|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1403 occurrences of 958 keywords
|
|
|
Results
Found 5944 publication records. Showing 5944 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
72 | Gil-Han Kim, Hyung-Woo Lee |
SVM Based False Alarm Minimization Scheme on Intrusion Prevention System. |
ICCSA (5) |
2006 |
DBLP DOI BibTeX RDF |
Intrusion Detection/Prevention, Network Security.1, False Alarm, Multi-class SVM |
60 | Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst |
10341 Report - Insider Threats: Strategies for Prevention, Mitigation, and Response. |
Insider Threats: Strategies for Prevention, Mitigation, and Response |
2010 |
DBLP BibTeX RDF |
|
60 | Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst |
10341 Abstracts Collection - Insider Threats: Strategies for Prevention, Mitigation, and Response. |
Insider Threats: Strategies for Prevention, Mitigation, and Response |
2010 |
DBLP BibTeX RDF |
|
56 | V. Suma 0001, T. R. Gopalakrishnan Nair |
Enhanced Approaches in Defect Detection and Prevention Strategies in Small and Medium Scale Industries. |
ICSEA |
2008 |
DBLP DOI BibTeX RDF |
Defect detection and Prevention, Software Engineering, Testing, Software Quality, Software Process, Inspections |
50 | Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst (eds.) |
Insider Threats: Strategies for Prevention, Mitigation, and Response, 22.08. - 26.08.2010 |
Insider Threats: Strategies for Prevention, Mitigation, and Response |
2010 |
DBLP BibTeX RDF |
|
49 | Ajit Ashok Shenvi |
Defect prevention with orthogonal defect classification. |
ISEC |
2009 |
DBLP DOI BibTeX RDF |
odc, algorithm, interface, timing, documentation, function, assignment, car, checking |
49 | A. Vartak, S. Ahmad, K. N. Gopinath |
An Experimental Evaluation of Over-The-Air (OTA) Wireless Intrusion Prevention Techniques. |
COMSWARE |
2007 |
DBLP DOI BibTeX RDF |
|
48 | Hai Jin 0001, Guofu Xiang, Feng Zhao 0003, Deqing Zou, Min Li, Lei Shi |
VMFence: a customized intrusion prevention system in distributed virtual computing environment. |
ICUIMC |
2009 |
DBLP DOI BibTeX RDF |
virtual computing platform, distributed system, intrusion detection, network security, virtualization, intrusion prevention |
48 | Ahmed Zeeshan, Anwar M. Masood, Zafar M. Faisal, Azam Kalim, Naheed Farzana |
PrISM: Automatic Detection and Prevention from Cyber Attacks. |
IMTIC |
2008 |
DBLP DOI BibTeX RDF |
Information Security Management System, Intrusion Detection, Network security, Computer Security, Intrusion Prevention |
48 | José M. González, Vern Paxson, Nicholas Weaver |
Shunting: a hardware/software architecture for flexible, high-performance network intrusion prevention. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
nips, fpga, intrusion detection, hardware acceleration, intrusion prevention, nids |
46 | Xicheng Lu, Gaofeng Lü, Peidong Zhu, Yijiao Chen |
MASK: An efficient mechanism to extend inter-domain IP spoofing preventions. |
Sci. China Ser. F Inf. Sci. |
2008 |
DBLP DOI BibTeX RDF |
IP spoofing prevention, BGP, DDoS |
41 | Erik D. Engeberg, Sanford G. Meek |
Adaptive object slip prevention for prosthetic hands through proportional-derivative shear force feedback. |
IROS |
2008 |
DBLP DOI BibTeX RDF |
|
41 | Li Meng, Xiaoyuan He, Sontakke Ashok |
Defect Prevention: A General Framework and Its Application. |
QSIC |
2006 |
DBLP DOI BibTeX RDF |
|
41 | Jiazhu Dai, Huaikou Miao |
D_DIPS: An Intrusion Prevention System for Database Security. |
ICICS |
2005 |
DBLP DOI BibTeX RDF |
|
41 | P. Ramasubramanian, Arputharaj Kannan |
Intelligent Multi-agent Based Database Hybrid Intrusion Prevention System. |
ADBIS |
2004 |
DBLP DOI BibTeX RDF |
Quickprop Prediction Technique, Neural Networks, Multi-Agents, Database Security |
41 | Saleh Al-Furiah, Lamia Al-Braheem |
Comprehensive study on methods of fraud prevention in credit card e-payment system. |
iiWAS |
2009 |
DBLP DOI BibTeX RDF |
MTIO, fraud prevention, fraud detection, credit card |
41 | Danielle Chrun, Michel Cukier, Gerry Sneeringer |
Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data. |
SAFECOMP |
2008 |
DBLP DOI BibTeX RDF |
Empirical Study, Security Metrics, Intrusion Prevention Systems |
41 | Junhua Zhao 0001, Zhao Yang Dong, Pei Zhang 0010 |
Mining complex power networks for blackout prevention. |
KDD |
2007 |
DBLP DOI BibTeX RDF |
blackout prevention, graph mining, power networks |
41 | Michael E. Locasto, Ke Wang 0009, Angelos D. Keromytis, Salvatore J. Stolfo |
FLIPS: Hybrid Adaptive Intrusion Prevention. |
RAID |
2005 |
DBLP DOI BibTeX RDF |
Adaptive Response, Intrusion Tolerance, Intrusion Prevention |
41 | Shin Parker, Zhengxin Chen |
Extending invalid-access prevention policy protocols for mobile-client data caching. |
SAC |
2004 |
DBLP DOI BibTeX RDF |
invalid-access prevention policy protocol, serializability, two phase locking, multimedia object, mobile client |
41 | Wayne E. Woldt, Bruce I. Dvorak, Mohamed F. Dahab |
Application of fuzzy set theory to industrial pollution prevention: production system modeling and life cycle assessment. |
Soft Comput. |
2003 |
DBLP DOI BibTeX RDF |
Fuzzy systems analysis, Multiple criteria evaluation, Industrial pollution prevention, Life cycle assessment, Industrial ecology, Cleaner production technology, Large-scale systems, Decision analysis, Sustainable development |
40 | Mark J. Karol, S. Jamaloddin Golestani, David Lee |
Prevention of deadlocks and livelocks in lossless backpressured packet networks. |
IEEE/ACM Trans. Netw. |
2003 |
DBLP DOI BibTeX RDF |
backpressure, livelock prevention, lossless networks, congestion control, deadlock prevention, bounded delay |
33 | Xin W. Chen, Shimon Y. Nof |
Automating Errors and Conflicts Prognostics and Prevention. |
Handbook of Automation |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Edward C. Conley, David R. Owens |
Improving Disease Early Detection and Prevention by Multiplex Longitudinal Outcomes Marker Modeling. |
eTELEMED |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Ikpeme Erete |
Browser-Based Intrusion Prevention System. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Zhiwu Li 0001, Mi Zhao |
On Controllability of Dependent Siphons for Deadlock Prevention in Generalized Petri Nets. |
IEEE Trans. Syst. Man Cybern. Part A |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Rami Yared, Xavier Défago, Matthias Wiesmann |
Collision prevention using group communication for asynchronous cooperative mobile robots. |
AINA |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Jakub Botwicz, Piotr Buciak, Piotr Sapiecha |
Building Dependable Intrusion Prevention Systems. |
DepCoS-RELCOMEX |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Daniel Thalmann, Patrick Salamin, Renaud Ott, Mario Gutiérrez, Frédéric Vexo |
Advanced Mixed Reality Technologies for Surveillance and Risk Prevention Applications. |
ISCIS |
2006 |
DBLP DOI BibTeX RDF |
Security, Virtual Reality, Virtual Environments, Eye-tracking, Surveillance, Haptic Interfaces, Handheld Devices, Teleoperation, Collaborative Environments |
33 | Xiaolin Lu |
A WEB-GIS Based Urgent Medical Rescue CSCW System for SARS Disease Prevention. |
GCC (1) |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Tian Song, Dongsheng Wang 0002, Zhizhong Tang |
A parameterized multilevel pattern matching architecture on FPGAs for network intrusion detection and prevention. |
Sci. China Ser. F Inf. Sci. |
2009 |
DBLP DOI BibTeX RDF |
network intrusion prevention, network security, pattern matching, network intrusion detection |
33 | Toshihiro Osaragi |
Estimating Spatio-Temporal Distribution of Railroad Users and Its Application to Disaster Prevention Planning. |
AGILE Conf. |
2009 |
DBLP DOI BibTeX RDF |
railroad user, spatio-temporal distribution, disaster prevention planning, person trip survey, difficulty returning home |
33 | Alexander Hoffmann, Daniel Spelmezan, Jan O. Borchers |
TypeRight: a keyboard with tactile error prevention. |
CHI |
2009 |
DBLP DOI BibTeX RDF |
adopting input device, haptic, text entry, tactile feedback, error prevention |
33 | Niklas Lavesson, Paul Davidsson, Martin Boldt, Andreas Jacobsson |
Spyware Prevention by Classifying End User License Agreements. |
New Challenges in Applied Intelligence Technologies |
2008 |
DBLP DOI BibTeX RDF |
EULA spyware classification prevention |
33 | Keijo Haataja |
New efficient intrusion detection and prevention system for Bluetooth networks. |
MOBILWARE |
2008 |
DBLP DOI BibTeX RDF |
ad-hoc networks, intrusion detection, Bluetooth, wireless security, intrusion prevention, security attacks |
33 | Stathis Th. Konstantinidis, Anastasia Kitsou, Panagiotis D. Bamidis, Themistoklis Mikos, Menelaos Zafrakas, Maria M. Nikolaidou, Costas Pappas, Theodoros Agorastos |
A SCORM Compliant e-learning Platform for Cervical Cancer Prevention. |
CBMS |
2008 |
DBLP DOI BibTeX RDF |
Healthcare LOM, Cervical Cancer Prevention, e-learning, metadata, SCORM, Medical Education, online training, IEEE LOM |
33 | Prithvi Bisht, V. N. Venkatakrishnan |
XSS-GUARD: Precise Dynamic Prevention of Cross-Site Scripting Attacks. |
DIMVA |
2008 |
DBLP DOI BibTeX RDF |
Attack Prevention, Security, Filtering, Cross-site scripting (XSS) |
33 | Pablo García Bringas, Yoseba K. Penya |
Next-Generation Misuse and Anomaly Prevention System. |
ICEIS |
2008 |
DBLP DOI BibTeX RDF |
Data mining, Machine learning, Bayesian networks, Anomaly detection, Intrusion prevention, Misuse detection |
33 | Konstantinos Xinidis, Ioannis Charitakis, Spyros Antonatos, Kostas G. Anagnostakis, Evangelos P. Markatos |
An Active Splitter Architecture for Intrusion Detection and Prevention. |
IEEE Trans. Dependable Secur. Comput. |
2006 |
DBLP DOI BibTeX RDF |
network processors, Network-level security and protection, intrusion detection and prevention |
33 | Juan M. Estévez-Tapiador |
Book Review: Practical Intrusion Prevention. |
IEEE Distributed Syst. Online |
2006 |
DBLP DOI BibTeX RDF |
IPS, intrusion prevention systems |
33 | Masato Goto, Akira Hattori, Takami Yasuda, Shigeki Yokoi |
A Web-Based System for Gathering and Sharing Experience and Knowledge Information in Local Crime Prevention. |
KES (2) |
2006 |
DBLP DOI BibTeX RDF |
Crime Prevention, Information Sharing, CMS, Local Community |
33 | Stephen S. Yau, Xinyu Zhang |
Computer Network Intrusion Detection, Assessment And Prevention Based on Security Dependency Relation. |
COMPSAC |
1999 |
DBLP DOI BibTeX RDF |
intrusion assessment, security dependency relation, agent, intrusion detection, Network security, intrusion prevention, ripple effect analysis |
33 | Valmir Carneiro Barbosa |
Strategies for the Prevention of Communication Deadlocks in Distributed Parallel Programs. |
IEEE Trans. Software Eng. |
1990 |
DBLP DOI BibTeX RDF |
randomly generated systems, distributed parallel programs, unavailability, message buffers, message buffering space, buffer usage, NP-hard optimization problems, computational complexity, parallel programming, concurrency, heuristic, upper bounds, programming theory, communication channels, deadlock prevention, process execution, communication deadlocks |
31 | Sangwook Bae, Keo Oudom, Young-Guk Ha, Sunyoung Han |
LBS system using online map in 3G networks environment. |
ICIS |
2009 |
DBLP DOI BibTeX RDF |
emergency rescue system, LBS, 3G networks, WIBRO, online map |
31 | Linda Dailey Paulson |
Stopping Intruders Outside the Gates. |
Computer |
2002 |
DBLP DOI BibTeX RDF |
|
31 | Y. J. Song, R. Z. Liu, T. N. Tan |
Digital Watermarking for Forgery Detection in Printed Materials. |
IEEE Pacific Rim Conference on Multimedia |
2001 |
DBLP DOI BibTeX RDF |
|
31 | Damian Dechev, Bjarne Stroustrup |
Scalable nonblocking concurrent objects for mission critical code. |
OOPSLA Companion |
2009 |
DBLP DOI BibTeX RDF |
ABA problem prevention, autonomous space software, C++, software transactional memory, nonblocking synchronization |
31 | Leelani Kumari Wickramasinghe, Christian Guttmann, Michael P. Georgeff, Hamid Gharib, Ian E. Thomas, Simon G. Thompson, Heinz W. Schmidt |
Agent-based intelligent collaborative care management. |
AAMAS (2) |
2009 |
DBLP BibTeX RDF |
adherence support, distribution/assignment problem, failure prevention, planning, service oriented computing, e-health, agent based systems |
31 | Joaquín García-Alfaro, Michael A. Jaeger, Gero Mühl, I. Barrera, Joan Borrell |
Distributed Exchange of Alerts for the Detection of Coordinated Attacks. |
CNSR |
2008 |
DBLP DOI BibTeX RDF |
Attack Prevention System, IDMEF, Network Security, Publish/Subscribe, Message Oriented Middleware |
31 | Simon P. Chung, Aloysius K. Mok |
Allergy Attack Against Automatic Signature Generation. |
RAID |
2006 |
DBLP DOI BibTeX RDF |
Automatic Signature Generation, Adaptive Response, Intrusion Prevention |
31 | Sushant Sinha, Farnam Jahanian, Jignesh M. Patel |
WIND: Workload-Aware INtrusion Detection. |
RAID |
2006 |
DBLP DOI BibTeX RDF |
workload aware, adaptive algorithm, deep packet inspection, Intrusion detection and prevention |
31 | Mohamed Kaâniche, Jean-Claude Laprie, Jean-Paul Blanquart |
Dependability Engineering of Complex Computing Systems. |
ICECCS |
2000 |
DBLP DOI BibTeX RDF |
dependability engineering, complex computing systems, development model, system creation process, classical development steps, dependability processes, fault prevention, fault forecasting, supporting processes, system creation activity, fault tolerance, software reliability, certification, quality assurance, dependable systems, checklist, fault removal |
25 | Yaping Jiang, Yong Gan, Jianhua Zhou, Zengyu Cai |
A Model of Intrusion Prevention Base on Immune. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
25 | ZhiWu Li 0001, MengChu Zhou, Naiqi Wu |
A Survey and Comparison of Petri Net-Based Deadlock Prevention Policies for Flexible Manufacturing Systems. |
IEEE Trans. Syst. Man Cybern. Part C |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Luigi Piroddi, Roberto Cordone, Ivano Fumagalli |
Selective Siphon Control for Deadlock Prevention in Petri Nets. |
IEEE Trans. Syst. Man Cybern. Part A |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Danielle Chrun, Michel Cukier, Gerry Sneeringer |
On the Use of Security Metrics Based on Intrusion Prevention System Event Data: An Empirical Analysis. |
HASE |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Milon Gupta, Laure Chotard, Ólafur Ingþórsson, João Bastos, Isabel Borges |
Health@Home - An e-Service Model for Disease Prevention and Healthcare in the Home. |
eHealth |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Guangyu He, Yingyou Wen, Hong Zhao |
SPIT Detection and Prevention Method in VoIP Environment. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Felix Salfner, Katinka Wolter |
Replication vs. Failure Prevention - How to Boost Service Availability? |
ISSRE |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Ryan D. Riley, Xuxian Jiang, Dongyan Xu |
Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Kjetil Haslum, Marie Elisabeth Gaup Moe, Svein J. Knapskog |
Real-time intrusion prevention and security analysis of networks using HMMs. |
LCN |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Heejo Lee, Minjin Kwon, Geoffrey Hasker, Adrian Perrig |
BASE: an incrementally deployable mechanism for viable IP spoofing prevention. |
AsiaCCS |
2007 |
DBLP DOI BibTeX RDF |
BGP anti-spoofing extension, packet marking and filtering, DDoS attack, IP spoofing |
25 | Kjetil Haslum, Ajith Abraham, Svein J. Knapskog |
DIPS: A Framework for Distributed Intrusion Prediction and Prevention Using Hidden Markov Models and Online Fuzzy Risk Assessment. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Miyuki Hanaoka, Kenji Kono, Makoto Shimamura, Satoshi Yamaguchi |
An Efficient TCP Reassembler Mechanism for Layer7-aware Network Intrusion Detection/Prevention Systems. |
ISCC |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Yoshifumi Nishida, Yoichi Motomura, Koji Kitamura, Tatsuhiro Yamanaka, Hiroshi Mizoguchi |
Methodology of Everyday Life Computing and Application to Children Injury Prevention. |
FOCI |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Simon P. Chung, Aloysius K. Mok |
Collaborative Intrusion Prevention. |
WETICE |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Yi-Sheng Huang, MuDer Jeng, Xiaolan Xie, Da-Hsiang Chung |
Siphon-Based Deadlock Prevention Policy for Flexible Manufacturing Systems. |
IEEE Trans. Syst. Man Cybern. Part A |
2006 |
DBLP DOI BibTeX RDF |
|
25 | René V. Mayorga, Pronnapa Sanongboon |
An Artificial Neural Network Approach for Inverse Kinematics Computation and Singularities Prevention of Redundant Manipulators. |
J. Intell. Robotic Syst. |
2005 |
DBLP DOI BibTeX RDF |
manipulator path planning, singularities avoidance, artificial neural networks, inverse kinematics, redundant manipulators |
25 | Gertrude Neuman Levine |
The classification of deadlock prevention and avoidance is erroneous. |
ACM SIGOPS Oper. Syst. Rev. |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Luz Marina Quiroga, Pablo Villatoro |
Recommendations for an Integrated Information System at the Chilean National Council for Drug Prevention. |
HICSS |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Petar Djekic, Claudia Löbbecke |
Software Piracy Prevention through Digital Rights Management Systems. |
CEC |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Victor Serdiouk |
Behavior-Based Model of Detection and Prevention of Intrusions in Computer Networks. |
MMM-ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Hee Seok Song, Jae Kyeong Kim, Yeong Bin Cho, Soung Hie Kim |
A Personalized Defection Detection and Prevention Procedure based on the Self-Organizing Map and Association Rule Mining: Applied to Online Game Site. |
Artif. Intell. Rev. |
2004 |
DBLP DOI BibTeX RDF |
customer retention, data mining, Self-organizing map, association rule mining, customer relationship management |
25 | Zhiwu Li 0001, Jingwei Liang, Yang Lu, Anrong Wang |
A deadlock prevention method for FMS with multiple resource acquisitions. |
ICARCV |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Zhiwu Li 0001, Haibin Xia, Anrong Wang |
An effective deadlock prevention policy using elementary siphons of Petri nets for FMS. |
ICARCV |
2004 |
DBLP DOI BibTeX RDF |
|
25 | ZhiWu Li 0001, XiangFeng Zhang |
A deadlock prevention approach using elementary siphons for a class of Petri nets. |
SMC (2) |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Todd S. Sproull, John W. Lockwood |
Distributed Instrusion Prevention in Active and Extensible Networks. |
IWAN |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Josef Pieprzyk, Xian-Mo Zhang |
Cheating Prevention in Linear Secret Sharing. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
Linear Secret Sharing Schemes, Cheating Identification, Cryptography, Secret Sharing, Cheating Detection |
25 | Jeng-Jie Peng, Ming-Dou Ker, Hsin-Chin Jiang |
Latchup current self-stop circuit for whole-chip latchup prevention in bulk CMOS integrated circuits. |
ISCAS (5) |
2002 |
DBLP DOI BibTeX RDF |
|
25 | Marian V. Iordache, Panos J. Antsaklis |
Generalized Conditions for Liveness Enforcement and Deadlock Prevention in Petri Nets. |
ICATPN |
2001 |
DBLP DOI BibTeX RDF |
|
25 | Yoshikiyo Kato, Takehisa Yairi, Koichi Hori |
Integrating Data Mining Techniques and Design Information Management for Failure Prevention. |
JSAI Workshops |
2001 |
DBLP DOI BibTeX RDF |
|
25 | Blas Cuesta Saez, Antonio Robles, José Duato |
Efficient and Scalable Starvation Prevention Mechanism for Token Coherence. |
IEEE Trans. Parallel Distributed Syst. |
2011 |
DBLP DOI BibTeX RDF |
token coherence, starvation prevention, scalability, Cache coherence |
25 | Jing Bi, Zhiliang Zhu 0001, Haitao Yuan 0001, Yushun Fan, Ming Tie |
A Petri Net Based Hybrid Optimal Controller for Deadlock Prevention in Web Service Composition. |
ICWS |
2011 |
DBLP DOI BibTeX RDF |
Controlled Petri net, hybrid optimal controller, web service composition, compatibility, deadlock prevention |
25 | Helen Balinsky, David Subirós Perez, Steven J. Simske |
System Call Interception Framework for Data Leak Prevention. |
EDOC |
2011 |
DBLP DOI BibTeX RDF |
data leak prevention, security, policy enforcement, system calls interception |
25 | Simon Liu, Rick Kuhn |
Data Loss Prevention. |
IT Prof. |
2010 |
DBLP DOI BibTeX RDF |
data loss prevention |
25 | Xiao-hui Zeng, Wen-lang Luo, Jin-tao Zeng, Yan-ping Chen, Shi-yao Jin |
Research on a High Efficient Intrusion Prevention Model. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
network security, distributed scheduling, intrusion prevention, network attack, network intrusion |
25 | Saskia M. Kelders, Julia E. W. C. van Gemert-Pijnen, Andrea Werkman, Erwin R. Seydel |
Usage and Effect of a Web-Based Intervention for the Prevention of Overweight; a Randomized Controlled Trial. |
eTELEMED |
2010 |
DBLP DOI BibTeX RDF |
RCT, eHealth, intervention, usage, prevention |
25 | Atefeh Tajpour, Mohammad JorJor Zadeh Shooshtari |
Evaluation of SQL Injection Detection and Prevention Techniques. |
CICSyN |
2010 |
DBLP DOI BibTeX RDF |
evaluation, detection, technique, SQL Injection Attacks, prevention |
25 | Adnan Nadeem, Michael P. Howarth |
Adaptive intrusion detection & prevention of denial of service attacks in MANETs. |
IWCMC |
2009 |
DBLP DOI BibTeX RDF |
intrusion detection & prevention, ad-hoc network security |
25 | Jianchao Han, Mohsen Beheshti, Kazimierz Kowalski, Joel Ortiz, Johnly Tomelden |
Component-Based Software Architecture Design for Network Intrusion Detection and Prevention System. |
ITNG |
2009 |
DBLP DOI BibTeX RDF |
network security, software reuse, Component-based software engineering, intrusion detection and prevention |
25 | Yosuke Horiuchi, Osamu Uchida |
A Falsification Prevention Method for Face Authentication Using Light. |
IIH-MSP |
2009 |
DBLP DOI BibTeX RDF |
falsification prevention, face detection, face authentication |
25 | Rok Bojanc, Borka Jerman-Blazic |
Standard Approach for Quantification of the ICT Security Investment for Cybercrime Prevention. |
ICDS |
2008 |
DBLP DOI BibTeX RDF |
security technology investment, cybercrime prevention, information security |
25 | Rainer Blaser, M. Schnabel, D. Mann, P. Jancke, Klaus Kuhn 0001, Richard Lenz |
Potential prevention of medical errors in casualty surgery by using information technology. |
SAC |
2004 |
DBLP DOI BibTeX RDF |
Failure Mode and Effect Analysis, demand driven system evolution, electronic discharge letters, medical error prevention, structured reporting |
25 | Bertrand Anckaert, Bjorn De Sutter, Koen De Bosschere |
Software piracy prevention through diversity. |
Digital Rights Management Workshop |
2004 |
DBLP DOI BibTeX RDF |
software piracy prevention, tailored updates, authentication, diversity, identification, copyright protection, intellectual property protection |
25 | R. Geoff Dromey |
Software Quality-Prevention versus Cure? |
Softw. Qual. J. |
2003 |
DBLP DOI BibTeX RDF |
product quality models, defect prevention, quality-carrying properties, component-based quality, software inspection, software defects, acceptance testing |
25 | David Gelernter |
A DAG-Based Algorithm for Prevention of Store-and-Forward Deadlock in Packet Networks. |
IEEE Trans. Computers |
1981 |
DBLP DOI BibTeX RDF |
store-and-forward deadlock, network operating systems, deadlock prevention, packet networks, Communication software |
23 | Baowen Zhang, Jing Zhang, Ning Zhou, Mingang Chen |
Evaluating the Disaster Defense Ability of Information Systems. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Chuen-Ching Wang, Yih-Chuan Lin, Shu-Chung Yi |
Satellite Interference Detection Using Real-Time Watermarking Technique for SMS. |
ICITA (2) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Neil C. Rowe, Jim Coffman, Yilmaz Degirmenci, Scott Hall, Shong Lee, Clifton Williams |
Automatic removal of advertising from web-page display. |
JCDL |
2002 |
DBLP DOI BibTeX RDF |
information retrieval, World Wide Web, images, information filtering, advertising |
23 | Dimitrios S. Nikolopoulos, Constantine D. Polychronopoulos |
Adaptive Scheduling under Memory Pressure on Multiprogrammed Cluster. |
CCGRID |
2002 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 5944 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|