The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for infosec with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1989-2004 (16) 2005-2007 (17) 2008-2015 (38) 2016-2022 (18) 2023 (2)
Publication types (Num. hits)
article(24) book(1) incollection(2) inproceedings(61) phdthesis(2) proceedings(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 22 occurrences of 20 keywords

Results
Found 91 publication records. Showing 91 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
96Phillip A. Porras, Martin W. Fong, Alfonso Valdes A Mission-Impact-Based Approach to INFOSEC Alarm Correlation. Search on Bibsonomy RAID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF intrusion report correlation, alert management, alert prioritization, Network security
55 2015 Second International Conference on Information Security and Cyber Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17, 2015 Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  BibTeX  RDF
55Mustafa Hassan Saad, Ahmed Serageldin, Goda Ismaeel Salama Android spyware disease and medication. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
55Eric Amankwa, Marianne Loock, Elmarie Kritzinger Enhancing information security education and awareness: Proposed characteristics for a model. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
55Shabier Parker, Jean-Paul Van Belle Lifelogging and lifeblogging: Privacy issues and influencing factors in South Africa. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
55Bassey Isong, Naison Gasela, Ifeoma U. Ohaeri, Elegbeleye Femi RFID-based design-theoretical framework for combating police impersonation in South Africa. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
55Mostafa Doroudian, Narges Arastouie, Mohammad Talebi, Ali Reza Ghanbarian Multilayered database intrusion detection system for detecting malicious behaviors in big data transaction. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
55T. Charles, M. Pollock Digital forensic investigations at universities in South Africa. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
55Reema Al Mushcab, Pavel Gladyshev The significance of different backup applications in retrieving social networking forensic artifacts from Android-based mobile devices. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
55Haoua Cheribi, Mohamed-Khireddine Kholladi A security model for complex applications based on normative multi-agents system. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
55Zahra Waheed, M. Usman Akram, Amna Waheed, Arslan Shaukat Robust extraction of blood vessels for retinal recognition. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
55Fayyaadh Parker, Jacques Ophoff, Jean-Paul Van Belle, Ross Karia Security awareness and adoption of security controls by smartphone users. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
55Mvelo Walaza, Marianne Loock, Elmarie Kritzinger A pragmatic approach towards the integration of ICT security awareness into the South African education system. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
55Ruilin Zhu, Lech J. Janczewski Typology of information systems security research: A methodological perspective. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
55Muhammad Najam Dar, M. Usman Akram, Anam Usman, Shoab Ahmad Khan ECG biometric identification for general population using multiresolution analysis of DWT based features. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
55Madiha Tahir, M. Usman Akram Online signature verification using hybrid features. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
55Ar Kar Kyaw, Yuzhu Chen, Justin Joseph Pi-IDS: evaluation of open-source intrusion detection systems on Raspberry Pi 2. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
55Walid Al-Ahmad, Basil Mohammed A code of practice for effective information security risk management using COBIT 5. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
55Wenli Shang, Ming Wan, Peng Zeng 0001, Quansheng Qiao Research on self-learning method on generation and optimization of industrial firewall rules. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
55Nyalleng Moorosi, Vukosi Marivate Privacy in mining crime data from social Media: A South African perspective. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
55Lineo Mejaele, Elisha Oketch Ochola Analysing the impact of black hole attack on DSR-based MANET: The hidden network destructor. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
55Antesar M. Shabut, Keshav P. Dahal, Irfan Awan, Zeeshan Pervez Route optimasation based on multidimensional trust evaluation model in mobile ad hoc networks. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
55Muhammad Sarfraz 0001, Syed M. A. J. Rizvi An intelligent system for Online Signature Verification. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
55Topside E. Mathonsi Optimized handoff and secure roaming model for wireless networks. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
55Ar Kar Kyaw, Franco Sioquim, Justin Joseph Dictionary attack on Wordpress: Security and forensic analysis. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
55Michael Hopkins, Ali Dehghantanha Exploit Kits: The production line of the Cybercrime economy? Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
55Delwar Alam, Touhid Bhuiyan, Md. Alamgir Kabir, Tanjila Farah SQLi vulnerabilty in education sector websites of Bangladesh. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
55Kevin Hughes, Adrie Stander, Val A. Hooper eDiscovery in South Africa and the challenges it faces. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
55Ileen E. van Vuuren, Elmarie Kritzinger, Conrad Mueller Identifying gaps in IT retail Information Security policy implementation processes. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
55Kennedy Njenga, Sifiso Ndlovu Mobile banking and information security risks: Demand-side predilections of South African lead-users. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
52E. Eugene Schultz Non-infosec professionals in infosec? Search on Bibsonomy Comput. Secur. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
31Merv Matson, Mihaela Ulieru The 'how' and 'why' of persistent information security. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF avaliability, emergency response operations, information custodian, infosec, persistent information security, integrity, information security, confidentiality, digital rights management, DRM
31Errol A. Blake The management of access controls/biometrics in organizations. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF IT spending, access control policy (ACP), cyber risk insurance, information technology (IT) information security (InfoSec), system specific policy (SSP), authentication, trust, policy, risk management, systems, return on investment (ROI)
31Kenneth R. van Wyk, Gary McGraw Bridging the Gap between Software Development and Information Security. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF building security in, BSI, infosec, softdev
26Rebekah E. Austin The Interplay of InfoSec Mindfulness and Sanctions on Extra Role Security Behaviors: A Trait Activation Perspective. Search on Bibsonomy AMCIS The full citation details ... 2023 DBLP  BibTeX  RDF
26Andriana Magdalinou, Athena Kalokairinou, Flora Malamateniou, John Mantas SNA: The Optimal Nodes to Raise Nurses' Infosec Awareness. Search on Bibsonomy ICIMTH The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26Ethan M. Rudd, Mohammad Saidur Rahman 0002, Philip Tully Transformers for End-to-End InfoSec Tasks: A Feasibility Study. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
26Byron Marshall, Michael Curry, Robert E. Crossler, John Correia Machine Learning and Survey-based Predictors of InfoSec Non-Compliance. Search on Bibsonomy ACM Trans. Manag. Inf. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
26Leigh A. Mutchler, Amy J. Connolly How to Increase InfoSec Compliance by Matching the Messaging to the Right Users? Search on Bibsonomy AMCIS The full citation details ... 2022 DBLP  BibTeX  RDF
26Ethan M. Rudd, Mohammad Saidur Rahman 0002, Philip Tully Transformers for End-to-End InfoSec Tasks: A Feasibility Study. Search on Bibsonomy WoRMA@AsiaCCS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
26Yasir Gokce Commissioning Development to Externals: Addressing Infosec Risks Upfront. Search on Bibsonomy Int. J. Cyber Warf. Terror. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
26Rauli Kaksonen, Tommi Järvenpää, Jukka Pajukangas, Mihai Mahalean, Juha Röning 100 Popular Open-Source Infosec Tools. Search on Bibsonomy SEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
26Leigh A. Mutchler, Amy J. Connolly, Daniel Rush Marrying the Agile Framework with InfoSec Management Education. Search on Bibsonomy AMCIS The full citation details ... 2021 DBLP  BibTeX  RDF
26Dalal N. Alharthi Social Engineering Defense Mechanisms and InfoSec Policies: A Survey and Qualitative Analysis. Search on Bibsonomy 2021   RDF
26Michael Curry, Byron Marshall, John Correia, Robert E. Crossler InfoSec Process Action Model (IPAM): Targeting Insiders' Weak Password Behavior. Search on Bibsonomy J. Inf. Syst. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
26M. Mohamed Asan Basiri, Sandeep K. Shukla Formal Hardware Verification of InfoSec Primitives. Search on Bibsonomy ISVLSI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
26Michael Curry, Byron Marshall, Robert E. Crossler, John Correia InfoSec Process Action Model (IPAM): Systematically Addressing Individual Security Behavior. Search on Bibsonomy Data Base The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26Jorge Blasco, Elizabeth A. Quaglia InfoSec Cinema: Using Films for Information Security Teaching. Search on Bibsonomy ASE @ USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
26Jessica Stockett Dr. InfoSec: How to Teach Your Community to Stop Worrying and Love 2-Factor Authentication. Search on Bibsonomy SIGUCCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26Mark-David McLaughlin, Janis L. Gogan InfoSec Research in Prominent IS Journals: Findings and Implications for the CIO and Board of Directors. Search on Bibsonomy HICSS The full citation details ... 2017 DBLP  BibTeX  RDF
26Rita Heimes Global InfoSec and Breach Standards. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
26Eli Rohn, Gilad Sabari, Guy Leshem Explaining small business InfoSec posture using social theories. Search on Bibsonomy Inf. Comput. Secur. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
26Sarfraz Iqbal Design and Emergence of a Pedagogical Online InfoSec Laboratory as an Ensemble Artefact. Search on Bibsonomy J. Inf. Syst. Educ. The full citation details ... 2016 DBLP  BibTeX  RDF
26Bahareh Shojaie, Hannes Federrath, Iman Saberi Getting the Full Benefits of the ISO 27001 to Develop an ISMS based on Organisations’ InfoSec Culture. Search on Bibsonomy HAISA The full citation details ... 2016 DBLP  BibTeX  RDF
26Fredrik Karlsson 0001, Göran Goldkuhl, Karin Hedström Practice-Based Discourse Analysis of InfoSec Policies. Search on Bibsonomy SEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
26Jason Andress The basics of information security - understanding the fundamentals of InfoSec in theory and practice, Second edition. Search on Bibsonomy 2014   RDF
26Mark-David McLaughlin, Janis L. Gogan INFOSEC in a Basket, 2004-2013. Search on Bibsonomy AMCIS The full citation details ... 2014 DBLP  BibTeX  RDF
26Katina Michael The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice. Search on Bibsonomy Comput. Secur. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
26Tara Whalen, Carrie Gates Watching the watchers: "voluntary monitoring" of infosec employees. Search on Bibsonomy Inf. Manag. Comput. Secur. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
26Tara Whalen, Carrie Gates Watchdog or Guardian? Unpacking the Issues Surrounding the Monitoring of InfoSec Employees. Search on Bibsonomy HAISA The full citation details ... 2009 DBLP  BibTeX  RDF
26Nicholas J. Macias, Peter M. Athanas Architecturally-Enforced InfoSec in a General-Purpose Self-Configurable System. Search on Bibsonomy BLISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Anand Gupta, Deepank Gupta, Nidhi Gupta InfoSec-MobCop - Framework for Theft Detection and Data Security on Mobile Computing Devices. Search on Bibsonomy IC3 The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Camilo H. Viecco, L. Jean Camp A Life or Death InfoSec Subversion. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26E. Eugene Schultz What infosec changes are likely to result from the recent US election? Search on Bibsonomy Comput. Secur. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26E. Eugene Schultz Struggles in the academic side of infosec. Search on Bibsonomy Comput. Secur. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Erwin Louis Carrow InfoSec technology management of user space and services through security threat gateways. Search on Bibsonomy InfoSecCD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26E. Eugene Schultz Predicting the future of InfoSec. Search on Bibsonomy Comput. Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26E. Eugene Schultz Infosec certification: Which way do we turn from here? Search on Bibsonomy Comput. Secur. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Herbert J. Mattord, Michael E. Whitman INFOSEC Policy - The Foundation for an Effective Security Program. Search on Bibsonomy Encyclopedia of Information Science and Technology (III) The full citation details ... 2005 DBLP  BibTeX  RDF
26Stephen W. Neville Necessary conditions for determining a robust time threshold in standard INFOSEC alert clustering algorithms. Search on Bibsonomy SMC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Stephen Neville Are Deeper Levels of Risk Analysis a Requirement for Enabling Optimal Tactical Responses in INFOSEC Alert Correlation Systems? Search on Bibsonomy PST The full citation details ... 2005 DBLP  BibTeX  RDF
26Xinzhou Qin A Probabilistic-Based Framework for INFOSEC Alert Correlation. Search on Bibsonomy 2005   RDF
26Xinzhou Qin, Wenke Lee Discovering Novel Attack Strategies from INFOSEC Alerts. Search on Bibsonomy ESORICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Steven J. Greenwald, Kenneth G. Olthoff, Victor Raskin, Willibald Ruch The user non-acceptance paradigm: INFOSEC's dirty little secret. Search on Bibsonomy NSPW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26E. Eugene Schultz Why can't Microsoft stay out of the InfoSec headlines? Search on Bibsonomy Comput. Secur. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Xinzhou Qin, Wenke Lee Statistical Causality Analysis of INFOSEC Alert Data. Search on Bibsonomy RAID The full citation details ... 2003 DBLP  DOI  BibTeX  RDF attack scenario analysis, Intrusion detection, time series analysis, alert correlation
26Gerald L. Kovacich, Andy Jones What InfoSec professionals should know about information warfare tactics by terrorists. Search on Bibsonomy Comput. Secur. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
26Gerald L. Kovacich, Andy Jones What InfoSec Professionals Should Know About Information Warfare Tactics by Terrorists. Search on Bibsonomy Comput. Secur. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
26M. E. Kabay Time for industry to support academic INFOSEC. Search on Bibsonomy Ubiquity The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
26Gary McGraw, J. Gregory Morrisett Attacking Malicious Code: A Report to the Infosec Research Council. Search on Bibsonomy IEEE Softw. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
26Gunnar O. Klein Trusted Health Information Systems: A project within the DG XIII/INFOSEC programme on Electronic Signatures and Trusted Third Parties. Search on Bibsonomy Towards Security in Medical Telematics The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
26Charles Cresson Wood Writing infosec policies. Search on Bibsonomy Comput. Secur. The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
26Andrey P. Kurilo The Current State of INFOSEC Legislation. Search on Bibsonomy Security and Control of Information Technology in Society The full citation details ... 1993 DBLP  BibTeX  RDF
26Frank L. Mayer, William Curtis Barker, Theresa K. Haley, J. Noelle McAuliffe, Daniel F. Sterne, Lynne S. Vidmar Evaluation issues for an integrated 'INFOSEC' product. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
23Marianthi Theoharidou, Dimitris Gritzalis Common Body of Knowledge for Information Security. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Rose-Mharie Åhlfeldt, Paolo Spagnoletti, Guttorm Sindre Improving the Information Security Model by using TFI. Search on Bibsonomy SEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Michael E. Whitman, Herbert J. Mattord Developing the BS-ISA: lessons learned and future directions - sponsored by NSF grant # DUE-0516192. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF curriculum instruction, information assurance curriculum, information security curriculum, information security, curriculum development, information assurance
23Michael E. Whitman, Herbert J. Mattord Workshop on designing and teaching information security curriculum. Search on Bibsonomy ACM Southeast Regional Conference (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF information security curriculum development, information security, information security education
23Paul D. Williams, Kevin P. Anchor, John L. Bebo, Gregg H. Gunsch, Gary B. Lamont CDIS: Towards a Computer Immune System for Detecting Network Intrusions. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
23Rayford B. Vaughn Application of security tot he computing science classroom. Search on Bibsonomy SIGCSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
23Angelos P. Varvitsiotis, Despina Polemi, Andy Marsh EUROMED-JAVA: Trusted Third Party Services for Securing Medical Java Applets. Search on Bibsonomy ESORICS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Telemedical Applications, Trusted Third Party Services, EUROMED, EUROMED-ETS, Java, Web
Displaying result #1 - #91 of 91 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license