The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for cyberspace with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1991-1994 (19) 1995 (19) 1996 (35) 1997 (35) 1998 (35) 1999 (42) 2000 (74) 2001 (660) 2002 (42) 2003 (35) 2004 (40) 2005 (50) 2006 (42) 2007 (40) 2008 (30) 2009 (32) 2010 (41) 2011 (39) 2012 (77) 2013 (63) 2014 (227) 2015 (373) 2016 (174) 2017 (170) 2018 (206) 2019 (246) 2020 (246) 2021 (148) 2022 (165) 2023 (117) 2024 (8)
Publication types (Num. hits)
article(562) book(15) incollection(41) inproceedings(2860) phdthesis(26) proceedings(26)
Venues (Conferences, Journals, ...)
DSC(799) SMC(616) HPCC/CSS/ICESS(513) CSS(221) CIAT(95) CSS (2)(54) CSS (1)(49) CyCon(49) IUCC-CSS(28) Cyberpsychology Behav. Soc. Ne...(27) New Media Soc.(26) CIA(25) Comput. Law Secur. Rev.(23) CoRR(23) Inf. Soc.(22) Commun. ACM(19) More (+10 of total 513)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 332 occurrences of 274 keywords

Results
Found 3531 publication records. Showing 3530 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
62Reind P. van de Riet, Wouter Janssen, Martin S. Olivier, Radu Serban A Comparison of Two Architectures for Implementing Security and Privacy in Cyberspace. Search on Bibsonomy DEXA The full citation details ... 2000 DBLP  DOI  BibTeX  RDF architecture, object-orientation, capability, security and privacy, cyberspace
59Metodi Hadji-Janev Southeast European(SEE) States' International Legal Rights And Obligations In The Cyberspace. Search on Bibsonomy Terrorist Use of Cyberspace and Cyber Terrorism The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
59Stefano Mele The Italian Strategic Response Against Cyber Threats and the Terrorist Use of Cyberspace. Search on Bibsonomy Terrorist Use of Cyberspace and Cyber Terrorism The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
59Zlatogor Minchev Human Factor Dual Role in Modern Cyberspace Social Engineering. Search on Bibsonomy Terrorist Use of Cyberspace and Cyber Terrorism The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
52Janusz Wielki A Framework of the Impact of Cyberspace on Contemporary Organizations. Search on Bibsonomy DEXA Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
52Yee Fen Lim Law and Regulation in cyberspace. Search on Bibsonomy CW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
52Jeffrey M. Bradshaw, Niranjan Suri, Alberto J. Cañas, Robert Davis, Kenneth M. Ford, Robert R. Hoffman, Renia Jeffers, Thomas Reichherzer Terraforming Cyberspace. Search on Bibsonomy Computer The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
52Pat Jefferies Multimedia, Cyberspace & Ethics. Search on Bibsonomy IV The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
52Ken Musgrave Building Worlds in Cyberspace. Search on Bibsonomy Computer Graphics International The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
52Kara L. Nance, Mahla Strohmaier Ethical accountability in the cyberspace. Search on Bibsonomy Ethics in Computer Age The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
51Chinese Academy of Cyberspace Studies China Internet Development Report 2018 - Blue Book of World Internet Conference Search on Bibsonomy 2020   DOI  RDF
50Tara Krueger Mapping Cyberspace: The Image of the Internet. Search on Bibsonomy IEEE Ann. Hist. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cyberspace map, Internet space place, Mapping, conceptual map
49W. Yang Pictopia. Search on Bibsonomy ACM Multimedia The full citation details ... 2004 DBLP  DOI  BibTeX  RDF cybertecture, mediatecture, architecture, locatability, urbanism
49Mao Lin Huang, Wei Lai, Yanchun Zhang Mapping and Browsing the Web in a 2D Space. Search on Bibsonomy DEXA Workshops The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Information Visualization, Web Browser, Web Graph, Web Navigation
44David Mair Conforming to al Qaeda's single narrative - an analysis of al Shabaab's Tweets during the Westgate terrorist attack. Search on Bibsonomy Terrorist Use of Cyberspace and Cyber Terrorism The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
44Mitko Bogdanoski, Aleksandar Risteski, Marjan Bogdanoski Steganography in Support of the Global Terrorism. Search on Bibsonomy Terrorist Use of Cyberspace and Cyber Terrorism The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
44Nancy Houston How Human Issues Impact Confronting Cyber Terrorism. Search on Bibsonomy Terrorist Use of Cyberspace and Cyber Terrorism The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
44Nancy Houston Cultural Aspects of Information Sharing and Collaboration. Search on Bibsonomy Terrorist Use of Cyberspace and Cyber Terrorism The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
44Ronald S. Bearse Protecting Critical Information Infrastructure from Terrorist Attacks and Other Threats: Strategic Challenges for NATO and its Partner Countries. Search on Bibsonomy Terrorist Use of Cyberspace and Cyber Terrorism The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
44Alan Brill The Use of Internet Technology by Cyber Terrorists & Cyber Criminals: The 2014 Report. Search on Bibsonomy Terrorist Use of Cyberspace and Cyber Terrorism The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
44Stuart MacDonald Assessing and Responding to the Cyberterrorism Threat. Search on Bibsonomy Terrorist Use of Cyberspace and Cyber Terrorism The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
44Alan Brill Virtual Currencies and Terrorist Financing: Basics for Anti-Terrorist Professionals. Search on Bibsonomy Terrorist Use of Cyberspace and Cyber Terrorism The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
44Elliot Zweig From Al-Qaeda To The Islamic State (ISIS), Jihadi Groups Engage in Cyber Jihad: Beginning with 1980s Promotion Of Use Of 'Electronic Technologies' Up To Today's Embrace Of Social Media to Attract A New Jihadi Generation. Search on Bibsonomy Terrorist Use of Cyberspace and Cyber Terrorism The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
44Raoul Chiesa Cyber-Attacking a Country: What Terrorists Haven't Done So Far (and they could do). Search on Bibsonomy Terrorist Use of Cyberspace and Cyber Terrorism The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
44Arthur L. Brocato Jr. Tackling Terrorists' Use of the Internet: Propaganda Dispersion & the Threat of Radicalization. Search on Bibsonomy Terrorist Use of Cyberspace and Cyber Terrorism The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
44Ivica Simonovski The Use Of Cyber Space For Terrorist Purposes - With Special Reference To The Financing Terrorist Activity. Search on Bibsonomy Terrorist Use of Cyberspace and Cyber Terrorism The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
44Bracha Shapira A Content-Based Model for Web-Monitoring. Search on Bibsonomy Fighting Terror in Cyberspace The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
44Yehuda Shaffer Analysis of Financial Intelligence and the Detection of Terror Financing. Search on Bibsonomy Fighting Terror in Cyberspace The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
44Mark Last Using Data Mining Technology for Terrorist Detection on the Web. Search on Bibsonomy Fighting Terror in Cyberspace The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
44Yuval Elovici TDS - An Innovative Terrorist Detection System. Search on Bibsonomy Fighting Terror in Cyberspace The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
44Abraham R. Wagner Terrorism and the Internet: Use and Abuse. Search on Bibsonomy Fighting Terror in Cyberspace The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
44Menahem Friedman, Moti Schneider, Abraham Kandel Clustering Algorithms for Variable-Length Vectors and Their Application to Detecting Terrorist Activities. Search on Bibsonomy Fighting Terror in Cyberspace The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
44Alex Markov, Mark Last Identification of Terrorist Web Sites with Cross-Lingual Classification Tools. Search on Bibsonomy Fighting Terror in Cyberspace The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
44Shaul Shay The Radical Islam and the Cyber Jihad. Search on Bibsonomy Fighting Terror in Cyberspace The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
44Zijia Wang, Han-Teng Liao, Jiacheng Lou, Yu Liu Making Cyberspace Towards Sustainability A Scientometric Review for a Cyberspace that Enables Green and Digital Transformation. Search on Bibsonomy CIAT The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
39Shankar Sastry 0001 TRUST: in cyberspace and beyond. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
39David W. Valentine Practical computer security: a new service course based upon the national strategy to secure cyberspace. Search on Bibsonomy SIGITE Conference The full citation details ... 2005 DBLP  DOI  BibTeX  RDF model syllabi, security, education
39Mihaela Ulieru Emergence in Cyberspace: Towards the Evolutionary Self-Organizing Enterprise. Search on Bibsonomy Agent Technologies, Infrastructures, Tools, and Applications for E-Services The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
39Herbert Fiedler Der Staat im Cyberspace - zur Diskussion gestellt. Search on Bibsonomy Inform. Spektrum The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
38Yoshitaka Sakurai, Kinshuk, Kouhei Takada, Rainer Knauf, Setsuo Tsuruta Enriched Cyberspace through Adaptive Multimedia Utilization for Dependable Remote Collaboration. Search on Bibsonomy AINA Workshops The full citation details ... 2010 DBLP  DOI  BibTeX  RDF enriched cyberspace, CSCW (computer-supported cooperative work), situation assessment
38Andrey Leonov, Alexander Serebrov, Mikhail Anikushkin, Dmitriy Belosokhov, Alexander Bobkov, Evgeny Eremchenko, Pavel Frolov, Ilya Kazanskiy, Andrey Klimenko, Stanislav V. Klimenko, Viktoria Leonova, Andrey Rashidov, Vasil Urazmetov, Valeriy Droznin, Viktor Dvigalo, Vladimir Leonov, Sergey Samoylenko, Alexander Aleynikov, Tikhon Shpilenok Virtual Story in Cyberspace: Valley of Geysers, Kamchatka. Search on Bibsonomy CW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Heritage in cyberspace, Mixed and virtual reality, Cyberworlds and their impact on the real worlds, Neogeography, Virtual story, Valley of Geysers, Kamchatka, Situational awareness, Shared virtual worlds, Virtual collaborative spaces
38Narushige Shiode, Tomoko Kanoshima Utilising the Spatial Features of Cyberspace for Generating a Dynamic Museum Environment. Search on Bibsonomy VRML The full citation details ... 1999 DBLP  DOI  BibTeX  RDF art experience, interactivity, VRML, dynamic environment, virtual museum, cyberspace
38K. Andrews Case study: Visualising cyberspace: information visualisation in the Harmony Internet browser. Search on Bibsonomy INFOVIS The full citation details ... 1995 DBLP  DOI  BibTeX  RDF cyberspace visualisation, Harmony Internet browser, Gopher spaces, WWW spaces, Hyper-G Internet information system, Harmony client, navigational facilities, location feedback, Internet, information retrieval, data structures, information systems, information systems, data models, hypermedia, data visualisation, information visualisation
37Daniel L. Rubin, Pattanasak Mongkolwat, Vladimir Kleper, Kaustubh Supekar, David S. Channin Annotation and Image Markup: Accessing and Interoperating with the Semantic Content in Medical Imaging. Search on Bibsonomy IEEE Intell. Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Frank A. Biocca The Space of Cognitive Technology: The Design Medium and Cognitive Properties of Virtual Space. Search on Bibsonomy Cognitive Technology The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
37Bruce Damer, Stuart Gold, Jan de Bruin, Dirk-Jan de Bruin Conferences and Trade Shows in Inhabited Virtual Worlds: A Case Study of Avatars98 & 99. Search on Bibsonomy Virtual Worlds The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
35Donald P. Brutzman, Michael Zyda, Kent Watsen, Michael R. Macedonia Virtual Reality Transfer Protocol (VRTP) Design Rationale. Search on Bibsonomy WETICE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF virtual reality transfer protocol, VRTP, network support, Cyberspace Backbone, CBone, interactive internetworked 3D worlds, Internet, World Wide Web, virtual reality, testing, Virtual Reality Modeling Language, VRML, HTML, http, network monitoring, design rationale, client-server, peer-to-peer communications, hypertext transfer protocol, large-scale virtual environments
35Urs E. Gattiker, Helen Kelley Morality and technology, or is it wrong to create and let loose a computer virus. Search on Bibsonomy HICSS (3) The full citation details ... 1995 DBLP  DOI  BibTeX  RDF computer related actions, women end users, context specific situation, policy makers, moral conduct, electronic highway, moral judgment, cyberspace domain, privacy, human factors, researchers, social aspects of automation, computer crime, social norms, computer virus, computer viruses, morality, theoretical models, professional aspects, civil liberties
29Nikola Pijovic The Cyberspace 'Great Game'. The Five Eyes, the Sino-Russian Bloc and the Growing Competition to Shape Global Cyberspace Norms. Search on Bibsonomy CyCon The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
29Aleksandra Pawlicka, Michal Choras, Marek Pawlicki Cyberspace threats: not only hackers and criminals. Raising the awareness of selected unusual cyberspace actors - cybersecurity researchers' perspective. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
29Chenhui Zhao, Bo Zhang Research on the ideology monitoring system of cyberspace legal security based on Neural Network. Search on Bibsonomy CIAT The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
29Fenghua Li, Zifu Li, Weili Han, Ting Wu 0001, Lihua Chen, Yunchuan Guo, Jinjun Chen Cyberspace-Oriented Access Control: A Cyberspace Characteristics-Based Model and its Policies. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
29Huansheng Ning, Xiaozhen Ye, Mohammed Amine Bouras, Dawei Wei, Mahmoud Daneshmand General Cyberspace: Cyberspace and Cyber-Enabled Spaces. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
29Jinlin Wang, Hongli Zhang 0001, Binxing Fang, Xing Wang, Yuanxin Zhang Evaluation on Availability of Entity Information in Cyberspace. Search on Bibsonomy DSC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
29Jinlin Wang, Hongli Zhang 0001, Binxing Fang, Xing Wang, Lin Ye A Survey on Data Cleaning Methods in Cyberspace. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
29Fenghua Li, Zifu Li, Weili Han, Ting Wu 0001, Lihua Chen, Yunchuan Guo Cyberspace-Oriented Access Control: Model and Policies. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
29Paul A. Walker Law of the horse to law of the submarine: The future of State behavior in cyberspace. Search on Bibsonomy CyCon The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
29Geoffrey S. DeWeese Anticipatory and preemptive self-defense in cyberspace: The challenge of imminence. Search on Bibsonomy CyCon The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
29Alison L. Russell Strategic anti-access/area denial in cyberspace. Search on Bibsonomy CyCon The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
29Mark W. Bell A Review of "Ethics in Cyberspace: How Cyberspace May Influence Interpersonal Interaction". Search on Bibsonomy Inf. Soc. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
29Ronald J. Deibert, Rafal Rohozinski Control and Subversion in Russian Cyberspace. Search on Bibsonomy Access Controlled The full citation details ... 2010 DBLP  BibTeX  RDF
29Georgios I. Zekos State Cyberspace Jurisdiction and Personal Cyberspace Jurisdiction. Search on Bibsonomy Int. J. Law Inf. Technol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Wen-Bin Chiou, Chin-Sheng Wan Sexual Self-Disclosure in Cyberspace among Taiwanese Adolescents: Gender Differences and the Interplay of Cyberspace and Real Life. Search on Bibsonomy Cyberpsychology Behav. Soc. Netw. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Michael T. Zimmer The tensions of securing cyberspace: The Internet, state power and The National Strategy to Secure Cyberspace. Search on Bibsonomy First Monday The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
29Claire Coleman Cyberspace security: Securing cyberspace - new laws and developing strategies. Search on Bibsonomy Comput. Law Secur. Rev. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
29Mo Fu, Christopher Yeo, Yuetong Lin, Fei-Yue Wang 0001 WAVES: towards real time laboratory experiments in cyberspace. Search on Bibsonomy SMC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
29Todd Papaioannou Mobile Information Agents for Cyberspace - State of the Art and Visions. Search on Bibsonomy CIA The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
29David Judah Liability in cyberspace - I: Defamation in cyberspace. Search on Bibsonomy Comput. Law Secur. Rev. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
27Hiromu Miyashita, Ryo Segawa, Ken-ichi Okada Estimation of thinking states in cyberspace using multiple physiological parameters. Search on Bibsonomy VRST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF presence, psychology, feelings
27Ahmed Abbasi, Hsinchun Chen Writeprints: A stylometric approach to identity-level identification and similarity detection in cyberspace. Search on Bibsonomy ACM Trans. Inf. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF online text, style classification, text mining, discourse, Stylometry
27Karine Barzilai-Nahon Gatekeeping in Virtual Communities: On Politics of Power in Cyberspace. Search on Bibsonomy HICSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Sheng Fang 0001, Min Zhang, Ling Huang, Yongshan Wei The Social Context Model for Research Activities in a Cyberspace. Search on Bibsonomy ICAT Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Shi-Cho Cha 0001, Yuh-Jzer Joung On Derived Data Services in Cyberspace. Search on Bibsonomy SAINT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Tzong-Song Wang, Larry K. Bright The Challenge of Exclusions in Pervasive Cyberspace. Search on Bibsonomy EEE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
27Ko Fujimura, Naoto Tanimoto The EigenRumor Algorithm for Calculating Contributions in Cyberspace Communities. Search on Bibsonomy Trusting Agents for Trusting Electronic Societies The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
27Naftaly H. Minsky Regularity-Based Trust in Cyberspace. Search on Bibsonomy iTrust The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
27Alessandro Aurigi Urban Cyberspace as a Social Construction: Non-technological Factors in the Shaping of Digital Bristol. Search on Bibsonomy Digital Cities The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
27Alexander Roßnagel Freiheit im Cyberspace. Search on Bibsonomy Inform. Spektrum The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
27Pekka Nikander Users and Trust in Cyberspace (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
27Betty Beaumont Decompression: a living laboratory in cyberspace. Search on Bibsonomy ACM Multimedia Workshops The full citation details ... 2000 DBLP  DOI  BibTeX  RDF ecological art, electronic media, virtual reality, perceptual models, invisibility
27Ravi S. Sandhu Engineering authority and trust in cyberspace: the OM-AM and RBAC way. Search on Bibsonomy ACM Workshop on Role-Based Access Control The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
27George E. Mobus, Manuel Aparicio IV Foraging for information resources in cyberspace: intelligent foraging agent in a distributed network. Search on Bibsonomy CASCON The full citation details ... 1994 DBLP  BibTeX  RDF Internet
25Jay S. Bayne Cyberspatial Mechanics. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Part B The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Ahmad Nadzri Muhammad Nasir, Ali Selamat, Md. Hafiz Selamat Web Mining for Malaysia's Political Social Networks Using Artificial Immune System. Search on Bibsonomy PKAW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Political Parties, General Elections, Social Network Analysis, Artificial Immune System
25Rung-Huei Liang, Yin-Huan Chen Planning Locative Media within Physical Space and Collaborative Workspace. Search on Bibsonomy APSCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Yoshifumi Kitamura, Rong Rong, Yoshinori Hirano, Kazuhiro Asai, Fumio Kishino Video agent: interactive autonomous agents generated from real-world creatures. Search on Bibsonomy VRST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF interactive multimedia content, image processing, fuzzy logic, computer animation, video database, characters
25Leonardo M. Trejos, Masaru Kamada, Tatsuhiro Yonekura, Mamun Bin Ibne Reaz Wildlife net-gamekeepers using sensor network. Search on Bibsonomy NETGAMES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF game modification, nature conservation, pattern recognition, network monitoring
25Cheng-De Qin Personal data protection in electronic business. Search on Bibsonomy ICEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF personal data protection, tort, privacy, legislation, electronic business
25Dae-Hee Seo, Im-Yeong Lee, Hee-Un Park A Study on Key Recovery Agent Protection Profile Having Composition Function. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Key Recovery Protection Profile, Evaluation Methodology, Common Criteria
25Zheng Yan 0002, Piotr Cofta A Mechanism for Trust Sustainability Among Trusted Computing Platforms. Search on Bibsonomy TrustBus The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
25Matthew Allen Dematerialised data and human desire: the Internet and copy culture. Search on Bibsonomy CW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
25Shambhu J. Upadhyaya Real-Time Intrusion Detection with Emphasis on Insider Attacks. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
25Donald J. Welch, Daniel Ragsdale, Wayne Schepens Training for Information Assurance. Search on Bibsonomy Computer The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
25Herbert Fiedler zur diskussion gestellt: Cyber - libertär? Nach dem 11. September. Search on Bibsonomy Inform. Spektrum The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
25Richard O. Mason Intellectual Property and Open Systems. Search on Bibsonomy HICSS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Proprietary Property, Closed Source, Public Property, Open Source, Intellectual Property
23Yayoi Itoh, Yang Chen, Kazuhiko Iida, Mamoru Shiiki, Keiji Mitsubuchi Experiment of metaverse learning method using anatomical 3D object. Search on Bibsonomy VRCAI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF virtual world, Second Life, 3D object, cyberspace, metaverse, learning method
23Roberto Siagri Pervasive computers and the GRID: the birth of a computational exoskeleton for augmented reality. Search on Bibsonomy ESEC/SIGSOFT FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF invited talk, mest compression, java, internet, sensor networks, grid, pervasive computing, wearable computers, eclipse, cyberspace, soda, exoskeleton
23Daniel Memmi The nature of virtual communities. Search on Bibsonomy AI Soc. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Gemeinschaft, Gesellschaft, Community, Social networks, Groupware, Virtual communities, Cyberspace, Collaborative software
23Manuel Oliveira 0002 Virtual environment system layered object model. Search on Bibsonomy Advances in Computer Entertainment Technology The full citation details ... 2004 DBLP  DOI  BibTeX  RDF virtual environments, online games, component frameworks, cyberspace
23Dennis L. Chao Doom as an interface for process management. Search on Bibsonomy CHI The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Doom, Post-Modernism, vernacular, visualization, games, operating systems, video games, metaphors, 3D user interfaces, first-person shooter, cyberspace
Displaying result #1 - #100 of 3530 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license