The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for threat with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1964-1982 (15) 1983-1989 (16) 1990-1993 (20) 1994-1996 (20) 1997 (15) 1998-1999 (32) 2000 (19) 2001 (38) 2002 (54) 2003 (80) 2004 (129) 2005 (216) 2006 (242) 2007 (314) 2008 (320) 2009 (244) 2010 (113) 2011 (114) 2012 (117) 2013 (132) 2014 (148) 2015 (162) 2016 (200) 2017 (250) 2018 (326) 2019 (348) 2020 (348) 2021 (449) 2022 (499) 2023 (506) 2024 (120)
Publication types (Num. hits)
article(2051) book(11) data(2) incollection(83) inproceedings(3406) phdthesis(53)
Venues (Conferences, Journals, ...)
CoRR(376) Comput. Secur.(83) IEEE Access(83) HICSS(74) ARES(60) ISI(60) NeuroImage(50) IEEE Secur. Priv.(46) Sensors(40) FUSION(38) Netw. Secur.(31) ACSAC(30) CCS(28) RFC(26) SAC(26) IEEE BigData(25) More (+10 of total 1868)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1717 occurrences of 1015 keywords

Results
Found 5607 publication records. Showing 5606 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
71Mark A. Whiting, Wendy Cowley, Jereme Haack, Douglas Love, Stephen Tratz, Caroline Varley, Kim Wiessner Threat stream data generator: creating the known unknowns for test and evaluation of visual analytics tools. Search on Bibsonomy BELIV The full citation details ... 2006 DBLP  DOI  BibTeX  RDF threat stream, threat, data generator
68Dianxiang Xu, Kendall E. Nygard Threat-Driven Modeling and Verification of Secure Software Using Aspect-Oriented Petri Nets. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF aspect-oriented Petri nets, modeling, verification, Petri nets, aspect-oriented software development, Software security, threat modeling
61Sangho Lee, Dong Hwi Lee, Kuinam J. Kim A Conceptual Design of Knowledge-Based Real-Time Cyber-Threat Early Warning System. Search on Bibsonomy ISPA Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cyber-threat, TMS, Early-Warning, ESM
57Punam Bedi, Vandana Gandotra, Archana Singhal, Vandita Vats, Neha Mishra Avoiding Threats Using Multi Agent System Planning for Web Based Systems. Search on Bibsonomy ICCCI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF HTN, GOAP, MASPTA, Multi agent system, Threat modeling
57Fredrik Johansson, Göran Falkman A Comparison between Two Approaches to Threat Evaluation in an Air Defense Scenario. Search on Bibsonomy MDAI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF fuzzy inference rules, threat assessment, threat evaluation, weapons allocation, fuzzy logic, Bayesian networks
54Michael D. Carroll Information security: examining and managing the insider threat. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF insider threat
54Ragib Hasan, Suvda Myagmar, Adam J. Lee, William Yurcik Toward a threat model for storage systems. Search on Bibsonomy StorageSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, storage system, threat model
54Volkmar Lotz Threat Scenarios as a Means to Formally Develop Secure Systems. Search on Bibsonomy ESORICS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Threat Identification, Stream Processing Functions, Security, Authentication, Formal Methods, Protocols, Risk Analysis
51Otto Carlander, Lars Eriksson, Per-Anders Oskarsson Handling Uni- and Multimodal Threat Cueing with Simultaneous Radio Calls in a Combat Vehicle Setting. Search on Bibsonomy HCI (6) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Combat Vehicle, Simulation, Multimodal, Display technologies
51Neeli Rashmi Prasad Threat Model Framework and Methodology for Personal Networks (PNs). Search on Bibsonomy COMSWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
51Ramkumar Chinchani, Anusha Iyer, Hung Q. Ngo 0001, Shambhu J. Upadhyaya Towards a Theory of Insider Threat Assessment. Search on Bibsonomy DSN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
51Oliver J. Bear Don't Walk IV, Kevin K. Wiley, Lois Walters-Threat, Rebecca L. Rivera, Martin Chieng Were, Tiffani J. Bright A Framework to Support Diversity, Equity, and Inclusion within AMIA Through Strengthened Pathways, Support and Leadership. Search on Bibsonomy AMIA The full citation details ... 2021 DBLP  BibTeX  RDF
50Peter Torr Demystifying the Threat-Modeling Process. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF threat environment, security, software development, product development, threat modeling
50Ghi Paul Im, Richard L. Baskerville A longitudinal study of information system threat categories: the enduring problem of human error. Search on Bibsonomy Data Base The full citation details ... 2005 DBLP  DOI  BibTeX  RDF information infrastructure protection, information system threat, information system threat taxonomy, software quality and reliability, information security, computer security, human error, software defects
47Emily M. Zechman Integrating complex adaptive system simulation and evolutionary computation to support water infrastructure threat management. Search on Bibsonomy GECCO (Companion) The full citation details ... 2010 DBLP  DOI  BibTeX  RDF threat management, water distribution security, agent-based modeling
47Dianxiang Xu, Kendall E. Nygard A threat-driven approach to modeling and verifying secure software. Search on Bibsonomy ASE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF aspect-oriented Petri nets, verification, Petri nets, aspect-oriented software development, software security, threat modeling
44Anton Bolfing, Tobias Halbherr, Adrian Schwaninger How Image Based Factors and Human Factors Contribute to Threat Detection Performance in X-Ray Aviation Security Screening. Search on Bibsonomy USAB The full citation details ... 2008 DBLP  DOI  BibTeX  RDF aviation security, image based factors, human factors, X-ray imaging
44Kevin S. Killourhy, Roy A. Maxion Toward Realistic and Artifact-Free Insider-Threat Data. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
44Robert S. Garfinkel, Ram D. Gopal, Daniel O. Rice New Approaches to Disclosure Limitation While Answering Queries to a Database: Protecting Numerical Confidential Data against Insider Threat Based on Data or Algorithms. Search on Bibsonomy HICSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
44Syed Naqvi, Michel Riguidel Threat Model for Grid Security Services. Search on Bibsonomy EGC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
44Jonathan W. Butts, Robert F. Mills, Rusty O. Baldwin Developing an Insider Threat Model Using Functional Decomposition. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
40Ignacio J. Martinez-Moyano, Eliot H. Rich, Stephen H. Conrad, David F. Andersen, Thomas R. Stewart A behavioral theory of insider-threat risks: A system dynamics approach. Search on Bibsonomy ACM Trans. Model. Comput. Simul. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF behavioral theory, judgment and decision making, signal detection theory, system dynamics modeling, risk, security modeling, Insider threat, policy analysis
40Andreas Ekelhart, Stefan Fenz, Thomas Neubauer, Edgar R. Weippl Formal threat descriptions for enhancing governmental risk assessment. Search on Bibsonomy ICEGOV The full citation details ... 2007 DBLP  DOI  BibTeX  RDF formal threat descriptions, inventory, security ontology
40Lanxiang Chen, Dan Feng 0001, Liang Ming The Security Threats and Corresponding Measures to Distributed Storage Systems. Search on Bibsonomy APPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF process of security, threat modeling, security threat, storage security, security measure
37Hui Wang 0071, Heli Xu, Bibo Lu, Zihao Shen Research on Security Architecture for Defending Insider Threat. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Jianxin Li 0002, Teodor Sommestad, Patrick C. K. Hung, Xiang Li Web Service-Based Business Process Development, Threat Modeling and Security Assessment Tool. Search on Bibsonomy ICWS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Teresa Musiol, Katarzyna Ujma-Wasowicz Identification of Threat of Isolation as a Result of Work with a Computer in Free Time. Search on Bibsonomy HCI (7) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF sociometric measure, reduction of threats, active recreation, computer, isolation
37Zhitang Li, Jie Lei 0004, Li Wang 0015, Dong Li Assessing Attack Threat by the Probability of Following Attacks. Search on Bibsonomy IEEE NAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
37Sanguk Noh Autonomous Situation Awareness Through Threat Data Integration. Search on Bibsonomy IRI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
37Zhitang Li, Jie Lei 0004, Li Wang 0015, Dong Li, Yang-ming Ma Towards Identifying True Threat from Network Security Data. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
37Ileana Buhan, Asker M. Bazen, Pieter H. Hartel, Raymond N. J. Veldhuis A False Rejection Oriented Threat Model for the Design of Biometric Authentication Systems. Search on Bibsonomy ICB The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
37Alan N. Steinberg Threat Assessment Technology Development. Search on Bibsonomy CONTEXT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
37Seong Chae Seo, Jin Ho You, Young Dae Kim, Jun Yong Choi, Sang Jun Lee, Byung Ki Kim Building Security Requirements Using State Transition Diagram at Security Threat Location. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
37Mohsen Saffarian, Matei Ciobanu Morogan A novel protocol to prevent malicious nodes from misdirecting forward ants in AntNet algorithm. Search on Bibsonomy SAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AntNet, free-roaming forward ants, misdirection threat
37Jinghua Wu, Guorui Jiang, Tiyun Huang Using Two Main Arguments in Agent Negotiation. Search on Bibsonomy PRIMA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Agent, Negotiation, Threat, Reward
37Thomas Thomsen Lambda-Search in Game Trees - with Application to Go. Search on Bibsonomy Computers and Games The full citation details ... 2000 DBLP  DOI  BibTeX  RDF binary tree search, threat-sequences, null-moves, proof-number search, abstract game-knowledge, Go block tactics
37Ikuya Morikawa, Yuji Yamaoka Threat Tree Templates to Ease Difficulties in Threat Modeling. Search on Bibsonomy NBiS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF software design, security analysis, threat modeling
34Robert Willison, Mikko T. Siponen Overcoming the insider: reducing employee computer crime through Situational Crime Prevention. Search on Bibsonomy Commun. ACM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
34Wihem Arsac, Giampaolo Bella, Xavier Chantry, Luca Compagna Validating Security Protocols under the General Attacker. Search on Bibsonomy ARSPA-WITS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
34Ali Razavi, Kostas Kontogiannis Pattern and Policy Driven Log Analysis for Software Monitoring. Search on Bibsonomy COMPSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Software Auditing, Trace Analysis, Software Monitoring
34Allen Christiansen, Damian Johnson, Lawrence B. Holder Game-Based Simulation for the Evaluation of Threat Detection in a Seaport Environment. Search on Bibsonomy ICEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF seaport, particle propagation, threat detection, security, Simulation, sensor modeling
34Marwan Abi-Antoun, Daniel Wang, Peter Torr Checking threat modeling data flow diagrams for implementation conformance and security. Search on Bibsonomy ASE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF reflexion models, denial of service, security analysis, threat modeling, data flow diagrams, information disclosure, tampering, spoofing
34Merv Matson, Mihaela Ulieru Persistent information security: beyond the e-commerce threat model. Search on Bibsonomy ICEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF document security, insecurity expense, persistent information security, risk remediation, digital rights management, DRM, threat model
34Michel Barbeau WiMax/802.16 threat analysis. Search on Bibsonomy Q2SWinet The full citation details ... 2005 DBLP  DOI  BibTeX  RDF wireless network, WiMax, 802.16, threat analysis
34Vassilios Morellas, Ioannis T. Pavlidis, Panagiotis Tsiamyrtzis DETER: Detection of events for threat evaluation and recognition. Search on Bibsonomy Mach. Vis. Appl. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Multicamera calibration, Threat assessment, Object tracking, Surveillance system, Security system
34Sridhar R. Kundur, Daniel Raviv Novel active-vision-based visual-threat-cue for autonomous navigation tasks. Search on Bibsonomy CVPR The full citation details ... 1996 DBLP  DOI  BibTeX  RDF active-vision-based visual-threat-cue, autonomous navigation tasks, moving observer, time-based imaginary 3-D surfaces, 3D surface texture, mobile robots, active vision, robot vision, visual fields
33John Diamant Resilient Security Architecture: A Complementary Approach to Reducing Vulnerabilities. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF HP Comprehensive Applications Threat Analysis, W. Edwards Deming, dynamic application security testing, static application security testing, security requirements gap analysis, architectural threat analysis, security quality, zero day, 0-day, software development, security and privacy, security vulnerabilities
33Mohammed A. Alhabeeb, Abdullah Mohammed Almuhaideb, Phu Dung Le, Bala Srinivasan 0002 Information Security Threats Classification Pyramid. Search on Bibsonomy AINA Workshops The full citation details ... 2010 DBLP  DOI  BibTeX  RDF deliberate threat, threat classification
31Simon N. Foley, William M. Fitzgerald An Approach to Security Policy Configuration Using Semantic Threat Graphs. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
31Wencong Cheng, Xishan Xu, Yan Jia 0001, Peng Zou Network Dynamic Risk Assessment Based on the Threat Stream Analysis. Search on Bibsonomy WAIM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Feng Wu, Yan Zhong, Quanyuan Wu Network Threat Frequency Forecasting Based on Fuzzy Time Series and D-S Evidence Theory. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Hervé Debar, Yohann Thomas, Frédéric Cuppens, Nora Cuppens-Boulahia Enabling automated threat response through the use of a dynamic security policy. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
31Do-Hoon Kim, Taek Lee, Sung-Oh David Jung, Hoh Peter In, Heejo Lee Cyber Threat Trend Analysis Model Using HMM. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
31Ferat Sahin, Prasanna Sridhar, Ben Horan, Vikraman Raghavan, Mo M. Jamshidi System of systems approach to threat detection and integration of heterogeneous independently operable systems. Search on Bibsonomy SMC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
31Nabil R. Adam, Vijayalakshmi Atluri, Vandana Pursnani Janeja, Aabhas V. Paliwal, Mahmoud Youssef, Soon Ae Chun, Jim Cooper, John Paczkowski, Christof Bornhövd, Ike Nassi, Joachim Schaper Semantics-based threat structure mining. Search on Bibsonomy DG.O The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
31Yael Shahar Indicators of Threat: Reflecting New Trends. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
31Neelam Jain, Thomas D. Jeitschko, Leonard J. Mirman Strategic Experimentation in Financial Intermediation with Threat of Entry. Search on Bibsonomy Ann. Oper. Res. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF strategic experimentation, signal dampening, financial intermediation, limit pricing, entry deterrence, experimentation
30Rebecca Fribourg, Evan Blanpied, Ludovic Hoyet, Anatole Lécuyer, Ferran Argelaguet Does virtual threat harm VR experience?: Impact of threat occurrence and repeatability on virtual embodiment and threat response. Search on Bibsonomy Comput. Graph. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
30Lundy Lewis, John F. Buford, Gabriel Jakobson Inferring threats in urban environments with uncertain and approximate data: an agent-based approach. Search on Bibsonomy Appl. Intell. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Threat assessment, Uncertain/approximate data, Fuzzy, BDI agent, Agent platform, Peer-to-peer overlay
30Fredrik Johansson, Göran Falkman Performance Evaluation of TEWA Systems for Improved Decision Support. Search on Bibsonomy MDAI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF TEWA, threat evaluation, weapon allocation, Performance evaluation, testbed
30Yi-Ming Chen 0008, Dachrahn Wu, Cheng-Kuang Wu A Game Theoretic Approach for Deploying Intrusion Detection Agent. Search on Bibsonomy PRIMA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Agent deployment, threat levels, Nash equilibrium, Shapley value
30Andreas Ekelhart, Stefan Fenz, Markus D. Klemen, Edgar R. Weippl Security Ontology: Simulating Threats to Corporate Assets. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF risk analysis, threat modeling, security ontology
30Howard Chivers Information Modeling for Automated Risk Analysis. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, model, communication, information, risk, service-oriented, threat
30Sjouke Mauw, Martijn Oostdijk Foundations of Attack Trees. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF semantics, attack trees, threat analysis
30Andrew James Simmonds, Peter Sandilands, Louis van Ekert An Ontology for Network Security Attacks. Search on Bibsonomy AACC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF cyber, security, ontology, network, attack, failure, vulnerability, threat
30Young-Hwan Bang, Yoon-Jung Jung, In-Jung Kim, Namhoon Lee, Gang-Soo Lee The Design and Development for Risk Analysis Automatic Tool. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Safeguard, Vulnerability, Risk Analysis, Interview, Threat, Asset, Inquiry
30Cynthia E. Irvine, Timothy E. Levin, Jeffery D. Wilson, David J. Shifflett, Barbara Pereira An Approach to Security Requirements Engineering for a High Assurance System. Search on Bibsonomy Requir. Eng. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Security, Specification, Requirements, Engineering, Assurance, Threat
30Sridhar R. Kundur, Daniel Raviv, Ernest Kent An image-based visual-motion-cue for autonomous navigatio. Search on Bibsonomy CVPR The full citation details ... 1997 DBLP  DOI  BibTeX  RDF visual-motion-cue, visual motion cue, Hybrid Visual Threat Cue, 3D textured surface, sequence of images, active vision, active vision, collision avoidance, visual navigation, autonomous navigation
27Yi-Ming Chen 0008, Dachrahn Wu, Cheng-Kuang Wu A game theory approach for an emergency management security advisory system. Search on Bibsonomy ISI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Dianxiang Xu, Vivek Goel, Kendall E. Nygard An Aspect-Oriented Approach to Security Requirements Analysis. Search on Bibsonomy COMPSAC (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF use case, aspect-oriented software development, Security requirements, threats, mitigation
27Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad Verbowski, Helen J. Wang, Jacob R. Lorch SubVirt: Implementing malware with virtual machines. Search on Bibsonomy S&P The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Steven R. Johnston Development of a Legal Framework for Intrusion Detection. Search on Bibsonomy RAID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Anti-terrorism law, criminal law, private communications, privacy, intrusion detection, wiretap, interception
27Jung-Min Kang, Wook Shin, C.-G. Park, Dong-Ik Lee Extended BLP Security Model Based on Process Reliability for Secure Linux Kernel. Search on Bibsonomy PRDC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
27Hee Ock Rho, Il Ryu The Impact of Information Technology Threat on IT Appropriation and IT Avoidance. Search on Bibsonomy CICSyN The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Information Technology Threat, Coping Theory, IT appropriation, IT avoidance
27Holger Schmidt 0001 Threat- and Risk-Analysis During Early Security Requirements Engineering. Search on Bibsonomy ARES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF risk analysis, domain knowledge, threat analysis, security requirements engineering
27Qizeng Li, Zanfu Xie A Correlation Analysis Method for Threat Factors in Information System Based on Cloud Model. Search on Bibsonomy MVHI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF single rule generator, threat identification, correlation analysis, cloud model
27Antonietta Stango, Neeli R. Prasad, Dimitris M. Kyriazanos A Threat Analysis Methodology for Security Evaluation and Enhancement Planning. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF vulnerabilities, security metrics, assets, threat analysis
27Xudong Miao, Demin Xu, Yongchun Wang Intuitionistic Fuzzy Likelihood Methods and Models for Naval Air Defense Situation and Threat Assessment. Search on Bibsonomy FSKD (6) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Situation Threat Assessment, Uncertainty, Fuzzy Set, Intuitionistic Fuzzy Set
27Yair Amir The insider threat in scalable distributed systems: algorithms, metrics and gaps. Search on Bibsonomy STC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF distributed system, insider threat
27Sébastien Foulle, Steve A. Schneider, Jacques Traoré, Zhe Xia Threat Analysis of a Practical Voting Scheme with Receipts. Search on Bibsonomy VOTE-ID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Voter verifiable, voting ducks, electronic voting, threat analysis
27Mohd A. Bashar, Ganesh Krishnan, Markus G. Kuhn, Eugene H. Spafford, Samuel S. Wagstaff Jr. Low-threat security patches and tools. Search on Bibsonomy ICSM The full citation details ... 1997 DBLP  DOI  BibTeX  RDF low-threat security patches, dangerous information, vulnerability information, software vendor, binary program patch, differential application times, cryptoprocessors, enciphered operating systems, synchronization, reverse engineering, customization, security of data, security tools
24Mariusz Chmielewski, Andrzej Galka, Piotr Jarema, Kamil Krasowski, Artur Kosinski Semantic Knowledge Representation in Terrorist Threat Analysis for Crisis Management Systems. Search on Bibsonomy ICCCI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF counter-terrorism, GTD, ontology, GIS, decision support, crisis management
24Frank L. Greitzer, Andrew P. Moore, Dawn M. Cappelli, Dee H. Andrews, Lynn A. Carroll, Thomas D. Hull Combating the Insider Cyber Threat. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Wilian Segatto, Eduardo Herzer, Cristiano L. Mazzotti, João Ricardo Bittencourt, Jorge L. V. Barbosa Mobio threat: A mobile game based on the integration of wireless technologies. Search on Bibsonomy Comput. Entertain. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF RFID, Bluetooth, Pervasive, QR code, social gaming
24Jose Andre Morales Threat of renovated .NET viruses to mobile devices. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Xuezhong Liu, Zengliang Liu Evaluating Method of Security Threat Based on Attacking-Path Graph Model. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Xi Liu, Alastair G. Gale Searching for Possible Threat Items to Safe Air Travel: Human Error and Training. Search on Bibsonomy HCI (13) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF airport X-ray luggage image, visual search, perceptual learning
24Umit Ayvaz, Murat Dere, Yao Ming Tiah Using the MANA agent-based simulation tool to evaluate and compare the effectiveness of ground-based and airborne communications jammers in countering the IED threat to ground convoys. Search on Bibsonomy SpringSim (2) The full citation details ... 2007 DBLP  BibTeX  RDF Counter-IED, MANA, communications jammers, nearly orthogonal Latin hypercube, IED
24Yue Chen, Barry W. Boehm, Luke Sheppard Value Driven Security Threat Modeling Based on Attack Path Analysis. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Hervé Debar, Yohann Thomas, Nora Boulahia-Cuppens, Frédéric Cuppens Using Contextual Security Policies for Threat Response. Search on Bibsonomy DIMVA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Dick Brackney, Terrance Goan, Allen Ott, Lockheed Martin The Cyber Enemy Within ... Countering the Threat from Malicious Insiders. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Wenbo Mao A Structured Operational Modelling of the Dolev-Yao Threat Model. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
24William L. Spight Evaluating Kos in a Neutral Threat Environment: Preliminary Results. Search on Bibsonomy Computers and Games The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
24Ali Berrached, Mohsen Beheshti, André de Korvin, Richard A. Aló Applying Fuzzy Relation Equations to Threat Analysis. Search on Bibsonomy HICSS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
23Medha Bhargava, Chia-Chih Chen, Michael S. Ryoo, Jake K. Aggarwal Detection of object abandonment using temporal logic. Search on Bibsonomy Mach. Vis. Appl. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Abandoned objects, Threat detection, Public areas, Temporal logic
23Debin Liu, XiaoFeng Wang 0001, L. Jean Camp Mitigating Inadvertent Insider Threats with Incentives. Search on Bibsonomy Financial Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Incentive Engineering, Game Theory, Insider Threat, Human Subject
23Dattatraya S. Bhilare, Ashwini K. Ramani, Sanjay K. Tanwani Protecting intellectual property and sensitive information in academic campuses from trusted insiders: leveraging active directory. Search on Bibsonomy SIGUCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF audit automation, real time action, insider threat, active directory, user identification
23Charalampos Z. Patrikakis, Dimitris M. Kyriazanos, Athanasios Voulodimos, Ioannis G. Nikolakopoulos Privacy and resource protection in personal network federations. Search on Bibsonomy PETRA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security, privacy, threat analysis, personal networks
23Xin Liu, Peidong Zhu, Yuxing Peng 0001 SEM: A Security Evaluation Model for Inter-domain Routing System in the Internet. Search on Bibsonomy IPOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security Threat Situation, BGP, Security Evaluation
23Madhusudhanan Chandrasekaran, Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya Inferring Sources of Leaks in Document Management Systems. (PDF / PS) Search on Bibsonomy IFIP Int. Conf. Digital Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF information leaks, insider threat, Document management system
Displaying result #1 - #100 of 5606 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license