|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 43 occurrences of 41 keywords
|
|
|
Results
Found 93 publication records. Showing 93 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
66 | Burcu Bulgurcu, Hasan Cavusoglu, Izak Benbasat |
Effects of Individual and Organization Based Beliefs and the Moderating Role of Work Experience on Insiders' Good Security Behaviors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (3) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 476-481, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Elinor M. Madigan, Corey Petrulich, Kelly Motuk |
The cost of non-compliance: when policies fail. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 32nd Annual ACM SIGUCCS Conference on User Services 2004, Baltimore, MD, USA, October 10-13, 2004, pp. 47-51, 2004, ACM, 1-58113-869-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
administrative staff, network policy, network, network security, tools, malware, viruses, backup |
46 | Carlos Müller, Manuel Resinas, Antonio Ruiz Cortés |
Explaining the Non-compliance between Templates and Agreement Offers in WS-Agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSOC/ServiceWave ![In: Service-Oriented Computing, 7th International Joint Conference, ICSOC-ServiceWave 2009, Stockholm, Sweden, November 24-27, 2009. Proceedings, pp. 237-252, 2009, 978-3-642-10382-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Quality of Service, Debugging, Service Level Agreement, SLA, Explanations, WS-Agreement, Compliance Checking |
44 | Ivar Jacobson |
Enough of RE Processes- Let's Do Practices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RE ![In: 15th IEEE International Requirements Engineering Conference, RE 2007, October 15-19th, 2007, New Delhi, India, 2007, IEEE Computer Society, 0-7695-2935-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Paul N. Otto, Annie I. Antón |
Addressing Legal Requirements in Requirements Engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RE ![In: 15th IEEE International Requirements Engineering Conference, RE 2007, October 15-19th, 2007, New Delhi, India, pp. 5-14, 2007, IEEE Computer Society, 0-7695-2935-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
37 | Ruopeng Lu, Shazia Wasim Sadiq, Guido Governatori |
Compliance Aware Business Process Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Business Process Management Workshops ![In: Business Process Management Workshops, BPM 2007 International Workshops, BPI, BPD, CBP, ProHealth, RefMod, semantics4ws, Brisbane, Australia, September 24, 2007, Revised Selected Papers, pp. 120-131, 2007, Springer, 978-3-540-78237-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Process Compliance Control, Business Process Modeling, Business Process Design |
30 | Panuchart Bunyakiati, Anthony Finkelstein, David S. Rosenblum |
The Certification of Software Tools with respect to Software Standards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IRI ![In: Proceedings of the IEEE International Conference on Information Reuse and Integration, IRI 2007, 13-15 August 2007, Las Vegas, Nevada, USA, pp. 724-729, 2007, IEEE Systems, Man, and Cybernetics Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Ahmad-Reza Sadeghi, Marcel Selhorst, Christian Stüble, Christian Wachsmann, Marcel Winandy |
TCG inside?: a note on TPM specification compliance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, STC 2006, Alexandria, VA, USA, November 3, 2006, pp. 47-56, 2006, ACM, 1-59593-548-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
test, trusted computing, compliance, TPM |
25 | Mandeep Saran, Pavol Zavarsky |
A Study of the Methods for Improving Internet Usage Policy Compliance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (3) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 371-378, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Yurdaer N. Doganata, Francisco Curbera |
Effect of Using Automated Auditing Tools on Detecting Compliance Failures in Unmanaged Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BPM ![In: Business Process Management, 7th International Conference, BPM 2009, Ulm, Germany, September 8-10, 2009. Proceedings, pp. 310-326, 2009, Springer, 978-3-642-03847-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Topics covered BPM Governance and Compliance, Management Issues and Empirical Studies, Non-traditional BPM Scenarios |
24 | Robert M. Davison, Louie H. M. Wong, Steven Alter, Carol Ou |
Adopted Globally but unusable Locally: What Workarounds Reveal about Adoption, Resistance, Compliance and non-Compliance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECIS ![In: 27th European Conference on Information Systems - Information Systems for a Sharing Society, ECIS 2019, Stockholm and Uppsala, Sweden, June 8-14, 2019, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
24 | Ella Kolkowska, Fredrik Karlsson 0001, Karin Hedström |
Towards analysing the rationale of information security non-compliance: Devising a Value-Based Compliance analysis method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Strateg. Inf. Syst. ![In: J. Strateg. Inf. Syst. 26(1), pp. 39-57, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Jirí Vokrínek, Jirí Bíba, Jirí Hodík, Jaromír Vybíhal, Michal Pechoucek |
Competitive Contract Net Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOFSEM (1) ![In: SOFSEM 2007: Theory and Practice of Computer Science, 33rd Conference on Current Trends in Theory and Practice of Computer Science, Harrachov, Czech Republic, January 20-26, 2007, Proceedings, pp. 656-668, 2007, Springer, 978-3-540-69506-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Silvana Quaglini, Carla Rognoni, Anna Cavallini, Giuseppe Micieli |
Evaluating the Impact of Clinical Practice Guidelines on Stroke Outcomes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIME ![In: Artificial Intelligence Medicine, 8th Conference on AI in Medicine in Europe, AIME 2001, Cascais, Portugal, July 1-4, 2001, Proceedings, pp. 442-452, 2001, Springer, 3-540-42294-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
21 | Giada Maggenti |
LET_ME: An Electronic Device to Help Elderly People with Their Home Medications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOST ![In: Ambient Assistive Health and Wellness Management in the Heart of the City, 7th International Conference on Smart Homes and Health Telematics, ICOST 2009, Tours, France, July 1-3, 2009. Proceedings, pp. 278-281, 2009, Springer, 978-3-642-02867-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Therapy errors, administration errors, non-compliance, home therapy, elderly people, medication errors |
21 | Peter Goldschmidt |
Managing the false alarms: A framework for assurance and verification of surveillance monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Frontiers ![In: Inf. Syst. Frontiers 9(5), pp. 541-556, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Primary monitoring systems (PMS), Second tier monitoring, Simple environments, Suspected non-compliance event (SNCE), False positive management, Complex environments |
18 | Silvia Panzarasa, Silvana Quaglini, Anna Cavallini, Simona Marcheselli, Mario Stefanelli, Giuseppe Micieli |
Computerised Guidelines Implementation: Obtaining Feedback for Revision of Guidelines, Clinical Data Model and Data Flow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIME ![In: Artificial Intelligence in Medicine, 11th Conference on Artificial Intelligence in Medicine, AIME 2007, Amsterdam, The Netherlands, July 7-11, 2007, Proceedings, pp. 461-466, 2007, Springer, 978-3-540-73598-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Zoran Milosevic, Audun Jøsang, Theodosis Dimitrakos, Mary Anne Patton |
Discretionary Enforcement of Electronic Contracts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDOC ![In: 6th International Enterprise Distributed Object Computing Conference (EDOC 2002), 17-20 September 2002, Lausanne, Switzerland, Proceedings, pp. 39-50, 2002, IEEE Computer Society, 0-7695-1742-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
17 | Charbel El Hachem |
Automation of quality control and reduction of non-compliance using machine learning techniques at Faurecia Clean Mobility. (Automatisation du contrôle qualité et réduction des non conformités en utilisant des techniques de machine learning chez Faurecia Clean Mobility). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2022 |
RDF |
|
17 | Élise Bigeard, Natalia Grabar |
Détecter la non-adhérence médicamenteuse dans les forums de discussion avec les méthodes de recherche d'information (Detect drug non-compliance in Internet fora using Information Retrieval methods ). ![Search on Bibsonomy](Pics/bibsonomy.png) |
PFIA (Articles courts) ![In: Actes de la Conférence sur le Traitement Automatique des Langues Naturelles (TALN) PFIA 2019. Volume II : Articles courts, Toulouse, France, 2019, pp. 245-254, 2019, ATALA. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
15 | Salima Benbernou, Hassina Meziane, Mohand-Said Hacid |
Run-Time Monitoring for Privacy-Agreement Compliance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSOC ![In: Service-Oriented Computing - ICSOC 2007, Fifth International Conference, Vienna, Austria, September 17-20, 2007, Proceedings, pp. 353-364, 2007, Springer, 978-3-540-74973-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Stefan Sackmann |
Personalization and Privacy in Ubiquitous Computing - Resolving the Conflict by Legally Binding Commitments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CEC/EEE ![In: 9th IEEE International Conference on E-Commerce Technology (CEC 2007) / 4th IEEE International Conference on Enterprise Computing, E-Commerce and E-Services (EEE 2007), 23-26 July 2007, National Center of Sciences, Tokyo, Japan, pp. 447-450, 2007, IEEE Computer Society, 0-7695-2913-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Silvana Quaglini, Silvia Panzarasa, Anna Cavallini, Giuseppe Micieli, Corrado Pernice, Mario Stefanelli |
Smooth Integration of Decision Support into an Existing Electronic Patient Record. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIME ![In: Artificial Intelligence in Medicine, 10th Conference on Artificial Intelligence in Medicine, AIME 2005, Aberdeen, UK, July 23-27, 2005, Proceedings, pp. 89-93, 2005, Springer, 3-540-27831-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
15 | Gregory L. Orgill, Gordon W. Romney, Michael G. Bailey, Paul M. Orgill |
The urgency for effective user privacy-education to counter social engineering attacks on secure computer systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGITE Conference ![In: Proceedings of the 5th Conference on Information Technology Education, SIGITE 2004, 2004, Salt Lake City, UT, USA, October 28-30, 2004, pp. 177-181, 2004, ACM, 1-58113-936-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
user education, access control, social engineering, physical security |
15 | Marina Krol, D. Nelkin-Warantz, A. Auville |
Database-Controlled Document Management System for the Mt. Sinai Independent Practice Association. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CBMS ![In: 16th IEEE Symposium on Computer-Based Medical Systems (CBMS 2003), 26-27 June 2003, New York, NY, USA, pp. 225-, 2003, IEEE Computer Society, 0-7695-1901-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
15 | Janice Singer, Norman G. Vinson |
Empirical Software Engineering Research Ethics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE METRICS ![In: 6th IEEE International Software Metrics Symposium (METRICS 1999), 4-6 November 1999, Boca Raton, FL, USA, pp. 326, 1999, IEEE Computer Society, 0-7695-0403-5. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
14 | Timon Mertens |
IT-Schnittstellen als Einfallstor datenschutzrechtlicher Non-Compliance - Grundlagen und Beispiele für die Auswahl technischer und organisatorischer Maßnahmen beim Einsatz von IT-Schnittstellen. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. und Recht ![In: Comput. und Recht 40(2), pp. 96-102, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Denekew Tenaw Anley, Temesgen Yihunie Akalu, Anteneh Mengist Dessie, Rahel Mulatie Anteneh, Melkamu Aderajew Zemene, Wubet Alebachew Bayih, Yenealem Solomon, Natnael Atnafu Gebeyehu, Gizachew Ambaw Kassie, Misganaw Asmamaw Mengstie, Endeshaw Chekol Abebe, Mohammed Abdu Seid, Molalegn Mesele Gesese, Natnael Moges, Berihun Bantie, Sefineh Fenta Feleke, Tadesse Asmamaw Dejenie, Getachew Asmare Adella, Achenef Asmamaw Muche |
Prognostication of treatment non-compliance among patients with multidrug-resistant tuberculosis in the course of their follow-up: a logistic regression-based machine learning algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Frontiers Digit. Health ![In: Frontiers Digit. Health 5, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
14 | Yu Tang, Li Jin, Kaan Ozbay |
How Does Driver Non-compliance Destroy Traffic Routing Control? ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2304.00248, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
14 | Akshay Aggarwal, Ram Kumar Dhurkari |
Association between stress and information security policy non-compliance behavior: A meta-analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 124, pp. 102991, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
14 | Christine T. Chang, Matthew B. Luebbers, Mitchell Hebert, Bradley Hayes |
Human Non-Compliance with Robot Spatial Ownership Communicated via Augmented Reality: Implications for Human-Robot Teaming Safety. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICRA ![In: IEEE International Conference on Robotics and Automation, ICRA 2023, London, UK, May 29 - June 2, 2023, pp. 9785-9792, 2023, IEEE, 979-8-3503-2365-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
14 | Yu Tang, Li Jin, Kaan Ozbay |
How Does Driver Non-Compliance Destroy Traffic Routing Control? ![Search on Bibsonomy](Pics/bibsonomy.png) |
CDC ![In: 62nd IEEE Conference on Decision and Control, CDC 2023, Singapore, December 13-15, 2023, pp. 1118-1123, 2023, IEEE, 979-8-3503-0124-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
14 | Yue Xiao, Zhengyi Li, Yue Qin, Xiaolong Bai, Jiale Guan, Xiaojing Liao, Luyi Xing |
Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy Labels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, pp. 1091-1108, 2023, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
14 | Yuta Kawakami, Ryusei Shingaki, Manabu Kuroki |
Identification and Estimation of the Probabilities of Potential Outcome Types Using Covariate Information in Studies with Non-compliance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI ![In: Thirty-Seventh AAAI Conference on Artificial Intelligence, AAAI 2023, Thirty-Fifth Conference on Innovative Applications of Artificial Intelligence, IAAI 2023, Thirteenth Symposium on Educational Advances in Artificial Intelligence, EAAI 2023, Washington, DC, USA, February 7-14, 2023, pp. 12234-12242, 2023, AAAI Press, 978-1-57735-880-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
14 | Ye Cai, Na Liu 0005, Robin Huang, Kamal Sud, Jinman Kim |
Predicting Remote Monitoring Patients' Non-compliance Behavior Through App-mediated Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 56th Hawaii International Conference on System Sciences, HICSS 2023, Maui, Hawaii, USA, January 3-6, 2023, pp. 3101-3110, 2023, ScholarSpace, 978-0-9981331-6-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
14 | Yue Xiao, Zhengyi Li, Yue Qin, Xiaolong Bai, Jiale Guan, Xiaojing Liao, Luyi Xing |
Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy Labels at Scale. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2206.06274, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
14 | Rima El-Khatib, Henri Barki |
How different rewards tend to influence employee non-compliance with information security policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Comput. Secur. ![In: Inf. Comput. Secur. 30(1), pp. 97-116, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
14 | Byron Marshall, Michael Curry, Robert E. Crossler, John Correia |
Machine Learning and Survey-based Predictors of InfoSec Non-Compliance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Manag. Inf. Syst. ![In: ACM Trans. Manag. Inf. Syst. 13(2), pp. 13:1-13:20, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
14 | Alexander J. McLeod Jr., Diane Dolezel |
Information security policy non-compliance: Can capitulation theory explain user behaviors? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 112, pp. 102526, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
14 | Pablo Becker, Luis Olsina, María Fernanda Papa |
Approach to Improving Java Source Code Considering Non-compliance with a Java Style Guide. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CACIC ![In: Computer Science - CACIC 2022 - 28th Argentine Congress, CACIC 2022, La Rioja, Argentina, October 3-6, 2022, Revised Selected Papers, pp. 123-139, 2022, Springer, 978-3-031-34146-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
14 | Sebastian Hengstler, Robert C. Nickerson, Simon Trang 0001 |
Towards a Taxonomy of Information Security Policy Non-Compliance Behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 55th Hawaii International Conference on System Sciences, HICSS 2022, Virtual Event / Maui, Hawaii, USA, January 4-7, 2022, pp. 1-10, 2022, ScholarSpace. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
14 | Jan Higgins, Robert D. Steiner |
Author preprint behaviour and non-compliance with journal preprint policies: One biomedical journal's experience. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Learn. Publ. ![In: Learn. Publ. 34(3), pp. 389-395, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
14 | Mitch Brown, Steven G. Young, Donald F. Sacco |
Competing motives in a pandemic: Interplays between fundamental social motives and technology use in predicting (Non)Compliance with social distancing guidelines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Hum. Behav. ![In: Comput. Hum. Behav. 123, pp. 106892, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
14 | Jacques Ophoff, Karen Renaud |
Revealing the Cyber Security Non-Compliance "Attribution Gulf". ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 54th Hawaii International Conference on System Sciences, HICSS 2021, Kauai, Hawaii, USA, January 5, 2021, pp. 1-10, 2021, ScholarSpace. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
14 | Rima El-Khatib, Henri Barki |
An activity theory approach to information security non-compliance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Comput. Secur. ![In: Inf. Comput. Secur. 28(4), pp. 485-501, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Robert M. Davison, Louie H. M. Wong, Carol Ou, Mahendrawathi ER, Xiayu Chen, Ina Kayser, Pattarawan Prasarnphanich |
Beneficial Non-Compliance with Inadequate Information Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: Proceedings of the 41st International Conference on Information Systems, ICIS 2020, Making Digital Inclusive: Blending the Locak and the Global, Hyderabad, India, December 13-16, 2020, 2020, Association for Information Systems, 978-1-7336325-5-3. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
14 | Kuo-Chung Chang, Yoke May Seow |
Protective Measures and Security Policy Non-Compliance Intention: IT Vision Conflict as a Moderator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Organ. End User Comput. ![In: J. Organ. End User Comput. 31(1), pp. 1-21, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
14 | Sam Bigeard, Frantz Thiessard, Natalia Grabar |
Detection and Analysis of Drug Non-compliance in Internet Fora Using Information Retrieval Approaches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICLing (1) ![In: Computational Linguistics and Intelligent Text Processing - 20th International Conference, CICLing 2019, La Rochelle, France, April 7-13, 2019, Revised Selected Papers, Part I, pp. 143-154, 2019, Springer, 978-3-031-24336-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
14 | Élise Bigeard, Frantz Thiessard, Natalia Grabar |
Detecting Drug Non-Compliance in Internet Fora Using Information Retrieval and Machine Learning Approaches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MedInfo ![In: MEDINFO 2019: Health and Wellbeing e-Networks for All - Proceedings of the 17th World Congress on Medical and Health Informatics, Lyon, France, 25-30 August 2019., pp. 30-34, 2019, IOS Press, 978-1-64368-002-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
14 | Carl Im, Erik Hemberg |
On the use of context sensitive grammars in grammatical evolution for legal non-compliance detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO (Companion) ![In: Proceedings of the Genetic and Evolutionary Computation Conference Companion, GECCO 2019, Prague, Czech Republic, July 13-17, 2019., pp. 371-372, 2019, ACM, 978-1-4503-6748-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
14 | Joakim Berndtsson, Peter Johansson, Martin Karlsson |
Value conflicts and non-compliance: Attitudes to whistleblowing in Swedish organisations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Comput. Secur. ![In: Inf. Comput. Secur. 26(2), pp. 246-258, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
14 | Krissada Rongrat, Twittie Senivongse |
Assessing Risk of Security Non-compliance of Banking Security Requirements Based on Attack Patterns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Networked Distributed Comput. ![In: Int. J. Networked Distributed Comput. 6(1), pp. 1-10, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
14 | Fabrizio Maria Maggi, Andrea Marrella, Giuseppe Capezzuto, Abel Armas-Cervantes |
Explaining Non-compliance of Business Process Models Through Automated Planning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSOC ![In: Service-Oriented Computing - 16th International Conference, ICSOC 2018, Hangzhou, China, November 12-15, 2018, Proceedings, pp. 181-197, 2018, Springer, 978-3-030-03595-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
14 | Zhengchuan Xu, Qing Hu 0003 |
The Role of Rational Calculus in Controlling Individual Propensity toward Information Security Policy Non-Compliance Behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 51st Hawaii International Conference on System Sciences, HICSS 2018, Hilton Waikoloa Village, Hawaii, USA, January 3-6, 2018, pp. 1-10, 2018, ScholarSpace / AIS Electronic Library (AISeL). The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
14 | Nguyen Thi Loan, Nguyen Viet Hong Anh, Pham Phu Quoc |
Detecting Corporate Income Tax Non-compliance from Financial Statements: A Case Study of Vietnam. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECONVN ![In: Econometrics for Financial Applications, ECONVN 2018, International Econometric Conference of Vietnam, Ho Chi Minh, Vietnam, 15-16 January, 2018, pp. 656-672, 2018, Springer, 978-3-319-73149-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
14 | Alok Patel, Abhinay Puvvala, Veerendra K. Rai |
SLA Non-compliance Detection and Prevention in Batch Jobs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEIS (1) ![In: Proceedings of the 20th International Conference on Enterprise Information Systems, ICEIS 2018, Funchal, Madeira, Portugal, March 21-24, 2018, Volume 1., pp. 397-406, 2018, SciTePress, 978-989-758-298-1. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
14 | Inho Hwang, Daejin Kim, Taeha Kim, Sanghyun Kim |
Why not comply with information security? An empirical approach for the causes of non-compliance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Online Inf. Rev. ![In: Online Inf. Rev. 41(1), pp. 2-18, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
14 | Stefan Bauer, Edward W. N. Bernroider, Katharina Chudzikowski |
Prevention is better than cure! Designing information security awareness programs to overcome users' non-compliance with information security policies in banks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 68, pp. 145-159, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
14 | Chun-Miin Jimmy Chen |
Efficiency of non-compliance chargeback mechanisms in retail supply chains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WSC ![In: 2017 Winter Simulation Conference, WSC 2017, Las Vegas, NV, USA, December 3-6, 2017, pp. 3404-3415, 2017, IEEE, 978-1-5386-3428-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
14 | Wei-Chian Tan, I-Ming Chen, Hoon Kiang Tan |
Multiple binary classifiers to analyse decision of non-compliance: For automated evaluation of piping layout. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CASE ![In: 13th IEEE Conference on Automation Science and Engineering, CASE 2017, Xi'an, China, August 20-23, 2017, pp. 80-85, 2017, IEEE, 978-1-5090-6781-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
14 | Jacob B. Rosen, Erik Hemberg, Una-May O'Reilly |
Dynamics of Adversarial Co-evolution in Tax Non-Compliance Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO (Companion) ![In: Genetic and Evolutionary Computation Conference, GECCO 2016, Denver, CO, USA, July 20-24, 2016, Companion Material Proceedings, pp. 1087-1094, 2016, ACM, 978-1-4503-4323-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
14 | Kwasi Dankwa, Keiichi Nakata |
Making Sense of Non-compliance: A Semiotic Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISO ![In: Socially Aware Organisations and Technologies. Impact and Challenges - 17th IFIP WG 8.1 International Conference on Informatics and Semiotics in Organisations, ICISO 2016, Campinas, Brazil, August 1-3, 2016, Proceedings, pp. 97-106, 2016, Springer, 978-3-319-42101-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
14 | Erik Hemberg, Jacob B. Rosen, Geoff Warner, Sanith Wijesinghe, Una-May O'Reilly |
Tax non-compliance detection using co-evolution of tax evasion risk and audit likelihood. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAIL ![In: Proceedings of the 15th International Conference on Artificial Intelligence and Law, ICAIL 2015, San Diego, CA, USA, June 8-12, 2015, pp. 79-88, 2015, ACM, 978-1-4503-3522-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
14 | Sagar Sunkle, Deepali Kholkar, Vinay Kulkarni |
Explanation of Proofs of Regulatory (Non-)Compliance Using Semantic Vocabularies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RuleML ![In: Rule Technologies: Foundations, Tools, and Applications - 9th International Symposium, RuleML 2015, Berlin, Germany, August 2-5, 2015, Proceedings, pp. 388-403, 2015, Springer, 978-3-319-21541-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
14 | Charles S. Tapiero |
Financial regulation, non-compliance risks and control: A statistical approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Risk Decis. Anal. ![In: Risk Decis. Anal. 5(2-3), pp. 113-127, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
14 | Ban Kawas, Marco Laumanns, Eleni Pratsini |
A robust optimization approach to enhancing reliability in production planning under non-compliance risks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OR Spectr. ![In: OR Spectr. 35(4), pp. 835-865, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
14 | Karin Hedström, Fredrik Karlsson 0001, Ella Kolkowska |
Social action theory for understanding information security non-compliance in hospitals: The importance of user rationale. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Manag. Comput. Secur. ![In: Inf. Manag. Comput. Secur. 21(4), pp. 266-287, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
14 | Darli A. A. Mello, Rafael B. Lourenco |
New analytical method to compute availability non-compliance risks for lambda services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OFC/NFOEC ![In: 2013 Optical Fiber Communication Conference and Exposition and the National Fiber Optic Engineers Conference (OFC/NFOEC), Anaheim, CA, USA, March 17-21, 2013, pp. 1-3, 2013, IEEE, 978-1-4799-0457-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
14 | A. J. Gilbert Silvius, Taco Dols |
Factors influencing Non-Compliance behavior towards Information Security Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CONF-IRM ![In: CONF-IRM 2012, The International Conference on Information Resources Management: Information Systems and Accountability in a Digital World, Vienna, Austria, May 21-23, 2012, pp. 39, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
14 | Hoang Trinh, Sharath Pankanti, Quanfu Fan |
Multimodal ranking for non-compliance detection in retail surveillance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WACV ![In: IEEE Workshop on Applications of Computer Vision, WACV 2012, Breckenridge, CO, USA, January 9-11, 2012, pp. 241-246, 2012, IEEE Computer Society, 978-1-4673-0233-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
14 | Brigitte Séroussi, Arnaud Soulet, Nizar Messai, Cédric Laouenan, France Mentré, Jacques Bouaud |
Patient clinical profiles associated with physician non-compliance despite the use of a guideline-based decision support system: a case study with OncoDoc2 using data mining techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AMIA ![In: AMIA 2012, American Medical Informatics Association Annual Symposium, Chicago, Illinois, USA, November 3-7, 2012, 2012, AMIA. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
14 | Nizar Messai, Jacques Bouaud, Marie-Aude Aufaure, Laurent Zelek, Brigitte Séroussi |
Using Formal Concept Analysis to Discover Patterns of Non-compliance with Clinical Practice Guidelines: A Case Study in the Management of Breast Cancer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIME ![In: Artificial Intelligence in Medicine - 13th Conference on Artificial Intelligence in Medicine, AIME 2011, Bled, Slovenia, July 2-6, 2011. Proceedings, pp. 119-128, 2011, Springer, 978-3-642-22217-7. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
14 | Carlos Müller, Manuel Resinas, Antonio Ruiz Cortés |
Explaining the Non-Compliance between Templates and Agreement Offers in WS-Agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
JISBD ![In: XV Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2010), Valencia, Spain, September 7-10, 2010. Actas, pp. 261-261, 2010, IBERGARCETA Pub. S.L., 978-84-92812-51-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
14 | Marco Laumanns, Eleni Pratsini, Steven D. Prestwich, Catalin-Stefan Tiseanu |
Production Planning for Pharmaceutical Companies Under Non-Compliance Risk. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OR ![In: Operations Research Proceedings 2010, Selected Papers of the Annual International Conference of the German Operations Research Society, Universität der Bundeswehr, München, September 1-3, 2010, pp. 545-550, 2010, Springer, 978-3-642-20008-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
14 | Kung-Jong Lui, William G. Cumberland |
Notes on estimation of proportion ratio under a non-compliance randomized trial with missing outcomes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Stat. Data Anal. ![In: Comput. Stat. Data Anal. 52(9), pp. 4325-4345, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Amir R. Razavi, Hans Gill, Hans Åhlfeldt, Nosrat Shahsavar |
Non-compliance with a postmastectomy radiotherapy guideline: Decision tree and cause analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BMC Medical Informatics Decis. Mak. ![In: BMC Medical Informatics Decis. Mak. 8, pp. 41, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Kung-Jong Lui |
Sample size calculation for non-compliance randomized trials with repeated measurements in binary data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Stat. Data Anal. ![In: Comput. Stat. Data Anal. 51(8), pp. 3832-3843, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Amir R. Razavi, Hans Gill, Hans Åhlfeldt, Nosrat Shahsavar |
A Data Mining Approach to Analyze Non-compliance with a Guideline for the Treatment of Breast Cancer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MedInfo ![In: MEDINFO 2007 - Proceedings of the 12th World Congress on Health (Medical) Informatics - Building Sustainable Health Systems, 20-24 August, 2007, Brisbane, Australia, pp. 591-595, 2007, IOS Press, 978-1-58603-774-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Amir Reza Razavi |
Applications of Knowledge Discovery in Quality Registries - Predicting Recurrence of Breast Cancer and Analyzing Non-compliance with a Clinical Guideline. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2007 |
RDF |
|
14 | Silvana Quaglini, Paolo Ciccarese, Giuseppe Micieli, Anna Cavallini |
Non-Compliance with Guidelines: Motivations and Consequences in a case study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CGP ![In: Computer-based Support for Clinical Guidelines and Protocols - Proceedings of the Symposium on Computerized Guidelines and Protocols, CGP 2004, Prague, Czech Republic, 12-14 April, 2004, pp. 75-87, 2004, IOS Press, 978-1-58603-412-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Jinkyun Park, Wondea Jung |
The operators' non-compliance behavior to conduct emergency operating procedures - comparing with the work experience and the complexity of procedural steps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Reliab. Eng. Syst. Saf. ![In: Reliab. Eng. Syst. Saf. 82(2), pp. 115-131, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Silvana Quaglini, Mario Stefanelli, Vincenzo Caporusso, Silvia Panzarasa |
Managing Non-compliance in Guideline-based Careflow Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AMIA ![In: AMIA 2000, American Medical Informatics Association Annual Symposium, Los Angeles, CA, USA, November 4-8, 2000, 2000, AMIA. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP BibTeX RDF |
|
14 | David Maxwell Chickering, Judea Pearl |
A Clinician's Tool for Analyzing Non-Compliance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI/IAAI, Vol. 2 ![In: Proceedings of the Thirteenth National Conference on Artificial Intelligence and Eighth Innovative Applications of Artificial Intelligence Conference, AAAI 96, IAAI 96, Portland, Oregon, USA, August 4-8, 1996, Volume 2., pp. 1269-1276, 1996, AAAI Press / The MIT Press. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP BibTeX RDF |
|
10 | Shafiq Ahmad, Mali Abdollahian, Panlop Zeephongsekul |
Process Capability Analysis for Non-Normal Quality Characteristics Using Gamma Distribution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2-4 April 2007, Las Vegas, Nevada, USA, pp. 425-430, 2007, IEEE Computer Society, 978-0-7695-2776-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
8 | Neeta Verma, Lokesh Joshi |
Guidelines for Indian government websites: standards for enhancing web usability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEGOV ![In: ICEGOV 2009, Proceedings of the 3rd International Conference on Theory and Practice of Electronic Governance, Bogota, Colombia, November 10-13, 2009, pp. 281-286, 2009, ACM, 978-1-60558-663-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Indian government, guidelines, compliance, websites, identifiers, hosting |
8 | Ken Huang, Paul Douthit |
ST&E Is the Most Cost Effective Measure for Comply with Payment Card Industry (PCI) Data Security Standard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers, pp. 321-322, 2008, Springer, 978-3-540-85229-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
8 | Mpostol Jeremia Mashinini |
Challenges of ICT policy for rural communities: A case study from South Africa. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCC ![In: Social Dimensions of Information And Communication Technology Policy, Proceedings of the Eighth International Conference on Human Choice and Computers (HCC8), IFIP TC 9, Pretoria, South Africa, September 25-26, 2008, pp. 125-137, 2008, Springer, 978-0-387-84821-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Traditional leadership, grounded theory method, ICT Policies, South Africa, rural communities |
8 | George Yee |
Visualization for privacy compliance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 3rd International Workshop on Visualization for Computer Security, VizSEC 2006, Alexandria, VA, USA, November 3, 2006, pp. 117-122, 2006, ACM, 1-59593-549-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privacy legislation, visualization, privacy, compliance, e-services |
8 | Djamal Benslimane, Zakaria Maamar, Chirine Ghedira |
A View-based Approach for Tracking Composite Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECOWS ![In: 2005 IEEE International Conference on Web Services (ICWS 2005), 11-15 July 2005, Orlando, FL, USA, pp. 170-181, 2005, IEEE Computer Society, 0-7695-2409-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Web Service, Context, Composition, View |
8 | Uyen Trang Nguyen |
Evaluation of flow control algorithms for ABR multipoint services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28 - July 1, 2004, Alexandria, Egypt, pp. 1077-1084, 2004, IEEE Computer Society, 0-7803-8623-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
8 | Qinglin Jiang, Douglas S. Reeves, Peng Ning |
Certificate Recommendations to Improve the Robustness of Web of Trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings, pp. 292-303, 2004, Springer, 3-540-23208-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
PGP keyrings, Authentication, certificates, graph connectivity |
8 | Jitendra Padhye, Sally Floyd |
On inferring TCP behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 27-31, 2001, San Diego, CA, USA, pp. 287-298, 2001, ACM, 1-58113-411-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
TCP/IP |
8 | Horace Cheok Mak, Robert B. Johnston |
Leveraging Traditional EDI Investment using the Internet: A Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 32nd Annual Hawaii International Conference on System Sciences (HICSS-32), January 5-8, 1999, Maui, Hawaii, USA, 1999, IEEE Computer Society, 0-7695-0001-3. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #93 of 93 (100 per page; Change: )
|
|