The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for bootcamp with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2004-2014 (45) 2015 (29) 2016 (27) 2017-2018 (46) 2019-2023 (15) 2024 (2)
Publication types (Num. hits)
article(6) inproceedings(153) proceedings(5)
Venues (Conferences, Journals, ...)
HotSoS(133) SIGCSE (2)(3) LWMOOCS(2) SIGCSE(2) CASCON(1) Comput. Sci. Educ.(1) CoRR(1) EDUCON(1) FECS(1) HCI (10)(1) HCI (35)(1) ICCS(1) ICER(1) ICPEC(1) ICSOB(1) IEEE Consumer Electron. Mag.(1) More (+10 of total 28)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 8 occurrences of 8 keywords

Results
Found 164 publication records. Showing 164 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
33Gregory W. Bennett, Andrew Denton Developing practical models for teaching motion capture. Search on Bibsonomy SIGGRAPH ASIA Educators Program The full citation details ... 2009 DBLP  DOI  BibTeX  RDF principles of animation, performance, motion capture, curriculum development
33Karl J. Kuehn Considerations in a dual boot strategy: a paper and technical presentation for the ACM SIGUCCS 2008 fall conference. Search on Bibsonomy SIGUCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF BootCamp, dual-boot
33Robert S. Hanmer, Linda Rising, Joseph W. Yoder A mini-plop at OOPSLA '07. Search on Bibsonomy OOPSLA Companion The full citation details ... 2007 DBLP  DOI  BibTeX  RDF bootcamp, writers' workshops, design, architecture, patterns, documentation
28Whitney Nelson, Kinnis Gosha, Talitha Washington, Nina Gilbert Incorporating Technical Interview Training into an HBCU Pre-Freshman Programming Bootcamp. Search on Bibsonomy SIGCSE (2) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
28Stella Kaval, Mallika Reddy, Abigail O'Neill Computer Science Kickstart: An Innovative Bootcamp to Ignite Passion in First-Year Female-Identifying University Students. Search on Bibsonomy SIGCSE (2) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
28Uzay Macar, Blake Castleman, Noah Mauchly, Michael Jiang, Asma Aouissi, Salma Aouissi, Xena Maayah, Kaan Erdem, Rohith Ravindranath, Andrea Clark-Sevilla, Ansaf Salleb-Aouissi Teenagers and Artificial Intelligence: Bootcamp Experience and Lessons Learned. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
28Mireilla Bikanga Ada, Mary Ellen Foster Enhancing postgraduate students' technical skills: perceptions of modified team-based learning in a six-week multi-subject Bootcamp-style CS course. Search on Bibsonomy Comput. Sci. Educ. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
28Andrew Meads, Yu-Cheng Tu 0001, Gillian Dobbie Moving a Bootcamp-Style Computer Science Programme Online: An Experience Report. Search on Bibsonomy SIGCSE (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
28Reuben Moyo, Stanley Ndebvu, Michael Zimba, Martin Dybdal, Maria Maistro, Benjamin Balder Bach Report on the Malawi Data Science Bootcamp 2021. Search on Bibsonomy SIGKDD Explor. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Samuel Serna, Drew Weninger, Luigi Ranno, Kenan Cicek, Peyton Brown, Samuel Bechtold, Juan Jose Arango Uribe, Julian Andres Laverde Preciado, Sajan Saini, Saif Rayyan, Pablo Bedoya Rios, Camilo Hurtado Ballesteros, Glenda Stump, George Westerman, Erik Verlage, Trevor Morrisey, Christian Gabbianelli, Yue Yuan, Jeff Bertrand, Kapil Chalil Madathil, Kazumi Wada, Juejun Hu, Lionel C. Kimerling, Anu Agarwal Leveraging MOOCs in a hybrid learning bootcamp model for training technicians and engineers in STEM manufacturing. Search on Bibsonomy LWMOOCS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Aditya Akundi, Oscar Mondragon, Mayra Ortiz, Tzu-Liang Bill Tseng, Sergio Luna, Viviana Lopez Online Model-based Systems Engineering (MBSE) Bootcamp: A Report on Two Day Workforce Development Workshop. Search on Bibsonomy SysCon The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Sherry Seibel, Nanette Veilleux, Tabitha Miles, Rachel Beaulieu Reflections on Educational Choices Made by Coding Bootcamp and Computer Science Graduates. Search on Bibsonomy SIGCSE (2) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Lukas Lodes, Alexander Schiendorfer A Deep Learning Bootcamp for Engineering & Management Students. Search on Bibsonomy Teaching ML The full citation details ... 2022 DBLP  BibTeX  RDF
28Juan Manuel Campos, Leticia Almaguer, Lamberto Alvarez, Laura Elena Morales "Beautiful patterns" MIT and Tec de Monterrey International Bootcamp: engineering women students teaching IT to high-school women students. Search on Bibsonomy EDUCON The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Walter Hower Game-Design: Das Mathe-Bootcamp. Search on Bibsonomy MuC (Workshopband) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Jhonattan Miranda, Arturo Molina 0001 Designing Hybrid Learning Programs in Higher Education by Applying Education 4.0: The Innovation Challenge Bootcamp as Case Study. Search on Bibsonomy LWMOOCS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28José Pedro Amaro, Jorge Barreiros, Fernanda Coutinho, João Durães, Frederico Santos, Ana Alves 0001, Marco Silva 0001, João Carlos Cunha Challenges and Solutions from an Embedded Programming Bootcamp. Search on Bibsonomy ICPEC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Carlos Alberto Ocampo-Quintero, Carlos Moreno-Paniagua, Sara Ibarra-Vargas, Rocío Torres-Novoa, Nicolás Restrepo-Henao, Francisco Gallego-Escobar, Juan Henao-Santa, Luis Muñoz-Marín, Saúl Emilio Rivero-Mejía Implementation of a Design Thinking Didactic Strategy Aimed at Challenges and Their Impact on the Development of Generic Competencies: Bootcamp #PascualChallenge. Search on Bibsonomy HCI (35) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Orges Cico The Impact of IT Bootcamp on Student Learning - Experience from ICT Enabled Experiential-Based Course. Search on Bibsonomy ICSOB The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Gail Carmichael More than a Bootcamp, Less than a Degree: A One-Year Program to Retrain Industry Employees as Developers. Search on Bibsonomy SIGCSE The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Graham A. Wilson Could a Coding Bootcamp Experience Prepare You for Industry? Search on Bibsonomy IT Prof. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Munindar P. Singh, Laurie A. Williams, Rick Kuhn, Tao Xie 0001 (eds.) Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, HoTSoS 2018, Raleigh, North Carolina, USA, April 10-11, 2018. Search on Bibsonomy HoTSoS The full citation details ... 2018 DBLP  BibTeX  RDF
28Lenin Guillermo Lemus Zúñiga, Valeria Alexandra Haro Valle, José-Vicente Benlloch-Dualde, Edgar Lorenzo-Sáez, Miguel A. Mateo Pla, Jorge Maldonado-Mahauad Proposal of a Bootcamp's User Activity Dashboard Based on MAS. Search on Bibsonomy KES-AMSTA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Devan Shah, Larry Lindsay, Josue Diaz, Sagi Shechter, Andy Becher IBM security guardium analyzer bootcamp. Search on Bibsonomy CASCON The full citation details ... 2018 DBLP  BibTeX  RDF
28Hui Guo 0002, Özgür Kafali, Anne-Liz Jeukeng, Laurie A. Williams, Munindar P. Singh Toward extraction of security requirements from text: poster. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Leslie Leonard, William Glodek HACSAW: a trusted framework for cyber situational awareness. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Inger Anne Tøndel, Tosin Daniel Oyetoyan, Martin Gilje Jaatun, Daniela S. Cruzes Understanding challenges to adoption of the Microsoft elevation of privilege game. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Pooria Madani, Natalija Vlajic Robustness of deep autoencoder in intrusion detection under adversarial contamination. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Dimitris E. Simos, Rick Kuhn, Yu Lei 0001, Raghu Kacker Combinatorial security testing course. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Lindsey McGowen, Angela Stoica An expert-based bibliometric for a science of security: poster. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Daniel G. Wolf, Donald L. Goff A ransomware research framework: poster. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Martha McNeil, Thomas Llansó, Dallas Pearson Application of capability-based cyber risk assessment methodology to a space system. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Bradley Potteiger, Zhenkai Zhang, Xenofon D. Koutsoukos Integrated instruction set randomization and control reconfiguration for securing cyber-physical systems. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Ira Ray Jenkins, Sergey Bratus, Sean W. Smith, Maxwell Koo Reinventing the privilege drop: how principled preservation of programmer intent would prevent security bugs. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Iness Ben Guirat, Harry Halpin Formal verification of the W3C web authentication protocol. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Darya Melicher, Yangqingwei Shi, Valerie Zhao, Alex Potanin, Jonathan Aldrich Using object capabilities and effects to build an authority-safe module system: poster. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Erkang Zheng, Phil Gates-Idem, Matt Lavin Building a virtually air-gapped secure environment in AWS: with principles of devops security program and secure software delivery. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Huashan Chen, Jin-Hee Cho, Shouhuai Xu Quantifying the security effectiveness of network diversity: poster. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Nikolay Shopov, Mingu Jeong, Evin Rude, Brennan Neseralla, Scott Hutchison, Alexander S. Mentis, Suzanne J. Matthews Investigating tensorflow for airport facial identification: poster. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Yao Dong 0001, Ana L. Milanova, Julian Dolby SecureMR: secure mapreduce computation using homomorphic encryption and program partitioning. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Spencer Drakontaidis, Michael Stanchi, Gabriel Glazer, Antoine Davis, Madison Stark, Caleb Clay, Jason Hussey, Nicholas Barry, Aaron St. Leger, Suzanne J. Matthews Integrating historical and real-time anomaly detection to create a more resilient smart grid architecture: poster. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Jayati Dev, Sanchari Das, L. Jean Camp Understanding privacy concerns of whatsapp users in India: poster. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Sarah Elder, Anna Mattapallil, Laurie A. Williams A comparative analysis of manual methods for analyzing security requirements in regulatory documents: POSTER. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Andrés Alejos, Matthew Ball, Connor Eckert, Michael Ma, Hayden Ward, Peter Hanlon, Suzanne J. Matthews Exploring the raspberry Pi for data summarization in wireless sensor networks: poster. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Ryan Wagner, David Garlan, Matt Fredrikson Quantitative underpinnings of secure, graceful degradation: poster. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Daniela S. Cruzes, Martin Gilje Jaatun, Tosin Daniel Oyetoyan Challenges and approaches of performing canonical action research in software security: research paper. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Katharine Ahrens Cryptography in a post-quantum world: poster. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Muhammad Umer Tariq, Marilyn Wolf Hourglass-shaped architecture for model-based development of safe and secure cyber-physical systems: poster. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Huashan Chen, Jin-Hee Cho, Shouhuai Xu Quantifying the security effectiveness of firewalls and DMZs. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Rick Kuhn, Mohammad S. Raunak, Raghu Kacker What proportion of vulnerabilities can be attributed to ordinary coding errors?: poster. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Key-whan Chung, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer Indirect cyber attacks by perturbation of environment control: a data driven attack model: poster. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Nirav Ajmeri, Hui Guo 0002, Pradeep K. Murukannaiah, Munindar P. Singh Ethics, values, and personal agents: poster. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Uttam Thakore, Ahmed M. Fawaz, William H. Sanders Detecting monitor compromise using evidential reasoning: poster. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Christopher Theisen, Laurie A. Williams How bad is it, really? an analysis of severity scores for vulnerabilities: poster. Search on Bibsonomy HotSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Soumya Kanti Datta CE Society Future Directions Bootcamp: The Internet of Things and Connected Car [Society News]. Search on Bibsonomy IEEE Consumer Electron. Mag. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Kyle Thayer, Amy J. Ko Barriers Faced by Coding Bootcamp Students. Search on Bibsonomy ICER The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28 Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp, HoTSoS 2017, Hanover, MD, USA, April 4-5, 2017 Search on Bibsonomy HoTSoS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Hoang Hai Nguyen, Kartik Palani, David M. Nicol An Approach to Incorporating Uncertainty in Network Security Analysis. Search on Bibsonomy HotSoS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Ghita Mezzour, Kathleen M. Carley, L. Richard Carley Global Variation in Attack Encounters and Hosting. Search on Bibsonomy HotSoS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Morgan Burcham, Mahran Al-Zyoud, Jeffrey C. Carver, Mohammed Noraden Alsaleh, Hongying Du, Fida Gillani, Jun Jiang, Akond Rahman, Özgür Kafali, Ehab Al-Shaer, Laurie A. Williams Characterizing Scientific Reporting in Security Literature: An analysis of ACM CCS and IEEE S&P Papers. Search on Bibsonomy HotSoS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Patrick Morrison, Benjamin H. Smith, Laurie A. Williams Surveying Security Practice Adherence in Software Development. Search on Bibsonomy HotSoS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Carlos A. Barreto, Alvaro A. Cárdenas, Alain Bensoussan 0001 Optimal Security Investments in a Prevention and Detection Game. Search on Bibsonomy HotSoS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Weining Yang, Aiping Xiong, Jing Chen 0005, Robert W. Proctor, Ninghui Li Use of Phishing Training to Improve Security Warning Compliance: Evidence from a Field Experiment. Search on Bibsonomy HotSoS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Pradeep K. Murukannaiah, Chinmaya Dabral, Karthik Sheshadri, Esha Sharma, Jessica Staddon Learning a Privacy Incidents Database. Search on Bibsonomy HotSoS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Jairo Giraldo, Alvaro A. Cárdenas, Murat Kantarcioglu Leveraging Unique CPS Properties to Design Better Privacy-Enhancing Algorithms. Search on Bibsonomy HotSoS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Richeng Jin, Xiaofan He, Huaiyu Dai On the Tradeoff between Privacy and Utility in Collaborative Intrusion Detection Systems-A Game Theoretical Approach. Search on Bibsonomy HotSoS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28William L. Scherlis, David Brumley (eds.) Proceedings of the Symposium and Bootcamp on the Science of Security, Pittsburgh, PA, USA, April 19-21, 2016 Search on Bibsonomy HotSoS The full citation details ... 2016 DBLP  BibTeX  RDF
28Bradley Potteiger, Gonçalo Martins, Xenofon D. Koutsoukos Software and attack centric integrated threat modeling for quantitative risk assessment. Search on Bibsonomy HotSoS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Jeffrey C. Carver, Morgan Burcham, Sedef Akinli Koçak, Ayse Bener, Michael Felderer, Matthias Gander, Jason King, Jouni Markkula, Markku Oivo, Clemens Sauerwein, Laurie A. Williams Establishing a baseline for measuring advancement in the science of security: an analysis of the 2015 IEEE security & privacy proceedings. Search on Bibsonomy HotSoS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Özgür Kafali, Munindar P. Singh, Laurie A. Williams Toward a normative approach for forensicability. Search on Bibsonomy HotSoS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Hui Lin 0005, Homa Alemzadeh, Daniel Chen 0001, Zbigniew Kalbarczyk, Ravishankar K. Iyer Safety-critical cyber-physical attacks: analysis, detection, and mitigation. Search on Bibsonomy HotSoS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Jian Lou 0002, Yevgeniy Vorobeychik Decentralization and security in dynamic traffic light control. Search on Bibsonomy HotSoS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Wenyu Ren, Klara Nahrstedt, Tim Yardley Operation-level traffic analyzer framework for smart grid. Search on Bibsonomy HotSoS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Christopher Theisen, Laurie A. Williams Risk-based attack surface approximation: poster. Search on Bibsonomy HotSoS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Olga A. Zielinska, Allaire K. Welk, Christopher B. Mayhorn, Emerson R. Murphy-Hill The persuasive phish: examining the social psychological principles hidden in phishing emails. Search on Bibsonomy HotSoS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Atul Bohara, Uttam Thakore, William H. Sanders Intrusion detection in enterprise systems by combining and clustering diverse monitor data. Search on Bibsonomy HotSoS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Susan G. Campbell, Lelyn D. Saner, Michael F. Bunting Characterizing cybersecurity jobs: applying the cyber aptitude and talent assessment framework. Search on Bibsonomy HotSoS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Hanan Hibshi Systematic analysis of qualitative data in security. Search on Bibsonomy HotSoS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Daniel Smullen, Travis D. Breaux Modeling, analyzing, and consistency checking privacy requirements using eddy. Search on Bibsonomy HotSoS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Zhenqi Huang, Yu Wang 0044, Sayan Mitra, Geir E. Dullerud Controller synthesis for linear dynamical systems with adversaries. Search on Bibsonomy HotSoS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Carl J. Pearson, Allaire K. Welk, William A. Boettcher, Roger C. Mayer, Sean Streck, Joseph M. Simons-Rudolph, Christopher B. Mayhorn Differences in trust between human and automated decision aids. Search on Bibsonomy HotSoS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Momin M. Malik, Jürgen Pfeffer, Gabriel Ferreira, Christian Kästner Visualizing the variational callgraph of the Linux kernel: an approach for reasoning about dependencies [poster]. Search on Bibsonomy HotSoS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Aron Laszka, Waseem Abbas, S. Shankar Sastry, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos Optimal thresholds for intrusion detection systems. Search on Bibsonomy HotSoS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Phuong Cao, Eric C. Badger, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer A framework for generation, replay, and analysis of real-world attack variants. Search on Bibsonomy HotSoS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Marwan Abi-Antoun, Ebrahim Khalaj, Radu Vanciu, Ahmad Moghimi Abstract runtime structure for reasoning about security: poster. Search on Bibsonomy HotSoS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Antonio Roque, Kevin B. Bush, Christopher Degni Security is about control: insights from cybernetics. Search on Bibsonomy HotSoS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Akond Ashfaque Ur Rahman, Laurie A. Williams Security practices in DevOps. Search on Bibsonomy HotSoS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Tao Xie 0001, William Enck Text analytics for security: tutorial. Search on Bibsonomy HotSoS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Clark W. Barrett, Cesare Tinelli, Morgan Deters, Tianyi Liang, Andrew Reynolds 0001, Nestan Tsiskaridze Efficient solving of string constraints for security analysis. Search on Bibsonomy HotSoS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Darya Kurilova, Alex Potanin, Jonathan Aldrich Modules in wyvern: advanced control over security and privacy. Search on Bibsonomy HotSoS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Hemank Lamba, Thomas J. Glazier, Bradley R. Schmerl, Javier Cámara, David Garlan, Jürgen Pfeffer A model-based approach to anomaly detection in software architectures. Search on Bibsonomy HotSoS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Bradley R. Schmerl, Jeffrey Gennari, Javier Cámara, David Garlan Raindroid: a system for run-time mitigation of Android intent vulnerabilities [poster]. Search on Bibsonomy HotSoS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Jiaming Jiang, Nirav Ajmeri, Rada Chirkova, Jon Doyle, Munindar P. Singh Expressing and reasoning about conflicting norms in cybersecurity: poster. Search on Bibsonomy HotSoS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28David M. Nicol (eds.) Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, HotSoS 2015, Urbana, IL, USA, April 21-22, 2015 Search on Bibsonomy HotSoS The full citation details ... 2015 DBLP  BibTeX  RDF
28Bradley R. Schmerl, Jeffrey Gennari, David Garlan An architecture style for Android security analysis: poster. Search on Bibsonomy HotSoS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Dusko Pavlovic Towards a science of trust. Search on Bibsonomy HotSoS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Patrick Morrison, Kim Herzig, Brendan Murphy, Laurie A. Williams Challenges with applying vulnerability prediction models. Search on Bibsonomy HotSoS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Allaire K. Welk, Christopher B. Mayhorn All signals go: investigating how individual differences affect performance on a medical diagnosis task designed to parallel a signals intelligence analyst task. Search on Bibsonomy HotSoS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Sean W. Smith, Ross Koppel, Jim Blythe, Vijay H. Kothari Mismorphism: a semiotic model of computer security circumvention (poster abstract). Search on Bibsonomy HotSoS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Phuong Cao, Eric C. Badger, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer, Adam J. Slagell Preemptive intrusion detection: theoretical framework and real-world measurements. Search on Bibsonomy HotSoS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 164 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license