The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for protect with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1965-1985 (16) 1986-1989 (18) 1990-1994 (24) 1995-1996 (26) 1997 (18) 1998 (27) 1999 (42) 2000 (57) 2001 (89) 2002 (102) 2003 (161) 2004 (235) 2005 (364) 2006 (394) 2007 (405) 2008 (419) 2009 (274) 2010 (70) 2011 (26) 2012 (43) 2013 (34) 2014 (45) 2015 (52) 2016 (58) 2017 (53) 2018 (63) 2019 (82) 2020 (60) 2021 (92) 2022 (86) 2023 (82) 2024 (17)
Publication types (Num. hits)
article(805) book(1) incollection(22) inproceedings(2695) phdthesis(11)
Venues (Conferences, Journals, ...)
CoRR(73) HICSS(35) ACSAC(32) IEEE Secur. Priv.(32) SAC(29) ARES(28) ISCC(25) CCS(22) ICC(21) IEEE Access(20) Computer(19) AsiaCCS(18) CRYPTO(17) ICDCS(16) LCN(16) CHES(15) More (+10 of total 1374)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 3074 occurrences of 1561 keywords

Results
Found 3534 publication records. Showing 3534 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
57Seong-Hee Bae, Jaejoon Kim Personal Information Protection Model Based on Mobile Agent. Search on Bibsonomy ITNG The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Information protect model, personal information protect, privacy protection policy, mobile agent
36Ming-Hour Yang, Jain-Shing Wu, Shih-Jen Chen Protect mobile RFID location privacy using dynamic identity. Search on Bibsonomy IEEE ICCI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
34Luigi Ciminiera, Adriano Valenzano Authentication Mechanisms in Microprocessor-Based Local Area Networks. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1989 DBLP  DOI  BibTeX  RDF authentication mechanisms, microprocessor-based local area networks, unauthorized use, intruders, interface process, user-server connection, unauthorized requests, capability checking, iAPX432-based hosts, database, cache, searching, service, local area networks, security of data, identity, protect, server, hardware support, shared resources, parallel search, access rights, check, performance issues
31Shao Wei-jie An Analysis to the Protection of Commercial Secrets and Strategies to Protect. Search on Bibsonomy CSSE (5) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Paavo Ritala, Aino Kianto, Mika Vanhala, Henri Hussinki To protect or not to protect? Renewal capital, knowledge protection and innovation performance. Search on Bibsonomy J. Knowl. Manag. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
29Christopher Jelesnianski, Mohannad Ismail, Yeongjin Jang, Dan Williams, Changwoo Min Protect the System Call, Protect (Most of) the World with BASTION. Search on Bibsonomy ASPLOS (3) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
29Jayanth Shenoy, Zikun Liu, Bill Tao, Zachary Kabelac, Deepak Vasisht RF-Protect: Wireless Ghosts to Protect Against Device-Free Human Tracking. Search on Bibsonomy GetMobile Mob. Comput. Commun. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
29Grace Fox "To protect my health or to protect my health privacy?" A mixed-methods investigation of the privacy paradox. Search on Bibsonomy J. Assoc. Inf. Sci. Technol. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
29Eric Shieh, Bo An 0001, Rong Yang, Milind Tambe, Craig Baldwin, Joseph DiRenzo, Ben Maule, Garrett Meyer PROTECT: a deployed game theoretic system to protect the ports of the United States. Search on Bibsonomy AAMAS The full citation details ... 2012 DBLP  BibTeX  RDF
28Zhefeng Qiao, Junzhong Gu, Xin Lin, Jing Chen Privacy-Preserving Skyline Queries in LBS. Search on Bibsonomy MVHI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Range to Ranges Skyline query, Point to Ranges Skyline query, LBS, Privacy-Protect
28Muntaha Alawneh, Imad M. Abbadi Preventing information leakage between collaborating organisations. Search on Bibsonomy ICEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF collaborating organisations, enterprise rights management, share but protect
27Pamela J. Hinds The Hidden Cost of Keeping Secrets: How Protecting Proprietary Information Can Inhibit Creativity. Search on Bibsonomy HICSS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
25Hsin-Yu Chen, Hsiang-An Wang, Chin-Lung Lin Using Watermarks and Offline DRM to Protect Digital Images in DIAS. Search on Bibsonomy ECDL The full citation details ... 2007 DBLP  DOI  BibTeX  RDF watermark, DRM, digital image, Flash
25Jen-Chieh Lai, Chia-Hui Wang Buffer Occupancy Feedback Security Control and Changing Encryption Keys to Protect MOD Services. Search on Bibsonomy PSIVT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF encryption/decryption, playback buffer occupancy (PBO), feedback control, MOD
25Chin-Chen Chang 0001, Ren-Junn Hwang A New Scheme to Protect Confidential Images. Search on Bibsonomy AINA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
25Sarah Giessing, Dietz Repsilber Tools and Strategies to Protect Multiples Tables with the GHQUAR Cell Suppression Engine. Search on Bibsonomy Inference Control in Statistical Databases The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
25Fritz Hohl A Framework to Protect Mobile Agents by using Reference States. Search on Bibsonomy ICDCS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
22Brian Rogers, Chenyu Yan, Siddhartha Chhabra, Milos Prvulovic, Yan Solihin Single-level integrity and confidentiality protection for distributed shared memory multiprocessors. Search on Bibsonomy HPCA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Ying-zong Huang, John G. Apostolopoulos Making Packet Erasures to Improve Quality of FEC-Protected Video. Search on Bibsonomy ICIP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Zhefan Jiang, Sangok Kim, Kanghee Lee, Hyunchul Bae, Sangwook Kim Security Service Framework for Home Network. Search on Bibsonomy ACIS-ICIS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Michael M. Swift, Anne Hopkins, Peter Brundrett, Cliff Van Dyke, Praerit Garg, Shannon Chan, Mario Goertzel, Gregory Jensenworth Improving the granularity of access control for Windows 2000. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Microsoft Windows 2000, active directory, Microsoft Windows (OS), Windows NT, Access control lists
20Mehrab Monjur, Sheikh Iqbal Ahamed Towards a landmark influence framework to protect location privacy. Search on Bibsonomy SAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF landmark influence space, Voronoi diagram, location privacy
20Eric Y. Chen, Mitsutaka Ito Using end-to-middle security to protect against evil twin access points. Search on Bibsonomy WOWMOM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Fangyong Hou, Nong Xiao, Yuhua Tang, Hongjun He, Fang Liu 0002 Protect Disk Integrity: Solid Security, Fine Performance and Fast Recovery. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF hash tree, performance, integrity, consistency, disk
20Hannes Tschofenig, Rainer Falk, Jon Peterson, Jeff Hodges, Douglas C. Sicker, James M. Polk Using SAML to protect the session initiation protocol (SIP). Search on Bibsonomy IEEE Netw. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Byung Ryong Kim, Ki-Chang Kim Packet Manipulating Based on Zipf's Distribution to Protect from Attack in P2P Information Retrieval. Search on Bibsonomy Advances in Web Intelligence and Data Mining The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Sung Ki Kim, Byoung-Joon Min Inter-domain Security Management to Protect Legitimate User Access from DDoS Attacks. Search on Bibsonomy ICCSA (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Jehan-François Pâris, Darrell D. E. Long Using device diversity to protect data against batch-correlated disk failures. Search on Bibsonomy StorageSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF disk array reliability, disk mirroring, RAID
20Marc L. Corliss, E. Christopher Lewis, Amir Roth Using DISE to protect return addresses from attack. Search on Bibsonomy SIGARCH Comput. Archit. News The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Jung-Taek Seo, Cheolho Lee, Jungtae Kim, Taeshik Shon, Jongsub Moon Probabilistic Packet Filtering Model to Protect Web Server from DDoS Attacks. Search on Bibsonomy NPC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Haidong Xia, Jayashree Kanchana, José Carlos Brustoloni Using Secure Coprocessors to Protect Access to Enterprise Networks. Search on Bibsonomy NETWORKING The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Nicolas T. Courtois, Louis Goubin An Algebraic Masking Method to Protect AES Against Power Attacks. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Yang Xiang 0001, Wanlei Zhou 0001 Protect Grids from DDoS Attacks. Search on Bibsonomy GCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Alan F. Karr, Adrian Dobra, Ashish P. Sanil Table servers protect confidentiality in tabular data releases. Search on Bibsonomy Commun. ACM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Joe Kilian, Phillip Rogaway How to Protect DES Against Exhaustive Key Search. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
16Gabriel Ghinita, Panos Kalnis, Murat Kantarcioglu, Elisa Bertino A Hybrid Technique for Private Location-Based Queries with Database Protection. Search on Bibsonomy SSTD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Matthieu Rivain Differential Fault Analysis on DES Middle Rounds. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Kimberly C. Claffy "Show me the data": resolving challenges in network data sharing. Search on Bibsonomy NDA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF protected data-sharing, anonymization
16Ken Komiya, Masayuki Yamamura, John A. Rose Experimental Validation of Signal Dependent Operation in Whiplash PCR. Search on Bibsonomy DNA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Kazuhiro Haramura, Maki Yoshida, Toru Fujiwara Anonymous Fingerprinting for Predelivery of Contents. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Aristides Mpitziopoulos, Charalampos Konstantopoulos, Damianos Gavalas, Grammati E. Pantziou Hazard monitoring for visually impaired people enabled by wireless sensor networking technology. Search on Bibsonomy PETRA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF hazard monitoring, itinerary design, wireless sensor networks, mobile agents, healthcare, assistive environments, itineraries
16Chu-Hsing Lin, Jung-Chun Liu, Chih-Hsiong Shih, Yan-Wei Lee A Robust Watermark Scheme for Copyright Protection. Search on Bibsonomy MUE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF distributed discrete wavelet transformation, image attacks, watermark, singular value decomposition, copyright protection
16Jordi Pont-Tuset, Pau Medrano-Gracia, Jordi Nin, Josep Lluís Larriba-Pey, Victor Muntés-Mulero ONN the Use of Neural Networks for Data Privacy. Search on Bibsonomy SOFSEM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Perturbative protection methods, Privacy in statistical databases, Artificial Neural Networks, Data preprocessing
16Jeffrey S. Dwoskin, Ruby B. Lee Hardware-rooted trust for secure key management and transient trust. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hardware policy enforcement, secret protection (sp), transient trust, key management, emergency response, secure processors
16Zhiyong Shan, Qiuyue Wang, Xiaofeng Meng 0001 An OS Security Protection Model for Defeating Attacks from Network. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Access Control, information flow
16Zhensong Liao, Hai Jin 0001, Deqing Zou A Hidden Credential Based Oblivious Automated Trust Negotiation Model. Search on Bibsonomy ICEBE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Daesung Moon, Sungju Lee, Seunghwan Jung, Yongwha Chung, Miae Park, Okyeon Yi Fingerprint Template Protection Using Fuzzy Vault. Search on Bibsonomy ICCSA (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Crypto-Biometric, Template Protection, Fuzzy Vault
16Shun Hattori, Katsumi Tanaka Secure Spaces: Protecting Freedom of Information Access in Public Places. Search on Bibsonomy ICOST The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Ravi S. Sandhu, Kumar Ranganathan, Xinwen Zhang Secure information sharing enabled by Trusted Computing and PEI models. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF PEI models, secure information sharing, access control, authorization, trusted computing, security framework
16Hua Wang 0002, Yanchun Zhang, Jinli Cao Ubiquitous computing environments and its usage access control. Search on Bibsonomy Infoscale The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Rajesh Garg, Nikhil Jayakumar, Sunil P. Khatri, Gwan Choi A design approach for radiation-hard digital electronics. Search on Bibsonomy DAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF radiation-hard, SEU
16Wenbing Zhao 0001, Louise E. Moser, P. M. Melliar-Smith Unification of Transactions and Replication in Three-Tier Architectures Based on CORBA. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Fault tolerance, CORBA, replication, transaction processing, three-tier architectures
16Tian Zhao, John Tang Boyland Type Annotations to Improve Stack-Based Access Control. Search on Bibsonomy CSFW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Liwen He A Verified Distance Vector Routing Protocol for Protection of Internet Infrastructure. Search on Bibsonomy ICN (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Yu-Cheng Fan, Hen-Wai Tsao A Dual Pyramid Watermarking for JPEG-2000. Search on Bibsonomy AINA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Todd S. Sproull, John W. Lockwood Distributed Instrusion Prevention in Active and Extensible Networks. Search on Bibsonomy IWAN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Bok-Nyong Park, Jae-Won Kim, Wonjun Lee 0001 PrecePt: A Privacy-Enhancing License Management Protocol for Digital Rights Management. Search on Bibsonomy AINA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF License Management Protocol, Privacy, Anonymity, Public-Key Cryptosystem, DRM
16Stuart E. Schechter, Michael D. Smith 0001 How Much Security Is Enough to Stop a Thief?: The Economics of Outsider Theft via Computer Systems and Networks. Search on Bibsonomy Financial Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Theft, Exploits, Threat Models, Security Economics
16Whe Dar Lin A Firewall Approach to Personal Knowledge System. Search on Bibsonomy CBMS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16Terri Oda, Tony White Developing an Immunity to Spam. Search on Bibsonomy GECCO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16Lawrence A. Gordon, Martin P. Loeb The economics of information security investment. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Optimal security investment
16Pascal Felber, Priya Narasimhan Reconciling Replication and Transactions for the End-to-End Reliability of CORBA Applications. Search on Bibsonomy OTM The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
16Ming-Dong Feng, Chung-Kwong Yuen Detection of Races and Control-Flow Nondeterminism. Search on Bibsonomy LCR The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
16Peter Wegner Granularity of modules in object-based concurrent systems. Search on Bibsonomy OOPSLA/ECOOP Workshop on Object-based Concurrent Programming The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
16Andrew J. Clark Physical Protection of Cryptographic Devices. Search on Bibsonomy EUROCRYPT The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
15Xiaoting Li 0001, Lingwei Chen, Dinghao Wu Adversary for Social Good: Leveraging Adversarial Attacks to Protect Personal Attribute Privacy. Search on Bibsonomy ACM Trans. Knowl. Discov. Data The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Zengrui Liu, Umar Iqbal 0002, Nitesh Saxena Opted Out, Yet Tracked: Are Regulations Enough to Protect Your Privacy? Search on Bibsonomy Proc. Priv. Enhancing Technol. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Kamil Mamak Should criminal law protect love relation with robots? Search on Bibsonomy AI Soc. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Imran Memon, Riaz Ahmed Shaikh 0001, Hidayatullah Shaikh Dynamic pseudonyms trust-based model to protect attack scenario for internet of vehicle ad-hoc networks. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Vivek Mankotia, Ramesh Kumar Sunkaria, Shashi Gurung DTAM: A Dynamic Threshold and Monitoring Based Technique to Protect Mobile Ad-hoc Network from Black-Hole and Flooding Attacks. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Leslie D. McIntosh, Cynthia Hudson-Vitale Forensic Scientometrics - An emerging discipline to protect the scholarly record. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Guanlin Li, Shuai Yang, Jie Zhang, Tianwei Zhang 0004 PRIME: Protect Your Videos From Malicious Editing. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Andrew W. Macpherson Do backrun auctions protect traders? Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Navid Ashrafi, Vera Schmitt, Robert P. Spang, Sebastian Möller 0001, Jan-Niklas Voigt-Antons Protect and Extend - Using GANs for Synthetic Data Generation of Time-Series Medical Records. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Shiwei Lu, Ruihu Li, Wenbin Liu FedDAA: a robust federated learning framework to protect privacy and defend against adversarial attack. Search on Bibsonomy Frontiers Comput. Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Lili Zhang, Perihan Elif Ekmekci, Virginia Murray, Burcak Basbug Erkan, Francis P. Crawley, Xueting Li, Yandi Li The 'PROTECT' Essential Elements in Managing Crisis Data Policies. Search on Bibsonomy Data Sci. J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Rob Romijnders, Christos Louizos, Yuki M. Asano, Max Welling Protect Your Score: Contact-Tracing with Differential Privacy Guarantees. Search on Bibsonomy AAAI The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Timothy Chu, Zhao Song 0002, Chiwun Yang How to Protect Copyright Data in Optimization of Large Language Models? Search on Bibsonomy AAAI The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Satoru Matsumoto, Tomoki Yoshihisa, Hideyuki Shimonishi, Tomoya Kawakami, Yuuichi Teranishi Implementation and Evaluation of a Facial Image Obscuring Method for Person Identification to Protect Personal Data. Search on Bibsonomy CCNC The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Qili Wang, Xinzhi Rao, Alice Li, Liangfei Qiu Do Masks Protect Children? Evidence from Florida's Mask Mandate Ban Using Large-Scale School Transmission Data. Search on Bibsonomy HICSS The full citation details ... 2024 DBLP  BibTeX  RDF
15Bo Guan, Shuangqing Wei, Amir Houmansadr, Hossein Pishro-Nik, Dennis Goeckel Optimal Obfuscation to Protect Client Privacy in Federated Learning. Search on Bibsonomy CISS The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Chenxi Qiu, Sourabh Yadav, Yuede Ji, Anna Cinzia Squicciarini, Ram Dantu, Juanjuan Zhao, Cheng-Zhong Xu 0001 Fine-Grained Geo-Obfuscation to Protect Workers' Location Privacy in Time-Sensitive Spatial Crowdsourcing. Search on Bibsonomy EDBT The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Sungsik Park, Woochoel Shin, Jinhong Xie Disclosure in Incentivized Reviews: Does It Protect Consumers? Search on Bibsonomy Manag. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Gadde Swetha, J. Amutharaj, S. Usha A security model to protect the isolation of medical data in the cloud using hybrid cryptography. Search on Bibsonomy J. Inf. Secur. Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Güler Aksüt, Tamer Eren Evaluation of personal protective equipment to protect health and safety in pesticide use. Search on Bibsonomy Frontiers Appl. Math. Stat. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Wenjing Yin Zero-Knowledge Proof Intelligent Recommendation System to Protect Students' Data Privacy in the Digital Age. Search on Bibsonomy Appl. Artif. Intell. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Malhar Patel, Ittai Dayan, Elliot K. Fishman, Mona Flores, Fiona J. Gilbert, Michal Guindy, Eugene J. Koay, Michael Rosenthal, Holger R. Roth, Marius George Linguraru Accelerating artificial intelligence: How federated learning can protect privacy, facilitate collaboration, and improve outcomes. Search on Bibsonomy Health Informatics J. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Linjiang Xie, Feilu Hang, Wei Guo, Zhenhong Zhang, Hanruo Li Data-centric Networking with Parallel and Distributed Architecture Performs Performance Analysis to Protect Critical Infrastructure in the Future Power System Network Based on IoT. Search on Bibsonomy Parallel Process. Lett. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Tuka Kareem Jebur Proposed Hybrid Secured Method to Protect Against DDOS in n Vehicular Adhoc Network (VANET). Search on Bibsonomy Int. J. Interact. Mob. Technol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Sahel Alouneh A Multi-Path Approach to Protect DNS Against DDoS Attacks. Search on Bibsonomy J. Cyber Secur. Mobil. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Vivek Singh Baghel, Syed Sadaf Ali, Surya Prakash 0001 A non-invertible transformation based technique to protect a fingerprint template. Search on Bibsonomy IET Image Process. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Sumit Kumar Rana, Arun Kumar Rana, Sanjeev Kumar Rana, Vishnu Sharma, Umesh Kumar Lilhore, Osamah Ibrahim Khalaf, Antonino Galletta Decentralized Model to Protect Digital Evidence via Smart Contracts Using Layer 2 Polygon Blockchain. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Bruna V. Dos Santos, Andressa Vergütz, Ricardo T. Macedo, Michele Nogueira A dynamic method to protect user privacy against traffic-based attacks on smart home. Search on Bibsonomy Ad Hoc Networks The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15P. Neelakantan A secure framework for the cloud to protect the virtual machine from malicious events. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Ying Joey Zhou, Aarti Ramchandran, Saskia Haegens Alpha oscillations protect working memory against distracters in a modality-specific way. Search on Bibsonomy NeuroImage The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Thuy M. Pham, Miroslav Mitev, Arsenia Chorti, Gerhard P. Fettweis Pilot Randomization to Protect MIMO Secret Key Generation Systems Against Injection Attacks. Search on Bibsonomy IEEE Wirel. Commun. Lett. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Aaro Tupasela, Juanita Devis-Clavijo, Marjut Salokannel, Christoph Fink Older people and the smart city - Developing inclusive practices to protect and serve a vulnerable population. Search on Bibsonomy Internet Policy Rev. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Umar S. Suryahatmaja, Mehdi Mrad, Mohamed Naceur Azaiez, Asma Ben Yaghlane, Anis Gharbi The K Critical Path Sets to Protect in Interdiction Networks Under Limited Defensive Resources. Search on Bibsonomy IEEE Trans. Netw. Serv. Manag. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Amin Mohammadi, Mohsen Jannati, Mohammadreza Shams Using Deep Transfer Learning Technique to Protect Electrical Distribution Systems Against High-Impedance Faults. Search on Bibsonomy IEEE Syst. J. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Ahmad Taher Azar, Esraa Shehab, Ahmed M. Mattar, Ibrahim A. Hameed, Shaimaa Ahmed El-Said Deep Learning Based Hybrid Intrusion Detection Systems to Protect Satellite Networks. Search on Bibsonomy J. Netw. Syst. Manag. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 3534 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license