|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1717 occurrences of 1015 keywords
|
|
|
Results
Found 5607 publication records. Showing 5606 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
71 | Mark A. Whiting, Wendy Cowley, Jereme Haack, Douglas Love, Stephen Tratz, Caroline Varley, Kim Wiessner |
Threat stream data generator: creating the known unknowns for test and evaluation of visual analytics tools.  |
BELIV  |
2006 |
DBLP DOI BibTeX RDF |
threat stream, threat, data generator |
68 | Dianxiang Xu, Kendall E. Nygard |
Threat-Driven Modeling and Verification of Secure Software Using Aspect-Oriented Petri Nets.  |
IEEE Trans. Software Eng.  |
2006 |
DBLP DOI BibTeX RDF |
aspect-oriented Petri nets, modeling, verification, Petri nets, aspect-oriented software development, Software security, threat modeling |
61 | Sangho Lee, Dong Hwi Lee, Kuinam J. Kim |
A Conceptual Design of Knowledge-Based Real-Time Cyber-Threat Early Warning System.  |
ISPA Workshops  |
2006 |
DBLP DOI BibTeX RDF |
Cyber-threat, TMS, Early-Warning, ESM |
57 | Punam Bedi, Vandana Gandotra, Archana Singhal, Vandita Vats, Neha Mishra |
Avoiding Threats Using Multi Agent System Planning for Web Based Systems.  |
ICCCI  |
2009 |
DBLP DOI BibTeX RDF |
HTN, GOAP, MASPTA, Multi agent system, Threat modeling |
57 | Fredrik Johansson, Göran Falkman |
A Comparison between Two Approaches to Threat Evaluation in an Air Defense Scenario.  |
MDAI  |
2008 |
DBLP DOI BibTeX RDF |
fuzzy inference rules, threat assessment, threat evaluation, weapons allocation, fuzzy logic, Bayesian networks |
54 | Michael D. Carroll |
Information security: examining and managing the insider threat.  |
InfoSecCD  |
2006 |
DBLP DOI BibTeX RDF |
insider threat |
54 | Ragib Hasan, Suvda Myagmar, Adam J. Lee, William Yurcik |
Toward a threat model for storage systems.  |
StorageSS  |
2005 |
DBLP DOI BibTeX RDF |
security, storage system, threat model |
54 | Volkmar Lotz |
Threat Scenarios as a Means to Formally Develop Secure Systems.  |
ESORICS  |
1996 |
DBLP DOI BibTeX RDF |
Threat Identification, Stream Processing Functions, Security, Authentication, Formal Methods, Protocols, Risk Analysis |
51 | Otto Carlander, Lars Eriksson, Per-Anders Oskarsson |
Handling Uni- and Multimodal Threat Cueing with Simultaneous Radio Calls in a Combat Vehicle Setting.  |
HCI (6)  |
2007 |
DBLP DOI BibTeX RDF |
Combat Vehicle, Simulation, Multimodal, Display technologies |
51 | Neeli Rashmi Prasad |
Threat Model Framework and Methodology for Personal Networks (PNs).  |
COMSWARE  |
2007 |
DBLP DOI BibTeX RDF |
|
51 | Ramkumar Chinchani, Anusha Iyer, Hung Q. Ngo 0001, Shambhu J. Upadhyaya |
Towards a Theory of Insider Threat Assessment.  |
DSN  |
2005 |
DBLP DOI BibTeX RDF |
|
51 | Oliver J. Bear Don't Walk IV, Kevin K. Wiley, Lois Walters-Threat, Rebecca L. Rivera, Martin Chieng Were, Tiffani J. Bright |
A Framework to Support Diversity, Equity, and Inclusion within AMIA Through Strengthened Pathways, Support and Leadership.  |
AMIA  |
2021 |
DBLP BibTeX RDF |
|
50 | Peter Torr |
Demystifying the Threat-Modeling Process.  |
IEEE Secur. Priv.  |
2005 |
DBLP DOI BibTeX RDF |
threat environment, security, software development, product development, threat modeling |
50 | Ghi Paul Im, Richard L. Baskerville |
A longitudinal study of information system threat categories: the enduring problem of human error.  |
Data Base  |
2005 |
DBLP DOI BibTeX RDF |
information infrastructure protection, information system threat, information system threat taxonomy, software quality and reliability, information security, computer security, human error, software defects |
47 | Emily M. Zechman |
Integrating complex adaptive system simulation and evolutionary computation to support water infrastructure threat management.  |
GECCO (Companion)  |
2010 |
DBLP DOI BibTeX RDF |
threat management, water distribution security, agent-based modeling |
47 | Dianxiang Xu, Kendall E. Nygard |
A threat-driven approach to modeling and verifying secure software.  |
ASE  |
2005 |
DBLP DOI BibTeX RDF |
aspect-oriented Petri nets, verification, Petri nets, aspect-oriented software development, software security, threat modeling |
44 | Anton Bolfing, Tobias Halbherr, Adrian Schwaninger |
How Image Based Factors and Human Factors Contribute to Threat Detection Performance in X-Ray Aviation Security Screening.  |
USAB  |
2008 |
DBLP DOI BibTeX RDF |
aviation security, image based factors, human factors, X-ray imaging |
44 | Kevin S. Killourhy, Roy A. Maxion |
Toward Realistic and Artifact-Free Insider-Threat Data.  |
ACSAC  |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Robert S. Garfinkel, Ram D. Gopal, Daniel O. Rice |
New Approaches to Disclosure Limitation While Answering Queries to a Database: Protecting Numerical Confidential Data against Insider Threat Based on Data or Algorithms.  |
HICSS  |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Syed Naqvi, Michel Riguidel |
Threat Model for Grid Security Services.  |
EGC  |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Jonathan W. Butts, Robert F. Mills, Rusty O. Baldwin |
Developing an Insider Threat Model Using Functional Decomposition.  |
MMM-ACNS  |
2005 |
DBLP DOI BibTeX RDF |
|
40 | Ignacio J. Martinez-Moyano, Eliot H. Rich, Stephen H. Conrad, David F. Andersen, Thomas R. Stewart |
A behavioral theory of insider-threat risks: A system dynamics approach.  |
ACM Trans. Model. Comput. Simul.  |
2008 |
DBLP DOI BibTeX RDF |
behavioral theory, judgment and decision making, signal detection theory, system dynamics modeling, risk, security modeling, Insider threat, policy analysis |
40 | Andreas Ekelhart, Stefan Fenz, Thomas Neubauer, Edgar R. Weippl |
Formal threat descriptions for enhancing governmental risk assessment.  |
ICEGOV  |
2007 |
DBLP DOI BibTeX RDF |
formal threat descriptions, inventory, security ontology |
40 | Lanxiang Chen, Dan Feng 0001, Liang Ming |
The Security Threats and Corresponding Measures to Distributed Storage Systems.  |
APPT  |
2007 |
DBLP DOI BibTeX RDF |
process of security, threat modeling, security threat, storage security, security measure |
37 | Hui Wang 0071, Heli Xu, Bibo Lu, Zihao Shen |
Research on Security Architecture for Defending Insider Threat.  |
IAS  |
2009 |
DBLP DOI BibTeX RDF |
|
37 | Jianxin Li 0002, Teodor Sommestad, Patrick C. K. Hung, Xiang Li |
Web Service-Based Business Process Development, Threat Modeling and Security Assessment Tool.  |
ICWS  |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Teresa Musiol, Katarzyna Ujma-Wasowicz |
Identification of Threat of Isolation as a Result of Work with a Computer in Free Time.  |
HCI (7)  |
2007 |
DBLP DOI BibTeX RDF |
sociometric measure, reduction of threats, active recreation, computer, isolation |
37 | Zhitang Li, Jie Lei 0004, Li Wang 0015, Dong Li |
Assessing Attack Threat by the Probability of Following Attacks.  |
IEEE NAS  |
2007 |
DBLP DOI BibTeX RDF |
|
37 | Sanguk Noh |
Autonomous Situation Awareness Through Threat Data Integration.  |
IRI  |
2007 |
DBLP DOI BibTeX RDF |
|
37 | Zhitang Li, Jie Lei 0004, Li Wang 0015, Dong Li, Yang-ming Ma |
Towards Identifying True Threat from Network Security Data.  |
PAISI  |
2007 |
DBLP DOI BibTeX RDF |
|
37 | Ileana Buhan, Asker M. Bazen, Pieter H. Hartel, Raymond N. J. Veldhuis |
A False Rejection Oriented Threat Model for the Design of Biometric Authentication Systems.  |
ICB  |
2006 |
DBLP DOI BibTeX RDF |
|
37 | Alan N. Steinberg |
Threat Assessment Technology Development.  |
CONTEXT  |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Seong Chae Seo, Jin Ho You, Young Dae Kim, Jun Yong Choi, Sang Jun Lee, Byung Ki Kim |
Building Security Requirements Using State Transition Diagram at Security Threat Location.  |
CIS (2)  |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Mohsen Saffarian, Matei Ciobanu Morogan |
A novel protocol to prevent malicious nodes from misdirecting forward ants in AntNet algorithm.  |
SAC  |
2008 |
DBLP DOI BibTeX RDF |
AntNet, free-roaming forward ants, misdirection threat |
37 | Jinghua Wu, Guorui Jiang, Tiyun Huang |
Using Two Main Arguments in Agent Negotiation.  |
PRIMA  |
2006 |
DBLP DOI BibTeX RDF |
Agent, Negotiation, Threat, Reward |
37 | Thomas Thomsen |
Lambda-Search in Game Trees - with Application to Go.  |
Computers and Games  |
2000 |
DBLP DOI BibTeX RDF |
binary tree search, threat-sequences, null-moves, proof-number search, abstract game-knowledge, Go block tactics |
37 | Ikuya Morikawa, Yuji Yamaoka |
Threat Tree Templates to Ease Difficulties in Threat Modeling.  |
NBiS  |
2011 |
DBLP DOI BibTeX RDF |
software design, security analysis, threat modeling |
34 | Robert Willison, Mikko T. Siponen |
Overcoming the insider: reducing employee computer crime through Situational Crime Prevention.  |
Commun. ACM  |
2009 |
DBLP DOI BibTeX RDF |
|
34 | Wihem Arsac, Giampaolo Bella, Xavier Chantry, Luca Compagna |
Validating Security Protocols under the General Attacker.  |
ARSPA-WITS  |
2009 |
DBLP DOI BibTeX RDF |
|
34 | Ali Razavi, Kostas Kontogiannis |
Pattern and Policy Driven Log Analysis for Software Monitoring.  |
COMPSAC  |
2008 |
DBLP DOI BibTeX RDF |
Software Auditing, Trace Analysis, Software Monitoring |
34 | Allen Christiansen, Damian Johnson, Lawrence B. Holder |
Game-Based Simulation for the Evaluation of Threat Detection in a Seaport Environment.  |
ICEC  |
2008 |
DBLP DOI BibTeX RDF |
seaport, particle propagation, threat detection, security, Simulation, sensor modeling |
34 | Marwan Abi-Antoun, Daniel Wang, Peter Torr |
Checking threat modeling data flow diagrams for implementation conformance and security.  |
ASE  |
2007 |
DBLP DOI BibTeX RDF |
reflexion models, denial of service, security analysis, threat modeling, data flow diagrams, information disclosure, tampering, spoofing |
34 | Merv Matson, Mihaela Ulieru |
Persistent information security: beyond the e-commerce threat model.  |
ICEC  |
2006 |
DBLP DOI BibTeX RDF |
document security, insecurity expense, persistent information security, risk remediation, digital rights management, DRM, threat model |
34 | Michel Barbeau |
WiMax/802.16 threat analysis.  |
Q2SWinet  |
2005 |
DBLP DOI BibTeX RDF |
wireless network, WiMax, 802.16, threat analysis |
34 | Vassilios Morellas, Ioannis T. Pavlidis, Panagiotis Tsiamyrtzis |
DETER: Detection of events for threat evaluation and recognition.  |
Mach. Vis. Appl.  |
2003 |
DBLP DOI BibTeX RDF |
Multicamera calibration, Threat assessment, Object tracking, Surveillance system, Security system |
34 | Sridhar R. Kundur, Daniel Raviv |
Novel active-vision-based visual-threat-cue for autonomous navigation tasks.  |
CVPR  |
1996 |
DBLP DOI BibTeX RDF |
active-vision-based visual-threat-cue, autonomous navigation tasks, moving observer, time-based imaginary 3-D surfaces, 3D surface texture, mobile robots, active vision, robot vision, visual fields |
33 | John Diamant |
Resilient Security Architecture: A Complementary Approach to Reducing Vulnerabilities.  |
IEEE Secur. Priv.  |
2011 |
DBLP DOI BibTeX RDF |
HP Comprehensive Applications Threat Analysis, W. Edwards Deming, dynamic application security testing, static application security testing, security requirements gap analysis, architectural threat analysis, security quality, zero day, 0-day, software development, security and privacy, security vulnerabilities |
33 | Mohammed A. Alhabeeb, Abdullah Mohammed Almuhaideb, Phu Dung Le, Bala Srinivasan 0002 |
Information Security Threats Classification Pyramid.  |
AINA Workshops  |
2010 |
DBLP DOI BibTeX RDF |
deliberate threat, threat classification |
31 | Simon N. Foley, William M. Fitzgerald |
An Approach to Security Policy Configuration Using Semantic Threat Graphs. (PDF / PS)  |
DBSec  |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Wencong Cheng, Xishan Xu, Yan Jia 0001, Peng Zou |
Network Dynamic Risk Assessment Based on the Threat Stream Analysis.  |
WAIM  |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Feng Wu, Yan Zhong, Quanyuan Wu |
Network Threat Frequency Forecasting Based on Fuzzy Time Series and D-S Evidence Theory.  |
CSSE (3)  |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Hervé Debar, Yohann Thomas, Frédéric Cuppens, Nora Cuppens-Boulahia |
Enabling automated threat response through the use of a dynamic security policy.  |
J. Comput. Virol.  |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Do-Hoon Kim, Taek Lee, Sung-Oh David Jung, Hoh Peter In, Heejo Lee |
Cyber Threat Trend Analysis Model Using HMM.  |
IAS  |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Ferat Sahin, Prasanna Sridhar, Ben Horan, Vikraman Raghavan, Mo M. Jamshidi |
System of systems approach to threat detection and integration of heterogeneous independently operable systems.  |
SMC  |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Nabil R. Adam, Vijayalakshmi Atluri, Vandana Pursnani Janeja, Aabhas V. Paliwal, Mahmoud Youssef, Soon Ae Chun, Jim Cooper, John Paczkowski, Christof Bornhövd, Ike Nassi, Joachim Schaper |
Semantics-based threat structure mining.  |
DG.O  |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Yael Shahar |
Indicators of Threat: Reflecting New Trends.  |
ISI  |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Neelam Jain, Thomas D. Jeitschko, Leonard J. Mirman |
Strategic Experimentation in Financial Intermediation with Threat of Entry.  |
Ann. Oper. Res.  |
2002 |
DBLP DOI BibTeX RDF |
strategic experimentation, signal dampening, financial intermediation, limit pricing, entry deterrence, experimentation |
30 | Rebecca Fribourg, Evan Blanpied, Ludovic Hoyet, Anatole Lécuyer, Ferran Argelaguet |
Does virtual threat harm VR experience?: Impact of threat occurrence and repeatability on virtual embodiment and threat response.  |
Comput. Graph.  |
2021 |
DBLP DOI BibTeX RDF |
|
30 | Lundy Lewis, John F. Buford, Gabriel Jakobson |
Inferring threats in urban environments with uncertain and approximate data: an agent-based approach.  |
Appl. Intell.  |
2009 |
DBLP DOI BibTeX RDF |
Threat assessment, Uncertain/approximate data, Fuzzy, BDI agent, Agent platform, Peer-to-peer overlay |
30 | Fredrik Johansson, Göran Falkman |
Performance Evaluation of TEWA Systems for Improved Decision Support.  |
MDAI  |
2009 |
DBLP DOI BibTeX RDF |
TEWA, threat evaluation, weapon allocation, Performance evaluation, testbed |
30 | Yi-Ming Chen 0008, Dachrahn Wu, Cheng-Kuang Wu |
A Game Theoretic Approach for Deploying Intrusion Detection Agent.  |
PRIMA  |
2007 |
DBLP DOI BibTeX RDF |
Agent deployment, threat levels, Nash equilibrium, Shapley value |
30 | Andreas Ekelhart, Stefan Fenz, Markus D. Klemen, Edgar R. Weippl |
Security Ontology: Simulating Threats to Corporate Assets.  |
ICISS  |
2006 |
DBLP DOI BibTeX RDF |
risk analysis, threat modeling, security ontology |
30 | Howard Chivers |
Information Modeling for Automated Risk Analysis.  |
Communications and Multimedia Security  |
2006 |
DBLP DOI BibTeX RDF |
security, model, communication, information, risk, service-oriented, threat |
30 | Sjouke Mauw, Martijn Oostdijk |
Foundations of Attack Trees.  |
ICISC  |
2005 |
DBLP DOI BibTeX RDF |
semantics, attack trees, threat analysis |
30 | Andrew James Simmonds, Peter Sandilands, Louis van Ekert |
An Ontology for Network Security Attacks.  |
AACC  |
2004 |
DBLP DOI BibTeX RDF |
cyber, security, ontology, network, attack, failure, vulnerability, threat |
30 | Young-Hwan Bang, Yoon-Jung Jung, In-Jung Kim, Namhoon Lee, Gang-Soo Lee |
The Design and Development for Risk Analysis Automatic Tool.  |
ICCSA (1)  |
2004 |
DBLP DOI BibTeX RDF |
Safeguard, Vulnerability, Risk Analysis, Interview, Threat, Asset, Inquiry |
30 | Cynthia E. Irvine, Timothy E. Levin, Jeffery D. Wilson, David J. Shifflett, Barbara Pereira |
An Approach to Security Requirements Engineering for a High Assurance System.  |
Requir. Eng.  |
2002 |
DBLP DOI BibTeX RDF |
Security, Specification, Requirements, Engineering, Assurance, Threat |
30 | Sridhar R. Kundur, Daniel Raviv, Ernest Kent |
An image-based visual-motion-cue for autonomous navigatio.  |
CVPR  |
1997 |
DBLP DOI BibTeX RDF |
visual-motion-cue, visual motion cue, Hybrid Visual Threat Cue, 3D textured surface, sequence of images, active vision, active vision, collision avoidance, visual navigation, autonomous navigation |
27 | Yi-Ming Chen 0008, Dachrahn Wu, Cheng-Kuang Wu |
A game theory approach for an emergency management security advisory system.  |
ISI  |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Dianxiang Xu, Vivek Goel, Kendall E. Nygard |
An Aspect-Oriented Approach to Security Requirements Analysis.  |
COMPSAC (2)  |
2006 |
DBLP DOI BibTeX RDF |
use case, aspect-oriented software development, Security requirements, threats, mitigation |
27 | Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad Verbowski, Helen J. Wang, Jacob R. Lorch |
SubVirt: Implementing malware with virtual machines.  |
S&P  |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Steven R. Johnston |
Development of a Legal Framework for Intrusion Detection.  |
RAID  |
2002 |
DBLP DOI BibTeX RDF |
Anti-terrorism law, criminal law, private communications, privacy, intrusion detection, wiretap, interception |
27 | Jung-Min Kang, Wook Shin, C.-G. Park, Dong-Ik Lee |
Extended BLP Security Model Based on Process Reliability for Secure Linux Kernel.  |
PRDC  |
2001 |
DBLP DOI BibTeX RDF |
|
27 | Hee Ock Rho, Il Ryu |
The Impact of Information Technology Threat on IT Appropriation and IT Avoidance.  |
CICSyN  |
2011 |
DBLP DOI BibTeX RDF |
Information Technology Threat, Coping Theory, IT appropriation, IT avoidance |
27 | Holger Schmidt 0001 |
Threat- and Risk-Analysis During Early Security Requirements Engineering.  |
ARES  |
2010 |
DBLP DOI BibTeX RDF |
risk analysis, domain knowledge, threat analysis, security requirements engineering |
27 | Qizeng Li, Zanfu Xie |
A Correlation Analysis Method for Threat Factors in Information System Based on Cloud Model.  |
MVHI  |
2010 |
DBLP DOI BibTeX RDF |
single rule generator, threat identification, correlation analysis, cloud model |
27 | Antonietta Stango, Neeli R. Prasad, Dimitris M. Kyriazanos |
A Threat Analysis Methodology for Security Evaluation and Enhancement Planning.  |
SECURWARE  |
2009 |
DBLP DOI BibTeX RDF |
vulnerabilities, security metrics, assets, threat analysis |
27 | Xudong Miao, Demin Xu, Yongchun Wang |
Intuitionistic Fuzzy Likelihood Methods and Models for Naval Air Defense Situation and Threat Assessment.  |
FSKD (6)  |
2009 |
DBLP DOI BibTeX RDF |
Situation Threat Assessment, Uncertainty, Fuzzy Set, Intuitionistic Fuzzy Set |
27 | Yair Amir |
The insider threat in scalable distributed systems: algorithms, metrics and gaps.  |
STC  |
2007 |
DBLP DOI BibTeX RDF |
distributed system, insider threat |
27 | Sébastien Foulle, Steve A. Schneider, Jacques Traoré, Zhe Xia |
Threat Analysis of a Practical Voting Scheme with Receipts.  |
VOTE-ID  |
2007 |
DBLP DOI BibTeX RDF |
Voter verifiable, voting ducks, electronic voting, threat analysis |
27 | Mohd A. Bashar, Ganesh Krishnan, Markus G. Kuhn, Eugene H. Spafford, Samuel S. Wagstaff Jr. |
Low-threat security patches and tools.  |
ICSM  |
1997 |
DBLP DOI BibTeX RDF |
low-threat security patches, dangerous information, vulnerability information, software vendor, binary program patch, differential application times, cryptoprocessors, enciphered operating systems, synchronization, reverse engineering, customization, security of data, security tools |
24 | Mariusz Chmielewski, Andrzej Galka, Piotr Jarema, Kamil Krasowski, Artur Kosinski |
Semantic Knowledge Representation in Terrorist Threat Analysis for Crisis Management Systems.  |
ICCCI  |
2009 |
DBLP DOI BibTeX RDF |
counter-terrorism, GTD, ontology, GIS, decision support, crisis management |
24 | Frank L. Greitzer, Andrew P. Moore, Dawn M. Cappelli, Dee H. Andrews, Lynn A. Carroll, Thomas D. Hull |
Combating the Insider Cyber Threat.  |
IEEE Secur. Priv.  |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Wilian Segatto, Eduardo Herzer, Cristiano L. Mazzotti, João Ricardo Bittencourt, Jorge L. V. Barbosa |
Mobio threat: A mobile game based on the integration of wireless technologies.  |
Comput. Entertain.  |
2008 |
DBLP DOI BibTeX RDF |
RFID, Bluetooth, Pervasive, QR code, social gaming |
24 | Jose Andre Morales |
Threat of renovated .NET viruses to mobile devices.  |
ACM Southeast Regional Conference  |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Xuezhong Liu, Zengliang Liu |
Evaluating Method of Security Threat Based on Attacking-Path Graph Model.  |
CSSE (3)  |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Xi Liu, Alastair G. Gale |
Searching for Possible Threat Items to Safe Air Travel: Human Error and Training.  |
HCI (13)  |
2007 |
DBLP DOI BibTeX RDF |
airport X-ray luggage image, visual search, perceptual learning |
24 | Umit Ayvaz, Murat Dere, Yao Ming Tiah |
Using the MANA agent-based simulation tool to evaluate and compare the effectiveness of ground-based and airborne communications jammers in countering the IED threat to ground convoys.  |
SpringSim (2)  |
2007 |
DBLP BibTeX RDF |
Counter-IED, MANA, communications jammers, nearly orthogonal Latin hypercube, IED |
24 | Yue Chen, Barry W. Boehm, Luke Sheppard |
Value Driven Security Threat Modeling Based on Attack Path Analysis.  |
HICSS  |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Hervé Debar, Yohann Thomas, Nora Boulahia-Cuppens, Frédéric Cuppens |
Using Contextual Security Policies for Threat Response.  |
DIMVA  |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Dick Brackney, Terrance Goan, Allen Ott, Lockheed Martin |
The Cyber Enemy Within ... Countering the Threat from Malicious Insiders.  |
ACSAC  |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Wenbo Mao |
A Structured Operational Modelling of the Dolev-Yao Threat Model.  |
Security Protocols Workshop  |
2002 |
DBLP DOI BibTeX RDF |
|
24 | William L. Spight |
Evaluating Kos in a Neutral Threat Environment: Preliminary Results.  |
Computers and Games  |
2002 |
DBLP DOI BibTeX RDF |
|
24 | Ali Berrached, Mohsen Beheshti, André de Korvin, Richard A. Aló |
Applying Fuzzy Relation Equations to Threat Analysis.  |
HICSS  |
2002 |
DBLP DOI BibTeX RDF |
|
23 | Medha Bhargava, Chia-Chih Chen, Michael S. Ryoo, Jake K. Aggarwal |
Detection of object abandonment using temporal logic.  |
Mach. Vis. Appl.  |
2009 |
DBLP DOI BibTeX RDF |
Abandoned objects, Threat detection, Public areas, Temporal logic |
23 | Debin Liu, XiaoFeng Wang 0001, L. Jean Camp |
Mitigating Inadvertent Insider Threats with Incentives.  |
Financial Cryptography  |
2009 |
DBLP DOI BibTeX RDF |
Incentive Engineering, Game Theory, Insider Threat, Human Subject |
23 | Dattatraya S. Bhilare, Ashwini K. Ramani, Sanjay K. Tanwani |
Protecting intellectual property and sensitive information in academic campuses from trusted insiders: leveraging active directory.  |
SIGUCCS  |
2009 |
DBLP DOI BibTeX RDF |
audit automation, real time action, insider threat, active directory, user identification |
23 | Charalampos Z. Patrikakis, Dimitris M. Kyriazanos, Athanasios Voulodimos, Ioannis G. Nikolakopoulos |
Privacy and resource protection in personal network federations.  |
PETRA  |
2009 |
DBLP DOI BibTeX RDF |
security, privacy, threat analysis, personal networks |
23 | Xin Liu, Peidong Zhu, Yuxing Peng 0001 |
SEM: A Security Evaluation Model for Inter-domain Routing System in the Internet.  |
IPOM  |
2008 |
DBLP DOI BibTeX RDF |
Security Threat Situation, BGP, Security Evaluation |
23 | Madhusudhanan Chandrasekaran, Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya |
Inferring Sources of Leaks in Document Management Systems. (PDF / PS)  |
IFIP Int. Conf. Digital Forensics  |
2008 |
DBLP DOI BibTeX RDF |
information leaks, insider threat, Document management system |
Displaying result #1 - #100 of 5606 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|