|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 415 occurrences of 286 keywords
|
|
|
Results
Found 945 publication records. Showing 945 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
89 | Giovanni Di Crescenzo |
On the Statistical Dependency of Identity Theft on Demographics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISIPS ![In: Protecting Persons While Protecting the People, Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers, pp. 122-137, 2008, Springer, 978-3-642-10232-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
US Demographics, Statistics, Regression Analysis, Identity Theft |
78 | Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu 0005 |
Behavior based software theft detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009, pp. 280-290, 2009, ACM, 978-1-60558-894-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
software plagiarism, software theft, dynamic analysis, software birthmark |
78 | Marion Schulze, Mahmood Hussain Shah |
The Step Method - Battling Identity Theft Using E-Retailers' Websites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
I3E ![In: Software Services for e-Business and e-Society, 9th IFIP WG 6.1 Conference on e-Business, e-Services and e-Society, I3E 2009, Nancy, France, September 23-25, 2009. Proceedings, pp. 173-183, 2009, Springer, 978-3-642-04279-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Identity Fraud, Customers’ Behavior, E-retailer, Security, Privacy, Websites, Identity Theft |
78 | Kim Luong |
The other side of identity theft: not just a financial concern. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 152-155, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
information security, identity theft |
75 | Jakob Illeborg Pagter, Michael Østergaard Pedersen |
The All-or-Nothing Anti-Theft Policy - Theft Protection for Pervasive Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops (1) ![In: 21st International Conference on Advanced Information Networking and Applications (AINA 2007), Workshops Proceedings, Volume 1, May 21-23, 2007, Niagara Falls, Canada, pp. 626-631, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
68 | Somnath Mitra, Zizhan Zheng, Santanu Guha, Animikh Ghosh, Prabal Dutta, Bhagavathy Krishna, Kurt Plarre, Santosh Kumar 0001, Prasun Sinha |
An affordable, long-lasting, and autonomous theft detection and tracking system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SenSys ![In: Proceedings of the 7th International Conference on Embedded Networked Sensor Systems, SenSys 2009, Berkeley, California, USA, November 4-6, 2009, pp. 351-352, 2009, ACM, 978-1-60558-519-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
burglar tracking, theft detection |
68 | Paul Madsen, Yuzo Koga, Kenji Takahashi |
Federated identity management for protecting users from ID theft. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2005 Workshop on Digital Identity Management, Fairfax, VA, USA, November 11, 2005, pp. 77-83, 2005, ACM, 1-59593-232-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
phishing, identity theft, federated identity |
68 | Yang Yu, Tzi-cker Chiueh |
Display-only file server: a solution against information theft due to insider attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Proceedings of the 2004 ACM Workshop on Digital Rights Management 2004, Washington, DC, USA, October 25, 2004, pp. 31-39, 2004, ACM, 1-58113-969-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
information theft, access, digital rights management, insider attack |
59 | Fatih Özgül, Hakan Aksoy, Chris Bowerman |
Theft Gang Discovery Using Co-offending Knowledge and SNA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IV ![In: 12th International Conference on Information Visualisation, IV 2008, 8-11 July 2008, London, UK, pp. 347-348, 2008, IEEE Computer Society, 978-0-7695-3268-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
59 | Sabine Delaître |
Risk Management approach on identity theft in biometric systems context. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The First International Conference on Availability, Reliability and Security, ARES 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria, pp. 982, 2006, IEEE Computer Society, 0-7695-2567-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
59 | Paul C. van Oorschot, Stuart G. Stubblebine |
Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and Funneling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 9th International Conference, FC 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers, pp. 31-43, 2005, Springer, 3-540-26656-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
57 | Leyla Bilge, Thorsten Strufe, Davide Balzarotti, Engin Kirda |
All your contacts are belong to us: automated identity theft attacks on social networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 18th International Conference on World Wide Web, WWW 2009, Madrid, Spain, April 20-24, 2009, pp. 551-560, 2009, ACM, 978-1-60558-487-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
social network security, identity theft |
57 | Tjaart Steyn, Hennie A. Kruger, Lynette Drevin |
Identity Theft - Empirical evidence from a Phishing Exercise. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa, pp. 193-203, 2007, Springer, 978-0-387-72366-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
phising, education, Identity theft, security awareness |
57 | Wenjie Wang, Yufei Yuan, Norman P. Archer |
A Contextual Framework for Combating Identity Theft. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 4(2), pp. 30-38, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
identity authentication, risk analysis, security and privacy, Identity theft, multi-party interaction |
52 | M. Eric Johnson |
Data Hemorrhages in the Health-Care Sector. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers, pp. 71-89, 2009, Springer. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Health-care information, data leaks, security, identity theft |
52 | Kayvan M. Lavassani, Bahar Movahedi, Vinod Kumar 0001 |
Identification in electronic networks: characteristics of e-identifiers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 8th International Conference on Electronic Commerce: The new e-commerce - Innovations for Conquering Current Barriers, Obstacles and Limitations to Conducting Successful Business on the Internet, 2006, Fredericton, New Brunswick, Canada, August 13-16, 2006, pp. 216-224, 2006, ACM, 1-59593-392-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
electronic identification, electronic identifier, electronic networks, e-commerce, identity theft |
48 | Andreas Klenk, Holger Kinkelin, Christoph Eunicke, Georg Carle |
Preventing identity theft with electronic identity cards and the trusted platform module. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROSEC ![In: Proceedings of the Second European Workshop on System Security, EUROSEC 2009, Nuremburg, Germany, March 31, 2009, pp. 44-51, 2009, ACM, 978-1-60558-472-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
authentication with TPM, electronic ID, identity system |
48 | Hui Song, Sencun Zhu, Guohong Cao |
SVATS: A Sensor-Network-Based Vehicle Anti-Theft System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: INFOCOM 2008. 27th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 13-18 April 2008, Phoenix, AZ, USA, pp. 2128-2136, 2008, IEEE, 978-1-4244-2026-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
48 | Ginger Myles, Christian S. Collberg |
Detecting Software Theft via Whole Program Path Birthmarks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings, pp. 404-415, 2004, Springer, 3-540-23208-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
copyright protection, software piracy, software birthmark |
46 | Jedidiah R. Crandall, John Brevik, Shaozhi Ye, Gary Wassermann, Daniela Alvim Seabra de Oliveira, Zhendong Su 0001, Shyhtsun Felix Wu, Frederic T. Chong |
Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Comput. Sci. ![In: Transactions on Computational Science IV, Special Issue on Security in Computing, pp. 244-262, 2009, Springer, 978-3-642-01003-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
information theft detection, Intrusion detection, information theory, malware analysis |
46 | Philip Prentis, Mats Sjöberg, Markus Koskela, Jorma Laaksonen |
Image Theft Detection with Self-Organising Maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICANN (1) ![In: Artificial Neural Networks - ICANN 2009, 19th International Conference, Limassol, Cyprus, September 14-17, 2009, Proceedings, Part I, pp. 495-504, 2009, Springer, 978-3-642-04273-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Image theft detection, TS-SOM, PicSOM, image retrieval, self-organising maps |
46 | Latanya Sweeney |
Protecting Job Seekers from Identity Theft. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Comput. ![In: IEEE Internet Comput. 10(2), pp. 74-78, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
phishing, google, identity theft |
46 | Bill McCarty |
Automated Identity Theft. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 1(5), pp. 89-92, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Internet Relay Chat, credit-card fraud, identity theft, honeynets, honeynets, IRC |
46 | Stuart E. Schechter, Michael D. Smith 0001 |
How Much Security Is Enough to Stop a Thief?: The Economics of Outsider Theft via Computer Systems and Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, 7th International Conference, FC 2003, Guadeloupe, French West Indies, January 27-30, 2003, Revised Papers, pp. 122-137, 2003, Springer, 3-540-40663-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Theft, Exploits, Threat Models, Security Economics |
44 | Weidong Shi, Joshua B. Fryman, Guofei Gu, Hsien-Hsin S. Lee, Youtao Zhang, Jun Yang 0002 |
InfoShield: a security architecture for protecting information usage in memory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCA ![In: 12th International Symposium on High-Performance Computer Architecture, HPCA-12 2006, Austin, Texas, USA, February 11-15, 2006, pp. 222-231, 2006, IEEE Computer Society, 0-7803-9368-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
41 | Yameng Bai, Xingming Sun, Guang Sun, Xiaohong Deng, Xiaoming Zhou |
Dynamic K-Gram Based Software Birthmark. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Australian Software Engineering Conference ![In: 19th Australian Software Engineering Conference (ASWEC 2008), March 25-28, 2008, Perth, Australia, pp. 644-649, 2008, IEEE Computer Society, 978-0-7695-3100-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Software Theft, k-gram, Obfuscation, Dynamic Program Slicing, Software Birthmark |
41 | Anne M. Payton |
Data security breach: seeking a prescription for adequate remedy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 162-167, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
data breach, data custodian, negligence, notification laws, identity theft, personal information, security breach |
38 | HongQian Karen Lu, Asad M. Ali |
Prevent Online Identity Theft - Using Network Smart Cards for Secure Online Transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings, pp. 342-353, 2004, Springer, 3-540-23208-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
38 | Alexandra Boldyreva, Markus Jakobsson |
Theft-Protected Proprietary Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Security and Privacy in Digital Rights Management, ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised Papers, pp. 208-220, 2002, Springer, 3-540-40410-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
35 | Robert C. Newman |
Cybercrime, identity theft, and fraud: practicing safe internet - network security threats and vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 68-78, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
internet fraud, identity theft, cybercrime |
35 | Greg Goth |
Identity Theft Solutions Disagree on Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Distributed Syst. Online ![In: IEEE Distributed Syst. Online 6(8), 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
online security, identity theft |
33 | Melanie R. Rieback |
Keep on Blockin' in the Free World. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers, pp. 60-68, 2005, Springer, 978-3-540-77155-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Md. Asif Nawaz, Abdullah Esha, Ahad Ahamed, Raihan Uddin Ahmed |
Assisting the Power Generation Sector Toward Sustainability - an IoT Based System for Power Theft Detection with Theft Location Identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCA ![In: ICCA 2022: 2nd International Conference on Computing Advancements, Dhaka, Bangladesh, March 10 - 12, 2022, pp. 309-315, 2022, ACM, 978-1-4503-9734-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
32 | Pamir, Ashraf Ullah, Shoaib Munawar, Muhammad Asif 0018, Benish Kabir, Nadeem Javaid |
Synthetic Theft Attacks Implementation for Data Balancing and a Gated Recurrent Unit Based Electricity Theft Detection in Smart Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISIS ![In: Complex, Intelligent and Software Intensive Systems - Proceedings of the 15th International Conference on Complex, Intelligent and Software Intensive Systems (CISIS-2021), Asan, Korea, 1-3 July 2021., pp. 395-405, 2021, Springer, 978-3-030-79724-9. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
32 | Rajiv Punmiya, Sangho Choe |
Energy Theft Detection Using Gradient Boosting Theft Detector With Feature Engineering-Based Preprocessing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Smart Grid ![In: IEEE Trans. Smart Grid 10(2), pp. 2326-2329, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
32 | Nicholas Charles Patterson, Michael Hobbs, Jemal H. Abawajy |
Virtual Property Theft Detection Framework: An Algorithm to Detect Virtual Propety Theft in Virtual World Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, Liverpool, United Kingdom, June 25-27, 2012, pp. 177-184, 2012, IEEE Computer Society, 978-1-4673-2172-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
32 | Adam Shostack, Paul Syverson |
What Price Privacy? - and why identity theft is about neither identity nor theft. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Economics of Information Security ![In: Economics of Information Security, pp. 129-142, 2004, Springer, 1-4020-8089-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy |
TruWallet: trustworthy and migratable wallet-based web authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, STC 2009, Chicago, Illinois, USA, November 13, 2009, pp. 19-28, 2009, ACM, 978-1-60558-788-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
password wallet, secure migration, trusted computing, phishing, identity theft |
30 | Markus Jakobsson |
Captcha-free throttling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, AISec 2009, Chicago, Illinois, USA, November 9, 2009, pp. 15-22, 2009, ACM, 978-1-60558-781-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
cookie theft, dns poisoning, usability, access, malware, scripting, cloning, captcha, throttle |
30 | Stephen Badan, Julien Probst, Markus Jaton, Damien Vionnet, Jean-Frédéric Wagen, Gérald Litzistorf |
A Rich Client-Server Based Framework for Convenient Security and Management of Mobile Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiSec ![In: Security and Privacy in Mobile Information and Communication Systems, First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers, pp. 23-34, 2009, Springer, 978-3-642-04433-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
rich client, transient authentication, theft detection, authentication, smartphone, client-server, mobile security, secure framework |
30 | Daisuke Mashima, Mustaque Ahamad |
Using identity credential usage logs to detect anomalous service accesses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 5th Workshop on Digital Identity Management, Chicago, Illinois, USA, November 13, 2009, pp. 73-80, 2009, ACM, 978-1-60558-786-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
identity theft and misuse detection, online access log monitoring, risk scoring |
30 | Akiko Orita, Hisakazu Hada |
Is that really you?: an approach to assure identity without revealing real-name online. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 5th Workshop on Digital Identity Management, Chicago, Illinois, USA, November 13, 2009, pp. 17-20, 2009, ACM, 978-1-60558-786-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
anonymity, identity, twitter, identity theft, linkability, impersonation |
30 | Yang Yu, Hariharan Kolam, Lap-Chung Lam, Tzi-cker Chiueh |
Applications of a feather-weight virtual machine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VEE ![In: Proceedings of the 4th International Conference on Virtual Execution Environments, VEE 2008, Seattle, WA, USA, March 5-7, 2008, pp. 171-180, 2008, ACM, 978-1-59593-796-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
binary server, browser exploit, information theft, virtual machine, web crawler |
30 | Craig W. Thompson, Dale R. Thompson |
Identity Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Comput. ![In: IEEE Internet Comput. 11(3), pp. 82-85, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Identity Solutions Symposium, RFID, smart cards, Identity management, identity theft, ID |
30 | Ian M. Molloy, Jiangtao Li 0001, Ninghui Li |
Dynamic Virtual Credit Card Numbers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers, pp. 208-223, 2007, Springer, 978-3-540-77365-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
credit card theft, e-commerce |
30 | Hennie A. Kruger, Lynette Drevin, Tjaart Steyn |
Email Security Awareness - a Practical Assessment of Employee Behaviour. ![Search on Bibsonomy](Pics/bibsonomy.png) |
World Conference on Information Security Education ![In: Fifth World Conference on Information Security Education, Proceedings of the IFIP TC11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, New York, USA, pp. 33-40, 2007, Springer, 978-0-387-73268-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Email security, employee behaviour, identity theft, security awareness |
30 | Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Elisa Bertino |
Privacy preserving multi-factor authentication with biometrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2006 Workshop on Digital Identity Management, Alexandria, VA, USA, November 3, 2006, pp. 63-72, 2006, ACM, 1-59593-547-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
identity theft prevention, privacy, authentication, biometrics |
30 | Ginger Myles, Christian S. Collberg |
K-gram based software birthmarks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), Santa Fe, New Mexico, USA, March 13-17, 2005, pp. 314-318, 2005, ACM, 1-58113-964-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
software theft detection, legal aspects, software birthmarking |
30 | Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Elisa Bertino |
Establishing and protecting digital identity in federation systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2005 Workshop on Digital Identity Management, Fairfax, VA, USA, November 11, 2005, pp. 11-19, 2005, ACM, 1-59593-232-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
identity management, federation, single sign-on, identity theft, zero knowledge proof |
30 | Terry Costlow |
Camera Phone Bans Expected. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Distributed Syst. Online ![In: IEEE Distributed Syst. Online 5(2), 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
cell phone privacy, camera phones, identity theft |
30 | Elizabeth A. Evans, Carolyn M. Kotlas, Donna W. Bailey, Abe Crystal, Terri Buckner |
It's eleven o'clock: do you know where your identity is? ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 32nd Annual ACM SIGUCCS Conference on User Services 2004, Baltimore, MD, USA, October 10-13, 2004, pp. 361-363, 2004, ACM, 1-58113-869-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
identity abuse, identity theft |
30 | Heikki Ailisto, Mikko Lindholm, Satu-Marja Mäkelä, Elena Vildjiounaite |
Unobtrusive user identification with light biometrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NordiCHI ![In: Proceedings of the Third Nordic Conference on Human-Computer Interaction 2004, Tampere, Finland, October 23-27, 2004, pp. 327-330, 2004, ACM, 1-58113-857-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
body fat percentage, privacy, verification, biometrics, identification, weight, identity theft, height |
30 | Simson L. Garfinkel |
Email-Based Identification and Authentication: An Alternative to PKI? ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 1(6), pp. 20-26, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
EBIA, Email Security, Social Security Numbers (SSNs), PKI, Identity Theft |
27 | André N. Klingsheim, Kjell Jørgen Hole |
Identity Theft: Much Too Easy? A Study of Online Systems in Norway. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers, pp. 192-196, 2008, Springer, 978-3-540-85229-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Heewan Park, Seokwoo Choi, Hyun-il Lim, Taisook Han |
Detecting Java Theft Based on Static API Trace Birthmark. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings, pp. 121-135, 2008, Springer, 978-3-540-89597-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Rebecca T. Mercuri |
Scoping identity theft. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 49(5), pp. 17-21, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Adam L. Young, Moti Yung |
On Fundamental Limitations of Proving Data Theft. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 1(4), pp. 524-531, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Jianlong Yang, Jianmin Wang 0001, Deyi Li |
Detecting the Theft of Natural Language Text Using Birthmark. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), Pasadena, California, USA, December 18-20, 2006, Proceedings, pp. 699-702, 2006, IEEE Computer Society, 0-7695-2745-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Taekyoung Kwon 0002, Hyeonjoon Moon |
Multi-modal Techniques for Identity Theft Prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Human.Society@Internet ![In: Web and Communication Technologies and Internet-Related Social Issues - HSI 2005, 3rd International Conference on Human.Society@Internet, Tokyo, Japan, July 27-29, 2005, Proceedings, pp. 291-300, 2005, Springer, 3-540-27830-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Patrick S. Chen |
Discovering Investigation Clues through Mining Criminal Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Intelligence and Security Informatics ![In: Intelligence and Security Informatics, Techniques and Applications, pp. 173-198, 2008, Springer, 978-3-540-69207-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Criminal Data, Stolen Automobiles, Data Mining, Databases, Data Warehousing |
22 | Peter Likarish, Eunjin Jung, Donald E. Dunbar, Thomas E. Hansen, Juan Pablo Hourcade |
B-APT: Bayesian Anti-Phishing Toolbar. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2008, Beijing, China, 19-23 May 2008, pp. 1745-1749, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Christian S. Collberg, Clark D. Thomborson, Gregg M. Townsend |
Dynamic graph-based software fingerprinting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Program. Lang. Syst. ![In: ACM Trans. Program. Lang. Syst. 29(6), pp. 35, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
watermarking, software protection, Software piracy |
22 | Yungchang Ku, Ying-Chieh Chen, Kuo-Ching Wu, Chaochang Chiu |
An Empirical Analysis of Online Gaming Crime Characteristics from 2002 to 2004. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAISI ![In: Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings, pp. 34-45, 2007, Springer, 978-3-540-71548-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
online gaming crime, virtual property, MMORPG, cybercrime |
22 | Nicholas Huber, Katina Michael |
Minimizing Product Shrinkage across the Supply Chain using Radio Frequency Identification: a Case Study on a Major Australian Retailer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMB ![In: International Conference on Mobile Business (ICMB 2007), July 9-11, 2007, Toronto, Ontario, Canada, pp. 45, 2007, IEEE Computer Society, 0-7695-2803-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Patrick S. Chen, K. C. Chang, Tai-Ping Hsing, Shihchieh Chou |
Mining Criminal Databases to Finding Investigation Clues-By Example of Stolen Automobiles Database. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISI ![In: Intelligence and Security Informatics, International Workshop, WISI 2006, Singapore, April 9, 2006, Proceedings, pp. 91-102, 2006, Springer, 3-540-33361-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Walid Shawbaki |
Multimedia Security in Passive Optical Networks via Wavelength Hopping and codes cycling technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AICT/ICIW ![In: Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW 2006), 19-25 February 2006, Guadeloupe, French Caribbean, pp. 51, 2006, IEEE Computer Society, 0-7695-2522-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Ahsan Habib 0001, Sonia Fahmy, Bharat K. Bhargava |
Monitoring and controlling QoS network domains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Manag. ![In: Int. J. Netw. Manag. 15(1), pp. 11-29, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Christer Magnusson, Louise Yngström |
Method for Insuring IT Risks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 37th Hawaii International Conference on System Sciences (HICSS-37 2004), CD-ROM / Abstracts Proceedings, 5-8 January 2004, Big Island, HI, USA, 2004, IEEE Computer Society, 0-7695-2056-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
IT insurance method, IT insurance policies, estimated maximum IT loss, commercial and industrial security, risk management, security policies |
22 | Radu Sion, Mikhail J. Atallah, Sunil Prabhakar |
On-the-fly Intrusion Detection for Web Portals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC ![In: 2003 International Symposium on Information Technology (ITCC 2003), 28-30 April 2003, Las Vegas, NV, USA, pp. 325-330, 2003, IEEE Computer Society, 0-7695-1916-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Akito Monden, Hajimu Iida, Ken-ichi Matsumoto, Koji Torii, Katsuro Inoue |
A Practical Method for Watermarking Java Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: 24th International Computer Software and Applications Conference (COMPSAC 2000), 25-28 October 2000, Taipei, Taiwan, pp. 191-197, 2000, IEEE Computer Society, 0-7695-0792-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
22 | Yacov Yacobi |
Risk Management for E-Cash Systems with Partial Real-Time Audit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, Third International Conference, FC'99, Anguilla, British West Indies, February 1999, Proceedings, pp. 62-71, 1999, Springer, 3-540-66362-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
randomized-audit, Cryptography, risk-management, e-cash, economy |
22 | T. F. Higginbotham |
Software protection of micro computer software (abstract only). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Conference on Computer Science ![In: Proceedings of the 15th ACM Annual Conference on Computer Science, St. Louis, Missouri, USA, February 16-19, 1987, pp. 390, 1987, ACM, 0-89791-218-7. The full citation details ...](Pics/full.jpeg) |
1987 |
DBLP DOI BibTeX RDF |
|
19 | Mariam Al-Hamar, Ray Dawson, Lin Guan |
A Culture of Trust Threatens Security and Privacy in Qatar. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: 10th IEEE International Conference on Computer and Information Technology, CIT 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010, pp. 991-995, 2010, IEEE Computer Society, 978-0-7695-4108-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Spear phishing, Phishing, E-mail, Identity theft, Penetration test |
19 | Ahren Studer, Adrian Perrig |
Mobile user location-specific encryption (MULE): using your office as your password. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Third ACM Conference on Wireless Network Security, WISEC 2010, Hoboken, New Jersey, USA, March 22-24, 2010, pp. 151-162, 2010, ACM, 978-1-60558-923-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
key derivation, laptop theft, location based access, security |
19 | Rüdiger Heimgärtner |
Identification of the User by Analyzing Human Computer Interaction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (3) ![In: Human-Computer Interaction. Ambient, Ubiquitous and Intelligent Interaction, 13th International Conference, HCI International 2009, San Diego, CA, USA, July 19-24, 2009, Proceedings, Part III, pp. 275-283, 2009, Springer, 978-3-642-02579-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
HCI analysis, interaction indicator, theft protection, computer protection, user interface, personalization, user interface design, tool, culture, recognition, identification, interaction analysis, user identification |
19 | Aniello Castiglione, Roberto De Prisco, Alfredo De Santis |
Do You Trust Your Phone? ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC-Web ![In: E-Commerce and Web Technologies, 10th International Conference, EC-Web 2009, Linz, Austria, September 1-4, 2009. Proceedings, pp. 50-61, 2009, Springer, 978-3-642-03963-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
SMS security, mobile malware, telephone phishing, telephone pharming, caller ID spoofing, SMS spoofing, NGN, identity theft, untraceability, VoIP security |
19 | Xiaoming Zhou, Xingming Sun, Guang Sun, Ying Yang 0003 |
A Combined Static and Dynamic Software Birthmark Based on Component Dependence Graph. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), Harbin, China, 15-17 August 2008, Proceedings, pp. 1416-1421, 2008, IEEE Computer Society, 978-0-7695-3278-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
software theft detection, software protection, software birthmark |
19 | Basie von Solms, Bobby L. Tait |
Biovault: Solving the Problem of Replay in Biometrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
I3E ![In: Challenges of Expanding Internet: E-Commerce, E-Business, and E-Government, 5th IFIP Conference e-Commerce, e-Business, and e-Government (I3E'2OO5), October 28-30, 2005, Poznan, Poland, pp. 465-479, 2005, Springer, 978-0-387-28753-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Biometric Tokens, Authentication, Electronic Commerce, Biometrics, Identification, Replay, Identity theft |
19 | Husrev T. Sencar, Nasir D. Memon |
Watermarking and ownership problem: a revisit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Proceedings of the Fifth ACM Workshop on Digital Rights Management, Alexandria, VA, USA, November 7, 2005, pp. 93-101, 2005, ACM, 1-59593-230-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
additive watermarking, counterfeit ownership, ownership deadlock, theft of ownership, watermarking, ownership |
19 | Sultan Almuhammadi, Clifford Neuman |
Security and Privacy Using One-Round Zero-Knowledge Proofs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CEC ![In: 7th IEEE International Conference on E-Commerce Technology (CEC 2005), 19-22 July 2005, München, Germany, pp. 435-438, 2005, IEEE Computer Society, 0-7695-2277-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
privacy, e-commerce, computer security, public-key cryptography, trusted computing, identity theft, Zero-knowledge proofs |
16 | Jack Garbus, Jordan Pollack |
Emergent Resource Exchange and Tolerated Theft Behavior Using Multiagent Reinforcement Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Artif. Life ![In: Artif. Life 30(1), pp. 28-47, Winter 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Sidra Abbas, Imen Bouazzi, Stephen Ojo, Gabriel Avelino R. Sampedro, Ahmad S. Almadhor, Abdullah Al Hejaili, Zuzana Stolicna |
Improving Smart Grids Security: An Active Learning Approach for Smart Grid-Based Energy Theft Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 12, pp. 1706-1717, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Wei Zhuang, Wen Jiang, Min Xia 0002, Jun Liu |
Dynamic Generative Residual Graph Convolutional Neural Networks for Electricity Theft Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 12, pp. 42737-42750, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Sanyuan Zhu, Ziwei Xue, Youfeng Li |
Electricity Theft Detection in Smart Grids Based on Omni-Scale CNN and AutoXGB. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 12, pp. 15477-15492, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Olufemi Abiodun Abraham, Hideya Ochiai, Md Delwar Hossain, Yuzo Taenaka, Youki Kadobayashi |
Electricity Theft Detection for Smart Homes: Harnessing the Power of Machine Learning With Real and Synthetic Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 12, pp. 26023-26045, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Wenlong Liao, Birgitte Bak-Jensen, Jayakrishnan Radhakrishna Pillai, Xiaofang Xia, Guangchun Ruan, Zhe Yang 0007 |
Reducing Annotation Efforts in Electricity Theft Detection Through Optimal Sample Selection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Instrum. Meas. ![In: IEEE Trans. Instrum. Meas. 73, pp. 1-11, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Abhilash Sen, Nien-Che Yang |
Power Theft Detection Using Advanced Neural Network in Three-phase Distribution Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Instrum. Meas. ![In: IEEE Trans. Instrum. Meas. 73, pp. 1-10, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Wenlong Liao, Ruijin Zhu, Zhe Yang 0007, Kuangpu Liu, Bin Zhang, Shuyang Zhu, Bin Feng |
Electricity Theft Detection Using Dynamic Graph Construction and Graph Attention Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Ind. Informatics ![In: IEEE Trans. Ind. Informatics 20(4), pp. 5074-5086, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Ahlam Althobaiti, Charalampos Rotsos, Angelos K. Marnerides |
Adaptive Energy Theft Detection in Smart Grids Using Self-Learning With Dual Neural Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Ind. Informatics ![In: IEEE Trans. Ind. Informatics 20(2), pp. 2776-2786, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Lipeng Zhu, Weijia Wen, Jiayong Li, Cong Zhang 0004, Bin Zhou 0005, Zhikang Shuai |
Deep Active Learning-Enabled Cost-Effective Electricity Theft Detection in Smart Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Ind. Informatics ![In: IEEE Trans. Ind. Informatics 20(1), pp. 256-268, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Wenqing Zhou, Bin Li 0041, Hao Xiao, Hui Xiao, Wen Wang 0005, Yingjun Zheng, Sheng Su |
Electricity Theft Detection of Residential Users With Correlation of Water and Electricity Usage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Ind. Informatics ![In: IEEE Trans. Ind. Informatics 20(4), pp. 5339-5351, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Xiaoyang Wang, Haipeng Xie, Lingfeng Tang, Chen Chen 0007, Zhaohong Bie |
Decentralized Privacy-Preserving Electricity Theft Detection for Distribution System Operators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Smart Grid ![In: IEEE Trans. Smart Grid 15(2), pp. 2179-2190, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Aqsa Khalid, Ghulam Mustafa, Muhammad Rizwan Rashid Rana, Saeed M. Alshahrani, Mofadal Alymani |
RNN-BiLSTM-CRF based amalgamated deep learning model for electricity theft detection to secure smart grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PeerJ Comput. Sci. ![In: PeerJ Comput. Sci. 10, pp. e1872, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Trystan S. Goetze |
AI Art is Theft: Labour, Extraction, and Exploitation, Or, On the Dangers of Stochastic Pollocks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.06178, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Shiming Wang, Zhe Ji, Liyao Xiang, Hao Zhang, Xinbing Wang, Chenghu Zhou, Bo Li |
Crafter: Facial Feature Crafting against Inversion-based Identity Theft on Deep Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.07205, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Qiushi Liang, Shengjie Zhao, Jiangfan Zhang, Hao Deng 0002 |
Unsupervised BLSTM-Based Electricity Theft Detection with Training Data Contaminated. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Cyber Phys. Syst. ![In: ACM Trans. Cyber Phys. Syst. 8(1), pp. 1:1-1:20, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Jalalud Din, Hongsheng Su, Sajad Ali, Muhammad Salman |
Research on Blockchain-Enabled Smart Grid for Anti-Theft Electricity Securing Peer-to-Peer Transactions in Modern Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 24(5), pp. 1668, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Muhammed Zekeriya Gunduz, Resul Das |
Smart Grid Security: An Effective Hybrid CNN-Based Approach for Detecting Energy Theft Using Consumption Patterns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 24(4), pp. 1148, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Antônio Mário Kaminski, Filipe Gabriel Carloto, Carlos Henrique Barriquello, Vinícius Jacques Garcia, Matheus Mello Jacques, Otacílio Carneiro Filho |
Assignment of AI Detected Buildings from Satellite Images to Registered Meters for Energy Theft Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISGT ![In: IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, ISGT 2024, Washington, DC, USA, February 19-22, 2024, pp. 1-5, 2024, IEEE, 979-8-3503-1360-4. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Madeleine Miller, Hany Habbak, Mahmoud M. Badr, Mohamed Baza, Mohamed Mahmoud 0001, Mostafa M. Fouda |
Electricity Theft Detection Approach Using One-Class Classification for AMI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCNC ![In: 21st IEEE Consumer Communications & Networking Conference, CCNC 2024, Las Vegas, NV, USA, January 6-9, 2024, pp. 260-265, 2024, IEEE, 979-8-3503-0457-2. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 945 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|