The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase cs-vulnerability (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1972-1986 (16) 1987-1992 (26) 1993-1996 (27) 1997-1998 (23) 1999-2000 (30) 2001 (24) 2002 (56) 2003 (86) 2004 (146) 2005 (196) 2006 (227) 2007 (250) 2008 (259) 2009 (209) 2010 (169) 2011 (137) 2012 (165) 2013 (198) 2014 (207) 2015 (226) 2016 (251) 2017 (257) 2018 (342) 2019 (424) 2020 (484) 2021 (581) 2022 (612) 2023 (775) 2024 (155)
Publication types (Num. hits)
article(2504) book(8) data(4) incollection(62) inproceedings(3886) phdthesis(73) proceedings(21)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1664 occurrences of 928 keywords

Results
Found 6558 publication records. Showing 6558 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
112Hyung-Jong Kim 0002 Vulnerability Modeling and Simulation for DNS Intrusion Tolerance System Construction. Search on Bibsonomy AIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Atomic Vulnerability, DNS, Intrusion Tolerance, Vulnerability Analysis, DEVS formalism
105HyungJong Kim, KyungHee Koh, DongHoon Shin, HongGeun Kim Vulnerability Assessment Simulation for Information Infrastructure Protection. Search on Bibsonomy InfraSec The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Knowledge-Based Simulation, Modeling and Simulation, Vulnerability Analysis, Information Infrastructure, Vulnerability Assessment
100Hasan Cavusoglu, Huseyin Cavusoglu, Srinivasan Raghunathan Efficiency of Vulnerability Disclosure Mechanisms to Disseminate Vulnerability Knowledge. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF disclosure mechanisms, responsible vulnerability disclosure, game theory, Information security, economic modeling, software vulnerabilities
91David Brumley, James Newsome, Dawn Song, Hao Wang, Somesh Jha Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
83Aviral Shrivastava, Jongeun Lee, Reiley Jeyapaul Cache vulnerability equations for protecting data in embedded processor caches from soft errors. Search on Bibsonomy LCTES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF cache vulnerability, static analysis, embedded processors, soft errors, code transformation, compiler technique
83Wangyuan Zhang, Xin Fu, Tao Li 0006, José A. B. Fortes An Analysis of Microarchitecture Vulnerability to Soft Errors on Simultaneous Multithreaded Architectures. Search on Bibsonomy ISPASS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF thread-aware reliability optimization, microarchitecture vulnerability, simultaneous multithreaded architecture, semiconductor transient fault, microprocessor reliability, processor throughput, soft error vulnerability analysis, SPEC CPU 2000 benchmark, microarchitecture structure, microarchitecture reliability profile, fetch policy, thread-level parallelism, multithreading architecture
76Cuisong Yu, Zhenchun Hao, Jiahu Wang, Zhenhua Wang, Shouchang Hao Based on Fuzzy Clustering Theory: Vulnerability Classification Research of Water Resources System. Search on Bibsonomy FSKD (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
76David Brumley, James Newsome, Dawn Xiaodong Song, Hao Wang, Somesh Jha Towards Automatic Generation of Vulnerability-Based Signatures. Search on Bibsonomy S&P The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
76Youngsup Kim, Seung Yub Baek, Geuk Lee Intelligent Tool for Enterprise Vulnerability Assessment on a Distributed Network Environment Using Nessus and OVAL. Search on Bibsonomy KES (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
76Fanglu Guo, Yang Yu, Tzi-cker Chiueh Automated and Safe Vulnerability Assessment. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
76Haitao Tian, Liusheng Huang, Zhi Zhou, Hui Zhang Common Vulnerability Markup Language. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
76Zhichun Li, Gao Xia, Hongyu Gao, Yi Tang 0002, Yan Chen 0004, Bin Liu 0001, Junchen Jiang, Yuezhou Lv NetShield: massive semantics-based vulnerability signature matching for high-speed networks. Search on Bibsonomy SIGCOMM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF vulnerability signature, intrusion detection, deep packet inspection, signature matching
76Ashlesha Joshi, Samuel T. King, George W. Dunlap, Peter M. Chen Detecting past and present intrusions through vulnerability-specific predicates. Search on Bibsonomy SOSP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF IntroVirt, virtual-machine introspection, virtual-machine replay, vulnerability-specific predicates, intrusion detection, semantic gap
75Karen Scarfone, Peter Mell Vulnerability scoring for security configuration settings. Search on Bibsonomy QoP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF common configuration scoring system (ccss), common vulnerability scoring system (cvss), security configuration, vulnerability scoring, risk assessment, vulnerability
69Ping Chen 0003, Yi Wang, Zhi Xin, Bing Mao, Li Xie 0001 BRICK: A Binary Tool for Run-Time Detecting and Locating Integer-Based Vulnerability. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
69Haitao Tian, Liusheng Huang, Zhi Zhou, Yonglong Luo Arm up Administrators: Automated Vulnerability Management. Search on Bibsonomy ISPAN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
68Vilas Sridharan, David R. Kaeli Using hardware vulnerability factors to enhance AVF analysis. Search on Bibsonomy ISCA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF architectural vulnerability factor, fault tolerance, reliability
68Ashish Arora, Anand Nandkumar, Rahul Telang Does information security attack frequency increase with vulnerability disclosure? An empirical analysis. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Disclosure policy, Risk management, Economics, Patching, Software vulnerability
68Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan An OVAL-based active vulnerability assessment system for enterprise computer networks. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Open vulnerability assessment language, Attack path, Network security, Relational database management system, Predicate logic, Security vulnerability
62Christian Frühwirth, Tomi Männistö Improving CVSS-based vulnerability prioritization and response with context information. Search on Bibsonomy ESEM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
62Ryan Iwahashi, Daniela Alvim Seabra de Oliveira, Shyhtsun Felix Wu, Jedidiah R. Crandall, Young-Jun Heo, Jintae Oh, Jong-Soo Jang Towards Automatically Generating Double-Free Vulnerability Signatures Using Petri Nets. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
61Xuejiao Liu, Debao Xiao, Nian Ma, Jie Yu A Scalable, Vulnerability Modeling and Correlating Method for Network Security. Search on Bibsonomy Infoscale The full citation details ... 2009 DBLP  DOI  BibTeX  RDF vulnerability correlation, modeling, scalable, Network security
61Rahul Telang, Sunil Wattal An Empirical Analysis of the Impact of Software Vulnerability Announcements on Firm Stock Price. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF software vendors, quality, Information security, patching, software vulnerability, event-study
61Davide Balzarotti, Marco Cova, Viktoria Felmetsger, Giovanni Vigna Multi-module vulnerability analysis of web-based applications. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF multi-step attacks, static analysis, web applications, dynamic analysis, vulnerability analysis
60Jaziar Radianti, Jose J. Gonzalez Understanding Hidden Information Security Threats: The Vulnerability Black Market. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Vulnerability Black Market, Information Security, System Dynamics, Software Vulnerability, Integrated Operations
54Geraldine Vache Vulnerability analysis for a quantitative security evaluation. Search on Bibsonomy ESEM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
54Ching-Huang Lin, Chih-Hao Chen, Chi-Sung Laih A Study and Implementation of Vulnerability Assessment and Misconfiguration Detection. Search on Bibsonomy APSCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
54David McKinney Vulnerability Bazaar. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
54Jinyoo Kim, Yashwant K. Malaiya, Indrakshi Ray Vulnerability Discovery in Multi-Version Software Systems. Search on Bibsonomy HASE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
54Geuk Lee, Youngsup Kim, Sang-Jo Youk Development of Oval Based Vulnerability Management Tool (OVMT) on a Distributed Network Environment. Search on Bibsonomy KES (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
54Andy Ozment Improving vulnerability discovery models. Search on Bibsonomy QoP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF measuring software security, measuring vulnerabilities, vulnerability discovery model, security metrics
54Mohammad Ebrahim Rafiei, Mohsen Taherian, Hamid Mousavi, Ali Movaghar 0001, Rasool Jalili Vulnerability Analysis in VGBPS Using Prolog. Search on Bibsonomy FSEN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Protection System, Safety Problem, Prolog, Vulnerability Analysis
48Helen J. Wang, Chuanxiong Guo, Daniel R. Simon, Alf Zugenmaier Shield: vulnerability-driven network filters for preventing known vulnerability exploits. Search on Bibsonomy SIGCOMM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF generic protocol analyzer, network filter, vulnerability signature, worm defense, patching
48Ha-Thanh Le, Deepak Subramanian, Wen-Jing Hsu, Peter Kok Keong Loh Scoring Web-Based Vulnerability Impact Using Property-Based Vulnerability Model. Search on Bibsonomy AINA Workshops The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Web application vulnerability, vulnerable property relationship graph (VPRG), vulnerable property relationship matrix (VPRM), vulnerability impact score
47Kyle Coffey, Leandros A. Maglaras, Richard Smith 0002, Helge Janicke, Mohamed Amine Ferrag, Abdelouahid Derhab, Mithun Mukherjee 0001, Stylianos Rallis, Awais Yousaf Vulnerability Assessment of Cyber Security for SCADA Systems. Search on Bibsonomy Guide to Vulnerability Analysis for Computer Networks and Systems The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
47Igor V. Kotenko, Elena Doynikova, Andrey Chechulin, Andrey Fedorchenko AI- and Metrics-Based Vulnerability-Centric Cyber Security Assessment and Countermeasure Selection. Search on Bibsonomy Guide to Vulnerability Analysis for Computer Networks and Systems The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
47Yi Shi 0001, Yalin E. Sagduyu, Kemal Davaslioglu, Renato Levy Vulnerability Detection and Analysis in Adversarial Deep Learning. Search on Bibsonomy Guide to Vulnerability Analysis for Computer Networks and Systems The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
47Saad Khan 0001, Simon Parkinson Review into State of the Art of Vulnerability Assessment using Artificial Intelligence. Search on Bibsonomy Guide to Vulnerability Analysis for Computer Networks and Systems The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
47Patrick Tague, David Slater, Jason Rogers, Radha Poovendran Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
47Sebastian Roschke, Feng Cheng 0002, Robert Schuppenies, Christoph Meinel Towards Unifying Vulnerability Information for Attack Graph Construction. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
47Steve Counsell, Stephen Swift An Empirical Study of Potential Vulnerability Faults in Java Open-Source Software. Search on Bibsonomy Innovative Techniques in Instruction Technology, E-learning, E-assessment, and Education The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
47HyunChul Joh, Jinyoo Kim, Yashwant K. Malaiya Vulnerability Discovery Modeling Using Weibull Distribution. Search on Bibsonomy ISSRE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
47Nabil Schear, David R. Albrecht, Nikita Borisov High-Speed Matching of Vulnerability Signatures. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
47José Fonseca 0002, Marco Vieira, Henrique Madeira Testing and Comparing Web Vulnerability Scanning Tools for SQL Injection and XSS Attacks. Search on Bibsonomy PRDC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
47Muhammad Abedin, Syeda Nessa, Ehab Al-Shaer, Latifur Khan Vulnerability analysis For evaluating quality of protection of security policies. Search on Bibsonomy QoP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, evaluation, metric, policy
47Hossein Asadi 0001, Vilas Sridharan, Mehdi Baradaran Tahoori, David R. Kaeli Vulnerability analysis of L2 cache elements to single event upsets. Search on Bibsonomy DATE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
47Young-Ju Han, Jin S. Yang, Beom-Hwan Chang, Jung C. Na, Tai-Myung Chung The Vulnerability Assessment for Active Networks; Model, Policy, Procedures, and Performance Evaluations. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
47William A. Arbaugh, William L. Fithen, John McHugh Windows of Vulnerability: A Case Study Analysis. Search on Bibsonomy Computer The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
46Mohammad Ali Hadavi, Hossein Shirazi, Hasan Mokhtari Sangchi, Vahid Saber Hamishagi Software Security; A Vulnerability Activity Revisit. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, design, implementation, software, Vulnerability, Activity
46Marcus Kaiser, Claus C. Hilgetag Edge vulnerability in neural and metabolic networks. Search on Bibsonomy Biol. Cybern. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Brain networks, Edge betweenness, Cluster, Small world, Network vulnerability
45James Walden, Maureen Doyle, Grant A. Welch, Michael Whelan Security of open source web applications. Search on Bibsonomy ESEM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
45Somak Bhattacharya, S. K. Ghosh Security Threat Prediction in a Local Area Network Using Statistical Model. Search on Bibsonomy IPDPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
45Furkan Tari, A. Ant Ozok, Stephen H. Holden A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords. Search on Bibsonomy SOUPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF authentication, human factors, usable security, graphical passwords, social engineering, shoulder surfing, password security
44Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu 0003 Memsherlock: an automated debugger for unknown memory corruption vulnerabilities. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF memory corruption, debugging, vulnerability analysis
44Mohd A. Bashar, Ganesh Krishnan, Markus G. Kuhn, Eugene H. Spafford, Samuel S. Wagstaff Jr. Low-threat security patches and tools. Search on Bibsonomy ICSM The full citation details ... 1997 DBLP  DOI  BibTeX  RDF low-threat security patches, dangerous information, vulnerability information, software vendor, binary program patch, differential application times, cryptoprocessors, enciphered operating systems, synchronization, reverse engineering, customization, security of data, security tools
39Aaron Steele Ontological Vulnerability Assessment. Search on Bibsonomy WISE Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
39Diptikalyan Saha Extending logical attack graphs for efficient vulnerability analysis. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF logic programming, attack graphs, incremental analysis
39Yulong Wang, Fangchun Yang, Qibo Sun Measuring Network Vulnerability Based on Pathology. Search on Bibsonomy WAIM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
39HyunChul Joh, Yashwant K. Malaiya Seasonality in Vulnerability Discovery in Major Software Systems. Search on Bibsonomy ISSRE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
39Makoto Sugihara SEU Vulnerability of Multiprocessor Systems and Task Scheduling for Heterogeneous Multiprocessor Systems. Search on Bibsonomy ISQED The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Heterogeneous Multiprocessor Systems, Reliability, Task Scheduling, Soft Error, Single Event Upset
39David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong Song Creating Vulnerability Signatures Using Weakest Preconditions. Search on Bibsonomy CSF The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
39Shuai Wang 0006, Jie S. Hu, Sotirios G. Ziavras On the Characterization of Data Cache Vulnerability in High-Performance Embedded Microprocessors. Search on Bibsonomy ICSAMOS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
39Josh Dehlinger, Qian Feng, Lan Hu SSVChecker: unifying static security vulnerability detection tools in an Eclipse plug-in. Search on Bibsonomy ETX The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security auditing, software security, secure programming
39Karthik N. Kannan, Rahul Telang, Hao Xu Economic Analysis of the Market for Software Vulnerability Disclosure. Search on Bibsonomy HICSS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
39Young-Ju Han, Jin S. Yang, Beom-Hwan Chang, Tai-Myung Chung SVAM: The Scalable Vulnerability Analysis Model Based on Active Networks. Search on Bibsonomy ICOIN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
39Silvia Rapicetta, Vittorio Zanon GIS-based method for the environmental vulnerability assessment to volcanic ashfall at Etna Volcano. Search on Bibsonomy GeoInformatica The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Environmental vulnerability, Corine land cover, Volcanic risk, GIS
39Yong-Jun You, Sung-Do Chi SIMVA: simulation-based network vulnerability analysis system. Search on Bibsonomy SpringSim The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SES/MB, vulnerability analysis system, simulation, network security, DEVS
39Charles Reis, John Dunagan, Helen J. Wang, Opher Dubrovsky, Saher Esmeir BrowserShield: Vulnerability-driven filtering of dynamic HTML. Search on Bibsonomy ACM Trans. Web The full citation details ... 2007 DBLP  DOI  BibTeX  RDF code rewriting, JavaScript, Web browser, vulnerability
39Giorgos Valvis, Despina Polemi An XML-Based Data Model for Vulnerability Assessment Reports. Search on Bibsonomy I3E The full citation details ... 2005 DBLP  DOI  BibTeX  RDF XML modeling, Vulnerability assessment
37Swathi Nambiar Kadala Manikoth, Fabio Di Troia, Mark Stamp 0001 Masquerade Detection on Mobile Devices. Search on Bibsonomy Guide to Vulnerability Analysis for Computer Networks and Systems The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
37Suvodeep Mazumdar, Jing Wang Big Data and Cyber Security: A Visual Analytics Perspective. Search on Bibsonomy Guide to Vulnerability Analysis for Computer Networks and Systems The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
37Steven Walker-Roberts, Mohammad Hammoudeh Artificial Intelligence Agents as Mediators of Trustless Security Systems and Distributed Computing Applications. Search on Bibsonomy Guide to Vulnerability Analysis for Computer Networks and Systems The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
37Deebiga Rajeswaran, Fabio Di Troia, Thomas H. Austin, Mark Stamp 0001 Function Call Graphs Versus Machine Learning for Malware Detection. Search on Bibsonomy Guide to Vulnerability Analysis for Computer Networks and Systems The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
37Mark Stamp 0001 A Survey of Machine Learning Algorithms and Their Application in Information Security. Search on Bibsonomy Guide to Vulnerability Analysis for Computer Networks and Systems The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
37Alexandros Chrysikos, Stephen McGuire A Predictive Model for Risk and Trust Assessment in Cloud Computing: Taxonomy and Analysis for Attack Pattern Detection. Search on Bibsonomy Guide to Vulnerability Analysis for Computer Networks and Systems The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
37Bo Zhou 0001, Curtis L. Maines, Stephen Tang 0001, Qi Shi 0001 A Framework for the Visualisation of Cyber Security Requirements and Its Application in BPMN. Search on Bibsonomy Guide to Vulnerability Analysis for Computer Networks and Systems The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
37Saad Khan 0001, Simon Parkinson Automated Planning of Administrative Tasks Using Historic Events: A File System Case Study. Search on Bibsonomy Guide to Vulnerability Analysis for Computer Networks and Systems The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
37Vivin Paliath, Paulo Shakarian Defending Against Chained Cyber-Attacks by Adversarial Agents. Search on Bibsonomy Guide to Vulnerability Analysis for Computer Networks and Systems The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
37Dhiviya Dhanasekar, Fabio Di Troia, Katerina Potika, Mark Stamp 0001 Detecting Encrypted and Polymorphic Malware Using Hidden Markov Models. Search on Bibsonomy Guide to Vulnerability Analysis for Computer Networks and Systems The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
37Liam Grant, Simon Parkinson Identifying File Interaction Patterns in Ransomware Behaviour. Search on Bibsonomy Guide to Vulnerability Analysis for Computer Networks and Systems The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
37Muhammad Ajmal Azad, Junaid Arshad, Farhan Riaz SOCIO-LENS: Spotting Unsolicited Caller Through Network Analysis. Search on Bibsonomy Guide to Vulnerability Analysis for Computer Networks and Systems The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
37Panos M. Pardalos, Vitaliy A. Yatsenko, Michael B. Fenn, Arkadii A. Chikrii Bilinear Markovian Processes of Search for Stationary and Moving Objects. Search on Bibsonomy Examining Robustness and Vulnerability of Networked Systems The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
37Yuriy Stoyan, Petro Stetsyuk, Tatiana E. Romanova Optimal Balanced Packing Using Phi-Function Technique. Search on Bibsonomy Examining Robustness and Vulnerability of Networked Systems The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
37Zhen Kan, John M. Shea, Warren E. Dixon Navigation Function Based Decentralized Control of A Multi-Agent System with Network Connectivity Constraints. Search on Bibsonomy Examining Robustness and Vulnerability of Networked Systems The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
37Foad Mahdavi Pajouh, Alexander Veremyev, Vladimir Boginski Analysis and Design of Robust Network Clusters with Bounded Diameter. Search on Bibsonomy Examining Robustness and Vulnerability of Networked Systems The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
37Vardan Sargsyan, Arman Sargsyan, Armen Ghazaryan Distributed Computer Attack Detection System for Corporate Networks. Search on Bibsonomy Examining Robustness and Vulnerability of Networked Systems The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
37Alexander Gutfraind Monotonic and Non-Monotonic Infections on Networks. Search on Bibsonomy Examining Robustness and Vulnerability of Networked Systems The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
37Oleg Burdakov, Patrick Doherty 0001, Jonas Kvarnström Local Search for Hop-Constrained Directed Steiner Tree Problem with Application to UAV-Based Multi-Target Surveillance. Search on Bibsonomy Examining Robustness and Vulnerability of Networked Systems The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
37Yannis Marinakis, Athanasios Migdalas Multiobjective Particle Swarm Optimization for a Multicast Routing Problem. Search on Bibsonomy Examining Robustness and Vulnerability of Networked Systems The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
37Siddhartha S. Mehta, William MacKunis, Jess Willard Curtis Robust Networked Control Systems with Communication Constraints. Search on Bibsonomy Examining Robustness and Vulnerability of Networked Systems The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
37Sonia Cafieri, Pierre Hansen, Nenad Mladenovic Variable Neighborhood Search for Edge-Ratio Network Clustering. Search on Bibsonomy Examining Robustness and Vulnerability of Networked Systems The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
37Marta S. R. Monteiro, Dalila B. M. M. Fontes, Fernando A. C. C. Fontes Hop-Constrained Tree-Shaped Networks. Search on Bibsonomy Examining Robustness and Vulnerability of Networked Systems The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
37Mario Ventresca, Dionne M. Aleman Approximation Algorithms for Detecting Critical Nodes. Search on Bibsonomy Examining Robustness and Vulnerability of Networked Systems The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
37Satish Vadlamani, Hugh R. Medal, Burak Eksioglu Security in Wireless Networks: A Tutorial. Search on Bibsonomy Examining Robustness and Vulnerability of Networked Systems The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
37Austin Buchanan, Nannan Chen, Xin Ma 0002 Using GRASP for the Cover by s-Defective Independent Sets Problem. Search on Bibsonomy Examining Robustness and Vulnerability of Networked Systems The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
37Nickolay A. Kuznetsov Evaluation of the Reliability of Repairable s - t Networks by Fast Simulation Method. Search on Bibsonomy Examining Robustness and Vulnerability of Networked Systems The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
37Joydeep Banerjee, Arun Das 0002, Arunabha Sen A Survey of Interdependency Models for Critical Infrastructure Networks. Search on Bibsonomy Examining Robustness and Vulnerability of Networked Systems The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
37Paola Festa On Data Clustering: Exact and Approximate Solutions. Search on Bibsonomy Examining Robustness and Vulnerability of Networked Systems The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
37Krishna Reddy Gujjula, Krishnan Ayalur Seshadrinathan, Amirhossein Meisami A Hybrid Metaheuristic for the Maximum k-Plex Problem. Search on Bibsonomy Examining Robustness and Vulnerability of Networked Systems The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
37Maciej Rysz, Foad Mahdavi Pajouh, Pavlo A. Krokhmal, Eduardo L. Pasiliao On Risk-Averse Weighted k-Club Problems. Search on Bibsonomy Examining Robustness and Vulnerability of Networked Systems The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 6558 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license