|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 7090 occurrences of 2819 keywords
|
|
|
Results
Found 22916 publication records. Showing 22913 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
77 | Colette Reekie, Basie von Solms |
A Corporate Capital Protection and Assurance Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops (1) ![In: On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, OTM Confederated International Workshops and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, OTM Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS 2006, Montpellier, France, October 29 - November 3, 2006. Proceedings, Part I, pp. 546-553, 2006, Springer, 3-540-48269-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Corporate Capital Protection and Assurance, Information Security Governance, Digital Forensic Governance, Project Management Governance, IT Governance, Corporate Governance |
73 | Dan Assaf |
Government Intervention in Information Infrastructure Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection, Post-Proceedings of the First Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA, March 19-21, 2007, pp. 29-39, 2007, Springer, 978-0-387-75461-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Critical information infrastructure protection, market failures, cyber security, government regulation |
65 | Pin-Han Ho, János Tapolcai, Tibor Cinkler |
Segment shared protection in mesh communications networks with bandwidth guaranteed tunnels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 12(6), pp. 1105-1118, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
survivable routing, working and protection paths, integer linear programming (ILP), shared risk link group (SRLG), segment shared protection (SSP) |
59 | Cheng-De Qin |
Personal data protection in electronic business. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 7th International Conference on Electronic Commerce, ICEC 2005, Xi'an, China, August 15-17, 2005, pp. 893-895, 2005, ACM, 1-59593-112-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
personal data protection, tort, privacy, legislation, electronic business |
57 | Qin Zheng 0002, Mohan Gurusamy |
Integrated Dynamic Routing of LSPs in IP over WDM Networks: Full Protection and Partial Spatial-Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETWORKING ![In: NETWORKING 2004, Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication, Third International IFIP-TC6 Networking Conference, Athens, Greece, May 9-14, 2004, Proceedings, pp. 538-549, 2004, Springer, 3-540-21959-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
56 | Jianli Shen, Guru Venkataramani, Milos Prvulovic |
Tradeoffs in fine-grained heap memory protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASID ![In: Proceedings of the 1st Workshop on Architectural and System Support for Improving Software Dependability, ASID 2006, San Jose, California, USA, October 21, 2006, pp. 52-57, 2006, ACM, 1-59593-576-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
heap security, protection granularity, memory protection |
53 | Srinivasan Ramasubramanian |
Supporting multiple protection strategies in optical networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 16(6), pp. 1352-1365, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
multiple protection strategies, path protection, optical networks, dynamic routing, link protection |
51 | Elisa Boschi |
Legal requirements and issues in network traffic data protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDA ![In: Proceedings of the 1st ACM workshop on Network Data Anonymization, NDA 2008, Alexandria, VA, USA, October 31, 2008, pp. 19-20, 2008, ACM, 978-1-60558-301-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
data protection law, legal requirements, network traffic data |
51 | Wolfgang Kilian, Dörte Funkat |
Structuring Legal Knowledge on Data Protection: The EU-Data Protection Research Project DAPRO. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 11th International Workshop on Database and Expert Systems Applications (DEXA'00), 6-8 September 2000, Greenwich, London, UK, pp. 1061-1068, 2000, IEEE Computer Society, 0-7695-0680-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
legal knowledge structuring, DAPRO EU data protection research project, data privacy law, personal data dissemination, personal data storage, personal data collection, legal training, electronic accessibility, structured data protection rules, interactive checklists, decision support, data privacy, data protection, decision makers |
50 | Abdelilah Maach, Gregor von Bochmann, Hussein T. Mouftah |
An optimal shared protection scheme for optical networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AICCSA ![In: 2005 ACS / IEEE International Conference on Computer Systems and Applications (AICCSA 2005), January 3-6, 2005, Cairo, Egypt, pp. 71, 2005, IEEE Computer Society, 0-7803-8735-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
47 | Chava Vijaya Saradhi, Lian Kian Wei, Mohan Gurusamy |
Provisioning Fault-Tolerant Scheduled Lightpath Demands in WDM Mesh Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BROADNETS ![In: 1st International Conference on Broadband Networks (BROADNETS 2004), 25-29 October 2004, San Jose, CA, USA, pp. 150-159, 2004, IEEE Computer Society, 0-7695-2221-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
46 | Jing Zhang 0003, Keyao Zhu, Hui Zang, Norman S. Matloff, Biswanath Mukherjee |
Availability-aware provisioning strategies for differentiated protection services in wavelength-convertible WDM mesh networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 15(5), pp. 1177-1190, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
connection provisioning, optical mesh network, service reliability, availability, differentiated services, protection, WDM |
46 | Timothy Y. Chow, Fabián A. Chudak, Anthony M. Ffrench |
Fast optical layer mesh protection using pre-cross-connected trails. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 12(3), pp. 539-548, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
cage graph, mesh protection, mesh restoration, self-healing networks, survivable optical networks, online algorithm, experimental design, bandwidth sharing, SONET, dijkstra algorithm, p-cycle |
46 | Dae-Hee Seo, Im-Yeong Lee, Hee-Un Park |
A Study on Key Recovery Agent Protection Profile Having Composition Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part I, pp. 557-566, 2004, Springer, 3-540-22054-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Key Recovery Protection Profile, Evaluation Methodology, Common Criteria |
46 | Karthikeyan Sathyamurthy, Srinivasan Ramasubramanian |
Benefits of Link Protection at Connection Granularity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BROADNETS ![In: 1st International Conference on Broadband Networks (BROADNETS 2004), 25-29 October 2004, San Jose, CA, USA, pp. 300-309, 2004, IEEE Computer Society, 0-7695-2221-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Optical networks, Dynamic routing, Traffic grooming, Link Protection |
46 | Xu Shao, Luying Zhou, Xiaofei Cheng, Weiguo Zheng, Yixin Wang |
Best Effort Shared Risk Link Group (SRLG) Failure Protection in WDM Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2008, Beijing, China, 19-23 May 2008, pp. 5150-5154, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
46 | Canhui Ou, Hui Zang, Narendra K. Singhal, Keyao Zhu, Laxman H. Sahasrabuddhe, R. A. MacDonald, Biswanath Mukherjee |
Subpath protection for scalability and fast recovery in optical WDM mesh networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Sel. Areas Commun. ![In: IEEE J. Sel. Areas Commun. 22(9), pp. 1859-1875, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
46 | Adam Wiggins, Simon Winwood, Harvey Tuch, Gernot Heiser |
Legba: Fast Hardware Support for Fine-Grained Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Asia-Pacific Computer Systems Architecture Conference ![In: Advances in Computer Systems Architecture, 8th Asia-Pacific Conference, ACSAC 2003, Aizu-Wakamatsu, Japan, September 23-26, 2003, Proceedings, pp. 320-336, 2003, Springer, 3-540-20122-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
46 | Christian Damsgaard Jensen, Daniel Hagimont |
Protection Reconfiguration for Reusable Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSMR ![In: 2nd Euromicro Conference on Software Maintenance and Reengineering (CSMR '98), 8-11 March 1998, Florence, Italy, pp. 74-81, 1998, IEEE Computer Society, 0-8186-8421-6. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
44 | Consumer Financial Protection Bureau |
Consumer Complaints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2019 |
DOI RDF |
|
44 | IEEE Standards Association, NFPA National Fire Protection Association |
Arc Flash Phenomena. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2019 |
DOI RDF |
|
44 | European Data Protection Supervisor |
EDPS calls for consistency in EU approach to criminal records. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Datenschutz und Datensicherheit ![In: Datenschutz und Datensicherheit 42(2), pp. 68, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
44 | János Tapolcai, Pin-Han Ho |
A Deeper Study on Segment Shared Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPAN ![In: 7th International Symposium on Parallel Architectures, Algorithms, and Networks (I-SPAN 2004), 10-12 May 2004, Hong Kong, SAR, China, pp. 319-325, 2004, IEEE Computer Society, 0-7695-2135-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
restoration time, protection and restoration, switching/merging, integer linear program (ILP), segment shared protection (SSP), protection domain |
44 | Mikio Hashimoto |
Secure Processor Consistent with Both Foreign Software Protection and User Privacy Protection (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers, pp. 287-290, 2004, Springer, 3-540-40925-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
43 | Pin-Han Ho, Hussein T. Mouftah |
Allocation of Protection Domains in Dynamic WDM Mesh Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNP ![In: 10th IEEE International Conference on Network Protocols (ICNP 2002), 12-15 November 2002, Paris, France, Proceedings, pp. 188-189, 2002, IEEE Computer Society, 0-7695-1856-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
lighgtpath, shared protection, diverse routing, working and protection paths, wavelength division multiplexing (WDM) |
42 | Dan Wang 0002, Qian Zhang 0001, Jiangchuan Liu |
The self-protection problem in wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Sens. Networks ![In: ACM Trans. Sens. Networks 3(4), pp. 20, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Sensor networks, coverage, protection |
42 | Jianping Wang 0001, Mei Yang, Bin Yang, S. Q. Zheng 0001 |
Dual-Homing Based Scalable Partia Multicast Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 55(9), pp. 1130-1141, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
complexity, Networks, multicast, NP-completeness, survivability, protection |
42 | Josep Domingo-Ferrer |
Mobile Agent Route Protection through Hash-Based Mechanisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2001, Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings, pp. 17-29, 2001, Springer, 3-540-43010-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
agent route protection, Mobile agent security, Merkle trees, hash collisions |
41 | Yu Wang 0003, Xiang-Yang Li 0001, Qian Zhang 0001 |
Efficient Algorithms for p-Self-Protection Problem in Static Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 19(10), pp. 1426-1438, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
41 | Ahmed E. Kamal 0001 |
A Generalized Strategy for 1+N Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2008, Beijing, China, 19-23 May 2008, pp. 5155-5159, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
41 | Chava Vijaya Saradhi, Mohan Gurusamy, Luying Zhou |
Segment-Based Partial Protection Scheme for Routing Reliability Guaranteed Connections in WDM Optical Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BROADNETS ![In: 3rd International Conference on Broadband Communications, Networks, and Systems (BROADNETS 2006), 1-5 October 2006, San José, California, USA, 2006, IEEE, 978-1-4244-0425-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
41 | Abdelilah Maach, Gregor von Bochmann, Hussein T. Mouftah |
Shared Protection for Time Slotted Optical Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCA ![In: 3rd IEEE International Symposium on Network Computing and Applications (NCA 2004), 30 August - 1 September 2004, Cambridge, MA, USA, pp. 333-336, 2004, IEEE Computer Society, 0-7695-2242-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
41 | Harald Gossner |
ESD protection for the deep sub micron regime - a challenge for design methodology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLSI Design ![In: 17th International Conference on VLSI Design (VLSI Design 2004), with the 3rd International Conference on Embedded Systems Design, 5-9 January 2004, Mumbai, India, pp. 809-, 2004, IEEE Computer Society, 0-7695-2072-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
41 | Chi Wai Yung, Hung Fai Fu, Chi-Ying Tsui, Roger S. Cheng, D. George |
Unequal error protection for wireless transmission of MPEG audio. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS (6) ![In: Proceedings of the 1999 International Symposium on Circuits and Systems, ISCAS 1999, Orlando, Florida, USA, May 30 - June 2, 1999, pp. 342-345, 1999, IEEE, 0-7803-5471-0. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
40 | Arrvindh Shriraman, Sandhya Dwarkadas |
Sentry: light-weight auxiliary memory access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCA ![In: 37th International Symposium on Computer Architecture (ISCA 2010), June 19-23, 2010, Saint-Malo, France, pp. 407-418, 2010, ACM, 978-1-4503-0053-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
sentry, access control, multiprocessors, safety, cache coherence, memory protection, protection domains |
40 | Ron Banner, Ariel Orda |
The power of tuning: a novel approach for the efficient design of survivable networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 15(4), pp. 737-749, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
path restoration/protection, routing, survivability |
40 | Fangcheng Tang, Lu Ruan 0001 |
A Protection Tree Scheme for First-Failure Protection and Second-Failure Restoration in Optical Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCNMC ![In: Networking and Mobile Computing, Third International Conference, ICCNMC 2005, Zhangjiajie, China, August 2-4, 2005, Proceedings, pp. 620-631, 2005, Springer, 3-540-28102-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
39 | Thomas Schierl, Heiko Schwarz, Detlev Marpe, Thomas Wiegand |
Wireless Broadcasting Using the Scalable Extension of H.264/AVC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICME ![In: Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, ICME 2005, July 6-9, 2005, Amsterdam, The Netherlands, pp. 884-887, 2005, IEEE Computer Society, 0-7803-9331-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
39 | Salvatore D'Antonio, Francesco Oliviero, Roberto Setola |
High-Speed Intrusion Detection in Support of Critical Infrastructure Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRITIS ![In: Critical Information Infrastructures Security, First International Workshop, CRITIS 2006, Samos, Greece, August 31 - September 1, 2006, Revised Papers, pp. 222-234, 2006, Springer, 3-540-69083-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
critical infrastructure protection (CIP), critical information infrastructure protection (CIIP), flow monitoring, intrusion detection, security management, SCADA |
39 | Vito Cappellini, Franco Bartolini, Mauro Barni, M. Wada |
Copyright Protection of Cultural Heritage Multimedia Data through Digital Watermarking Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 11th International Workshop on Database and Expert Systems Applications (DEXA'00), 6-8 September 2000, Greenwich, London, UK, pp. 935-939, 2000, IEEE Computer Society, 0-7695-0680-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
cultural heritage multimedia data, intellectual property rights protection, Art Virtual Gallery, World Wide Web, digital watermarking, art, copyright protection |
38 | Markos Fountoulakis, Manolis Marazakis, Michail Flouris, Angelos Bilas |
DARC: design and evaluation of an I/O controller for data protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SYSTOR ![In: Proceedings of of SYSTOR 2010: The 3rd Annual Haifa Experimental Systems Conference, Haifa, Israel, May 24-26, 2010, 2010, ACM, 978-1-60558-908-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
block-level I/O, storage architecture, storage controllers, virtualization, error detection, versioning, data protection, I/O performance |
38 | Anders Mykkeltveit, Bjarne E. Helvik |
Comparison of Schemes for Provision of Differentiated Availability-Guaranteed Services Using Dedicated Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN ![In: Seventh International Conference on Networking (ICN 2008), 13-18 April 2008, Cancun, Mexico, pp. 78-86, 2008, IEEE Computer Society, 978-0-7695-3106-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
QoS, availability, protection |
38 | Wen Ji, Yiqiang Chen, Min Chen 0003, Yi Kang |
Unequal error protection based on objective video evaluation model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiMedia ![In: Proceedings of the 3rd International Conference on Mobile Multimedia Communications, MobiMedia 2007, Nafpaktos, Greece, August 27-29, 2007, pp. 5, 2007, ICST, 978-963-06-2670-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
unequal error protection (UEP), video quality evaluation, fuzzy theory |
38 | Francesco Palmieri 0002, Ugo Fiore |
A Low Cost and Effective Link Protection Approach for Enhanced Survivability in Optical Transport Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA Workshops ![In: Frontiers of High Performance Computing and Networking - ISPA 2006 Workshops, ISPA 2006 International Workshops, FHPCN, XHPC, S-GRACE, GridGIS, HPC-GTP, PDCE, ParDMCom, WOMP, ISDF, and UPWN, Sorrento, Italy, December 4-7, 2006, Proceedings, pp. 368-376, 2006, Springer, 3-540-49860-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Network resiliency, Fast rerouting, Link protection |
38 | Matthew S. Simpson, Bhuvan Middha, Rajeev Barua |
Segment protection for embedded systems using run-time checks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CASES ![In: Proceedings of the 2005 International Conference on Compilers, Architecture, and Synthesis for Embedded Systems, CASES 2005, San Francisco, California, USA, September 24-27, 2005, pp. 66-77, 2005, ACM, 1-59593-149-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
MMU, MPU, ewmbedded systems, safe languages, segment protection, segmentation violations, reliability, compilers, virtual memory, memory safety, run-time checks |
38 | Masahiko Takahashi, Kenji Kono, Takashi Masuda |
Efficient Kernel Support of Fine-Grained Protection Domains for Mobile Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: Proceedings of the 19th International Conference on Distributed Computing Systems, Austin, TX, USA, May 31 - June 4, 1999, pp. 64-73, 1999, IEEE Computer Society, 0-7695-0222-9. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
operating system, mobile code, lightweight, fine-grained, protection domain, page table |
38 | Shoji Suzuki, Kang G. Shin |
On memory protection in real-time OS for small embedded systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RTCSA ![In: 4th International Workshop on Real-Time Computing Systems and Applications (RTCSA '97), 27-29 October 1997, Taipei, Taiwan, pp. 51-, 1997, IEEE Computer Society, 0-8186-8073-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
real-time OS, small embedded systems, region enlargement, memory consumption, processing overhead, intermediate-level skip multi-size paging, multi-level paging, short-circuit segment tree, real-time systems, reliability, safety, microprocessors, paged segmentation, hardware support, memory protection |
38 | Jeffrey S. Chase, Henry M. Levy, Michael J. Feeley, Edward D. Lazowska |
Sharing and Protection in a Single-Address-Space Operating System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Comput. Syst. ![In: ACM Trans. Comput. Syst. 12(4), pp. 271-307, 1994. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
capability-based systems, microkernel operating systems, single-address-space operating systems, wide-address architectures, protection, object-oriented database systems, persistent storage, 64-bit architectures |
37 | Antonia Colibasanu |
NATO's Frontier Critical Infrastructure Protection Buildup - Discussion on the Romanian Energy Sector Protection Challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges ![In: Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges, pp. 43-52, 2016, IOS Press, 978-1-61499-698-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
37 | Daniel Le Métayer, Julien Le Clainche |
From the Protection of Data to the Protection of Individuals: Extending the Application of Non-discrimination Principles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
European Data Protection ![In: European Data Protection: In Good Health?, pp. 315-329, 2012, Springer, 978-94-007-2902-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
37 | Ian Ellefsen, Sebastiaan H. von Solms |
Critical Information Infrastructure Protection in the Developing World. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection IV - Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected Papers, pp. 29-40, 2010, Springer, 978-3-642-16805-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
37 | János Tapolcai, Pin-Han Ho, Dominique Verchère, Tibor Cinkler, Anwar Haque |
A New Shared Segment Protection Method for Survivable Networks with Guaranteed Recovery Time. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Reliab. ![In: IEEE Trans. Reliab. 57(2), pp. 272-282, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Abraham Jacobus Johannes Mouton, C. Smith, George E. Smith |
Wireless Control and Communication to Motor Protection Relays by using an Embedded Microprocessor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCECE ![In: Proceedings of the Canadian Conference on Electrical and Computer Engineering, CCECE 2006, May 7-10, 2006, Ottawa Congress Centre, Ottawa, Canada, pp. 1104-1107, 2006, IEEE, 1-4244-0038-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
37 | Jing Fang, Mahesh Sivakumar, Arun K. Somani, Krishna M. Sivalingam |
On Partial Protection in Groomed Optical WDM Mesh Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June - 1 July 2005, Yokohama, Japan, Proceedings, pp. 228-237, 2005, IEEE Computer Society, 0-7695-2282-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Wissam Fawaz, Fabio Martignon, Ken Chen 0004, Guy Pujolle |
A Priority-Aware Protection Technique for Quality of Service Enabled WDM Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETWORKING ![In: NETWORKING 2005: Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems, 4th International IFIP-TC6 Networking Conference, Waterloo, Canada, May 2-6, 2005, Proceedings, pp. 419-430, 2005, Springer, 3-540-25809-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Lei Guo 0005, Hongfang Yu, Lemin Li |
A New Path Protection Algorithm for Meshed Survivable Wavelength-Division-Multiplexing Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN (1) ![In: Networking - ICN 2005, 4th International Conference on Networking, ReunionIsland, France, April 17-21, 2005, Proceedings, Part I, pp. 68-75, 2005, Springer, 3-540-25339-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Javier A. Salcedo, Juin J. Liou, Muhammad Yaqub Afridi, Allen R. Hefner |
Novel electrostatic discharge protection structure for a monolithic gas sensor systems-on-a-chip. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS (1) ![In: International Symposium on Circuits and Systems (ISCAS 2005), 23-26 May 2005, Kobe, Japan, pp. 416-419, 2005, IEEE, 0-7803-8834-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Christophe Rippert |
Protection in flexible operating system architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 37(4), pp. 8-18, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
36 | Ken C. K. Lee, Wang-Chien Lee, Hong Va Leong, Baihua Zheng |
Navigational path privacy protection: navigational path privacy protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIKM ![In: Proceedings of the 18th ACM Conference on Information and Knowledge Management, CIKM 2009, Hong Kong, China, November 2-6, 2009, pp. 691-700, 2009, ACM, 978-1-60558-512-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
privacy protection, road network, path search |
35 | Bernard A. Galler |
Letters to the editor: Language protection by trademark ill-advised. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 11(3), pp. 148, 1968. The full citation details ...](Pics/full.jpeg) |
1968 |
DBLP DOI BibTeX RDF |
Mooers doctrine, TRAC languages, patent protection, procedure-oriented language, proprietary software, protection of software, standardization, copyright protection, licensing, trademarks |
35 | Nils Kalstad Svendsen, Stephen D. Wolthusen |
Multigraph Dependency Models for Heterogeneous Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection, Post-Proceedings of the First Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA, March 19-21, 2007, pp. 337-350, 2007, Springer, 978-0-387-75461-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Infrastructure interdependencies, multigraph models, simulation |
34 | Emile J. C. Kelkboom, Berk Gökberk, Tom A. M. Kevenaar, Anton H. M. Akkermans, Michiel van der Veen |
"3D Face": Biometric Template Protection for 3D Face Recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICB ![In: Advances in Biometrics, International Conference, ICB 2007, Seoul, Korea, August 27-29, 2007, Proceedings, pp. 566-573, 2007, Springer, 978-3-540-74548-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
helper data system (HDS), privacy protection, 3D face recognition, Template protection |
34 | Bart J. van Rijnsoever, Peter Lenoir, Jean-Paul M. G. Linnartz |
Interoperable Protection for Digital Multimedia Content. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. VLSI Signal Process. ![In: J. VLSI Signal Process. 34(1-2), pp. 167-179, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
OPIMA, architecture, interoperability, DRM, content-protection, copy-protection, conditional-access |
34 | Agnieszka C. Miguel, Eve A. Riskin |
Protection of Regions of Interest against Data Loss in a Generalized Multiple Description Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Compression Conference ![In: Data Compression Conference, DCC 2000, Snowbird, Utah, USA, March 28-30, 2000., pp. 562, 2000, IEEE Computer Society, 0-7695-0592-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Protection of Regions of Interest, Error Resilience of ROI, MD-SPIHT, Packet Erasure Networks, Lossy Communications Networks, Unequal Loss Protection, Region of Interest, ROI, Multiple Description Coding, SPIHT |
34 | Kai Rannenberg, Giovanni Iachello |
Protection Profiles for Remailer Mixes -Do the New Evaluation Criteria Help? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 107-, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
protection profiles, remailer mixes, IT security evaluation criteria, privacy-related requirements, remailer mix networks, unobservable message transfer, ISO-ECITS, TCSEC, ITSEC, information technology, information technology, certification, privacy protection, electronic mail, data privacy, CC, evaluation criteria, user anonymity |
34 | Richard E. Smith |
Mandatory Protection for Internet Server Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA, pp. 178-184, 1996, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
multilevel security applications, Internet server software, server overrun, attack code, server host, mandatory protection mechanisms, commercial systems, Unix chroot isolation, type enforcement, server protection, Internet, MLS, security flaws |
34 | Mojtaba Mehrara, Todd M. Austin |
Exploiting selective placement for low-cost memory protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Archit. Code Optim. ![In: ACM Trans. Archit. Code Optim. 5(3), pp. 14:1-14:24, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Partial memory protection, selective placement, transient faults, fault-tolerant design, memory system design |
34 | Eun-Jun Yoon, Kee-Young Yoo |
Improving the Host Authentication Mechanism for POD Copy Protection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
New Directions in Intelligent Interactive Multimedia ![In: New Directions in Intelligent Interactive Multimedia, pp. 373-383, 2008, Springer, 978-3-540-68126-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Host authentication, POD copy protection system, Diffie-Hellman key agreement, Replay attack |
34 | Yongho Seok, Taekyoung Kwon 0001, Yanghee Choi, Jean-Marie Bonnin |
Temporal fairness guarantee in multi-rate wireless LANs for per-flow protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Networks ![In: Wirel. Networks 13(2), pp. 237-258, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Temporal fairness, Per-flow protection, Wireless LAN, Packet scheduling, CSMA/CA |
34 | Yanjun Zuo, Timothy O'Keefe |
Post-release information privacy protection: A framework and next-generation privacy-enhanced operating system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Frontiers ![In: Inf. Syst. Frontiers 9(5), pp. 451-467, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Information privacy protection, Privacy violation detection, Privacy-enhanced operating system, Information post-release control |
34 | Jimena L. Bastos, Yujie Zhang, Anurag K. Srivastava 0001, Noel N. Schulz |
A design paradigm for integrated protection of shipboard power systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCSC ![In: Proceedings of the 2007 Summer Computer Simulation Conference, SCSC 2007, San Diego, California, USA, July 16-19, 2007, pp. 3, 2007, Simulation Councils, Inc., 1-56555-316-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
protection system, rapid prototyping, design process, modeling and simulation, real-time simulation, power system, hardware-in-the-loop |
34 | Min Xu, Xuxian Jiang, Ravi S. Sandhu, Xinwen Zhang |
Towards a VMM-based usage control framework for OS kernel integrity protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings, pp. 71-80, 2007, ACM, 978-1-59593-745-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
kernel integrity, operating system protection, access control, authorization, security architecture, usage control, VMM, UCON |
34 | Zude Li, Guoqiang Zhan, Xiaojun Ye |
Role-Based Peer-to-Peer Model: Capture Global Pseudonymity for Privacy Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WAIM ![In: Advances in Web-Age Information Management, 7th International Conference,WAIM 2006, Hong Kong, China, June 17-19, 2006, Proceedings, pp. 193-204, 2006, Springer, 3-540-35225-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Peer-to-Peer, Role, Privacy Protection, Pseudonymity |
34 | Jen-Hao Hsiao, Jenq-Haur Wang, Ming-Syan Chen, Chu-Song Chen, Lee-Feng Chien |
Constructing a Wrapper-Based DRM System for Digital Content Protection in Digital Libraries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICADL ![In: Digital Libraries: Implementing Strategies and Sharing Experiences, 8th International Conference on Asian Digital Libraries, ICADL 2005, Bangkok, Thailand, December 12-15, 2005, Proceedings, pp. 375-379, 2005, Springer, 3-540-30850-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
access control, digital watermark, Digital rights management, intellectual property, content protection |
34 | Emmett Witchel, Junghwan Rhee, Krste Asanovic |
Mondrix: memory isolation for linux using mondriaan memory protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOSP ![In: Proceedings of the 20th ACM Symposium on Operating Systems Principles 2005, SOSP 2005, Brighton, UK, October 23-26, 2005, pp. 31-44, 2005, ACM, 1-59593-079-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
fine-grained memory protection |
34 | Lin Yuan, Gang Qu 0001, Ankur Srivastava 0001 |
VLSI CAD tool protection by birthmarking design solutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Great Lakes Symposium on VLSI ![In: Proceedings of the 15th ACM Great Lakes Symposium on VLSI 2005, Chicago, Illinois, USA, April 17-19, 2005, pp. 341-344, 2005, ACM, 1-59593-057-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
birthmarking, CAD, protection, intellectual property |
34 | Yu-Quan Zhang, Sabu Emmanuel |
A Novel Watermarking Framework for Joint-Creatorship Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CW ![In: 4th International Conference on Cyberworlds (CW 2005), 23-25 November 2005, Singapore, pp. 109-116, 2005, IEEE Computer Society, 0-7695-2378-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Joint-Creatorship Protection, Joint-Ownership Verification, Watermarking Framework |
34 | Silvia Polettini, Luisa Franconi, Julian Stander |
Model Based Disclosure Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inference Control in Statistical Databases ![In: Inference Control in Statistical Databases, From Theory to Practice, pp. 83-96, 2002, Springer, 3-540-43614-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Business microdata, protection models, confidentiality, regression models, performance assessment |
34 | Oded Goldreich 0001, Rafail Ostrovsky |
Software Protection and Simulation on Oblivious RAMs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. ACM ![In: J. ACM 43(3), pp. 431-473, 1996. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
simulation of random access machines, software protection, pseudorandom functions |
33 | Michael Stilkerich, Daniel Lohmann, Wolfgang Schröder-Preikschat |
Memory protection at option. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDCC-CARS ![In: 1st Workshop on Critical Automotive Applications: Robustness & Safety, CARS 2010 (EDCC Workshop), Valencia, Spain, 27 April 2010, pp. 17-20, 2010, ACM, 978-1-60558-915-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
33 | Yang Xiao 0001, Frank Haizhon Li, Sunghyun Choi 0001 |
Two-level protection and guarantee for multimedia traffic in IEEE 802.11e distributed WLANs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Networks ![In: Wirel. Networks 15(2), pp. 141-161, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Quality of Service (QoS), Wireless LAN, Admission control, Medium access control (MAC), IEEE 802.11e |
33 | Emad Mahmoud Alsukhni, Hussein T. Mouftah |
A novel distributed destination routing-based Availability-Aware provisioning framework for differentiated protection services in optical mesh networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), July 6-9, Marrakech, Morocco, pp. 74-79, 2008, IEEE Computer Society, 978-1-4244-2702-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Ningning Zhu, Tzi-cker Chiueh |
Portable and Efficient Continuous Data Protection for Network File Servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: The 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2007, 25-28 June 2007, Edinburgh, UK, Proceedings, pp. 687-697, 2007, IEEE Computer Society, 0-7695-2855-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Hyunsu Lim, Sang-il Ahn, Eun-kyou Kim, Hong-Shik Park |
A QoS-Based Adaptive Resource Sharing Protection for Optical Burst Switching Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: Information Networking, Advances in Data Communications and Wireless Networks, International Conference, ICOIN 2006, Sendai, Japan, January 16-19, 2006, Revised Selected Papers, pp. 532-541, 2006, Springer, 3-540-48563-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Hyunseung Choo, Minhan Son, Min Young Chung, Tae-Jin Lee 0001 |
Shared Protection by Concatenated Rings in Optical WDM Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETWORKING ![In: NETWORKING 2004, Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication, Third International IFIP-TC6 Networking Conference, Athens, Greece, May 9-14, 2004, Proceedings, pp. 1476-1482, 2004, Springer, 3-540-21959-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
33 | Antony L. Hosking, J. Eliot B. Moss |
Protection Traps and Alternatives for Memory Management of an Object-Oriented Language. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOSP ![In: Proceedings of the Fourteenth ACM Symposium on Operating System Principles, SOSP 1993, The Grove Park Inn and Country Club, Asheville, North Carolina, USA, December 5-8, 1993, pp. 106-119, 1993, ACM, 0-89791-632-8. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
Smalltalk |
33 | Ravi S. Sandhu |
The schematic protection model: its definition and analysis for acyclic attenuating schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. ACM ![In: J. ACM 35(2), pp. 404-432, 1988. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
|
32 | Hans Ulrich Buhl, Marcus Kaiser, Veronica Winkler |
Beratungsindividualisierung in der Finanzdienstleistungsbranche Umsetzungskonzepte und rechtliche Rahmenbedingungen. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirtschaftsinf. ![In: Wirtschaftsinf. 49(1), pp. 26-33, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Individualisation, Consumer Protection, Role-Orientation, Situation-Orientation, Advisory, Data Protection, Financial Services |
32 | Chung-Lin Huang, Sling Liang |
A Model-Driven Joint Source and Channel Coder for MPEG-2 Video Transmission. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC ![In: 2002 International Symposium on Information Technology (ITCC 2002), 8-10 April 2002, Las Vegas, NV, USA, pp. 404-409, 2002, IEEE Computer Society, 0-7695-1506-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Joint Source and channel coding (JSCC), Unequal error protection (UEP), rate compatible punctured convolution (RCPC) coding and Equal error protection (EEP) |
32 | Robert Grimm 0001, Brian N. Bershad |
Separating access control policy, enforcement, and functionality in extensible systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Comput. Syst. ![In: ACM Trans. Comput. Syst. 19(1), pp. 36-70, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
access check, policy-neutral enforcement, protection domain transfer, Java, security policy, auditing, SPIN, extensible systems, protection domain |
32 | Robert N. Smith, Sourav Bhattacharya |
Firewall placement in a large network topology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FTDCS ![In: 6th IEEE Workshop on Future Trends of Distributed Computer Systems (FTDCS '97), 29-31 October 1997, Tunis, Tunisia, Proceedings, pp. 40-45, 1997, IEEE Computer Society, 0-8186-8153-5. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
firewall placement heuristics, large network topology, multi-user distributed information environment, firewall cascade, potential attack point, comprehensive security protection, end-to-end security protection, simulation, performance, network security, completeness, authorisation, operations research, cost optimization, delay minimization, sensitive data, confidence degree |
31 | Mikio Hashimoto, Hiroyoshi Haruki, Takeshi Kawabata |
Secure Processor Consistent with Both Foreign Software Protection and User Privacy Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers, pp. 276-286, 2004, Springer, 3-540-40925-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
31 | Dee Meng Kang, Haadee Faahym, Souhail Meftah, Sye Loong Keoh, Khin Mi Mi Aung |
Practical Deep Neural Network Protection for Unmodified Applications in Intel Software Guard Extension Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection XVII - 17th IFIP WG 11.10 International Conference, ICCIP 2023, Arlington, VA, USA, March 13-14, 2023, Revised Selected Papers, pp. 177-192, 2023, Springer, 978-3-031-49584-7. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
31 | Daniel Celebucki, Scott R. Graham, Sanjeev Gunawardena |
Reversing a Lattice ECP3 FPGA for Bitstream Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection XII - 12th IFIP WG 11.10 International Conference, ICCIP 2018, Arlington, VA, USA, March 12-14, 2018, Revised Selected Papers, pp. 91-111, 2018, Springer, 978-3-030-04536-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
31 | Francesco Cavallaro, Andrea Chiappetta, Massimiliano De Santis, Anna Pinnarelli |
Critical Infrastructure Protection: Smart Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges ![In: Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges, pp. 18-22, 2016, IOS Press, 978-1-61499-698-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
31 | Edoardo Camilli |
OSINT, Big Data & Critical Infrastructures Protection (CIP). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges ![In: Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges, pp. 35-42, 2016, IOS Press, 978-1-61499-698-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
31 | Gianluca Baldassarre |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges ![In: Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges, pp. 97-105, 2016, IOS Press, 978-1-61499-698-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
31 | Cyril Onwubiko |
Exploring web analytics to enhance cyber situational awareness for the protection of online web services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security And Protection Of Digital Services ![In: 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), London, United Kingdom, June 13-14, 2016, pp. 1-8, 2016, IEEE, 978-1-5090-0709-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
31 | Gaofeng Zhang, Paolo Falcarin, Elena Gómez-Martínez, Shareeful Islam, Christophe Tartary, Bjorn De Sutter, Jérôme d'Annoville |
Attack simulation based software protection assessment method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security And Protection Of Digital Services ![In: 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), London, United Kingdom, June 13-14, 2016, pp. 1-8, 2016, IEEE, 978-1-5090-0709-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
31 | George Stergiopoulos, Efstratios Vasilellis, Georgia Lykou, Panayiotis Kotzanikolaou, Dimitris Gritzalis |
Classification and Comparison of Critical Infrastructure Protection Tools. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection X - 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March 14-16, 2016, Revised Selected Papers, pp. 239-255, 2016, 978-3-319-48736-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 22913 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|