M. Marimuthu, G. Mohanraj, D. Karthikeyan, D. Vidyabharathi |
Safeguard confidential web information from malicious browser extension using Encryption and Isolation techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Fuzzy Syst. ![In: J. Intell. Fuzzy Syst. 45(4), pp. 6145-6160, October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Mohaimenul Azam Khan Raiaan, Nur Mohammad Fahad, Shovan Chowdhury, Debopom Sutradhar, Saadman Sakib Mihad, Md. Motaharul Islam |
IoT-Based Object-Detection System to Safeguard Endangered Animals and Bolster Agricultural Farm Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Internet ![In: Future Internet 15(12), pp. 372, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Gurtaj Singh, Vincenzo Violi, Marco Fisichella |
Federated Learning to Safeguard Patients Data: A Medical Image Retrieval Case. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Big Data Cogn. Comput. ![In: Big Data Cogn. Comput. 7(1), pp. 18, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Md. Shohidul Islam, Mohamed Ariff Ameedeen, Md. Arafatur Rahman, Husnul Ajra, Zahian Ismail |
Healthcare-Chain: Blockchain-Enabled Decentralized Trustworthy System in Healthcare Management Industry 4.0 with Cyber Safeguard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. ![In: Comput. 12(2), pp. 46, February 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Ying Ju, Guoxue Zou, Haowen Bai, Lei Liu 0031, Qingqi Pei, Celimuge Wu, Sattam Al Otaibi |
Random Beam Switching: A Physical Layer Key Generation Approach to Safeguard mmWave Electronic Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Consumer Electron. ![In: IEEE Trans. Consumer Electron. 69(3), pp. 594-607, August 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Zhengyue Zhao, Jinhao Duan, Kaidi Xu, Chenan Wang, Rui Zhangp Zidong Dup Qi Guo, Xing Hu 0001 |
Can Protective Perturbation Safeguard Personal Data from Being Exploited by Stable Diffusion? ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2312.00084, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Ranyang Zhou, Jacqueline Liu, Sabbir Ahmed, Nakul Kochar, Adnan Siraj Rakin, Shaahin Angizi |
Threshold Breaker: Can Counter-Based RowHammer Prevention Mechanisms Truly Safeguard DRAM? ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2311.16460, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Hakan Inan, Kartikeya Upasani, Jianfeng Chi, Rashi Rungta, Krithika Iyer, Yuning Mao, Michael Tontchev, Qing Hu, Brian Fuller, Davide Testuggine, Madian Khabsa |
Llama Guard: LLM-based Input-Output Safeguard for Human-AI Conversations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2312.06674, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Zezhong Wang 0004, Fangkai Yang, Lu Wang 0008, Pu Zhao 0004, Hongru Wang 0003, Liang Chen, Qingwei Lin, Kam-Fai Wong |
Self-Guard: Empower the LLM to Safeguard Itself. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2310.15851, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | K. Senthil, Muskaan Sethi, Loizos Pelecanos |
Techniques to safeguard the underground tunnels against surface blast load. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Crit. Infrastructures ![In: Int. J. Crit. Infrastructures 19(4), pp. 301-322, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Kevin Rafael Palomino Pacheco, Carmen Berdugo |
Big Data Analytics and Mental Health: Would Ethics Be the Only Safeguard Against the Risks of Identifying "Potential Patients"? ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Intell. Syst. ![In: IEEE Intell. Syst. 38(5), pp. 37-44, September - October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Shiva Agrawal, Savankumar Bhanderi, Sumit Amanagi, Kristina Doycheva, Gordon Elger |
Instance Segmentation and Detection of Children to Safeguard Vulnerable Traffic User by Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VEHITS ![In: Proceedings of the 9th International Conference on Vehicle Technology and Intelligent Transport Systems, VEHITS 2023, Prague, Czech Republic, April 26-28, 2023., pp. 206-214, 2023, SCITEPRESS, 978-989-758-652-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Kaulyaalalwa Peter, Selma Auala, Heike Winschiers-Theophilus |
An AR Game for Primary Learners to Safeguard Intangible Cultural Heritage of the Ovahimba Tribe. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMX ![In: Proceedings of the 2023 ACM International Conference on Interactive Media Experiences, IMX 2023, Nantes, France, June 12-15, 2023, pp. 359-361, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Weiye Zhao, Tairan He, Changliu Liu |
Probabilistic Safeguard for Reinforcement Learning Using Safety Index Guided Gaussian Process Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
L4DC ![In: Learning for Dynamics and Control Conference, L4DC 2023, 15-16 June 2023, Philadelphia, PA, USA., pp. 783-796, 2023, PMLR. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
22 | Ninni Singh, Vinit Kumar Gunjan, Gopal Chaudhary 0001, Rajesh Kaluri, Nancy Victor, Kuruva Lakshmanna |
IoT enabled HELMET to safeguard the health of mine workers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. ![In: Comput. Commun. 193, pp. 1-9, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Dean F. Sittig, Priti Lakhani, Hardeep Singh |
Applying requisite imagination to safeguard electronic health record transitions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Am. Medical Informatics Assoc. ![In: J. Am. Medical Informatics Assoc. 29(5), pp. 1014-1018, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Weiye Zhao, Tairan He, Changliu Liu |
Probabilistic Safeguard for Reinforcement Learning Using Safety Index Guided Gaussian Process Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2210.01041, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Salma Elmalaki 0001, Bo-Jhang Ho, Moustafa Alzantot, Yasser Shoukry, Mani B. Srivastava |
VindiCo: Privacy Safeguard Against Adaptation Based Spyware in Human-in-the-Loop IoT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2202.01348, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
22 | Wael Jabr |
Review credibility as a safeguard against fakery: the case of Amazon. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Eur. J. Inf. Syst. ![In: Eur. J. Inf. Syst. 31(4), pp. 525-545, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Ali Fakhrzadehgan, Yale N. Patt, Prashant J. Nair, Moinuddin K. Qureshi |
SafeGuard: Reducing the Security Risk from Row-Hammer via Low-Cost Integrity Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCA ![In: IEEE International Symposium on High-Performance Computer Architecture, HPCA 2022, Seoul, South Korea, April 2-6, 2022, pp. 373-386, 2022, IEEE, 978-1-6654-2027-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Chezlyn Pillay, Hannah Morenike Adebanjo |
Implementing Facial Recognition to Safeguard against Password Attacks at Universities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICTAS ![In: Conference on Information Communications Technology and Society, ICTAS 2022, Durban, South Africa, March 9-10, 2022, pp. 1-5, 2022, IEEE, 978-1-6654-4019-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Jean-Jacques Ponciano, Claire Prudhomme, Frank Boochs |
From Acquisition to Presentation - The Potential of Semantics to Support the Safeguard of Cultural Heritage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Remote. Sens. ![In: Remote. Sens. 13(11), pp. 2226, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Kristjan Kikerpill |
The individual's role in cybercrime prevention: internal spheres of protection and our ability to safeguard them. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Kybernetes ![In: Kybernetes 50(4), pp. 1015-1026, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Yifei Simon Shao, Chen Chao, Shreyas Kousik, Ram Vasudevan |
Reachability-Based Trajectory Safeguard (RTS): A Safe and Fast Reinforcement Learning Safety Layer for Continuous Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Robotics Autom. Lett. ![In: IEEE Robotics Autom. Lett. 6(2), pp. 3663-3670, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Sherief H. Murad, Kamel Hussein Rahouma |
Hybrid Cryptographic Approach to Safeguard Cloud Computing Services: A Survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AMLTA ![In: Advanced Machine Learning Technologies and Applications - Proceedings of AMLTA 2021, Cairo, Egypt, March 22-24, 2021., pp. 785-793, 2021, Springer, 978-3-030-69716-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Mohannad Ismail, Jinwoo Yom, Christopher Jelesnianski, Yeongjin Jang, Changwoo Min |
VIP: Safeguard Value Invariant Property for Thwarting Critical Memory Corruption Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021, pp. 1612-1626, 2021, ACM, 978-1-4503-8454-4. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Jing Lin, Chenhan Zhang, Shui Yu 0001 |
Safeguard the Original Data in Federated Learning via Data Decomposition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM ![In: IEEE Global Communications Conference, GLOBECOM 2021, Madrid, Spain, December 7-11, 2021, pp. 1-6, 2021, IEEE, 978-1-7281-8104-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Angelo Mario Del Grosso, Driss Fassi Fihri, Mohammed El Mohajir, Ouafae Nahli, Anna Tonazzini |
Digital safeguard of laminated historical manuscripts: the treatise "Poem in Rajaz on medicine" as a case study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIST ![In: 6th IEEE Congress on Information Science and Technology, CiSt 2020, Agadir - Essaouira, Morocco, June 5-12, 2021, pp. 192-197, 2021, IEEE, 978-1-7281-6646-9. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Alexander Pagan, Khaled Elleithy |
A Multi-Layered Defense Approach to Safeguard Against Ransomware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCWC ![In: 11th IEEE Annual Computing and Communication Workshop and Conference, CCWC 2021, Las Vegas, NV, USA, January 27-30, 2021, pp. 942-947, 2021, IEEE, 978-1-6654-1490-6. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Shaobing Xu, Huei Peng, Pingping Lu, Minghan Zhu, Yifan Tang |
Design and Experiments of Safeguard Protected Preview Lane Keeping Control for Autonomous Vehicles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 8, pp. 29944-29953, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Guangquan Xu, Wei Wang 0012, Litao Jiao, Xiaotong Li, Kaitai Liang, James Xi Zheng, Wenjuan Lian, Hequn Xian, Honghao Gao |
SoProtector: Safeguard Privacy for Native SO Files in Evolving Mobile IoT Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 7(4), pp. 2539-2552, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Xiangle Cheng, Yulei Wu, Geyong Min, Albert Y. Zomaya, Xuming Fang |
Safeguard Network Slicing in 5G: A Learning Augmented Optimization Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Sel. Areas Commun. ![In: IEEE J. Sel. Areas Commun. 38(7), pp. 1600-1613, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Zhong Cao, Shaobing Xu, Songan Zhang, Huei Peng, Diange Yang |
Driving-Policy Adaptive Safeguard for Autonomous Vehicles Using Reinforcement Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2012.01010, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
22 | Yifei Simon Shao, Chen Chao, Shreyas Kousik, Ram Vasudevan |
Reachability-based Trajectory Safeguard (RTS): A Safe and Fast Reinforcement Learning Safety Layer for Continuous Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2011.08421, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
22 | Tan Yigitcanlar, Luke Butler, Emily Windle, Kevin C. Desouza, Rashid Mehmood, Juan M. Corchado |
Can Building "Artificially Intelligent Cities" Safeguard Humanity from Natural Disasters, Pandemics, and Other Catastrophes? An Urban Scholar's Perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 20(10), pp. 2988, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Ingvar Tjøstheim, John A. Waterworth |
Inverting the Panopticon to Safeguard Privacy in Ambient Environments: An Exploratory Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (23) ![In: Distributed, Ambient and Pervasive Interactions - 8th International Conference, DAPI 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19-24, 2020, Proceedings, pp. 348-361, 2020, Springer, 978-3-030-50343-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Bita Banihashemi, Zakaria Maamar, Noura Faci, Emir Ugljanin |
Thing Mutation as a Countermeasure to Safeguard IoT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MEDES ![In: MEDES '20: 12th International Conference on Management of Digital EcoSystems, Virtual Event, United Arab Emirates, 2-4 November, 2020, pp. 96-103, 2020, ACM, 978-1-4503-8115-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Aryam Salazar Castillo |
Measures to safeguard food security during COVID-19: the experience of the sowing plan in Venezuela. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEGOV ![In: ICEGOV 2020: 13th International Conference on Theory and Practice of Electronic Governance, Athens, Greece, 23-25 September, 2020, pp. 396-399, 2020, ACM, 978-1-4503-7674-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Meysam Shojaee, Miguel C. Neves, Israat Haque 0001 |
SafeGuard: Congestion and Memory-aware Failure Recovery in SD-WAN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNSM ![In: 16th International Conference on Network and Service Management, CNSM 2020, Izmir, Turkey, November 2-6, 2020, pp. 1-7, 2020, IEEE, 978-3-903176-31-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Guohua Wang, Shangda Xie, Xun Zhang, Jinggeng Gao, Feng Wei, Bo Zhao, Chunying Wang, Shichao Lv |
An Effective Method to Safeguard Cyber Security by Preventing Malicious Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 7, pp. 166282-166291, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Abdullah M. Iliyasu |
Cellular-Automated Protocol to Safeguard Confidentiality of QR Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 7, pp. 144451-144471, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
22 | A. Dhanapal, P. Nithyanandam |
The HTTP Flooding Attack Detection to Secure and Safeguard Online Applications in the Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Syst. Model. Des. ![In: Int. J. Inf. Syst. Model. Des. 10(3), pp. 41-58, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Mallory Suzanne Graydon |
Retrospectively Documenting SAFEGUARD's Possession of the Overarching Properties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN (Supplements) ![In: 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2019, Portland, OR, USA, June 24-27, 2019, Supplemental Volume, pp. 27-28, 2019, IEEE, 978-1-7281-3028-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Peinan Li, Lutan Zhao, Rui Hou 0001, Lixin Zhang 0002, Dan Meng |
Conditional Speculation: An Effective Approach to Safeguard Out-of-Order Execution Against Spectre Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCA ![In: 25th IEEE International Symposium on High Performance Computer Architecture, HPCA 2019, Washington, DC, USA, February 16-20, 2019, pp. 264-276, 2019, IEEE, 978-1-7281-1444-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Promila Ghosh, M. Raihan, Md. Tanvir Islam, Md. Ekhlasur Rahaman |
Safeguard: A Prototype of An Application Programming Interface to Save the Disaster Affected People. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCNT ![In: 10th International Conference on Computing, Communication and Networking Technologies, ICCCNT 2019, Kanpur, India, July 6-8, 2019, pp. 1-5, 2019, IEEE, 978-1-5386-5906-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
22 | R. Vaitheeshwari, V. Sathiesh Kumar, S. Anubha Pearline |
Design and Implementation of Human Safeguard Measure Using Separable Convolutional Neural Network Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CVIP (2) ![In: Computer Vision and Image Processing - 4th International Conference, CVIP 2019, Jaipur, India, September 27-29, 2019, Revised Selected Papers, Part II, pp. 319-330, 2019, Springer, 978-981-15-4017-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Tao Wang 0018, Hongchang Chen, Guozhen Cheng, Yulin Lu |
SDNManager: A Safeguard Architecture for SDN DoS Attacks Based on Bandwidth Prediction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 2018, pp. 7545079:1-7545079:16, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Octavio Flores Siordia, Juan Carlos Estrada Gutiérrez, Carlos Eduardo Padilla Leyferman, Jorge Aguilar Santiago, Maricela Jiménez Rodríguez |
System to Safeguard the Identity of Persons in Photographs through Cryptography and Steganography Techniques Using Chaos. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 2018, pp. 4853134:1-4853134:16, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Wibke Kusturica, Christoph Laroque, Deike Gliem, Jana Stolipin, Sigrid Wenzel |
Estimating Process duration and Safeguard Project Planning in a One-of-a-kind production Environment by the Use of simulation Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WSC ![In: 2018 Winter Simulation Conference, WSC 2018, Gothenburg, Sweden, December 9-12, 2018, pp. 3909-3920, 2018, IEEE, 978-1-5386-6572-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Saad El Jaouhari, Ahmed Bouabdallah |
A Privacy Safeguard Framework for a WebRTC/WoT-Based Healthcare Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (2) ![In: 2018 IEEE 42nd Annual Computer Software and Applications Conference, COMPSAC 2018, Tokyo, Japan, 23-27 July 2018, Volume 2, pp. 468-473, 2018, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Eun Su Jeong, In-Seok Kim, Dong Hoon Lee 0001 |
SafeGuard: a behavior based real-time malware detection scheme for mobile multimedia applications in android platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 76(17), pp. 18153-18173, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Manaar Alam, Sarani Bhattacharya, Debdeep Mukhopadhyay, Sourangshu Bhattacharya |
Performance Counters to Rescue: A Machine Learning based safeguard against Micro-architectural Side-Channel-Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2017, pp. 564, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
22 | Anna Spagnolli, Lily Eva Frank, Pim Haselager, David Kirsh |
Transparency as an Ethical Safeguard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Symbiotic ![In: Symbiotic Interaction - 6th International Workshop, Symbiotic 2017, Eindhoven, The Netherlands, December 18-19, 2017, Revised Selected Papers, pp. 1-6, 2017, Springer, 978-3-319-91592-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Rajdeep Niyogi, Manoj Misra, Tarun Kulshrestha, Dhaval Patel 0002 |
Smart pilgrim: A mobile-sensor-cloud based system to safeguard pilgrims through smart environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IC3 ![In: Tenth International Conference on Contemporary Computing, IC3 2017, Noida, India, August 10-12, 2017, pp. 1-6, 2017, IEEE Computer Society, 978-1-5386-3077-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
22 | M. Mathankumar, M. Preethi, R. Kala Ranjani, N. Sugandhi |
An integrated dynamic power safeguard system using defence surveillance robots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Adv. Intell. Paradigms ![In: Int. J. Adv. Intell. Paradigms 8(2), pp. 219-228, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Muhammad Aminu Ahmad, Steve Woodhead, Diane Gan |
A Safeguard against Fast Self-propagating Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCNS ![In: Proceedings of the 6th International Conference on Communication and Network Security, ICCNS '16, Singapore, November 26-29, 2016, pp. 65-69, 2016, ACM, 978-1-4503-4783-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Ibbad Hafeez, Aaron Yi Ding, Lauri Suomalainen, Sasu Tarkoma |
Demo Abstract: Securebox - A Platform to Safeguard Network Edge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: IEEE/ACM Symposium on Edge Computing, SEC 2016, Washington, DC, USA, October 27-28, 2016, pp. 117-118, 2016, IEEE Computer Society, 978-1-5090-3322-5. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Yanling Lee, Kenji Watanabe, Wei-Sen Li |
Enhancing Regional Digital Preparedness on Natural Hazards to Safeguard Business Resilience in the Asia-Pacific. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITDRR ![In: Information Technology in Disaster Risk Reduction - First IFIP TC 5 DCITDRR International Conference, ITDRR 2016, Sofia, Bulgaria, November 16-18, 2016, Revised Selected Papers, pp. 170-182, 2016, Springer, 978-3-319-68485-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Li Lu 0001, Yongshuai Liu |
Safeguard: User Reauthentication on Smartphones via Behavioral Biometrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Comput. Soc. Syst. ![In: IEEE Trans. Comput. Soc. Syst. 2(3), pp. 53-64, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
22 | Xiaocong Jin, Jingchao Sun, Rui Zhang 0007, Yanchao Zhang |
SafeDSA: Safeguard Dynamic Spectrum Access against Fake Secondary Users. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015, pp. 304-315, 2015, ACM, 978-1-4503-3832-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
22 | Allen Nnanwuba Adum, Uche Patricia Ekwugha, Ngozi Marion Emmanuel |
The Potential of the m-Health Platform to Safeguard Public Health - The Nigerian Example. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HEALTHINF ![In: HEALTHINF 2015 - Proceedings of the International Conference on Health Informatics, Lisbon, Portugal, 12-15 January, 2015., pp. 383-389, 2015, SciTePress, 978-989-758-068-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
22 | Irene Govender |
Mapping 'Security Safeguard' Requirements in a data privacy legislation to an international privacy framework: A compliance methodology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSA ![In: 2015 Information Security for South Africa, ISSA 2015, Johannesburg, South Africa, August 12-13, 2015, pp. 1-8, 2015, IEEE, 978-1-4799-7755-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
22 | Hubert A. Jäger, Arnold Monitzer, Ralf Rieken, Edmund Ernst, Khiem Dau Nguyen |
Sealed Cloud - A Novel Approach to Safeguard against Insider Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trusted Cloud Computing ![In: Trusted Cloud Computing, pp. 15-34, 2014, Springer, 978-3-319-12717-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
22 | Flaviano Tessitore |
Aerial surveillance and airborne remote sensing techniques in Guardia di Finanza: An operational experience: Guardia di Finanza and CRdC BENECON, police officers and university researchers to protect and safeguard social fairness and legality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2014, Rome, Italy, October 13-16, 2014, pp. 1-6, 2014, IEEE, 978-1-4799-3530-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
22 | Emma Angelini, Sabrina Grassini, Marco Parvis, Marco Prioli, Simona Salicone |
An application of the Random-Fuzzy variables for the safeguard of underwater cultural heritage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
I2MTC ![In: IEEE International Instrumentation and Measurement Technology Conference, I2MTC 2014, Proceedings, Montevideo, Uruguay, May 12-15, 2014, pp. 342-347, 2014, IEEE. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
22 | Dong Fan, Yan Li, Yulu Gan, Jin Yin |
Dynamic modeling, analysis and evaluate of safeguard strength on emergency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOLI ![In: Proceedings of 2014 IEEE International Conference on Service Operations and Logistics, and Informatics, Qingdao, China, October 8-10, 2014, pp. 341-343, 2014, IEEE. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
22 | Kamil Jezek, Jens Dietrich 0001 |
On the Use of Static Analysis to Safeguard Recursive Dependency Resolution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROMICRO-SEAA ![In: 40th EUROMICRO Conference on Software Engineering and Advanced Applications, EUROMICRO-SEAA 2014, Verona, Italy, August 27-29, 2014, pp. 166-173, 2014, IEEE Computer Society, 978-1-4799-5795-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
22 | Federica Bressan, Antonio Rodà, Sergio Canazza, Federico Fontana, Roberta Bertani |
The Safeguard of Audio Collections: A Computer Science Based Approach to Quality Control - The Case of the Sound Archive of the Arena di Verona. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Adv. Multim. ![In: Adv. Multim. 2013, pp. 276354:1-276354:14, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
22 | Elisa Pievanelli, Alina Plesca, Riccardo Stefanelli, Daniele Trinchero |
Dynamic wireless sensor networks for real time safeguard of workers exposed to physical agents in constructions sites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WiSNet ![In: IEEE Topical Conference on Wireless Sensors and Sensor Networks, WiSNet 2013, Austin, TX, USA, January 20-23, 2013, pp. 55-57, 2013, IEEE, 978-1-4673-3104-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
22 | Jiusheng Du, Zheng Hou |
Wireless data transmission safeguard mechanism based on network status. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIA ![In: IEEE International Conference on Information and Automation, ICIA 2013, Yinchuan, China, August 26-28, 2013, pp. 404-408, 2013, IEEE. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
22 | Neeraj Kumar Sharma 0002, Vibha Gaur, Sunil Kumar Muttoo |
A dynamic reputation system with built-in attack resilience to safeguard buyers in e-market. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGSOFT Softw. Eng. Notes ![In: ACM SIGSOFT Softw. Eng. Notes 37(4), pp. 1-19, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
22 | Franziska Boehm, Paul de Hert |
Notification, an important safeguard against the improper use of surveillance - finally recognized in case law and EU law. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Eur. J. Law Technol. ![In: Eur. J. Law Technol. 3(3), 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
22 | Patrick Labenda |
Shared control system to safeguard mobility of wheeled, actively articulated truck-trailer vehicles on structured and rough terrain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITSC ![In: 15th International IEEE Conference on Intelligent Transportation Systems, ITSC 2012, Anchorage, AK, USA, September 16-19, 2012, pp. 1747-1752, 2012, IEEE, 978-1-4673-3064-0. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
22 | Jifeng Qian, Xiaoning Zhu, Ruijun Qiao |
Approach on Safeguard Mechanism of Emergency Supplies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LISS (2) ![In: LISS 2011 - Proceedings of the 1st International Conference on Logistics, Informatics and Service Science, Volume 2, Beijing, China, 8 - 11 June, 2011, pp. 169-174, 2011, SciTePress, 978-989-8425-63-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
22 | Chowdhury Sharif Hasan, Sheikh Iqbal Ahamed |
An Approach for Ensuring Robust Safeguard against Location Privacy Violation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, COMPSAC 2010, Seoul, Korea, 19-23 July 2010, pp. 82-91, 2010, IEEE Computer Society, 978-0-7695-4085-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
22 | |
Researches for Constructing Responsibility Safeguard System of Enterprise Faces User. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEE ![In: The International Conference on E-Business and E-Government, ICEE 2010, 7-9 May 2010, Guangzhou, China, Proceedings, pp. 5256-5258, 2010, IEEE Computer Society, 978-0-7695-3997-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
22 | Ardion D. Beldad, Menno de Jong, Michaël F. Steehouder |
When the bureaucrat promises to safeguard your online privacy: Dissecting the contents of privacy statements on Dutch municipal websites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Gov. Inf. Q. ![In: Gov. Inf. Q. 26(4), pp. 559-566, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Ang Li 0002, Xiaowei Yang 0001, David Wetherall |
SafeGuard: safe forwarding during route changes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoNEXT ![In: Proceedings of the 2009 ACM Conference on Emerging Networking Experiments and Technology, CoNEXT 2009, Rome, Italy, December 1-4, 2009, pp. 301-312, 2009, ACM, 978-1-60558-636-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Thomas Neubauer |
A Comparison of Security Safeguard Selection Methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEIS (3) ![In: ICEIS 2009 - Proceedings of the 11th International Conference on Enterprise Information Systems, Volume ISAS, Milan, Italy, May 6-10, 2009, pp. 320-323, 2009, 978-989-8111-86-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
22 | Rua-Huan Tsaih, Wanying Lin, Ada Chen |
Safeguard gaps and their managerial issues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ind. Manag. Data Syst. ![In: Ind. Manag. Data Syst. 108(5), pp. 669-676, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Do-Hoon Kim, Taek Lee, Hoh Peter In |
Effective Security Safeguard Selection Process for Return on Security Investment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSCC ![In: Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, Yilan, Taiwan, 9-12 December 2008, pp. 668-673, 2008, IEEE Computer Society, 978-0-7695-3473-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|