The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for insecurity with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1984-1999 (15) 2000-2003 (29) 2004-2005 (21) 2006-2007 (31) 2008 (16) 2009-2010 (24) 2011-2014 (24) 2015-2016 (28) 2017-2018 (24) 2019 (17) 2020 (18) 2021-2022 (33) 2023 (29) 2024 (9)
Publication types (Num. hits)
article(148) book(1) incollection(2) inproceedings(163) phdthesis(4)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 98 occurrences of 77 keywords

Results
Found 318 publication records. Showing 318 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
110Sanman Hu, Bin Zuo The Moderating Effect of Leader-member Exchange on the Job Insecurity-Organizational Commitment Relationship. Search on Bibsonomy I3E (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
79Zhiyao Liang, Rakesh M. Verma Correcting and Improving the NP Proof for Cryptographic Protocol Insecurity. Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF insecurity, Cryptographic protocols, secrecy, NP
65Sibylle B. Fröschle The Insecurity Problem: Tackling Unbounded Data. Search on Bibsonomy CSF The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
50Alessandro Armando, Luca Compagna, Yuliya Lierler Automatic Compilation of Protocol Insecurity Problems into Logic Programming. Search on Bibsonomy JELIA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
50Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani An NP Decision Procedure for Protocol Insecurity with XOR. Search on Bibsonomy LICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
50Alessandro Armando, Luca Compagna Automatic SAT-Compilation of Protocol Insecurity Problems via Reduction to Planning. Search on Bibsonomy FORTE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Verification, Network security
49Ang Cui, Yingbo Song, Pratap V. Prabhu, Salvatore J. Stolfo Brave New World: Pervasive Insecurity of Embedded Network Devices. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Router insecurity, network webcams, print servers, embedded device management interface exploitation, default password
35Eiichiro Fujisaki, Ryo Nishimaki, Keisuke Tanaka On the Insecurity of the Fiat-Shamir Signatures with Iterative Hash Functions. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Johann Barbier, Stéphanie Alt Practical Insecurity for Effective Steganalysis. Search on Bibsonomy Information Hiding The full citation details ... 2008 DBLP  DOI  BibTeX  RDF practical steganalysis, security models
35Olivier Pereira, Jean-Jacques Quisquater Generic Insecurity of Cliques-Type Authenticated Group Key Agreement Protocols. Search on Bibsonomy CSFW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
35Michaël Rusinowitch, Mathieu Turuani Protocol Insecurity with Finite Number of Sessions is NP-Complete. Search on Bibsonomy CSFW The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
30Raudzatul Fathiyah Mohd Said, Shuzlina Abdul Rahman, Sofianita Mutalib, Marina Yusoff, Azlinah Mohamed User Technology Readiness Measurement in Fingerprint Adoption at Higher Education Institution. Search on Bibsonomy ICCSA (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Fingerprint Technology, Technology Readiness Index Model, User Readiness, Biometric
30Sherman S. M. Chow, Duncan S. Wong Anonymous Identification and Designated-Verifiers Signatures from Insecure Batch Verification. Search on Bibsonomy EuroPKI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF ad hoc anonymous identification, strong de- signated verifier signatures, bilinear pairings, ring signatures, Identity-based, linkability
30Yannick Chevalier, Denis Lugiez, Michaël Rusinowitch Towards an Automatic Analysis of Web Service Security. Search on Bibsonomy FroCoS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF combination of decision procedures, Security, Web services, verification, cryptographic protocols, rewriting, equational theories
30Tomasz Truderung Regular Protocols and Attacks with Regular Knowledge. Search on Bibsonomy CADE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Alessandro Armando, Luca Compagna, Pierre Ganty SAT-Based Model-Checking of Security Protocols Using Planning Graph Analysis. Search on Bibsonomy FME The full citation details ... 2003 DBLP  DOI  BibTeX  RDF SAT encodings, security protocols, bounded model-checking, SAT-solvers
30Daniel E. Geer Jr., John Harthorne Penetration Testing: A Duet. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
29Rajasee S. Rege, Jennifer L. Allen, Eric P. Drewski, Robert S. Molnar The GroceryMate: eliciting community empathy and transforming it into purposeful action. Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2008 DBLP  DOI  BibTeX  RDF food insecurity, grocery shopping, hunger, persuasive technology, nutrition, homelessness
29Merv Matson, Mihaela Ulieru Persistent information security: beyond the e-commerce threat model. Search on Bibsonomy ICEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF document security, insecurity expense, persistent information security, risk remediation, digital rights management, DRM, threat model
19Walter Bossert, Conchita D'Ambrosio Relative measures of economic insecurity. Search on Bibsonomy Soc. Choice Welf. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Chanhyeok Park, Sangrae Cho, Young-Seob Cho, Soohyung Kim, Hyung Tae Lee Insecurity of Chait et al.'s RSA-Based Aggregate Signature Scheme. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19SangPil Yoon, Yanghon Chung, Seunghun Han, Chungwon Woo Do external risk factors increase or decrease country-level R&D efficiency: focused on air pollution and job insecurity? Search on Bibsonomy Technol. Anal. Strateg. Manag. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Thomas Debris-Alazard, Pouria Fallahpour, Damien Stehlé Quantum Oblivious LWE Sampling and Insecurity of Standard Model Lattice-Based SNARKs. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Jiang Wan, Chundong Zheng, Linlin Wang How and When Leader Job Insecurity Influences Engineer In-Role and Extra-Role Behaviors. Search on Bibsonomy IEEE Trans. Engineering Management The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Sela Navot Insecurity of MuSig and BN Multi-Signatures with Delayed Message Selection. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
19Julius Hermelink, Kai-Chun Ning, Emanuele Strieder The Insecurity of Masked Comparisons: SCAs on ML-KEM's FO-Transform. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
19Thomas Debris-Alazard, Pouria Fallahpour, Damien Stehlé Quantum Oblivious LWE Sampling and Insecurity of Standard Model Lattice-Based SNARKs. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
19Weiqiong Cao, Hua Chen 0011, Hongsong Shi, Haoyuan Li, Jian Wang, Jingyi Feng The Insecurity of SHA2 under the Differential Fault Characteristic of Boolean Functions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
19Yiwen Hu, Min-Yue Chen, Guan-Hua Tu, Chi-Yu Li 0001, Sihan Wang, Jingwen Shi, Tian Xie, Li Xiao 0001, Chunyi Peng 0001, Zhaowei Tan, Songwu Lu Unveiling the Insecurity of Operational Cellular Emergency Services (911): Vulnerabilities, Attacks, and Countermeasures. Search on Bibsonomy GetMobile Mob. Comput. Commun. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Uzma Noor, Sajeela Rabbani, Ghulam Dastgeer Impact of job insecurity during COVID-19 on green entrepreneurial intention of Pakistani entrepreneurs: a moderated mediation model. Search on Bibsonomy Kybernetes The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Kültigin Akçin The mediating effect of psychological resilience in the impact of increasing job insecurity with the pandemic, on organizational commitment and turnover intention. Search on Bibsonomy Kybernetes The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Enze Liu 0001, Sumanth Rao, Sam Havron, Grant Ho, Stefan Savage, Geoffrey M. Voelker, Damon McCoy No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps. Search on Bibsonomy Proc. Priv. Enhancing Technol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Uferah Shafi, Rafia Mumtaz, Zahid Anwar, Muhammad Muzyyab Ajmal, Muhammad Ajmal Khan, Zahid Mahmood, Maqsood Qamar, Hafiz Muhammad Jhanzab Tackling Food Insecurity Using Remote Sensing and Machine Learning-Based Crop Yield Prediction. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Yangzixing Lv, Wei Shi 0001, Weiyong Zhang, Hui Lu 0005, Zhihong Tian Do Not Trust the Clouds Easily: The Insecurity of Content Security Policy Based on Object Storage. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Andy Sharma Exploratory spatial analysis of food insecurity and diabetes: an application of multiscale geographically weighted regression. Search on Bibsonomy Ann. GIS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Elena Zaitseva, Tetiana Hovorushchenko, Olga Pavlova, Yurii Voichur Identifying the Mutual Correlations and Evaluating the Weights of Factors and Consequences of Mobile Application Insecurity. Search on Bibsonomy Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Yu-Han Lu, Sandy Hsin-Yu Hsiao, Chi-Yu Li 0001, Yi-Chen Hsieh, Po-Yi Chou, Yao-Yu Li, Tian Xie, Guan-Hua Tu Insecurity of Operational IMS Call Systems: Vulnerabilities, Attacks, and Countermeasures. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Bindu Chhabra, Pallavi Pandey Job insecurity as a barrier to thriving during COVID-19 pandemic: a moderated mediation model of knowledge hiding and benevolent leadership. Search on Bibsonomy J. Knowl. Manag. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Ramaswamy Ramanujam, Vaishnavi Sundararajan, S. P. Suresh Solving the insecurity problem for assertions. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Yongsu Ahn, Muheng Yan, Yu-Ru Lin, Zian Wang HungerGist: An Interpretable Predictive Model for Food Insecurity. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Naveed Saif, Muhammad Tahir Khan, Imrab Shaheen, Haji Rehman Knowledge toward employee's behaviour during job insecurity: evidence from four different sectors of developing country context. Search on Bibsonomy Int. J. Knowl. Learn. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Chao-Min Chiu, Chiew Mei Tan, Jack Shih-Chieh Hsu, Hsiang-Lan Cheng Employee deviance: the impacts of techno-insecurity and moral disengagement. Search on Bibsonomy Inf. Technol. People The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Piotr Zawadzki Insecurity of Quantum Blockchains Based on Entanglement in Time. Search on Bibsonomy Entropy The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Felix Schuckert, Basel Katt, Hanno Langweg Insecurity Refactoring: Automated Injection of Vulnerabilities in Source Code. Search on Bibsonomy Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Bob Frankston Trust and Insecurity. Search on Bibsonomy IEEE Consumer Electron. Mag. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Yahia Salim Melhem, Isra Ali Hamad BanyHani, Fatima Lahcen Yachou Aityassine, Abdullah Matar Al-Adamat, Main Naser Alolayyan, Sulieman Ibraheem Shelash Al-Hawary, Ayat Mohammad, Menahi Mosallam Alqahtani, Muhammad Turki Alshurideh The Impact of Job Insecurity on Employees Job Performance Among Employees Working at Save the Children in Jordan. Search on Bibsonomy The Effect of Information Technology on Business and Marketing Intelligence Systems The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Mario Yaksetig, Alexander Havlin Poster: Signer Discretion is Advised: On the Insecurity of Vitalik's Threshold Hash-based Signatures. Search on Bibsonomy CCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Toby Murray, Pengbo Yan, Gidon Ernst Compositional Vulnerability Detection with Insecurity Separation Logic. Search on Bibsonomy ICFEM The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Jade Preston, William Basener Predicting Food Insecurity in Africa From Modis Imagery, Demographics, Economic Factors, Climate, and Supply Chain Information. Search on Bibsonomy WHISPERS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Cristina Alcaraz Digital twins: Double Insecurity for Industrial Scenarios. Search on Bibsonomy CPSS@AsiaCCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Simon Rohlmann, Vladislav Mladenov, Christian Mainka, Daniel Hirschberger, Jörg Schwenk Every Signature is Broken: On the Insecurity of Microsoft Office's OOXML Signatures. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2023 DBLP  BibTeX  RDF
19Ken R. Duffy, Muriel Médard Soft Detection Physical Layer Insecurity. Search on Bibsonomy GLOBECOM The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Brett A. Halperin, Gary Hsieh, Erin McElroy, James Pierce 0001, Daniela K. Rosner Probing a Community-Based Conversational Storytelling Agent to Document Digital Stories of Housing Insecurity. Search on Bibsonomy CHI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Yongsu Ahn, Muheng Yan, Yu-Ru Lin, Zian Wang HungerGist: An Interpretable Predictive Model for Food Insecurity. Search on Bibsonomy IEEE Big Data The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Puti F. Larasati, R. M. Chandima Ratnayake, Nur Budi Mulyono Risk Assessment of Agri-food Supply Chain to Minimise Food Insecurity in Developing Economies: A Case Study of Poultry Chain in Indonesia. Search on Bibsonomy IEEM The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Rahul Bhattacharyya, Nishit Raj, Siddharta Mukherjee, Prasasti Choudhury, Rajat Gaur Responsible AI for Sustainable Agriculture: Forecasting Rice Yield to Combat Global Food Insecurity. Search on Bibsonomy ICCCNT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Muriel Médard, Ken R. Duffy Physical layer insecurity. Search on Bibsonomy CISS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Martijn Jungst Effect of Technological Insecurity on Performance Through Emotional Exhaustion: A Moderated Mediation Approach. Search on Bibsonomy Int. J. Technol. Hum. Interact. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Reem Talhouk, Kyle Montague, Hala Ghattas, Vera Araújo-Soares, Balsam Ahmad, Madeline Balaam Refugee Food Insecurity & Technology: Surfacing Experiences of Adaptation, Navigation, Negotiation and Sharing. Search on Bibsonomy Comput. Support. Cooperative Work. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Zhengjun Cao, Lihua Liu A Note on the Insecurity of Cryptosystems Based on Chebyshev Polynomials. Search on Bibsonomy Int. J. Bifurc. Chaos The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Wenying Xu, Zidong Wang, Liang Hu 0002, Jürgen Kurths State Estimation Under Joint False Data Injection Attacks: Dealing With Constraints and Insecurity. Search on Bibsonomy IEEE Trans. Autom. Control. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Muriel Médard, Ken R. Duffy Physical layer insecurity. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Robert Salzmann, Nilanjana Datta Total insecurity of communication via strong converse for quantum privacy amplification. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  BibTeX  RDF
19Ramaswamy Ramanujam, Vaishnavi Sundararajan, S. P. Suresh Protocol Insecurity with Assertions. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  BibTeX  RDF
19Sean Peisert Unsafe at Any Clock Speed: The Insecurity of Computer System Design, Implementation, and Operation. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Elisa Bertino The Persistent Problem of Software Insecurity. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Alex Lombardi, Ethan Mook, Willy Quach, Daniel Wichs Post-Quantum Insecurity from LWE. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
19Oxana Krutova, Tuuli Turja, Pertti Koistinen, Harri Melin, Tuomo Särkikoski Job insecurity and technology acceptance: an asymmetric dependence. Search on Bibsonomy J. Inf. Commun. Ethics Soc. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Chiara Ghislieri, Valentina Dolce, Domenico Sanseverino, Sophie Wodociag, Anne-Marie Vonthron, Émilie Vayre, Giunchi Marianna, Monica Molino Might insecurity and use of ICT enhance internet addiction and exhaust people? A study in two European countries during emergency remote working. Search on Bibsonomy Comput. Hum. Behav. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Luu Trong Tuan Employee mindfulness and proactive coping for technostress in the COVID-19 outbreak: The roles of regulatory foci, technostress, and job insecurity. Search on Bibsonomy Comput. Hum. Behav. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Jinghao Zhao, Qianru Li, Zengwen Yuan, Zhehui Zhang, Songwu Lu 5G Messaging: System Insecurity and Defenses. Search on Bibsonomy CNS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Alex Lombardi, Ethan Mook, Willy Quach, Daniel Wichs Post-quantum Insecurity from LWE. Search on Bibsonomy TCC (1) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Brian Krupp, Julia Gersey, Franklin Lebo Campus plate: connecting students on college campuses to reduce food waste and food insecurity. Search on Bibsonomy RACS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Andrea Rodrigo, Silvia Reyes, Mariana González Processing the Discourse of Insecurity in Rosario with the NooJ Platform. Search on Bibsonomy NooJ The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Daniele Antonioli, Mathias Payer On the Insecurity of Vehicles Against Protocol-Level Bluetooth Threats. Search on Bibsonomy SP (Workshops) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Marton Bognar, Jo Van Bulck, Frank Piessens Mind the Gap: Studying the Insecurity of Provably Secure Embedded Trusted Execution Architectures. Search on Bibsonomy SP The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Brian Krupp, Franklin Lebo Note: Campus Plate: Reducing Food Waste and Food Insecurity on College Campuses using Smartphones. Search on Bibsonomy COMPASS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Xu An Wang 0001, Xiaozhong Pan, Lixian Wei, Yize Zhao On the Insecurity of a Certificateless Public Verification Protocol for the Outsourced Data Integrity in Cloud Storage. Search on Bibsonomy EIDWT The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Jeffrey M. Voas, Nir Kshetri, Joanna F. DeFranco Scarcity and Global Insecurity: The Semiconductor Shortage. Search on Bibsonomy IT Prof. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Giovanni Schmid Thirty Years of DNS Insecurity: Current Issues and Perspectives. Search on Bibsonomy IEEE Commun. Surv. Tutorials The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Donald Ene, Osagie Nosa Favour Analysing GSM Insecurity. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
19Ananth Balashankar, Lakshminarayanan Subramanian, Samuel P. Fraiberger Fine-grained prediction of food insecurity using news streams. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
19Toby Murray, Pengbo Yan, Gidon Ernst Incremental Vulnerability Detection via Back-Propagating Symbolic Execution of Insecurity Separation Logic. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
19Shuwen Deng, Wenjie Xiong 0001, Jakub Szefer Understanding the Insecurity of Processor Caches Due to Cache Timing-Based Vulnerabilities. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Swades Pal, Sandipta Debanshi Developing wetland landscape insecurity and hydrological security models and measuring their spatial linkages. Search on Bibsonomy Ecol. Informatics The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Swades Pal, Satyajit Paul Linking hydrological security and landscape insecurity in the moribund deltaic wetland of India using tree-based hybrid ensemble method in python. Search on Bibsonomy Ecol. Informatics The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Chao-Min Chiu, Hsiang-Lan Cheng, Chiew Mei Tan Challenge vs. Threat: The Effects of Cognitive Appraisal of Job Insecurity on IT Employees' Emotions, Strain and Presenteeism. Search on Bibsonomy PACIS The full citation details ... 2021 DBLP  BibTeX  RDF
19Sihan Wang, Guan-Hua Tu, Xinyu Lei, Tian Xie, Chi-Yu Li 0001, Po-Yi Chou, Fu-Cheng Hsieh, Yiwen Hu, Li Xiao 0001, Chunyi Peng 0001 Insecurity of operational cellular IoT service: new vulnerabilities, attacks, and countermeasures. Search on Bibsonomy MobiCom The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Zeyu Lei, Yuhong Nan, Yanick Fratantonio, Antonio Bianchi On the Insecurity of SMS One-Time Password Messages against Local Attackers in Modern Mobile Devices. Search on Bibsonomy NDSS The full citation details ... 2021 DBLP  BibTeX  RDF
19Ruiyu Zhu, Yan Huang 0001 Hash-Enabled Garbling and the Insecurity of Free-Hashing Garbled Circuits. Search on Bibsonomy AsiaCCS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Or Sattath On the insecurity of quantum Bitcoin mining. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Reem Talhouk, Lizzie Coles-Kemp, Rikke Bjerg Jensen, Madeline Balaam, Andrew Garbett, Hala Ghattas, Vera Araújo-Soares, Balsam Ahmad, Kyle Montague Food Aid Technology: The Experience of a Syrian Refugee Community in Coping with Food Insecurity. Search on Bibsonomy Proc. ACM Hum. Comput. Interact. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Christian A. Gregory Are We Underestimating Food Insecurity? Partial Identification with a Bayesian 4-Parameter IRT Model. Search on Bibsonomy J. Classif. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Andrew Lukyamuzi, John Ngubiri, Washington Okori Towards Ensemble Learning for Tracking Food Insecurity From News Articles. Search on Bibsonomy Int. J. Syst. Dyn. Appl. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Toby Murray An Under-Approximate Relational Logic: Heralding Logics of Insecurity, Incorrect Implementation & More. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
19Philipp Jeitner, Haya Schulmann, Michael Waidner The Impact of DNS Insecurity on Time. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
19Muhammad Usama, Junaid Qadir 0001, Ala I. Al-Fuqaha, Mounir Hamdi The Adversarial Machine Learning Conundrum: Can the Insecurity of ML Become the Achilles' Heel of Cognitive Networks? Search on Bibsonomy IEEE Netw. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Antonio Mangino, Morteza Safaei Pour, Elias Bou-Harb Internet-scale Insecurity of Consumer Internet of Things: An Empirical Measurements Perspective. Search on Bibsonomy ACM Trans. Manag. Inf. Syst. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Hyung Tae Lee, San Ling, Jae Hong Seo, Huaxiong Wang Insecurity of the Public Key Encryption with Filtered Equality Test Proposed by Huang et al. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
19Tim M. Goetz, Stephan A. Boehm Am I outdated? The role of strengths use support and friendship opportunities for coping with technological insecurity. Search on Bibsonomy Comput. Hum. Behav. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 318 (100 per page; Change: )
Pages: [1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license