|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 3074 occurrences of 1561 keywords
|
|
|
Results
Found 3534 publication records. Showing 3534 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
57 | Seong-Hee Bae, Jaejoon Kim |
Personal Information Protection Model Based on Mobile Agent. |
ITNG |
2010 |
DBLP DOI BibTeX RDF |
Information protect model, personal information protect, privacy protection policy, mobile agent |
36 | Ming-Hour Yang, Jain-Shing Wu, Shih-Jen Chen |
Protect mobile RFID location privacy using dynamic identity. |
IEEE ICCI |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Luigi Ciminiera, Adriano Valenzano |
Authentication Mechanisms in Microprocessor-Based Local Area Networks. |
IEEE Trans. Software Eng. |
1989 |
DBLP DOI BibTeX RDF |
authentication mechanisms, microprocessor-based local area networks, unauthorized use, intruders, interface process, user-server connection, unauthorized requests, capability checking, iAPX432-based hosts, database, cache, searching, service, local area networks, security of data, identity, protect, server, hardware support, shared resources, parallel search, access rights, check, performance issues |
31 | Shao Wei-jie |
An Analysis to the Protection of Commercial Secrets and Strategies to Protect. |
CSSE (5) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Paavo Ritala, Aino Kianto, Mika Vanhala, Henri Hussinki |
To protect or not to protect? Renewal capital, knowledge protection and innovation performance. |
J. Knowl. Manag. |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Christopher Jelesnianski, Mohannad Ismail, Yeongjin Jang, Dan Williams, Changwoo Min |
Protect the System Call, Protect (Most of) the World with BASTION. |
ASPLOS (3) |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Jayanth Shenoy, Zikun Liu, Bill Tao, Zachary Kabelac, Deepak Vasisht |
RF-Protect: Wireless Ghosts to Protect Against Device-Free Human Tracking. |
GetMobile Mob. Comput. Commun. |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Grace Fox |
"To protect my health or to protect my health privacy?" A mixed-methods investigation of the privacy paradox. |
J. Assoc. Inf. Sci. Technol. |
2020 |
DBLP DOI BibTeX RDF |
|
29 | Eric Shieh, Bo An 0001, Rong Yang, Milind Tambe, Craig Baldwin, Joseph DiRenzo, Ben Maule, Garrett Meyer |
PROTECT: a deployed game theoretic system to protect the ports of the United States. |
AAMAS |
2012 |
DBLP BibTeX RDF |
|
28 | Zhefeng Qiao, Junzhong Gu, Xin Lin, Jing Chen |
Privacy-Preserving Skyline Queries in LBS. |
MVHI |
2010 |
DBLP DOI BibTeX RDF |
Range to Ranges Skyline query, Point to Ranges Skyline query, LBS, Privacy-Protect |
28 | Muntaha Alawneh, Imad M. Abbadi |
Preventing information leakage between collaborating organisations. |
ICEC |
2008 |
DBLP DOI BibTeX RDF |
collaborating organisations, enterprise rights management, share but protect |
27 | Pamela J. Hinds |
The Hidden Cost of Keeping Secrets: How Protecting Proprietary Information Can Inhibit Creativity. |
HICSS |
2000 |
DBLP DOI BibTeX RDF |
|
25 | Hsin-Yu Chen, Hsiang-An Wang, Chin-Lung Lin |
Using Watermarks and Offline DRM to Protect Digital Images in DIAS. |
ECDL |
2007 |
DBLP DOI BibTeX RDF |
watermark, DRM, digital image, Flash |
25 | Jen-Chieh Lai, Chia-Hui Wang |
Buffer Occupancy Feedback Security Control and Changing Encryption Keys to Protect MOD Services. |
PSIVT |
2006 |
DBLP DOI BibTeX RDF |
encryption/decryption, playback buffer occupancy (PBO), feedback control, MOD |
25 | Chin-Chen Chang 0001, Ren-Junn Hwang |
A New Scheme to Protect Confidential Images. |
AINA (1) |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Sarah Giessing, Dietz Repsilber |
Tools and Strategies to Protect Multiples Tables with the GHQUAR Cell Suppression Engine. |
Inference Control in Statistical Databases |
2002 |
DBLP DOI BibTeX RDF |
|
25 | Fritz Hohl |
A Framework to Protect Mobile Agents by using Reference States. |
ICDCS |
2000 |
DBLP DOI BibTeX RDF |
|
22 | Brian Rogers, Chenyu Yan, Siddhartha Chhabra, Milos Prvulovic, Yan Solihin |
Single-level integrity and confidentiality protection for distributed shared memory multiprocessors. |
HPCA |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Ying-zong Huang, John G. Apostolopoulos |
Making Packet Erasures to Improve Quality of FEC-Protected Video. |
ICIP |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Zhefan Jiang, Sangok Kim, Kanghee Lee, Hyunchul Bae, Sangwook Kim |
Security Service Framework for Home Network. |
ACIS-ICIS |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Michael M. Swift, Anne Hopkins, Peter Brundrett, Cliff Van Dyke, Praerit Garg, Shannon Chan, Mario Goertzel, Gregory Jensenworth |
Improving the granularity of access control for Windows 2000. |
ACM Trans. Inf. Syst. Secur. |
2002 |
DBLP DOI BibTeX RDF |
Microsoft Windows 2000, active directory, Microsoft Windows (OS), Windows NT, Access control lists |
20 | Mehrab Monjur, Sheikh Iqbal Ahamed |
Towards a landmark influence framework to protect location privacy. |
SAC |
2009 |
DBLP DOI BibTeX RDF |
landmark influence space, Voronoi diagram, location privacy |
20 | Eric Y. Chen, Mitsutaka Ito |
Using end-to-middle security to protect against evil twin access points. |
WOWMOM |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Fangyong Hou, Nong Xiao, Yuhua Tang, Hongjun He, Fang Liu 0002 |
Protect Disk Integrity: Solid Security, Fine Performance and Fast Recovery. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
hash tree, performance, integrity, consistency, disk |
20 | Hannes Tschofenig, Rainer Falk, Jon Peterson, Jeff Hodges, Douglas C. Sicker, James M. Polk |
Using SAML to protect the session initiation protocol (SIP). |
IEEE Netw. |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Byung Ryong Kim, Ki-Chang Kim |
Packet Manipulating Based on Zipf's Distribution to Protect from Attack in P2P Information Retrieval. |
Advances in Web Intelligence and Data Mining |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Sung Ki Kim, Byoung-Joon Min |
Inter-domain Security Management to Protect Legitimate User Access from DDoS Attacks. |
ICCSA (2) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Jehan-François Pâris, Darrell D. E. Long |
Using device diversity to protect data against batch-correlated disk failures. |
StorageSS |
2006 |
DBLP DOI BibTeX RDF |
disk array reliability, disk mirroring, RAID |
20 | Marc L. Corliss, E. Christopher Lewis, Amir Roth |
Using DISE to protect return addresses from attack. |
SIGARCH Comput. Archit. News |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Jung-Taek Seo, Cheolho Lee, Jungtae Kim, Taeshik Shon, Jongsub Moon |
Probabilistic Packet Filtering Model to Protect Web Server from DDoS Attacks. |
NPC |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Haidong Xia, Jayashree Kanchana, José Carlos Brustoloni |
Using Secure Coprocessors to Protect Access to Enterprise Networks. |
NETWORKING |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Nicolas T. Courtois, Louis Goubin |
An Algebraic Masking Method to Protect AES Against Power Attacks. |
ICISC |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Yang Xiang 0001, Wanlei Zhou 0001 |
Protect Grids from DDoS Attacks. |
GCC |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Alan F. Karr, Adrian Dobra, Ashish P. Sanil |
Table servers protect confidentiality in tabular data releases. |
Commun. ACM |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Joe Kilian, Phillip Rogaway |
How to Protect DES Against Exhaustive Key Search. |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
|
16 | Gabriel Ghinita, Panos Kalnis, Murat Kantarcioglu, Elisa Bertino |
A Hybrid Technique for Private Location-Based Queries with Database Protection. |
SSTD |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Matthieu Rivain |
Differential Fault Analysis on DES Middle Rounds. |
CHES |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Kimberly C. Claffy |
"Show me the data": resolving challenges in network data sharing. |
NDA |
2008 |
DBLP DOI BibTeX RDF |
protected data-sharing, anonymization |
16 | Ken Komiya, Masayuki Yamamura, John A. Rose |
Experimental Validation of Signal Dependent Operation in Whiplash PCR. |
DNA |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Kazuhiro Haramura, Maki Yoshida, Toru Fujiwara |
Anonymous Fingerprinting for Predelivery of Contents. |
ICISC |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Aristides Mpitziopoulos, Charalampos Konstantopoulos, Damianos Gavalas, Grammati E. Pantziou |
Hazard monitoring for visually impaired people enabled by wireless sensor networking technology. |
PETRA |
2008 |
DBLP DOI BibTeX RDF |
hazard monitoring, itinerary design, wireless sensor networks, mobile agents, healthcare, assistive environments, itineraries |
16 | Chu-Hsing Lin, Jung-Chun Liu, Chih-Hsiong Shih, Yan-Wei Lee |
A Robust Watermark Scheme for Copyright Protection. |
MUE |
2008 |
DBLP DOI BibTeX RDF |
distributed discrete wavelet transformation, image attacks, watermark, singular value decomposition, copyright protection |
16 | Jordi Pont-Tuset, Pau Medrano-Gracia, Jordi Nin, Josep Lluís Larriba-Pey, Victor Muntés-Mulero |
ONN the Use of Neural Networks for Data Privacy. |
SOFSEM |
2008 |
DBLP DOI BibTeX RDF |
Perturbative protection methods, Privacy in statistical databases, Artificial Neural Networks, Data preprocessing |
16 | Jeffrey S. Dwoskin, Ruby B. Lee |
Hardware-rooted trust for secure key management and transient trust. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
hardware policy enforcement, secret protection (sp), transient trust, key management, emergency response, secure processors |
16 | Zhiyong Shan, Qiuyue Wang, Xiaofeng Meng 0001 |
An OS Security Protection Model for Defeating Attacks from Network. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
Access Control, information flow |
16 | Zhensong Liao, Hai Jin 0001, Deqing Zou |
A Hidden Credential Based Oblivious Automated Trust Negotiation Model. |
ICEBE |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Daesung Moon, Sungju Lee, Seunghwan Jung, Yongwha Chung, Miae Park, Okyeon Yi |
Fingerprint Template Protection Using Fuzzy Vault. |
ICCSA (3) |
2007 |
DBLP DOI BibTeX RDF |
Crypto-Biometric, Template Protection, Fuzzy Vault |
16 | Shun Hattori, Katsumi Tanaka |
Secure Spaces: Protecting Freedom of Information Access in Public Places. |
ICOST |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Ravi S. Sandhu, Kumar Ranganathan, Xinwen Zhang |
Secure information sharing enabled by Trusted Computing and PEI models. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
PEI models, secure information sharing, access control, authorization, trusted computing, security framework |
16 | Hua Wang 0002, Yanchun Zhang, Jinli Cao |
Ubiquitous computing environments and its usage access control. |
Infoscale |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Rajesh Garg, Nikhil Jayakumar, Sunil P. Khatri, Gwan Choi |
A design approach for radiation-hard digital electronics. |
DAC |
2006 |
DBLP DOI BibTeX RDF |
radiation-hard, SEU |
16 | Wenbing Zhao 0001, Louise E. Moser, P. M. Melliar-Smith |
Unification of Transactions and Replication in Three-Tier Architectures Based on CORBA. |
IEEE Trans. Dependable Secur. Comput. |
2005 |
DBLP DOI BibTeX RDF |
Fault tolerance, CORBA, replication, transaction processing, three-tier architectures |
16 | Tian Zhao, John Tang Boyland |
Type Annotations to Improve Stack-Based Access Control. |
CSFW |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Liwen He |
A Verified Distance Vector Routing Protocol for Protection of Internet Infrastructure. |
ICN (2) |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Yu-Cheng Fan, Hen-Wai Tsao |
A Dual Pyramid Watermarking for JPEG-2000. |
AINA |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Todd S. Sproull, John W. Lockwood |
Distributed Instrusion Prevention in Active and Extensible Networks. |
IWAN |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Bok-Nyong Park, Jae-Won Kim, Wonjun Lee 0001 |
PrecePt: A Privacy-Enhancing License Management Protocol for Digital Rights Management. |
AINA (1) |
2004 |
DBLP DOI BibTeX RDF |
License Management Protocol, Privacy, Anonymity, Public-Key Cryptosystem, DRM |
16 | Stuart E. Schechter, Michael D. Smith 0001 |
How Much Security Is Enough to Stop a Thief?: The Economics of Outsider Theft via Computer Systems and Networks. |
Financial Cryptography |
2003 |
DBLP DOI BibTeX RDF |
Theft, Exploits, Threat Models, Security Economics |
16 | Whe Dar Lin |
A Firewall Approach to Personal Knowledge System. |
CBMS |
2003 |
DBLP DOI BibTeX RDF |
|
16 | Terri Oda, Tony White |
Developing an Immunity to Spam. |
GECCO |
2003 |
DBLP DOI BibTeX RDF |
|
16 | Lawrence A. Gordon, Martin P. Loeb |
The economics of information security investment. |
ACM Trans. Inf. Syst. Secur. |
2002 |
DBLP DOI BibTeX RDF |
Optimal security investment |
16 | Pascal Felber, Priya Narasimhan |
Reconciling Replication and Transactions for the End-to-End Reliability of CORBA Applications. |
OTM |
2002 |
DBLP DOI BibTeX RDF |
|
16 | Ming-Dong Feng, Chung-Kwong Yuen |
Detection of Races and Control-Flow Nondeterminism. |
LCR |
1998 |
DBLP DOI BibTeX RDF |
|
16 | Peter Wegner |
Granularity of modules in object-based concurrent systems. |
OOPSLA/ECOOP Workshop on Object-based Concurrent Programming |
1988 |
DBLP DOI BibTeX RDF |
|
16 | Andrew J. Clark |
Physical Protection of Cryptographic Devices. |
EUROCRYPT |
1987 |
DBLP DOI BibTeX RDF |
|
15 | Xiaoting Li 0001, Lingwei Chen, Dinghao Wu |
Adversary for Social Good: Leveraging Adversarial Attacks to Protect Personal Attribute Privacy. |
ACM Trans. Knowl. Discov. Data |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Zengrui Liu, Umar Iqbal 0002, Nitesh Saxena |
Opted Out, Yet Tracked: Are Regulations Enough to Protect Your Privacy? |
Proc. Priv. Enhancing Technol. |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Kamil Mamak |
Should criminal law protect love relation with robots? |
AI Soc. |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Imran Memon, Riaz Ahmed Shaikh 0001, Hidayatullah Shaikh |
Dynamic pseudonyms trust-based model to protect attack scenario for internet of vehicle ad-hoc networks. |
Multim. Tools Appl. |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Vivek Mankotia, Ramesh Kumar Sunkaria, Shashi Gurung |
DTAM: A Dynamic Threshold and Monitoring Based Technique to Protect Mobile Ad-hoc Network from Black-Hole and Flooding Attacks. |
Wirel. Pers. Commun. |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Leslie D. McIntosh, Cynthia Hudson-Vitale |
Forensic Scientometrics - An emerging discipline to protect the scholarly record. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Guanlin Li, Shuai Yang, Jie Zhang, Tianwei Zhang 0004 |
PRIME: Protect Your Videos From Malicious Editing. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Andrew W. Macpherson |
Do backrun auctions protect traders? |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Navid Ashrafi, Vera Schmitt, Robert P. Spang, Sebastian Möller 0001, Jan-Niklas Voigt-Antons |
Protect and Extend - Using GANs for Synthetic Data Generation of Time-Series Medical Records. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Shiwei Lu, Ruihu Li, Wenbin Liu |
FedDAA: a robust federated learning framework to protect privacy and defend against adversarial attack. |
Frontiers Comput. Sci. |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Lili Zhang, Perihan Elif Ekmekci, Virginia Murray, Burcak Basbug Erkan, Francis P. Crawley, Xueting Li, Yandi Li |
The 'PROTECT' Essential Elements in Managing Crisis Data Policies. |
Data Sci. J. |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Rob Romijnders, Christos Louizos, Yuki M. Asano, Max Welling |
Protect Your Score: Contact-Tracing with Differential Privacy Guarantees. |
AAAI |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Timothy Chu, Zhao Song 0002, Chiwun Yang |
How to Protect Copyright Data in Optimization of Large Language Models? |
AAAI |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Satoru Matsumoto, Tomoki Yoshihisa, Hideyuki Shimonishi, Tomoya Kawakami, Yuuichi Teranishi |
Implementation and Evaluation of a Facial Image Obscuring Method for Person Identification to Protect Personal Data. |
CCNC |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Qili Wang, Xinzhi Rao, Alice Li, Liangfei Qiu |
Do Masks Protect Children? Evidence from Florida's Mask Mandate Ban Using Large-Scale School Transmission Data. |
HICSS |
2024 |
DBLP BibTeX RDF |
|
15 | Bo Guan, Shuangqing Wei, Amir Houmansadr, Hossein Pishro-Nik, Dennis Goeckel |
Optimal Obfuscation to Protect Client Privacy in Federated Learning. |
CISS |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Chenxi Qiu, Sourabh Yadav, Yuede Ji, Anna Cinzia Squicciarini, Ram Dantu, Juanjuan Zhao, Cheng-Zhong Xu 0001 |
Fine-Grained Geo-Obfuscation to Protect Workers' Location Privacy in Time-Sensitive Spatial Crowdsourcing. |
EDBT |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Sungsik Park, Woochoel Shin, Jinhong Xie |
Disclosure in Incentivized Reviews: Does It Protect Consumers? |
Manag. Sci. |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Gadde Swetha, J. Amutharaj, S. Usha |
A security model to protect the isolation of medical data in the cloud using hybrid cryptography. |
J. Inf. Secur. Appl. |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Güler Aksüt, Tamer Eren |
Evaluation of personal protective equipment to protect health and safety in pesticide use. |
Frontiers Appl. Math. Stat. |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Wenjing Yin |
Zero-Knowledge Proof Intelligent Recommendation System to Protect Students' Data Privacy in the Digital Age. |
Appl. Artif. Intell. |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Malhar Patel, Ittai Dayan, Elliot K. Fishman, Mona Flores, Fiona J. Gilbert, Michal Guindy, Eugene J. Koay, Michael Rosenthal, Holger R. Roth, Marius George Linguraru |
Accelerating artificial intelligence: How federated learning can protect privacy, facilitate collaboration, and improve outcomes. |
Health Informatics J. |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Linjiang Xie, Feilu Hang, Wei Guo, Zhenhong Zhang, Hanruo Li |
Data-centric Networking with Parallel and Distributed Architecture Performs Performance Analysis to Protect Critical Infrastructure in the Future Power System Network Based on IoT. |
Parallel Process. Lett. |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Tuka Kareem Jebur |
Proposed Hybrid Secured Method to Protect Against DDOS in n Vehicular Adhoc Network (VANET). |
Int. J. Interact. Mob. Technol. |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Sahel Alouneh |
A Multi-Path Approach to Protect DNS Against DDoS Attacks. |
J. Cyber Secur. Mobil. |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Vivek Singh Baghel, Syed Sadaf Ali, Surya Prakash 0001 |
A non-invertible transformation based technique to protect a fingerprint template. |
IET Image Process. |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Sumit Kumar Rana, Arun Kumar Rana, Sanjeev Kumar Rana, Vishnu Sharma, Umesh Kumar Lilhore, Osamah Ibrahim Khalaf, Antonino Galletta |
Decentralized Model to Protect Digital Evidence via Smart Contracts Using Layer 2 Polygon Blockchain. |
IEEE Access |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Bruna V. Dos Santos, Andressa Vergütz, Ricardo T. Macedo, Michele Nogueira |
A dynamic method to protect user privacy against traffic-based attacks on smart home. |
Ad Hoc Networks |
2023 |
DBLP DOI BibTeX RDF |
|
15 | P. Neelakantan |
A secure framework for the cloud to protect the virtual machine from malicious events. |
Multim. Tools Appl. |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Ying Joey Zhou, Aarti Ramchandran, Saskia Haegens |
Alpha oscillations protect working memory against distracters in a modality-specific way. |
NeuroImage |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Thuy M. Pham, Miroslav Mitev, Arsenia Chorti, Gerhard P. Fettweis |
Pilot Randomization to Protect MIMO Secret Key Generation Systems Against Injection Attacks. |
IEEE Wirel. Commun. Lett. |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Aaro Tupasela, Juanita Devis-Clavijo, Marjut Salokannel, Christoph Fink |
Older people and the smart city - Developing inclusive practices to protect and serve a vulnerable population. |
Internet Policy Rev. |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Umar S. Suryahatmaja, Mehdi Mrad, Mohamed Naceur Azaiez, Asma Ben Yaghlane, Anis Gharbi |
The K Critical Path Sets to Protect in Interdiction Networks Under Limited Defensive Resources. |
IEEE Trans. Netw. Serv. Manag. |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Amin Mohammadi, Mohsen Jannati, Mohammadreza Shams |
Using Deep Transfer Learning Technique to Protect Electrical Distribution Systems Against High-Impedance Faults. |
IEEE Syst. J. |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Ahmad Taher Azar, Esraa Shehab, Ahmed M. Mattar, Ibrahim A. Hameed, Shaimaa Ahmed El-Said |
Deep Learning Based Hybrid Intrusion Detection Systems to Protect Satellite Networks. |
J. Netw. Syst. Manag. |
2023 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 3534 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|