|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1717 occurrences of 1015 keywords
|
|
|
Results
Found 5607 publication records. Showing 5606 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
71 | Mark A. Whiting, Wendy Cowley, Jereme Haack, Douglas Love, Stephen Tratz, Caroline Varley, Kim Wiessner |
Threat stream data generator: creating the known unknowns for test and evaluation of visual analytics tools. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BELIV ![In: Proceedings of the 2006 AVI Workshop on BEyond time and errors: novel evaluation methods for information visualization, BELIV 2006, Venice, Italy, May 23, 2006, pp. 1-3, 2006, ACM Press, 1-59593-562-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
threat stream, threat, data generator |
68 | Dianxiang Xu, Kendall E. Nygard |
Threat-Driven Modeling and Verification of Secure Software Using Aspect-Oriented Petri Nets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 32(4), pp. 265-278, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
aspect-oriented Petri nets, modeling, verification, Petri nets, aspect-oriented software development, Software security, threat modeling |
61 | Sangho Lee, Dong Hwi Lee, Kuinam J. Kim |
A Conceptual Design of Knowledge-Based Real-Time Cyber-Threat Early Warning System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA Workshops ![In: Frontiers of High Performance Computing and Networking - ISPA 2006 Workshops, ISPA 2006 International Workshops, FHPCN, XHPC, S-GRACE, GridGIS, HPC-GTP, PDCE, ParDMCom, WOMP, ISDF, and UPWN, Sorrento, Italy, December 4-7, 2006, Proceedings, pp. 1006-1017, 2006, Springer, 3-540-49860-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Cyber-threat, TMS, Early-Warning, ESM |
57 | Punam Bedi, Vandana Gandotra, Archana Singhal, Vandita Vats, Neha Mishra |
Avoiding Threats Using Multi Agent System Planning for Web Based Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCI ![In: Computational Collective Intelligence. Semantic Web, Social Networks and Multiagent Systems, First International Conference, ICCCI 2009, Wroclaw, Poland, October 5-7, 2009. Proceedings, pp. 709-719, 2009, Springer, 978-3-642-04440-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
HTN, GOAP, MASPTA, Multi agent system, Threat modeling |
57 | Fredrik Johansson, Göran Falkman |
A Comparison between Two Approaches to Threat Evaluation in an Air Defense Scenario. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MDAI ![In: Modeling Decisions for Artificial Intelligence, 5th International Conference, MDAI 2008, Sabadell, Spain, October 30-31, 2008. Proceedings, pp. 110-121, 2008, Springer, 978-3-540-88268-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
fuzzy inference rules, threat assessment, threat evaluation, weapons allocation, fuzzy logic, Bayesian networks |
54 | Michael D. Carroll |
Information security: examining and managing the insider threat. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 156-158, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
insider threat |
54 | Ragib Hasan, Suvda Myagmar, Adam J. Lee, William Yurcik |
Toward a threat model for storage systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
StorageSS ![In: Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, StorageSS 2005, Fairfax, VA, USA, November 11, 2005, pp. 94-102, 2005, ACM, 1-59593-233-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
security, storage system, threat model |
54 | Volkmar Lotz |
Threat Scenarios as a Means to Formally Develop Secure Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 96, 4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996, Proceedings, pp. 242-265, 1996, Springer, 3-540-61770-1. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
Threat Identification, Stream Processing Functions, Security, Authentication, Formal Methods, Protocols, Risk Analysis |
51 | Otto Carlander, Lars Eriksson, Per-Anders Oskarsson |
Handling Uni- and Multimodal Threat Cueing with Simultaneous Radio Calls in a Combat Vehicle Setting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (6) ![In: Universal Access in Human-Computer Interaction. Ambient Interaction, 4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007 Held as Part of HCI International 2007 Beijing, China, July 22-27, 2007 Proceedings, Part II, pp. 293-302, 2007, Springer, 978-3-540-73280-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Combat Vehicle, Simulation, Multimodal, Display technologies |
51 | Neeli Rashmi Prasad |
Threat Model Framework and Methodology for Personal Networks (PNs). ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMSWARE ![In: Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), January 7-12, 2007, Bangalore, India, 2007, IEEE, 1-4244-0614-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
51 | Ramkumar Chinchani, Anusha Iyer, Hung Q. Ngo 0001, Shambhu J. Upadhyaya |
Towards a Theory of Insider Threat Assessment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June - 1 July 2005, Yokohama, Japan, Proceedings, pp. 108-117, 2005, IEEE Computer Society, 0-7695-2282-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
51 | Oliver J. Bear Don't Walk IV, Kevin K. Wiley, Lois Walters-Threat, Rebecca L. Rivera, Martin Chieng Were, Tiffani J. Bright |
A Framework to Support Diversity, Equity, and Inclusion within AMIA Through Strengthened Pathways, Support and Leadership. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AMIA ![In: AMIA 2021, American Medical Informatics Association Annual Symposium, San Diego, CA, USA, October 30, 2021 - November 3, 2021, 2021, AMIA. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
50 | Peter Torr |
Demystifying the Threat-Modeling Process. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 3(5), pp. 66-70, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
threat environment, security, software development, product development, threat modeling |
50 | Ghi Paul Im, Richard L. Baskerville |
A longitudinal study of information system threat categories: the enduring problem of human error. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Base ![In: Data Base 36(4), pp. 68-79, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
information infrastructure protection, information system threat, information system threat taxonomy, software quality and reliability, information security, computer security, human error, software defects |
47 | Emily M. Zechman |
Integrating complex adaptive system simulation and evolutionary computation to support water infrastructure threat management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO (Companion) ![In: Genetic and Evolutionary Computation Conference, GECCO 2010, Proceedings, Portland, Oregon, USA, July 7-11, 2010, Companion Material, pp. 1809-1816, 2010, ACM, 978-1-4503-0073-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
threat management, water distribution security, agent-based modeling |
47 | Dianxiang Xu, Kendall E. Nygard |
A threat-driven approach to modeling and verifying secure software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASE ![In: 20th IEEE/ACM International Conference on Automated Software Engineering (ASE 2005), November 7-11, 2005, Long Beach, CA, USA, pp. 342-346, 2005, ACM, 1-58113-993-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
aspect-oriented Petri nets, verification, Petri nets, aspect-oriented software development, software security, threat modeling |
44 | Anton Bolfing, Tobias Halbherr, Adrian Schwaninger |
How Image Based Factors and Human Factors Contribute to Threat Detection Performance in X-Ray Aviation Security Screening. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USAB ![In: HCI and Usability for Education and Work, 4th Symposium of the Workgroup Human-Computer Interaction and Usability Engineering of the Austrian Computer Society, USAB 2008, Graz, Austria, November 20-21, 2008. Proceedings, pp. 419-438, 2008, Springer, 978-3-540-89349-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
aviation security, image based factors, human factors, X-ray imaging |
44 | Kevin S. Killourhy, Roy A. Maxion |
Toward Realistic and Artifact-Free Insider-Threat Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 23rd Annual Computer Security Applications Conference (ACSAC 2007), December 10-14, 2007, Miami Beach, Florida, USA, pp. 87-96, 2007, IEEE Computer Society, 0-7695-3060-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Robert S. Garfinkel, Ram D. Gopal, Daniel O. Rice |
New Approaches to Disclosure Limitation While Answering Queries to a Database: Protecting Numerical Confidential Data against Insider Threat Based on Data or Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), CD-ROM / Abstracts Proceedings, 4-7 January 2006, Kauai, HI, USA, 2006, IEEE Computer Society, 0-7695-2507-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Syed Naqvi, Michel Riguidel |
Threat Model for Grid Security Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EGC ![In: Advances in Grid Computing - EGC 2005, European Grid Conference, Amsterdam, The Netherlands, February 14-16, 2005, Revised Selected Papers, pp. 1048-1055, 2005, Springer, 3-540-26918-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Jonathan W. Butts, Robert F. Mills, Rusty O. Baldwin |
Developing an Insider Threat Model Using Functional Decomposition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings, pp. 412-417, 2005, Springer, 3-540-29113-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
40 | Ignacio J. Martinez-Moyano, Eliot H. Rich, Stephen H. Conrad, David F. Andersen, Thomas R. Stewart |
A behavioral theory of insider-threat risks: A system dynamics approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Model. Comput. Simul. ![In: ACM Trans. Model. Comput. Simul. 18(2), pp. 7:1-7:27, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
behavioral theory, judgment and decision making, signal detection theory, system dynamics modeling, risk, security modeling, Insider threat, policy analysis |
40 | Andreas Ekelhart, Stefan Fenz, Thomas Neubauer, Edgar R. Weippl |
Formal threat descriptions for enhancing governmental risk assessment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEGOV ![In: Proceedings of the 1st International Conference on Theory and Practice of Electronic Governance, ICEGOV 2007, Macao, China, December 10-13, 2007, pp. 40-43, 2007, ACM, 978-1-59593-822-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
formal threat descriptions, inventory, security ontology |
40 | Lanxiang Chen, Dan Feng 0001, Liang Ming |
The Security Threats and Corresponding Measures to Distributed Storage Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APPT ![In: Advanced Parallel Processing Technologies, 7th International Symposium, APPT 2007, Guangzhou, China, November 22-23, 2007, Proceedings, pp. 551-559, 2007, Springer, 978-3-540-76836-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
process of security, threat modeling, security threat, storage security, security measure |
37 | Hui Wang 0071, Heli Xu, Bibo Lu, Zihao Shen |
Research on Security Architecture for Defending Insider Threat. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 30-33, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
37 | Jianxin Li 0002, Teodor Sommestad, Patrick C. K. Hung, Xiang Li |
Web Service-Based Business Process Development, Threat Modeling and Security Assessment Tool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWS ![In: 2008 IEEE International Conference on Web Services (ICWS 2008), September 23-26, 2008, Beijing, China, pp. 13, 2008, IEEE Computer Society, 978-0-7695-3310-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Teresa Musiol, Katarzyna Ujma-Wasowicz |
Identification of Threat of Isolation as a Result of Work with a Computer in Free Time. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (7) ![In: Universal Access in Human-Computer Interaction. Applications and Services, 4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007 Held as Part of HCI International 2007 Beijing, China, July 22-27, 2007 Proceedings, Part III, pp. 707-715, 2007, Springer, 978-3-540-73282-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
sociometric measure, reduction of threats, active recreation, computer, isolation |
37 | Zhitang Li, Jie Lei 0004, Li Wang 0015, Dong Li |
Assessing Attack Threat by the Probability of Following Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE NAS ![In: International Conference on Networking, Architecture, and Storage, NAS 2007, 29-31 July 2007, Guilin, China, pp. 91-100, 2007, IEEE Computer Society, 0-7695-2927-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
37 | Sanguk Noh |
Autonomous Situation Awareness Through Threat Data Integration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IRI ![In: Proceedings of the IEEE International Conference on Information Reuse and Integration, IRI 2007, 13-15 August 2007, Las Vegas, Nevada, USA, pp. 550-555, 2007, IEEE Systems, Man, and Cybernetics Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
37 | Zhitang Li, Jie Lei 0004, Li Wang 0015, Dong Li, Yang-ming Ma |
Towards Identifying True Threat from Network Security Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAISI ![In: Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings, pp. 160-171, 2007, Springer, 978-3-540-71548-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
37 | Ileana Buhan, Asker M. Bazen, Pieter H. Hartel, Raymond N. J. Veldhuis |
A False Rejection Oriented Threat Model for the Design of Biometric Authentication Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICB ![In: Advances in Biometrics, International Conference, ICB 2006, Hong Kong, China, January 5-7, 2006, Proceedings, pp. 728-736, 2006, Springer, 3-540-31111-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
37 | Alan N. Steinberg |
Threat Assessment Technology Development. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CONTEXT ![In: Modeling and Using Context, 5th International and Interdisciplinary Conference, CONTEXT 2005, Paris, France, July 5-8, 2005, Proceedings, pp. 490-500, 2005, Springer, 3-540-26924-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Seong Chae Seo, Jin Ho You, Young Dae Kim, Jun Yong Choi, Sang Jun Lee, Byung Ki Kim |
Building Security Requirements Using State Transition Diagram at Security Threat Location. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS (2) ![In: Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II, pp. 451-456, 2005, Springer, 3-540-30819-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Mohsen Saffarian, Matei Ciobanu Morogan |
A novel protocol to prevent malicious nodes from misdirecting forward ants in AntNet algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), Fortaleza, Ceara, Brazil, March 16-20, 2008, pp. 1849-1853, 2008, ACM, 978-1-59593-753-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
AntNet, free-roaming forward ants, misdirection threat |
37 | Jinghua Wu, Guorui Jiang, Tiyun Huang |
Using Two Main Arguments in Agent Negotiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRIMA ![In: Agent Computing and Multi-Agent Systems, 9th Pacific Rim International Workshop on Multi-Agents, PRIMA 2006, Guilin, China, August 7-8, 2006, Proceedings, pp. 578-583, 2006, Springer, 3-540-36707-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Agent, Negotiation, Threat, Reward |
37 | Thomas Thomsen |
Lambda-Search in Game Trees - with Application to Go. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computers and Games ![In: Computers and Games, Second International Conference, CG 2000, Hamamatsu, Japan, October 26-28, 2000, Revised Papers, pp. 19-38, 2000, Springer, 3-540-43080-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
binary tree search, threat-sequences, null-moves, proof-number search, abstract game-knowledge, Go block tactics |
37 | Ikuya Morikawa, Yuji Yamaoka |
Threat Tree Templates to Ease Difficulties in Threat Modeling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NBiS ![In: The 14th International Conference on Network-Based Information Systems, NBiS 2011, Tirana, Albania, September 7-9, 2011, pp. 673-678, 2011, IEEE Computer Society, 978-1-4577-0789-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
software design, security analysis, threat modeling |
34 | Robert Willison, Mikko T. Siponen |
Overcoming the insider: reducing employee computer crime through Situational Crime Prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 52(9), pp. 133-137, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
34 | Wihem Arsac, Giampaolo Bella, Xavier Chantry, Luca Compagna |
Validating Security Protocols under the General Attacker. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARSPA-WITS ![In: Foundations and Applications of Security Analysis, Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers, pp. 34-51, 2009, Springer, 978-3-642-03458-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
34 | Ali Razavi, Kostas Kontogiannis |
Pattern and Policy Driven Log Analysis for Software Monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2008, 28 July - 1 August 2008, Turku, Finland, pp. 108-111, 2008, IEEE Computer Society, 978-0-7695-3262-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Software Auditing, Trace Analysis, Software Monitoring |
34 | Allen Christiansen, Damian Johnson, Lawrence B. Holder |
Game-Based Simulation for the Evaluation of Threat Detection in a Seaport Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Entertainment Computing - ICEC 2008, 7th International Conference, Pittsburgh, PA, USA, September 25-27, 2008. Proceedings, pp. 221-224, 2008, Springer, 978-3-540-89221-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
seaport, particle propagation, threat detection, security, Simulation, sensor modeling |
34 | Marwan Abi-Antoun, Daniel Wang, Peter Torr |
Checking threat modeling data flow diagrams for implementation conformance and security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASE ![In: 22nd IEEE/ACM International Conference on Automated Software Engineering (ASE 2007), November 5-9, 2007, Atlanta, Georgia, USA, pp. 393-396, 2007, ACM, 978-1-59593-882-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
reflexion models, denial of service, security analysis, threat modeling, data flow diagrams, information disclosure, tampering, spoofing |
34 | Merv Matson, Mihaela Ulieru |
Persistent information security: beyond the e-commerce threat model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 8th International Conference on Electronic Commerce: The new e-commerce - Innovations for Conquering Current Barriers, Obstacles and Limitations to Conducting Successful Business on the Internet, 2006, Fredericton, New Brunswick, Canada, August 13-16, 2006, pp. 271-277, 2006, ACM, 1-59593-392-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
document security, insecurity expense, persistent information security, risk remediation, digital rights management, DRM, threat model |
34 | Michel Barbeau |
WiMax/802.16 threat analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Q2SWinet ![In: Q2SWinet'05 - Proceedings of the First ACM Workshop on Q2S and Security for Wireless and Mobile Networks, Montreal, Quebec, Canada, October 13, 2005, pp. 8-15, 2005, ACM, 1-59593-241-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
wireless network, WiMax, 802.16, threat analysis |
34 | Vassilios Morellas, Ioannis T. Pavlidis, Panagiotis Tsiamyrtzis |
DETER: Detection of events for threat evaluation and recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mach. Vis. Appl. ![In: Mach. Vis. Appl. 15(1), pp. 29-45, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Multicamera calibration, Threat assessment, Object tracking, Surveillance system, Security system |
34 | Sridhar R. Kundur, Daniel Raviv |
Novel active-vision-based visual-threat-cue for autonomous navigation tasks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CVPR ![In: 1996 Conference on Computer Vision and Pattern Recognition (CVPR '96), June 18-20, 1996 San Francisco, CA, USA, pp. 606-612, 1996, IEEE Computer Society, 0-8186-7258-7. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
active-vision-based visual-threat-cue, autonomous navigation tasks, moving observer, time-based imaginary 3-D surfaces, 3D surface texture, mobile robots, active vision, robot vision, visual fields |
33 | John Diamant |
Resilient Security Architecture: A Complementary Approach to Reducing Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 9(4), pp. 80-84, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
HP Comprehensive Applications Threat Analysis, W. Edwards Deming, dynamic application security testing, static application security testing, security requirements gap analysis, architectural threat analysis, security quality, zero day, 0-day, software development, security and privacy, security vulnerabilities |
33 | Mohammed A. Alhabeeb, Abdullah Mohammed Almuhaideb, Phu Dung Le, Bala Srinivasan 0002 |
Information Security Threats Classification Pyramid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops ![In: 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2010, Perth, Australia, 20-13 April 2010, pp. 208-213, 2010, IEEE Computer Society, 978-0-7695-4019-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
deliberate threat, threat classification |
31 | Simon N. Foley, William M. Fitzgerald |
An Approach to Security Policy Configuration Using Semantic Threat Graphs. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XXIII, 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings, pp. 33-48, 2009, Springer, 978-3-642-03006-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Wencong Cheng, Xishan Xu, Yan Jia 0001, Peng Zou |
Network Dynamic Risk Assessment Based on the Threat Stream Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WAIM ![In: The Ninth International Conference on Web-Age Information Management, WAIM 2008, July 20-22, 2008, Zhangjiajie, China, pp. 532-538, 2008, IEEE Computer Society, 978-0-7695-3185-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Feng Wu, Yan Zhong, Quanyuan Wu |
Network Threat Frequency Forecasting Based on Fuzzy Time Series and D-S Evidence Theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 754-757, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Hervé Debar, Yohann Thomas, Frédéric Cuppens, Nora Cuppens-Boulahia |
Enabling automated threat response through the use of a dynamic security policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 3(3), pp. 195-210, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Do-Hoon Kim, Taek Lee, Sung-Oh David Jung, Hoh Peter In, Heejo Lee |
Cyber Threat Trend Analysis Model Using HMM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007, August 29-31, 2007, Manchester, United Kingdom, pp. 177-182, 2007, IEEE Computer Society, 978-0-7695-2876-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Ferat Sahin, Prasanna Sridhar, Ben Horan, Vikraman Raghavan, Mo M. Jamshidi |
System of systems approach to threat detection and integration of heterogeneous independently operable systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC ![In: Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, Montréal, Canada, 7-10 October 2007, pp. 1376-1381, 2007, IEEE, 978-1-4244-0990-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Nabil R. Adam, Vijayalakshmi Atluri, Vandana Pursnani Janeja, Aabhas V. Paliwal, Mahmoud Youssef, Soon Ae Chun, Jim Cooper, John Paczkowski, Christof Bornhövd, Ike Nassi, Joachim Schaper |
Semantics-based threat structure mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DG.O ![In: Proceedings of the 7th Annual International Conference on Digital Government Research, DG.O 2006, San Diego, California, USA, May 21-24, 2006, pp. 367-368, 2006, Digital Government Research Center. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Yael Shahar |
Indicators of Threat: Reflecting New Trends. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings, pp. 377-388, 2006, Springer, 3-540-34478-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Neelam Jain, Thomas D. Jeitschko, Leonard J. Mirman |
Strategic Experimentation in Financial Intermediation with Threat of Entry. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ann. Oper. Res. ![In: Ann. Oper. Res. 114(1-4), pp. 203-227, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
strategic experimentation, signal dampening, financial intermediation, limit pricing, entry deterrence, experimentation |
30 | Rebecca Fribourg, Evan Blanpied, Ludovic Hoyet, Anatole Lécuyer, Ferran Argelaguet |
Does virtual threat harm VR experience?: Impact of threat occurrence and repeatability on virtual embodiment and threat response. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Graph. ![In: Comput. Graph. 100, pp. 125-136, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
30 | Lundy Lewis, John F. Buford, Gabriel Jakobson |
Inferring threats in urban environments with uncertain and approximate data: an agent-based approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Intell. ![In: Appl. Intell. 30(3), pp. 220-232, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Threat assessment, Uncertain/approximate data, Fuzzy, BDI agent, Agent platform, Peer-to-peer overlay |
30 | Fredrik Johansson, Göran Falkman |
Performance Evaluation of TEWA Systems for Improved Decision Support. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MDAI ![In: Modeling Decisions for Artificial Intelligence, 6th International Conference, MDAI 2009, Awaji Island, Japan, November 30-December 2, 2009. Proceedings, pp. 205-216, 2009, Springer, 978-3-642-04819-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
TEWA, threat evaluation, weapon allocation, Performance evaluation, testbed |
30 | Yi-Ming Chen 0008, Dachrahn Wu, Cheng-Kuang Wu |
A Game Theoretic Approach for Deploying Intrusion Detection Agent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRIMA ![In: Agent Computing and Multi-Agent Systems, 10th Pacific Rim International Conference on Multi-Agents, PRIMA 2007, Bangkok, Thailand, November 21-23, 2007. Revised Papers, pp. 446-451, 2007, Springer, 978-3-642-01638-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Agent deployment, threat levels, Nash equilibrium, Shapley value |
30 | Andreas Ekelhart, Stefan Fenz, Markus D. Klemen, Edgar R. Weippl |
Security Ontology: Simulating Threats to Corporate Assets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings, pp. 249-259, 2006, Springer, 3-540-68962-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
risk analysis, threat modeling, security ontology |
30 | Howard Chivers |
Information Modeling for Automated Risk Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security, 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion, Crete, Greece, October 19-21, 2006, Proceedings, pp. 228-239, 2006, Springer, 3-540-47820-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security, model, communication, information, risk, service-oriented, threat |
30 | Sjouke Mauw, Martijn Oostdijk |
Foundations of Attack Trees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers, pp. 186-198, 2005, Springer, 3-540-33354-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
semantics, attack trees, threat analysis |
30 | Andrew James Simmonds, Peter Sandilands, Louis van Ekert |
An Ontology for Network Security Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AACC ![In: Applied Computing, Second Asian Applied Computing Conference, AACC 2004, Kathmandu, Nepal, October 29-31, 2004. Proceedings, pp. 317-323, 2004, Springer, 3-540-23659-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
cyber, security, ontology, network, attack, failure, vulnerability, threat |
30 | Young-Hwan Bang, Yoon-Jung Jung, In-Jung Kim, Namhoon Lee, Gang-Soo Lee |
The Design and Development for Risk Analysis Automatic Tool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part I, pp. 491-499, 2004, Springer, 3-540-22054-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Safeguard, Vulnerability, Risk Analysis, Interview, Threat, Asset, Inquiry |
30 | Cynthia E. Irvine, Timothy E. Levin, Jeffery D. Wilson, David J. Shifflett, Barbara Pereira |
An Approach to Security Requirements Engineering for a High Assurance System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Requir. Eng. ![In: Requir. Eng. 7(4), pp. 192-206, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Security, Specification, Requirements, Engineering, Assurance, Threat |
30 | Sridhar R. Kundur, Daniel Raviv, Ernest Kent |
An image-based visual-motion-cue for autonomous navigatio. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CVPR ![In: 1997 Conference on Computer Vision and Pattern Recognition (CVPR '97), June 17-19, 1997, San Juan, Puerto Rico, pp. 7-14, 1997, IEEE Computer Society, 0-8186-7822-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
visual-motion-cue, visual motion cue, Hybrid Visual Threat Cue, 3D textured surface, sequence of images, active vision, active vision, collision avoidance, visual navigation, autonomous navigation |
27 | Yi-Ming Chen 0008, Dachrahn Wu, Cheng-Kuang Wu |
A game theory approach for an emergency management security advisory system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE International Conference on Intelligence and Security Informatics, ISI 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings, pp. 116-121, 2008, IEEE, 978-1-4244-2414-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Dianxiang Xu, Vivek Goel, Kendall E. Nygard |
An Aspect-Oriented Approach to Security Requirements Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (2) ![In: 30th Annual International Computer Software and Applications Conference, COMPSAC 2006, Chicago, Illinois, USA, September 17-21, 2006. Volume 2, pp. 79-82, 2006, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
use case, aspect-oriented software development, Security requirements, threats, mitigation |
27 | Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad Verbowski, Helen J. Wang, Jacob R. Lorch |
SubVirt: Implementing malware with virtual machines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2006 IEEE Symposium on Security and Privacy (S&P 2006), 21-24 May 2006, Berkeley, California, USA, pp. 314-327, 2006, IEEE Computer Society, 0-7695-2574-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Steven R. Johnston |
Development of a Legal Framework for Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 5th International Symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings, pp. 138-157, 2002, Springer, 3-540-00020-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Anti-terrorism law, criminal law, private communications, privacy, intrusion detection, wiretap, interception |
27 | Jung-Min Kang, Wook Shin, C.-G. Park, Dong-Ik Lee |
Extended BLP Security Model Based on Process Reliability for Secure Linux Kernel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRDC ![In: 8th Pacific Rim International Symposium on Dependable Computing (PRDC 2001), 17-19 December 2001, Seoul, Korea, pp. 299-303, 2001, IEEE Computer Society, 0-7695-1414-6. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
27 | Hee Ock Rho, Il Ryu |
The Impact of Information Technology Threat on IT Appropriation and IT Avoidance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICSyN ![In: Third International Conference on Computational Intelligence, Communication Systems and Networks, CICSyN 2011, Bali, Indonesia, 26-28 July, 2011, pp. 195-200, 2011, IEEE Computer Society, 978-1-4577-0975-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Information Technology Threat, Coping Theory, IT appropriation, IT avoidance |
27 | Holger Schmidt 0001 |
Threat- and Risk-Analysis During Early Security Requirements Engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: ARES 2010, Fifth International Conference on Availability, Reliability and Security, 15-18 February 2010, Krakow, Poland, pp. 188-195, 2010, IEEE Computer Society, 978-0-7695-3965-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
risk analysis, domain knowledge, threat analysis, security requirements engineering |
27 | Qizeng Li, Zanfu Xie |
A Correlation Analysis Method for Threat Factors in Information System Based on Cloud Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MVHI ![In: 2010 International Conference on Machine Vision and Human-machine Interface, MVHI 2010, Kaifeng, China, April 24-25, 2010, pp. 541-544, 2010, IEEE Computer Soceity, 978-0-7695-4009-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
single rule generator, threat identification, correlation analysis, cloud model |
27 | Antonietta Stango, Neeli R. Prasad, Dimitris M. Kyriazanos |
A Threat Analysis Methodology for Security Evaluation and Enhancement Planning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 262-267, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
vulnerabilities, security metrics, assets, threat analysis |
27 | Xudong Miao, Demin Xu, Yongchun Wang |
Intuitionistic Fuzzy Likelihood Methods and Models for Naval Air Defense Situation and Threat Assessment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSKD (6) ![In: Sixth International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2009, Tianjin, China, 14-16 August 2009, 6 Volumes, pp. 311-315, 2009, IEEE Computer Society, 978-0-7695-3735-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Situation Threat Assessment, Uncertainty, Fuzzy Set, Intuitionistic Fuzzy Set |
27 | Yair Amir |
The insider threat in scalable distributed systems: algorithms, metrics and gaps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, USA, November 2, 2007, pp. 49, 2007, ACM, 978-1-59593-888-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
distributed system, insider threat |
27 | Sébastien Foulle, Steve A. Schneider, Jacques Traoré, Zhe Xia |
Threat Analysis of a Practical Voting Scheme with Receipts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VOTE-ID ![In: E-Voting and Identity, First International Conference, VOTE-ID 2007, Bochum, Germany, October 4-5, 2007, Revised Selected Papers, pp. 156-165, 2007, Springer, 978-3-540-77492-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Voter verifiable, voting ducks, electronic voting, threat analysis |
27 | Mohd A. Bashar, Ganesh Krishnan, Markus G. Kuhn, Eugene H. Spafford, Samuel S. Wagstaff Jr. |
Low-threat security patches and tools. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSM ![In: 1997 International Conference on Software Maintenance (ICSM '97), 1-3 October 1997, Bari, Italy, Proceedings, pp. 306-313, 1997, IEEE Computer Society, 0-8186-8013-X. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
low-threat security patches, dangerous information, vulnerability information, software vendor, binary program patch, differential application times, cryptoprocessors, enciphered operating systems, synchronization, reverse engineering, customization, security of data, security tools |
24 | Mariusz Chmielewski, Andrzej Galka, Piotr Jarema, Kamil Krasowski, Artur Kosinski |
Semantic Knowledge Representation in Terrorist Threat Analysis for Crisis Management Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCI ![In: Computational Collective Intelligence. Semantic Web, Social Networks and Multiagent Systems, First International Conference, ICCCI 2009, Wroclaw, Poland, October 5-7, 2009. Proceedings, pp. 460-471, 2009, Springer, 978-3-642-04440-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
counter-terrorism, GTD, ontology, GIS, decision support, crisis management |
24 | Frank L. Greitzer, Andrew P. Moore, Dawn M. Cappelli, Dee H. Andrews, Lynn A. Carroll, Thomas D. Hull |
Combating the Insider Cyber Threat. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 6(1), pp. 61-64, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Wilian Segatto, Eduardo Herzer, Cristiano L. Mazzotti, João Ricardo Bittencourt, Jorge L. V. Barbosa |
Mobio threat: A mobile game based on the integration of wireless technologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Entertain. ![In: Comput. Entertain. 6(3), pp. 39:1-39:14, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
RFID, Bluetooth, Pervasive, QR code, social gaming |
24 | Jose Andre Morales |
Threat of renovated .NET viruses to mobile devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference ![In: Proceedings of the 46th Annual Southeast Regional Conference, 2008, Auburn, Alabama, USA, March 28-29, 2008, pp. 367-372, 2008, ACM, 978-1-60558-105-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Xuezhong Liu, Zengliang Liu |
Evaluating Method of Security Threat Based on Attacking-Path Graph Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 1127-1132, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Xi Liu, Alastair G. Gale |
Searching for Possible Threat Items to Safe Air Travel: Human Error and Training. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (13) ![In: Engineering Psychology and Cognitive Ergonomics, 7th International Conference, EPCE 2007, Held as Part of HCI International 2007, Beijing, China, July 22-27, 2007, Proceedings, pp. 750-759, 2007, Springer, 978-3-540-73330-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
airport X-ray luggage image, visual search, perceptual learning |
24 | Umit Ayvaz, Murat Dere, Yao Ming Tiah |
Using the MANA agent-based simulation tool to evaluate and compare the effectiveness of ground-based and airborne communications jammers in countering the IED threat to ground convoys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SpringSim (2) ![In: Proceedings of the 2007 Spring Simulation Multiconference, SpringSim 2007, Norfolk, Virginia, USA, March 25-29, 2007, Volume 2, pp. 113-118, 2007, SCS/ACM, 1-56555-313-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
Counter-IED, MANA, communications jammers, nearly orthogonal Latin hypercube, IED |
24 | Yue Chen, Barry W. Boehm, Luke Sheppard |
Value Driven Security Threat Modeling Based on Attack Path Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), CD-ROM / Abstracts Proceedings, 3-6 January 2007, Waikoloa, Big Island, HI, USA, pp. 280, 2007, IEEE Computer Society, 0-7695-2755-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Hervé Debar, Yohann Thomas, Nora Boulahia-Cuppens, Frédéric Cuppens |
Using Contextual Security Policies for Threat Response. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware & Vulnerability Assessment, Third International Conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006, Proceedings, pp. 109-128, 2006, Springer, 3-540-36014-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Dick Brackney, Terrance Goan, Allen Ott, Lockheed Martin |
The Cyber Enemy Within ... Countering the Threat from Malicious Insiders. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 20th Annual Computer Security Applications Conference (ACSAC 2004), 6-10 December 2004, Tucson, AZ, USA, pp. 346-347, 2004, IEEE Computer Society, 0-7695-2252-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Wenbo Mao |
A Structured Operational Modelling of the Dolev-Yao Threat Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers, pp. 34-46, 2002, Springer, 3-540-20830-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
24 | William L. Spight |
Evaluating Kos in a Neutral Threat Environment: Preliminary Results. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computers and Games ![In: Computers and Games, Third International Conference, CG 2002, Edmonton, Canada, July 25-27, 2002, Revised Papers, pp. 413-428, 2002, Springer, 3-540-20545-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
24 | Ali Berrached, Mohsen Beheshti, André de Korvin, Richard A. Aló |
Applying Fuzzy Relation Equations to Threat Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 35th Hawaii International Conference on System Sciences (HICSS-35 2002), CD-ROM / Abstracts Proceedings, 7-10 January 2002, Big Island, HI, USA, pp. 50, 2002, IEEE Computer Society, 0-7695-1435-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
23 | Medha Bhargava, Chia-Chih Chen, Michael S. Ryoo, Jake K. Aggarwal |
Detection of object abandonment using temporal logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mach. Vis. Appl. ![In: Mach. Vis. Appl. 20(5), pp. 271-281, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Abandoned objects, Threat detection, Public areas, Temporal logic |
23 | Debin Liu, XiaoFeng Wang 0001, L. Jean Camp |
Mitigating Inadvertent Insider Threats with Incentives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers, pp. 1-16, 2009, Springer. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Incentive Engineering, Game Theory, Insider Threat, Human Subject |
23 | Dattatraya S. Bhilare, Ashwini K. Ramani, Sanjay K. Tanwani |
Protecting intellectual property and sensitive information in academic campuses from trusted insiders: leveraging active directory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the ACM SIGUCCS Fall Conference on User Services 2009, St. Louis, Missouri, USA, October 11-14, 2009, pp. 99-104, 2009, ACM, 978-1-60558-477-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
audit automation, real time action, insider threat, active directory, user identification |
23 | Charalampos Z. Patrikakis, Dimitris M. Kyriazanos, Athanasios Voulodimos, Ioannis G. Nikolakopoulos |
Privacy and resource protection in personal network federations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PETRA ![In: Proceedings of the 2nd International Conference on Pervasive Technologies Related to Assistive Environments, PETRA 2009, Corfu, Greece, June 9-13, 2009, 2009, ACM, 978-1-60558-409-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
security, privacy, threat analysis, personal networks |
23 | Xin Liu, Peidong Zhu, Yuxing Peng 0001 |
SEM: A Security Evaluation Model for Inter-domain Routing System in the Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPOM ![In: IP Operations and Management, 8th IEEE International Workshop, IPOM 2008, Samos Island, Greece, September 22-26, 2008, Proceedings, pp. 142-153, 2008, Springer, 978-3-540-87356-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Security Threat Situation, BGP, Security Evaluation |
23 | Madhusudhanan Chandrasekaran, Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya |
Inferring Sources of Leaks in Document Management Systems. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFIP Int. Conf. Digital Forensics ![In: Advances in Digital Forensics IV, Fourth Annual IFIP WG 11.9 Conference on Digital Forensics, Kyoto University, Kyoto, Japan, January 28-30, 2008, pp. 291-306, 2008, Springer, 978-0-387-84926-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
information leaks, insider threat, Document management system |
Displaying result #1 - #100 of 5606 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|