|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1403 occurrences of 958 keywords
|
|
|
Results
Found 5944 publication records. Showing 5944 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
72 | Gil-Han Kim, Hyung-Woo Lee |
SVM Based False Alarm Minimization Scheme on Intrusion Prevention System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (5) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part V, pp. 284-293, 2006, Springer, 3-540-34079-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Intrusion Detection/Prevention, Network Security.1, False Alarm, Multi-class SVM |
60 | Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst |
10341 Report - Insider Threats: Strategies for Prevention, Mitigation, and Response. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Insider Threats: Strategies for Prevention, Mitigation, and Response ![In: Insider Threats: Strategies for Prevention, Mitigation, and Response, 22.08. - 26.08.2010, 2010, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
60 | Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst |
10341 Abstracts Collection - Insider Threats: Strategies for Prevention, Mitigation, and Response. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Insider Threats: Strategies for Prevention, Mitigation, and Response ![In: Insider Threats: Strategies for Prevention, Mitigation, and Response, 22.08. - 26.08.2010, 2010, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
56 | V. Suma 0001, T. R. Gopalakrishnan Nair |
Enhanced Approaches in Defect Detection and Prevention Strategies in Small and Medium Scale Industries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSEA ![In: Proceedings of the Third International Conference on Software Engineering Advances, ICSEA 2008, October 26-31, 2008, Sliema, Malta, pp. 389-393, 2008, IEEE Computer Society, 978-0-7695-3372-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Defect detection and Prevention, Software Engineering, Testing, Software Quality, Software Process, Inspections |
50 | Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst (eds.) |
Insider Threats: Strategies for Prevention, Mitigation, and Response, 22.08. - 26.08.2010 ![Search on Bibsonomy](Pics/bibsonomy.png) |
Insider Threats: Strategies for Prevention, Mitigation, and Response ![Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
49 | Ajit Ashok Shenvi |
Defect prevention with orthogonal defect classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISEC ![In: Proceeding of the 2nd Annual India Software Engineering Conference, ISEC 2009, Pune, India, February 23-26, 2009, pp. 83-88, 2009, ACM, 978-1-60558-426-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
odc, algorithm, interface, timing, documentation, function, assignment, car, checking |
49 | A. Vartak, S. Ahmad, K. N. Gopinath |
An Experimental Evaluation of Over-The-Air (OTA) Wireless Intrusion Prevention Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMSWARE ![In: Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), January 7-12, 2007, Bangalore, India, 2007, IEEE, 1-4244-0614-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
48 | Hai Jin 0001, Guofu Xiang, Feng Zhao 0003, Deqing Zou, Min Li, Lei Shi |
VMFence: a customized intrusion prevention system in distributed virtual computing environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICUIMC ![In: Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC 2009, Suwon, Korea, January 15-16, 2009, pp. 391-399, 2009, ACM, 978-1-60558-405-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
virtual computing platform, distributed system, intrusion detection, network security, virtualization, intrusion prevention |
48 | Ahmed Zeeshan, Anwar M. Masood, Zafar M. Faisal, Azam Kalim, Naheed Farzana |
PrISM: Automatic Detection and Prevention from Cyber Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMTIC ![In: Wireless Networks, Information Processing and Systems, International Multi Topic Conference, IMTIC 2008, Jamshoro, Pakistan, April 11-12, 2008, Revised Selected Papers, pp. 433-444, 2008, Springer, 978-3-540-89852-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Information Security Management System, Intrusion Detection, Network security, Computer Security, Intrusion Prevention |
48 | José M. González, Vern Paxson, Nicholas Weaver |
Shunting: a hardware/software architecture for flexible, high-performance network intrusion prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 139-149, 2007, ACM, 978-1-59593-703-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
nips, fpga, intrusion detection, hardware acceleration, intrusion prevention, nids |
46 | Xicheng Lu, Gaofeng Lü, Peidong Zhu, Yijiao Chen |
MASK: An efficient mechanism to extend inter-domain IP spoofing preventions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 51(11), pp. 1745-1760, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
IP spoofing prevention, BGP, DDoS |
41 | Erik D. Engeberg, Sanford G. Meek |
Adaptive object slip prevention for prosthetic hands through proportional-derivative shear force feedback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IROS ![In: 2008 IEEE/RSJ International Conference on Intelligent Robots and Systems, September 22-26, 2008, Acropolis Convention Center, Nice, France, pp. 1940-1945, 2008, IEEE, 978-1-4244-2057-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
41 | Li Meng, Xiaoyuan He, Sontakke Ashok |
Defect Prevention: A General Framework and Its Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QSIC ![In: Sixth International Conference on Quality Software (QSIC 2006), 26-28 October 2006, Beijing, China, pp. 281-286, 2006, IEEE Computer Society, 0-7695-2718-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
41 | Jiazhu Dai, Huaikou Miao |
D_DIPS: An Intrusion Prevention System for Database Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings, pp. 481-490, 2005, Springer, 3-540-30934-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
41 | P. Ramasubramanian, Arputharaj Kannan |
Intelligent Multi-agent Based Database Hybrid Intrusion Prevention System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADBIS ![In: Advances in Databases and Information Systems, 8th East European Conference, ADBIS 2004, Budapest, Hungary, September 22-25, 2004, Proceeding, pp. 393-408, 2004, Springer, 3-540-23243-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Quickprop Prediction Technique, Neural Networks, Multi-Agents, Database Security |
41 | Saleh Al-Furiah, Lamia Al-Braheem |
Comprehensive study on methods of fraud prevention in credit card e-payment system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iiWAS ![In: iiWAS'2009 - The Eleventh International Conference on Information Integration and Web-based Applications and Services, 14-16 December 2009, Kuala Lumpur, Malaysia, pp. 592-598, 2009, ACM, 978-1-60558-660-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
MTIO, fraud prevention, fraud detection, credit card |
41 | Danielle Chrun, Michel Cukier, Gerry Sneeringer |
Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAFECOMP ![In: Computer Safety, Reliability, and Security, 27th International Conference, SAFECOMP 2008, Newcastle upon Tyne, UK, September 22-25, 2008, Proceedings, pp. 221-234, 2008, Springer, 978-3-540-87697-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Empirical Study, Security Metrics, Intrusion Prevention Systems |
41 | Junhua Zhao 0001, Zhao Yang Dong, Pei Zhang 0010 |
Mining complex power networks for blackout prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Jose, California, USA, August 12-15, 2007, pp. 986-994, 2007, ACM, 978-1-59593-609-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
blackout prevention, graph mining, power networks |
41 | Michael E. Locasto, Ke Wang 0009, Angelos D. Keromytis, Salvatore J. Stolfo |
FLIPS: Hybrid Adaptive Intrusion Prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 8th International Symposium, RAID 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers, pp. 82-101, 2005, Springer, 3-540-31778-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Adaptive Response, Intrusion Tolerance, Intrusion Prevention |
41 | Shin Parker, Zhengxin Chen |
Extending invalid-access prevention policy protocols for mobile-client data caching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), Nicosia, Cyprus, March 14-17, 2004, pp. 1171-1176, 2004, ACM, 1-58113-812-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
invalid-access prevention policy protocol, serializability, two phase locking, multimedia object, mobile client |
41 | Wayne E. Woldt, Bruce I. Dvorak, Mohamed F. Dahab |
Application of fuzzy set theory to industrial pollution prevention: production system modeling and life cycle assessment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Soft Comput. ![In: Soft Comput. 7(6), pp. 419-433, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Fuzzy systems analysis, Multiple criteria evaluation, Industrial pollution prevention, Life cycle assessment, Industrial ecology, Cleaner production technology, Large-scale systems, Decision analysis, Sustainable development |
40 | Mark J. Karol, S. Jamaloddin Golestani, David Lee |
Prevention of deadlocks and livelocks in lossless backpressured packet networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 11(6), pp. 923-934, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
backpressure, livelock prevention, lossless networks, congestion control, deadlock prevention, bounded delay |
33 | Xin W. Chen, Shimon Y. Nof |
Automating Errors and Conflicts Prognostics and Prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Automation ![In: Springer Handbook of Automation, pp. 503-525, 2009, Springer, 978-3-540-78830-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Edward C. Conley, David R. Owens |
Improving Disease Early Detection and Prevention by Multiplex Longitudinal Outcomes Marker Modeling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eTELEMED ![In: International Conference on eHealth, Telemedicine, and Social Medicine, eTELEMED 2009, February 1-7, 2009, Cancun, Mexico, pp. 257-262, 2009, IEEE Computer Society, 978-0-7695-3532-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Ikpeme Erete |
Browser-Based Intrusion Prevention System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009. Proceedings, pp. 371-373, 2009, Springer, 978-3-642-04341-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Zhiwu Li 0001, Mi Zhao |
On Controllability of Dependent Siphons for Deadlock Prevention in Generalized Petri Nets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Syst. Man Cybern. Part A ![In: IEEE Trans. Syst. Man Cybern. Part A 38(2), pp. 369-384, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Rami Yared, Xavier Défago, Matthias Wiesmann |
Collision prevention using group communication for asynchronous cooperative mobile robots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 21st International Conference on Advanced Information Networking and Applications (AINA 2007), May 21-23, 2007, Niagara Falls, Canada, pp. 244-249, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Jakub Botwicz, Piotr Buciak, Piotr Sapiecha |
Building Dependable Intrusion Prevention Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DepCoS-RELCOMEX ![In: 2006 International Conference on Dependability of Computer Systems (DepCoS-RELCOMEX 2006), 24-28 May 2006, Szklarska Poreba, Poland, pp. 135-142, 2006, IEEE Computer Society, 0-7695-2565-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Daniel Thalmann, Patrick Salamin, Renaud Ott, Mario Gutiérrez, Frédéric Vexo |
Advanced Mixed Reality Technologies for Surveillance and Risk Prevention Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCIS ![In: Computer and Information Sciences - ISCIS 2006, 21th International Symposium, Istanbul, Turkey, November 1-3, 2006, Proceedings, pp. 13-23, 2006, Springer, 3-540-47242-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Security, Virtual Reality, Virtual Environments, Eye-tracking, Surveillance, Haptic Interfaces, Handheld Devices, Teleoperation, Collaborative Environments |
33 | Xiaolin Lu |
A WEB-GIS Based Urgent Medical Rescue CSCW System for SARS Disease Prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC (1) ![In: Grid and Cooperative Computing, Second International Workshop, GCC 2003, Shanghai, China, December 7-10, 2003, Revised Papers, Part I, pp. 91-98, 2003, Springer, 3-540-21988-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Tian Song, Dongsheng Wang 0002, Zhizhong Tang |
A parameterized multilevel pattern matching architecture on FPGAs for network intrusion detection and prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 52(6), pp. 949-963, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
network intrusion prevention, network security, pattern matching, network intrusion detection |
33 | Toshihiro Osaragi |
Estimating Spatio-Temporal Distribution of Railroad Users and Its Application to Disaster Prevention Planning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AGILE Conf. ![In: Advances in GIScience, Proceedings of the 12th AGILE Conference, Hannover, Germany, 2-5 June 2009, pp. 233-250, 2009, Springer, 978-3-642-00317-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
railroad user, spatio-temporal distribution, disaster prevention planning, person trip survey, difficulty returning home |
33 | Alexander Hoffmann, Daniel Spelmezan, Jan O. Borchers |
TypeRight: a keyboard with tactile error prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 27th International Conference on Human Factors in Computing Systems, CHI 2009, Boston, MA, USA, April 4-9, 2009, pp. 2265-2268, 2009, ACM, 978-1-60558-246-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
adopting input device, haptic, text entry, tactile feedback, error prevention |
33 | Niklas Lavesson, Paul Davidsson, Martin Boldt, Andreas Jacobsson |
Spyware Prevention by Classifying End User License Agreements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
New Challenges in Applied Intelligence Technologies ![In: New Challenges in Applied Intelligence Technologies, pp. 373-382, 2008, Springer, 978-3-540-79354-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
EULA spyware classification prevention |
33 | Keijo Haataja |
New efficient intrusion detection and prevention system for Bluetooth networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MOBILWARE ![In: Proceedings of the 1st International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications, MOBILWARE 2008, Innsbruck, Austria, February 13 - 15, 2008, pp. 16, 2008, 978-1-59593-984-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
ad-hoc networks, intrusion detection, Bluetooth, wireless security, intrusion prevention, security attacks |
33 | Stathis Th. Konstantinidis, Anastasia Kitsou, Panagiotis D. Bamidis, Themistoklis Mikos, Menelaos Zafrakas, Maria M. Nikolaidou, Costas Pappas, Theodoros Agorastos |
A SCORM Compliant e-learning Platform for Cervical Cancer Prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CBMS ![In: Proceedings of the Twenty-First IEEE International Symposium on Computer-Based Medical Systems, June 17-19, 2008, Jyväskylä, Finland, pp. 424-426, 2008, IEEE Computer Society, 978-0-7695-3165-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Healthcare LOM, Cervical Cancer Prevention, e-learning, metadata, SCORM, Medical Education, online training, IEEE LOM |
33 | Prithvi Bisht, V. N. Venkatakrishnan |
XSS-GUARD: Precise Dynamic Prevention of Cross-Site Scripting Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment, 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings, pp. 23-43, 2008, Springer, 978-3-540-70541-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Attack Prevention, Security, Filtering, Cross-site scripting (XSS) |
33 | Pablo García Bringas, Yoseba K. Penya |
Next-Generation Misuse and Anomaly Prevention System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEIS ![In: Enterprise Information Systems, 10th International Conference, ICEIS 2008, Barcelona, Spain, June 12-16, 2008, Revised Selected Papers, pp. 117-129, 2008, Springer, 978-3-642-00669-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Data mining, Machine learning, Bayesian networks, Anomaly detection, Intrusion prevention, Misuse detection |
33 | Konstantinos Xinidis, Ioannis Charitakis, Spyros Antonatos, Kostas G. Anagnostakis, Evangelos P. Markatos |
An Active Splitter Architecture for Intrusion Detection and Prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 3(1), pp. 31-44, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
network processors, Network-level security and protection, intrusion detection and prevention |
33 | Juan M. Estévez-Tapiador |
Book Review: Practical Intrusion Prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Distributed Syst. Online ![In: IEEE Distributed Syst. Online 7(6), 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
IPS, intrusion prevention systems |
33 | Masato Goto, Akira Hattori, Takami Yasuda, Shigeki Yokoi |
A Web-Based System for Gathering and Sharing Experience and Knowledge Information in Local Crime Prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (2) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 10th International Conference, KES 2006, Bournemouth, UK, October 9-11, 2006, Proceedings, Part II, pp. 1079-1086, 2006, Springer, 3-540-46537-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Crime Prevention, Information Sharing, CMS, Local Community |
33 | Stephen S. Yau, Xinyu Zhang |
Computer Network Intrusion Detection, Assessment And Prevention Based on Security Dependency Relation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: 23rd International Computer Software and Applications Conference (COMPSAC '99), 27-19 October 1999, Phoenix, AZ, USA, pp. 86-91, 1999, IEEE Computer Society, 0-7695-0368-3. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
intrusion assessment, security dependency relation, agent, intrusion detection, Network security, intrusion prevention, ripple effect analysis |
33 | Valmir Carneiro Barbosa |
Strategies for the Prevention of Communication Deadlocks in Distributed Parallel Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 16(11), pp. 1311-1316, 1990. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
randomly generated systems, distributed parallel programs, unavailability, message buffers, message buffering space, buffer usage, NP-hard optimization problems, computational complexity, parallel programming, concurrency, heuristic, upper bounds, programming theory, communication channels, deadlock prevention, process execution, communication deadlocks |
31 | Sangwook Bae, Keo Oudom, Young-Guk Ha, Sunyoung Han |
LBS system using online map in 3G networks environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS 2009), Seoul, Korea, 24-26 November 2009, pp. 1033-1037, 2009, ACM, 978-1-60558-710-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
emergency rescue system, LBS, 3G networks, WIBRO, online map |
31 | Linda Dailey Paulson |
Stopping Intruders Outside the Gates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 35(11), pp. 20-22, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
31 | Y. J. Song, R. Z. Liu, T. N. Tan |
Digital Watermarking for Forgery Detection in Printed Materials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Pacific Rim Conference on Multimedia ![In: Advances in Multimedia Information Processing - PCM 2001, Second IEEE Pacific Rim Conference on Multimedia, Bejing, China, October 24-26, 2001, Proceedings, pp. 403-410, 2001, Springer, 3-540-42680-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
31 | Damian Dechev, Bjarne Stroustrup |
Scalable nonblocking concurrent objects for mission critical code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OOPSLA Companion ![In: Companion to the 24th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA 2009, October 25-29, 2009, Orlando, Florida, USA, pp. 597-610, 2009, ACM, 978-1-60558-768-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
ABA problem prevention, autonomous space software, C++, software transactional memory, nonblocking synchronization |
31 | Leelani Kumari Wickramasinghe, Christian Guttmann, Michael P. Georgeff, Hamid Gharib, Ian E. Thomas, Simon G. Thompson, Heinz W. Schmidt |
Agent-based intelligent collaborative care management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS (2) ![In: 8th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), Budapest, Hungary, May 10-15, 2009, Volume 2, pp. 1387-1388, 2009, IFAAMAS, 978-0-9817381-7-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
adherence support, distribution/assignment problem, failure prevention, planning, service oriented computing, e-health, agent based systems |
31 | Joaquín García-Alfaro, Michael A. Jaeger, Gero Mühl, I. Barrera, Joan Borrell |
Distributed Exchange of Alerts for the Detection of Coordinated Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNSR ![In: Sixth Annual Conference on Communication Networks and Services Research (CNSR 2008), 5-8 May 2008, Halifax, Nova Scotia, Canada, pp. 96-103, 2008, IEEE Computer Society, 978-0-7695-3135-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Attack Prevention System, IDMEF, Network Security, Publish/Subscribe, Message Oriented Middleware |
31 | Simon P. Chung, Aloysius K. Mok |
Allergy Attack Against Automatic Signature Generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 9th International Symposium, RAID 2006, Hamburg, Germany, September 20-22, 2006, Proceedings, pp. 61-80, 2006, Springer, 3-540-39723-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Automatic Signature Generation, Adaptive Response, Intrusion Prevention |
31 | Sushant Sinha, Farnam Jahanian, Jignesh M. Patel |
WIND: Workload-Aware INtrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 9th International Symposium, RAID 2006, Hamburg, Germany, September 20-22, 2006, Proceedings, pp. 290-310, 2006, Springer, 3-540-39723-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
workload aware, adaptive algorithm, deep packet inspection, Intrusion detection and prevention |
31 | Mohamed Kaâniche, Jean-Claude Laprie, Jean-Paul Blanquart |
Dependability Engineering of Complex Computing Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICECCS ![In: 6th International Conference on Engineering of Complex Computer Systems (ICECCS 2000), 11-15 September 2000, Tokyo, Japan, pp. 36-, 2000, IEEE Computer Society, 0-7695-0583-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
dependability engineering, complex computing systems, development model, system creation process, classical development steps, dependability processes, fault prevention, fault forecasting, supporting processes, system creation activity, fault tolerance, software reliability, certification, quality assurance, dependable systems, checklist, fault removal |
25 | Yaping Jiang, Yong Gan, Jianhua Zhou, Zengyu Cai |
A Model of Intrusion Prevention Base on Immune. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 441-444, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
25 | ZhiWu Li 0001, MengChu Zhou, Naiqi Wu |
A Survey and Comparison of Petri Net-Based Deadlock Prevention Policies for Flexible Manufacturing Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Syst. Man Cybern. Part C ![In: IEEE Trans. Syst. Man Cybern. Part C 38(2), pp. 173-188, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Luigi Piroddi, Roberto Cordone, Ivano Fumagalli |
Selective Siphon Control for Deadlock Prevention in Petri Nets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Syst. Man Cybern. Part A ![In: IEEE Trans. Syst. Man Cybern. Part A 38(6), pp. 1337-1348, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Danielle Chrun, Michel Cukier, Gerry Sneeringer |
On the Use of Security Metrics Based on Intrusion Prevention System Event Data: An Empirical Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HASE ![In: 11th IEEE High Assurance Systems Engineering Symposium, HASE 2008, Nanjing, China, December 3 - 5, 2008, pp. 49-58, 2008, IEEE Computer Society, 978-0-7695-3482-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Milon Gupta, Laure Chotard, Ólafur Ingþórsson, João Bastos, Isabel Borges |
Health@Home - An e-Service Model for Disease Prevention and Healthcare in the Home. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eHealth ![In: Electronic Healthcare, First International Conference, eHealth 2008, London, UK, September 8-9, 2008. Revised Selected Papers, pp. 17-24, 2008, Springer, 978-3-642-00412-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Guangyu He, Yingyou Wen, Hong Zhao |
SPIT Detection and Prevention Method in VoIP Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 473-478, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Felix Salfner, Katinka Wolter |
Replication vs. Failure Prevention - How to Boost Service Availability? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSRE ![In: 19th International Symposium on Software Reliability Engineering (ISSRE 2008), 11-14 November 2008, Seattle/Redmond, WA, USA, pp. 289-290, 2008, IEEE Computer Society, 978-0-7695-3405-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Ryan D. Riley, Xuxian Jiang, Dongyan Xu |
Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings, pp. 1-20, 2008, Springer, 978-3-540-87402-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Kjetil Haslum, Marie Elisabeth Gaup Moe, Svein J. Knapskog |
Real-time intrusion prevention and security analysis of networks using HMMs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: LCN 2008, The 33rd IEEE Conference on Local Computer Networks, The Conference on Leading Edge and Practical Computer Networking, Hyatt Regency Montreal, Montreal, Quebec, Canada, 14-17 October 2008, Proceedings, pp. 927-934, 2008, IEEE Computer Society, 978-1-4244-2412-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Heejo Lee, Minjin Kwon, Geoffrey Hasker, Adrian Perrig |
BASE: an incrementally deployable mechanism for viable IP spoofing prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007, pp. 20-31, 2007, ACM, 1-59593-574-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
BGP anti-spoofing extension, packet marking and filtering, DDoS attack, IP spoofing |
25 | Kjetil Haslum, Ajith Abraham, Svein J. Knapskog |
DIPS: A Framework for Distributed Intrusion Prediction and Prevention Using Hidden Markov Models and Online Fuzzy Risk Assessment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007, August 29-31, 2007, Manchester, United Kingdom, pp. 183-190, 2007, IEEE Computer Society, 978-0-7695-2876-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Miyuki Hanaoka, Kenji Kono, Makoto Shimamura, Satoshi Yamaguchi |
An Efficient TCP Reassembler Mechanism for Layer7-aware Network Intrusion Detection/Prevention Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), July 1-4, Aveiro, Portugal, pp. 79-86, 2007, IEEE Computer Society, 978-1-4244-1520-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Yoshifumi Nishida, Yoichi Motomura, Koji Kitamura, Tatsuhiro Yamanaka, Hiroshi Mizoguchi |
Methodology of Everyday Life Computing and Application to Children Injury Prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCI ![In: Proceedings of the IEEE Symposium on Foundations of Computational Intelligence, FOCI 2007, part of the IEEE Symposium Series on Computational Intelligence 2007, Honolulu, Hawaii, USA, 1-5 April 2007, pp. 652-659, 2007, IEEE, 1-4244-0703-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Simon P. Chung, Aloysius K. Mok |
Collaborative Intrusion Prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 16th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE 2007), 18-20 June 2007, Paris, France, pp. 395-400, 2007, IEEE Computer Society, 0-7695-2879-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Yi-Sheng Huang, MuDer Jeng, Xiaolan Xie, Da-Hsiang Chung |
Siphon-Based Deadlock Prevention Policy for Flexible Manufacturing Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Syst. Man Cybern. Part A ![In: IEEE Trans. Syst. Man Cybern. Part A 36(6), pp. 1248-1256, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | René V. Mayorga, Pronnapa Sanongboon |
An Artificial Neural Network Approach for Inverse Kinematics Computation and Singularities Prevention of Redundant Manipulators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Robotic Syst. ![In: J. Intell. Robotic Syst. 44(1), pp. 1-23, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
manipulator path planning, singularities avoidance, artificial neural networks, inverse kinematics, redundant manipulators |
25 | Gertrude Neuman Levine |
The classification of deadlock prevention and avoidance is erroneous. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 39(2), pp. 47-50, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Luz Marina Quiroga, Pablo Villatoro |
Recommendations for an Integrated Information System at the Chilean National Council for Drug Prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 38th Hawaii International Conference on System Sciences (HICSS-38 2005), CD-ROM / Abstracts Proceedings, 3-6 January 2005, Big Island, HI, USA, 2005, IEEE Computer Society, 0-7695-2268-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Petar Djekic, Claudia Löbbecke |
Software Piracy Prevention through Digital Rights Management Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CEC ![In: 7th IEEE International Conference on E-Commerce Technology (CEC 2005), 19-22 July 2005, München, Germany, pp. 504-507, 2005, IEEE Computer Society, 0-7695-2277-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Victor Serdiouk |
Behavior-Based Model of Detection and Prevention of Intrusions in Computer Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings, pp. 380-393, 2005, Springer, 3-540-29113-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Hee Seok Song, Jae Kyeong Kim, Yeong Bin Cho, Soung Hie Kim |
A Personalized Defection Detection and Prevention Procedure based on the Self-Organizing Map and Association Rule Mining: Applied to Online Game Site. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Artif. Intell. Rev. ![In: Artif. Intell. Rev. 21(2), pp. 161-184, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
customer retention, data mining, Self-organizing map, association rule mining, customer relationship management |
25 | Zhiwu Li 0001, Jingwei Liang, Yang Lu, Anrong Wang |
A deadlock prevention method for FMS with multiple resource acquisitions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICARCV ![In: 8th International Conference on Control, Automation, Robotics and Vision, ICARCV 2004, Kunming, China, 6-9 December 2004, Proceedings, pp. 2117-2122, 2004, IEEE, 0-7803-8653-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Zhiwu Li 0001, Haibin Xia, Anrong Wang |
An effective deadlock prevention policy using elementary siphons of Petri nets for FMS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICARCV ![In: 8th International Conference on Control, Automation, Robotics and Vision, ICARCV 2004, Kunming, China, 6-9 December 2004, Proceedings, pp. 521-526, 2004, IEEE, 0-7803-8653-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
25 | ZhiWu Li 0001, XiangFeng Zhang |
A deadlock prevention approach using elementary siphons for a class of Petri nets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC (2) ![In: Proceedings of the IEEE International Conference on Systems, Man & Cybernetics: The Hague, Netherlands, 10-13 October 2004, pp. 1728-1733, 2004, IEEE, 0-7803-8566-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Todd S. Sproull, John W. Lockwood |
Distributed Instrusion Prevention in Active and Extensible Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWAN ![In: Active Networks, IFIP TC6 6th International Working Conference, IWAN 2004, Lawrence, KS, USA, October 27-29, 2004. Revised Papers, pp. 54-65, 2004, Springer, 978-3-540-71499-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Josef Pieprzyk, Xian-Mo Zhang |
Cheating Prevention in Linear Secret Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 7th Australian Conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002, Proceedings, pp. 121-135, 2002, Springer, 3-540-43861-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Linear Secret Sharing Schemes, Cheating Identification, Cryptography, Secret Sharing, Cheating Detection |
25 | Jeng-Jie Peng, Ming-Dou Ker, Hsin-Chin Jiang |
Latchup current self-stop circuit for whole-chip latchup prevention in bulk CMOS integrated circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS (5) ![In: Proceedings of the 2002 International Symposium on Circuits and Systems, ISCAS 2002, Scottsdale, Arizona, USA, May 26-29, 2002, pp. 537-540, 2002, IEEE, 0-7803-7448-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
25 | Marian V. Iordache, Panos J. Antsaklis |
Generalized Conditions for Liveness Enforcement and Deadlock Prevention in Petri Nets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICATPN ![In: Application and Theory of Petri Nets 2001, 22nd International Conference, ICATPN 2001, Newcastle upon Tyne, UK, June 25-29, 2001, Proceedings, pp. 184-203, 2001, Springer, 3-540-42252-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
25 | Yoshikiyo Kato, Takehisa Yairi, Koichi Hori |
Integrating Data Mining Techniques and Design Information Management for Failure Prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
JSAI Workshops ![In: New Frontiers in Artificial Intelligence, Joint JSAI 2001 Workshop Post-Proceedings, pp. 475-480, 2001, Springer, 3-540-43070-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
25 | Blas Cuesta Saez, Antonio Robles, José Duato |
Efficient and Scalable Starvation Prevention Mechanism for Token Coherence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 22(10), pp. 1610-1623, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
token coherence, starvation prevention, scalability, Cache coherence |
25 | Jing Bi, Zhiliang Zhu 0001, Haitao Yuan 0001, Yushun Fan, Ming Tie |
A Petri Net Based Hybrid Optimal Controller for Deadlock Prevention in Web Service Composition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWS ![In: IEEE International Conference on Web Services, ICWS 2011, Washington, DC, USA, July 4-9, 2011, pp. 718-719, 2011, IEEE Computer Society, 978-1-4577-0842-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Controlled Petri net, hybrid optimal controller, web service composition, compatibility, deadlock prevention |
25 | Helen Balinsky, David Subirós Perez, Steven J. Simske |
System Call Interception Framework for Data Leak Prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDOC ![In: Proceedings of the 15th IEEE International Enterprise Distributed Object Computing Conference, EDOC 2011, Helsinki, Finland, August 29 - September 2, 2011, pp. 139-148, 2011, IEEE Computer Society, 978-1-4577-0362-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
data leak prevention, security, policy enforcement, system calls interception |
25 | Simon Liu, Rick Kuhn |
Data Loss Prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IT Prof. ![In: IT Prof. 12(2), pp. 10-13, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
data loss prevention |
25 | Xiao-hui Zeng, Wen-lang Luo, Jin-tao Zeng, Yan-ping Chen, Shi-yao Jin |
Research on a High Efficient Intrusion Prevention Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IITSI ![In: Third International Symposium on Intelligent Information Technology and Security Informatics, IITSI 2010, Jinggangshan, China, April 2-4, 2010, pp. 720-723, 2010, IEEE Computer Society, 978-0-7695-4020-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
network security, distributed scheduling, intrusion prevention, network attack, network intrusion |
25 | Saskia M. Kelders, Julia E. W. C. van Gemert-Pijnen, Andrea Werkman, Erwin R. Seydel |
Usage and Effect of a Web-Based Intervention for the Prevention of Overweight; a Randomized Controlled Trial. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eTELEMED ![In: The Second International Conference on eHealth, Telemedicine, and Social Medicine, eTELEMED 2010, 10-16 February 2010, St. Maarten, Netherlands Antilles, pp. 113-118, 2010, IEEE Computer Society, 978-0-7695-3950-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
RCT, eHealth, intervention, usage, prevention |
25 | Atefeh Tajpour, Mohammad JorJor Zadeh Shooshtari |
Evaluation of SQL Injection Detection and Prevention Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICSyN ![In: Second International Conference on Computational Intelligence, Communication Systems and Networks, CICSyN 2010, Liverpool, UK, 28-30 July, 2010, pp. 216-221, 2010, IEEE Computer Society, 978-1-4244-7837-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
evaluation, detection, technique, SQL Injection Attacks, prevention |
25 | Adnan Nadeem, Michael P. Howarth |
Adaptive intrusion detection & prevention of denial of service attacks in MANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, IWCMC 2009, Leipzig, Germany, June 21-24, 2009, pp. 926-930, 2009, ACM, 978-1-60558-569-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
intrusion detection & prevention, ad-hoc network security |
25 | Jianchao Han, Mohsen Beheshti, Kazimierz Kowalski, Joel Ortiz, Johnly Tomelden |
Component-Based Software Architecture Design for Network Intrusion Detection and Prevention System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Sixth International Conference on Information Technology: New Generations, ITNG 2009, Las Vegas, Nevada, USA, 27-29 April 2009, pp. 248-253, 2009, IEEE Computer Society, 978-0-7695-3596-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
network security, software reuse, Component-based software engineering, intrusion detection and prevention |
25 | Yosuke Horiuchi, Osamu Uchida |
A Falsification Prevention Method for Face Authentication Using Light. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), Kyoto, Japan, 12-14 September, 2009, Proceedings, pp. 909-912, 2009, IEEE Computer Society, 978-1-4244-4717-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
falsification prevention, face detection, face authentication |
25 | Rok Bojanc, Borka Jerman-Blazic |
Standard Approach for Quantification of the ICT Security Investment for Cybercrime Prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDS ![In: Second International Conference on the Digital Society (ICDS 2008), February 10-15, 2008, Sainte Luce, Martinique, France, pp. 7-14, 2008, IEEE Computer Society, 978-0-7695-3087-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security technology investment, cybercrime prevention, information security |
25 | Rainer Blaser, M. Schnabel, D. Mann, P. Jancke, Klaus Kuhn 0001, Richard Lenz |
Potential prevention of medical errors in casualty surgery by using information technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), Nicosia, Cyprus, March 14-17, 2004, pp. 285-290, 2004, ACM, 1-58113-812-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Failure Mode and Effect Analysis, demand driven system evolution, electronic discharge letters, medical error prevention, structured reporting |
25 | Bertrand Anckaert, Bjorn De Sutter, Koen De Bosschere |
Software piracy prevention through diversity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Proceedings of the 2004 ACM Workshop on Digital Rights Management 2004, Washington, DC, USA, October 25, 2004, pp. 63-71, 2004, ACM, 1-58113-969-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
software piracy prevention, tailored updates, authentication, diversity, identification, copyright protection, intellectual property protection |
25 | R. Geoff Dromey |
Software Quality-Prevention versus Cure? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Softw. Qual. J. ![In: Softw. Qual. J. 11(3), pp. 197-210, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
product quality models, defect prevention, quality-carrying properties, component-based quality, software inspection, software defects, acceptance testing |
25 | David Gelernter |
A DAG-Based Algorithm for Prevention of Store-and-Forward Deadlock in Packet Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 30(10), pp. 709-715, 1981. The full citation details ...](Pics/full.jpeg) |
1981 |
DBLP DOI BibTeX RDF |
store-and-forward deadlock, network operating systems, deadlock prevention, packet networks, Communication software |
23 | Baowen Zhang, Jing Zhang, Ning Zhou, Mingang Chen |
Evaluating the Disaster Defense Ability of Information Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAISI ![In: Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings, pp. 275-281, 2007, Springer, 978-3-540-71548-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Chuen-Ching Wang, Yih-Chuan Lin, Shu-Chung Yi |
Satellite Interference Detection Using Real-Time Watermarking Technique for SMS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITA (2) ![In: Third International Conference on Information Technology and Applications (ICITA 2005), 4-7 July 2005, Sydney, Australia, pp. 238-241, 2005, IEEE Computer Society, 0-7695-2316-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Neil C. Rowe, Jim Coffman, Yilmaz Degirmenci, Scott Hall, Shong Lee, Clifton Williams |
Automatic removal of advertising from web-page display. ![Search on Bibsonomy](Pics/bibsonomy.png) |
JCDL ![In: ACM/IEEE Joint Conference on Digital Libraries, JCDL 2002, Portland, Oregon, USA, June 14-18, 2002, Proceedings, pp. 406, 2002, ACM, 1-58113-513-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
information retrieval, World Wide Web, images, information filtering, advertising |
23 | Dimitrios S. Nikolopoulos, Constantine D. Polychronopoulos |
Adaptive Scheduling under Memory Pressure on Multiprogrammed Cluster. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCGRID ![In: 2nd IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2002), 22-24 May 2002, Berlin, Germany, pp. 22-29, 2002, IEEE Computer Society, 0-7695-1582-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 5944 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|