The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for protection with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1961-1968 (18) 1969-1973 (23) 1974-1975 (29) 1976 (30) 1977 (21) 1978 (25) 1979 (21) 1980 (15) 1981 (17) 1982 (23) 1983 (18) 1984 (27) 1985 (23) 1986 (23) 1987 (27) 1988 (33) 1989 (44) 1990 (36) 1991 (91) 1992 (55) 1993 (68) 1994 (59) 1995 (65) 1996 (96) 1997 (118) 1998 (131) 1999 (168) 2000 (232) 2001 (339) 2002 (361) 2003 (639) 2004 (843) 2005 (1008) 2006 (1107) 2007 (1175) 2008 (1164) 2009 (987) 2010 (662) 2011 (701) 2012 (807) 2013 (856) 2014 (912) 2015 (802) 2016 (966) 2017 (881) 2018 (1037) 2019 (1164) 2020 (1157) 2021 (1209) 2022 (1166) 2023 (1181) 2024 (253)
Publication types (Num. hits)
article(7850) book(33) data(8) incollection(362) inproceedings(14243) phdthesis(341) proceedings(76)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 7090 occurrences of 2819 keywords

Results
Found 22916 publication records. Showing 22913 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
77Colette Reekie, Basie von Solms A Corporate Capital Protection and Assurance Model. Search on Bibsonomy OTM Workshops (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Corporate Capital Protection and Assurance, Information Security Governance, Digital Forensic Governance, Project Management Governance, IT Governance, Corporate Governance
73Dan Assaf Government Intervention in Information Infrastructure Protection. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Critical information infrastructure protection, market failures, cyber security, government regulation
65Pin-Han Ho, János Tapolcai, Tibor Cinkler Segment shared protection in mesh communications networks with bandwidth guaranteed tunnels. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF survivable routing, working and protection paths, integer linear programming (ILP), shared risk link group (SRLG), segment shared protection (SSP)
59Cheng-De Qin Personal data protection in electronic business. Search on Bibsonomy ICEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF personal data protection, tort, privacy, legislation, electronic business
57Qin Zheng 0002, Mohan Gurusamy Integrated Dynamic Routing of LSPs in IP over WDM Networks: Full Protection and Partial Spatial-Protection. Search on Bibsonomy NETWORKING The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
56Jianli Shen, Guru Venkataramani, Milos Prvulovic Tradeoffs in fine-grained heap memory protection. Search on Bibsonomy ASID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF heap security, protection granularity, memory protection
53Srinivasan Ramasubramanian Supporting multiple protection strategies in optical networks. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF multiple protection strategies, path protection, optical networks, dynamic routing, link protection
51Elisa Boschi Legal requirements and issues in network traffic data protection. Search on Bibsonomy NDA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF data protection law, legal requirements, network traffic data
51Wolfgang Kilian, Dörte Funkat Structuring Legal Knowledge on Data Protection: The EU-Data Protection Research Project DAPRO. Search on Bibsonomy DEXA Workshops The full citation details ... 2000 DBLP  DOI  BibTeX  RDF legal knowledge structuring, DAPRO EU data protection research project, data privacy law, personal data dissemination, personal data storage, personal data collection, legal training, electronic accessibility, structured data protection rules, interactive checklists, decision support, data privacy, data protection, decision makers
50Abdelilah Maach, Gregor von Bochmann, Hussein T. Mouftah An optimal shared protection scheme for optical networks. Search on Bibsonomy AICCSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
47Chava Vijaya Saradhi, Lian Kian Wei, Mohan Gurusamy Provisioning Fault-Tolerant Scheduled Lightpath Demands in WDM Mesh Networks. Search on Bibsonomy BROADNETS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
46Jing Zhang 0003, Keyao Zhu, Hui Zang, Norman S. Matloff, Biswanath Mukherjee Availability-aware provisioning strategies for differentiated protection services in wavelength-convertible WDM mesh networks. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF connection provisioning, optical mesh network, service reliability, availability, differentiated services, protection, WDM
46Timothy Y. Chow, Fabián A. Chudak, Anthony M. Ffrench Fast optical layer mesh protection using pre-cross-connected trails. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF cage graph, mesh protection, mesh restoration, self-healing networks, survivable optical networks, online algorithm, experimental design, bandwidth sharing, SONET, dijkstra algorithm, p-cycle
46Dae-Hee Seo, Im-Yeong Lee, Hee-Un Park A Study on Key Recovery Agent Protection Profile Having Composition Function. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Key Recovery Protection Profile, Evaluation Methodology, Common Criteria
46Karthikeyan Sathyamurthy, Srinivasan Ramasubramanian Benefits of Link Protection at Connection Granularity. Search on Bibsonomy BROADNETS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Optical networks, Dynamic routing, Traffic grooming, Link Protection
46Xu Shao, Luying Zhou, Xiaofei Cheng, Weiguo Zheng, Yixin Wang Best Effort Shared Risk Link Group (SRLG) Failure Protection in WDM Networks. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
46Canhui Ou, Hui Zang, Narendra K. Singhal, Keyao Zhu, Laxman H. Sahasrabuddhe, R. A. MacDonald, Biswanath Mukherjee Subpath protection for scalability and fast recovery in optical WDM mesh networks. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
46Adam Wiggins, Simon Winwood, Harvey Tuch, Gernot Heiser Legba: Fast Hardware Support for Fine-Grained Protection. Search on Bibsonomy Asia-Pacific Computer Systems Architecture Conference The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
46Christian Damsgaard Jensen, Daniel Hagimont Protection Reconfiguration for Reusable Software. Search on Bibsonomy CSMR The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
44Consumer Financial Protection Bureau Consumer Complaints. Search on Bibsonomy 2019   DOI  RDF
44IEEE Standards Association, NFPA National Fire Protection Association Arc Flash Phenomena. Search on Bibsonomy 2019   DOI  RDF
44European Data Protection Supervisor EDPS calls for consistency in EU approach to criminal records. Search on Bibsonomy Datenschutz und Datensicherheit The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
44János Tapolcai, Pin-Han Ho A Deeper Study on Segment Shared Protection. Search on Bibsonomy ISPAN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF restoration time, protection and restoration, switching/merging, integer linear program (ILP), segment shared protection (SSP), protection domain
44Mikio Hashimoto Secure Processor Consistent with Both Foreign Software Protection and User Privacy Protection (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
43Pin-Han Ho, Hussein T. Mouftah Allocation of Protection Domains in Dynamic WDM Mesh Networks. Search on Bibsonomy ICNP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF lighgtpath, shared protection, diverse routing, working and protection paths, wavelength division multiplexing (WDM)
42Dan Wang 0002, Qian Zhang 0001, Jiangchuan Liu The self-protection problem in wireless sensor networks. Search on Bibsonomy ACM Trans. Sens. Networks The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Sensor networks, coverage, protection
42Jianping Wang 0001, Mei Yang, Bin Yang, S. Q. Zheng 0001 Dual-Homing Based Scalable Partia Multicast Protection. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF complexity, Networks, multicast, NP-completeness, survivability, protection
42Josep Domingo-Ferrer Mobile Agent Route Protection through Hash-Based Mechanisms. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF agent route protection, Mobile agent security, Merkle trees, hash collisions
41Yu Wang 0003, Xiang-Yang Li 0001, Qian Zhang 0001 Efficient Algorithms for p-Self-Protection Problem in Static Wireless Sensor Networks. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
41Ahmed E. Kamal 0001 A Generalized Strategy for 1+N Protection. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
41Chava Vijaya Saradhi, Mohan Gurusamy, Luying Zhou Segment-Based Partial Protection Scheme for Routing Reliability Guaranteed Connections in WDM Optical Networks. Search on Bibsonomy BROADNETS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
41Abdelilah Maach, Gregor von Bochmann, Hussein T. Mouftah Shared Protection for Time Slotted Optical Networks. Search on Bibsonomy NCA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
41Harald Gossner ESD protection for the deep sub micron regime - a challenge for design methodology. Search on Bibsonomy VLSI Design The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
41Chi Wai Yung, Hung Fai Fu, Chi-Ying Tsui, Roger S. Cheng, D. George Unequal error protection for wireless transmission of MPEG audio. Search on Bibsonomy ISCAS (6) The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
40Arrvindh Shriraman, Sandhya Dwarkadas Sentry: light-weight auxiliary memory access control. Search on Bibsonomy ISCA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF sentry, access control, multiprocessors, safety, cache coherence, memory protection, protection domains
40Ron Banner, Ariel Orda The power of tuning: a novel approach for the efficient design of survivable networks. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF path restoration/protection, routing, survivability
40Fangcheng Tang, Lu Ruan 0001 A Protection Tree Scheme for First-Failure Protection and Second-Failure Restoration in Optical Networks. Search on Bibsonomy ICCNMC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
39Thomas Schierl, Heiko Schwarz, Detlev Marpe, Thomas Wiegand Wireless Broadcasting Using the Scalable Extension of H.264/AVC. Search on Bibsonomy ICME The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
39Salvatore D'Antonio, Francesco Oliviero, Roberto Setola High-Speed Intrusion Detection in Support of Critical Infrastructure Protection. Search on Bibsonomy CRITIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF critical infrastructure protection (CIP), critical information infrastructure protection (CIIP), flow monitoring, intrusion detection, security management, SCADA
39Vito Cappellini, Franco Bartolini, Mauro Barni, M. Wada Copyright Protection of Cultural Heritage Multimedia Data through Digital Watermarking Techniques. Search on Bibsonomy DEXA Workshops The full citation details ... 2000 DBLP  DOI  BibTeX  RDF cultural heritage multimedia data, intellectual property rights protection, Art Virtual Gallery, World Wide Web, digital watermarking, art, copyright protection
38Markos Fountoulakis, Manolis Marazakis, Michail Flouris, Angelos Bilas DARC: design and evaluation of an I/O controller for data protection. Search on Bibsonomy SYSTOR The full citation details ... 2010 DBLP  DOI  BibTeX  RDF block-level I/O, storage architecture, storage controllers, virtualization, error detection, versioning, data protection, I/O performance
38Anders Mykkeltveit, Bjarne E. Helvik Comparison of Schemes for Provision of Differentiated Availability-Guaranteed Services Using Dedicated Protection. Search on Bibsonomy ICN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF QoS, availability, protection
38Wen Ji, Yiqiang Chen, Min Chen 0003, Yi Kang Unequal error protection based on objective video evaluation model. Search on Bibsonomy MobiMedia The full citation details ... 2007 DBLP  DOI  BibTeX  RDF unequal error protection (UEP), video quality evaluation, fuzzy theory
38Francesco Palmieri 0002, Ugo Fiore A Low Cost and Effective Link Protection Approach for Enhanced Survivability in Optical Transport Networks. Search on Bibsonomy ISPA Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Network resiliency, Fast rerouting, Link protection
38Matthew S. Simpson, Bhuvan Middha, Rajeev Barua Segment protection for embedded systems using run-time checks. Search on Bibsonomy CASES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF MMU, MPU, ewmbedded systems, safe languages, segment protection, segmentation violations, reliability, compilers, virtual memory, memory safety, run-time checks
38Masahiko Takahashi, Kenji Kono, Takashi Masuda Efficient Kernel Support of Fine-Grained Protection Domains for Mobile Code. Search on Bibsonomy ICDCS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF operating system, mobile code, lightweight, fine-grained, protection domain, page table
38Shoji Suzuki, Kang G. Shin On memory protection in real-time OS for small embedded systems. Search on Bibsonomy RTCSA The full citation details ... 1997 DBLP  DOI  BibTeX  RDF real-time OS, small embedded systems, region enlargement, memory consumption, processing overhead, intermediate-level skip multi-size paging, multi-level paging, short-circuit segment tree, real-time systems, reliability, safety, microprocessors, paged segmentation, hardware support, memory protection
38Jeffrey S. Chase, Henry M. Levy, Michael J. Feeley, Edward D. Lazowska Sharing and Protection in a Single-Address-Space Operating System. Search on Bibsonomy ACM Trans. Comput. Syst. The full citation details ... 1994 DBLP  DOI  BibTeX  RDF capability-based systems, microkernel operating systems, single-address-space operating systems, wide-address architectures, protection, object-oriented database systems, persistent storage, 64-bit architectures
37Antonia Colibasanu NATO's Frontier Critical Infrastructure Protection Buildup - Discussion on the Romanian Energy Sector Protection Challenges. Search on Bibsonomy Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
37Daniel Le Métayer, Julien Le Clainche From the Protection of Data to the Protection of Individuals: Extending the Application of Non-discrimination Principles. Search on Bibsonomy European Data Protection The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
37Ian Ellefsen, Sebastiaan H. von Solms Critical Information Infrastructure Protection in the Developing World. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37János Tapolcai, Pin-Han Ho, Dominique Verchère, Tibor Cinkler, Anwar Haque A New Shared Segment Protection Method for Survivable Networks with Guaranteed Recovery Time. Search on Bibsonomy IEEE Trans. Reliab. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Abraham Jacobus Johannes Mouton, C. Smith, George E. Smith Wireless Control and Communication to Motor Protection Relays by using an Embedded Microprocessor. Search on Bibsonomy CCECE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
37Jing Fang, Mahesh Sivakumar, Arun K. Somani, Krishna M. Sivalingam On Partial Protection in Groomed Optical WDM Mesh Networks. Search on Bibsonomy DSN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
37Wissam Fawaz, Fabio Martignon, Ken Chen 0004, Guy Pujolle A Priority-Aware Protection Technique for Quality of Service Enabled WDM Networks. Search on Bibsonomy NETWORKING The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
37Lei Guo 0005, Hongfang Yu, Lemin Li A New Path Protection Algorithm for Meshed Survivable Wavelength-Division-Multiplexing Networks. Search on Bibsonomy ICN (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
37Javier A. Salcedo, Juin J. Liou, Muhammad Yaqub Afridi, Allen R. Hefner Novel electrostatic discharge protection structure for a monolithic gas sensor systems-on-a-chip. Search on Bibsonomy ISCAS (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
37Christophe Rippert Protection in flexible operating system architectures. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
36Ken C. K. Lee, Wang-Chien Lee, Hong Va Leong, Baihua Zheng Navigational path privacy protection: navigational path privacy protection. Search on Bibsonomy CIKM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF privacy protection, road network, path search
35Bernard A. Galler Letters to the editor: Language protection by trademark ill-advised. Search on Bibsonomy Commun. ACM The full citation details ... 1968 DBLP  DOI  BibTeX  RDF Mooers doctrine, TRAC languages, patent protection, procedure-oriented language, proprietary software, protection of software, standardization, copyright protection, licensing, trademarks
35Nils Kalstad Svendsen, Stephen D. Wolthusen Multigraph Dependency Models for Heterogeneous Infrastructures. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Infrastructure interdependencies, multigraph models, simulation
34Emile J. C. Kelkboom, Berk Gökberk, Tom A. M. Kevenaar, Anton H. M. Akkermans, Michiel van der Veen "3D Face": Biometric Template Protection for 3D Face Recognition. Search on Bibsonomy ICB The full citation details ... 2007 DBLP  DOI  BibTeX  RDF helper data system (HDS), privacy protection, 3D face recognition, Template protection
34Bart J. van Rijnsoever, Peter Lenoir, Jean-Paul M. G. Linnartz Interoperable Protection for Digital Multimedia Content. Search on Bibsonomy J. VLSI Signal Process. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF OPIMA, architecture, interoperability, DRM, content-protection, copy-protection, conditional-access
34Agnieszka C. Miguel, Eve A. Riskin Protection of Regions of Interest against Data Loss in a Generalized Multiple Description Framework. Search on Bibsonomy Data Compression Conference The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Protection of Regions of Interest, Error Resilience of ROI, MD-SPIHT, Packet Erasure Networks, Lossy Communications Networks, Unequal Loss Protection, Region of Interest, ROI, Multiple Description Coding, SPIHT
34Kai Rannenberg, Giovanni Iachello Protection Profiles for Remailer Mixes -Do the New Evaluation Criteria Help? Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF protection profiles, remailer mixes, IT security evaluation criteria, privacy-related requirements, remailer mix networks, unobservable message transfer, ISO-ECITS, TCSEC, ITSEC, information technology, information technology, certification, privacy protection, electronic mail, data privacy, CC, evaluation criteria, user anonymity
34Richard E. Smith Mandatory Protection for Internet Server Software. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF multilevel security applications, Internet server software, server overrun, attack code, server host, mandatory protection mechanisms, commercial systems, Unix chroot isolation, type enforcement, server protection, Internet, MLS, security flaws
34Mojtaba Mehrara, Todd M. Austin Exploiting selective placement for low-cost memory protection. Search on Bibsonomy ACM Trans. Archit. Code Optim. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Partial memory protection, selective placement, transient faults, fault-tolerant design, memory system design
34Eun-Jun Yoon, Kee-Young Yoo Improving the Host Authentication Mechanism for POD Copy Protection System. Search on Bibsonomy New Directions in Intelligent Interactive Multimedia The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Host authentication, POD copy protection system, Diffie-Hellman key agreement, Replay attack
34Yongho Seok, Taekyoung Kwon 0001, Yanghee Choi, Jean-Marie Bonnin Temporal fairness guarantee in multi-rate wireless LANs for per-flow protection. Search on Bibsonomy Wirel. Networks The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Temporal fairness, Per-flow protection, Wireless LAN, Packet scheduling, CSMA/CA
34Yanjun Zuo, Timothy O'Keefe Post-release information privacy protection: A framework and next-generation privacy-enhanced operating system. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Information privacy protection, Privacy violation detection, Privacy-enhanced operating system, Information post-release control
34Jimena L. Bastos, Yujie Zhang, Anurag K. Srivastava 0001, Noel N. Schulz A design paradigm for integrated protection of shipboard power systems. Search on Bibsonomy SCSC The full citation details ... 2007 DBLP  BibTeX  RDF protection system, rapid prototyping, design process, modeling and simulation, real-time simulation, power system, hardware-in-the-loop
34Min Xu, Xuxian Jiang, Ravi S. Sandhu, Xinwen Zhang Towards a VMM-based usage control framework for OS kernel integrity protection. Search on Bibsonomy SACMAT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF kernel integrity, operating system protection, access control, authorization, security architecture, usage control, VMM, UCON
34Zude Li, Guoqiang Zhan, Xiaojun Ye Role-Based Peer-to-Peer Model: Capture Global Pseudonymity for Privacy Protection. Search on Bibsonomy WAIM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Peer-to-Peer, Role, Privacy Protection, Pseudonymity
34Jen-Hao Hsiao, Jenq-Haur Wang, Ming-Syan Chen, Chu-Song Chen, Lee-Feng Chien Constructing a Wrapper-Based DRM System for Digital Content Protection in Digital Libraries. Search on Bibsonomy ICADL The full citation details ... 2005 DBLP  DOI  BibTeX  RDF access control, digital watermark, Digital rights management, intellectual property, content protection
34Emmett Witchel, Junghwan Rhee, Krste Asanovic Mondrix: memory isolation for linux using mondriaan memory protection. Search on Bibsonomy SOSP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF fine-grained memory protection
34Lin Yuan, Gang Qu 0001, Ankur Srivastava 0001 VLSI CAD tool protection by birthmarking design solutions. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF birthmarking, CAD, protection, intellectual property
34Yu-Quan Zhang, Sabu Emmanuel A Novel Watermarking Framework for Joint-Creatorship Protection. Search on Bibsonomy CW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Joint-Creatorship Protection, Joint-Ownership Verification, Watermarking Framework
34Silvia Polettini, Luisa Franconi, Julian Stander Model Based Disclosure Protection. Search on Bibsonomy Inference Control in Statistical Databases The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Business microdata, protection models, confidentiality, regression models, performance assessment
34Oded Goldreich 0001, Rafail Ostrovsky Software Protection and Simulation on Oblivious RAMs. Search on Bibsonomy J. ACM The full citation details ... 1996 DBLP  DOI  BibTeX  RDF simulation of random access machines, software protection, pseudorandom functions
33Michael Stilkerich, Daniel Lohmann, Wolfgang Schröder-Preikschat Memory protection at option. Search on Bibsonomy EDCC-CARS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
33Yang Xiao 0001, Frank Haizhon Li, Sunghyun Choi 0001 Two-level protection and guarantee for multimedia traffic in IEEE 802.11e distributed WLANs. Search on Bibsonomy Wirel. Networks The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Quality of Service (QoS), Wireless LAN, Admission control, Medium access control (MAC), IEEE 802.11e
33Emad Mahmoud Alsukhni, Hussein T. Mouftah A novel distributed destination routing-based Availability-Aware provisioning framework for differentiated protection services in optical mesh networks. Search on Bibsonomy ISCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Ningning Zhu, Tzi-cker Chiueh Portable and Efficient Continuous Data Protection for Network File Servers. Search on Bibsonomy DSN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
33Hyunsu Lim, Sang-il Ahn, Eun-kyou Kim, Hong-Shik Park A QoS-Based Adaptive Resource Sharing Protection for Optical Burst Switching Networks. Search on Bibsonomy ICOIN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Hyunseung Choo, Minhan Son, Min Young Chung, Tae-Jin Lee 0001 Shared Protection by Concatenated Rings in Optical WDM Networks. Search on Bibsonomy NETWORKING The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
33Antony L. Hosking, J. Eliot B. Moss Protection Traps and Alternatives for Memory Management of an Object-Oriented Language. Search on Bibsonomy SOSP The full citation details ... 1993 DBLP  DOI  BibTeX  RDF Smalltalk
33Ravi S. Sandhu The schematic protection model: its definition and analysis for acyclic attenuating schemes. Search on Bibsonomy J. ACM The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
32Hans Ulrich Buhl, Marcus Kaiser, Veronica Winkler Beratungsindividualisierung in der Finanzdienstleistungsbranche Umsetzungskonzepte und rechtliche Rahmenbedingungen. Search on Bibsonomy Wirtschaftsinf. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Individualisation, Consumer Protection, Role-Orientation, Situation-Orientation, Advisory, Data Protection, Financial Services
32Chung-Lin Huang, Sling Liang A Model-Driven Joint Source and Channel Coder for MPEG-2 Video Transmission. Search on Bibsonomy ITCC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Joint Source and channel coding (JSCC), Unequal error protection (UEP), rate compatible punctured convolution (RCPC) coding and Equal error protection (EEP)
32Robert Grimm 0001, Brian N. Bershad Separating access control policy, enforcement, and functionality in extensible systems. Search on Bibsonomy ACM Trans. Comput. Syst. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF access check, policy-neutral enforcement, protection domain transfer, Java, security policy, auditing, SPIN, extensible systems, protection domain
32Robert N. Smith, Sourav Bhattacharya Firewall placement in a large network topology. Search on Bibsonomy FTDCS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF firewall placement heuristics, large network topology, multi-user distributed information environment, firewall cascade, potential attack point, comprehensive security protection, end-to-end security protection, simulation, performance, network security, completeness, authorisation, operations research, cost optimization, delay minimization, sensitive data, confidence degree
31Mikio Hashimoto, Hiroyoshi Haruki, Takeshi Kawabata Secure Processor Consistent with Both Foreign Software Protection and User Privacy Protection. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
31Dee Meng Kang, Haadee Faahym, Souhail Meftah, Sye Loong Keoh, Khin Mi Mi Aung Practical Deep Neural Network Protection for Unmodified Applications in Intel Software Guard Extension Environments. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
31Daniel Celebucki, Scott R. Graham, Sanjeev Gunawardena Reversing a Lattice ECP3 FPGA for Bitstream Protection. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
31Francesco Cavallaro, Andrea Chiappetta, Massimiliano De Santis, Anna Pinnarelli Critical Infrastructure Protection: Smart Grids. Search on Bibsonomy Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
31Edoardo Camilli OSINT, Big Data & Critical Infrastructures Protection (CIP). Search on Bibsonomy Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
31Gianluca Baldassarre Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges. Search on Bibsonomy Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
31Cyril Onwubiko Exploring web analytics to enhance cyber situational awareness for the protection of online web services. Search on Bibsonomy Cyber Security And Protection Of Digital Services The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
31Gaofeng Zhang, Paolo Falcarin, Elena Gómez-Martínez, Shareeful Islam, Christophe Tartary, Bjorn De Sutter, Jérôme d'Annoville Attack simulation based software protection assessment method. Search on Bibsonomy Cyber Security And Protection Of Digital Services The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
31George Stergiopoulos, Efstratios Vasilellis, Georgia Lykou, Panayiotis Kotzanikolaou, Dimitris Gritzalis Classification and Comparison of Critical Infrastructure Protection Tools. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 22913 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license