The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for threats with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1954-1987 (15) 1988-1993 (16) 1994-1996 (33) 1997 (17) 1998 (16) 1999 (21) 2000 (25) 2001 (30) 2002 (50) 2003 (83) 2004 (118) 2005 (218) 2006 (250) 2007 (330) 2008 (332) 2009 (227) 2010 (121) 2011 (93) 2012 (111) 2013 (105) 2014 (124) 2015 (162) 2016 (189) 2017 (188) 2018 (231) 2019 (223) 2020 (287) 2021 (264) 2022 (259) 2023 (329) 2024 (95)
Publication types (Num. hits)
article(1596) book(11) data(5) incollection(78) inproceedings(2795) phdthesis(63) proceedings(14)
Venues (Conferences, Journals, ...)
CoRR(283) LEET(69) HICSS(59) IEEE Access(56) ARES(49) IEEE Secur. Priv.(49) MIST@CCS(43) ISI(38) Sensors(32) ACSAC(29) Netw. Secur.(29) Comput. Secur.(27) CCS(26) Commun. ACM(18) Computer(18) AsiaCCS(17) More (+10 of total 1688)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 2004 occurrences of 1111 keywords

Results
Found 4563 publication records. Showing 4562 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
64Joaquín García-Alfaro, Michel Barbeau, Evangelos Kranakis Analysis of Threats to the Security of EPC Networks. Search on Bibsonomy CNSR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Electronic Product Code (EPC), Radio frequency identification (RFID), Network Security, Wireless Security, Threats analysis
58Spyros C. Kontogiannis, Paul G. Spirakis Equilibrium Points in Fear of Correlated Threats. Search on Bibsonomy WINE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
57Ménel Lassoued Intentional Services Specification Enhancement with Scenario-Based Techniques to Analyze Security Threats. Search on Bibsonomy COMPSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF intentional service, scenario, security threats
53Dianxiang Xu, Kendall E. Nygard Threat-Driven Modeling and Verification of Secure Software Using Aspect-Oriented Petri Nets. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF aspect-oriented Petri nets, modeling, verification, Petri nets, aspect-oriented software development, Software security, threat modeling
51Rabiah Ahmad, Ganthan Narayana Samy, Nuzulha Khilwani Ibrahim, Peter A. Bath, Zuraini Ismail Threats Identification in Healthcare Information Systems Using Genetic Algorithm and Cox Regression. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
51Robert C. Newman Cybercrime, identity theft, and fraud: practicing safe internet - network security threats and vulnerabilities. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF internet fraud, identity theft, cybercrime
51Tracy Hall, Austen Rainer, Dorota Jagielska Using Software Development Progress Data to Understand Threats to Project Outcomes. Search on Bibsonomy IEEE METRICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
51Terika McCall, Megan Threats, Malvika Pillai, Adnan Lakdawala, Clinton S. Bolton III Recommendations for design of a mobile application to support management of anxiety and depression among Black American women. Search on Bibsonomy Frontiers Digit. Health The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
50Cyril Onwubiko, Andrew P. Lenaghan An Evolutionary Approach in Threats Detection for Distributed Security Defence Systems. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security defence framework, genetic algorithms, security threats
49Ehab Al-Shaer, Brent Lagesse, Craig A. Shue (eds.) Proceedings of the 2010 ACM workshop on Insider threats, Insider Threats '10, Chicago, Illinois, USA, October 8, 2010 Search on Bibsonomy Insider Threats@CCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
49Christian W. Probst, Jeffrey Hunker, Dieter Gollmann, Matt Bishop Aspects of Insider Threats. Search on Bibsonomy Insider Threats in Cyber Security The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
49Peter G. Neumann Combatting Insider Threats. Search on Bibsonomy Insider Threats in Cyber Security The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
49Brian M. Bowen, Malek Ben Salem 0001, Angelos D. Keromytis, Salvatore J. Stolfo Monitoring Technologies for Mitigating Insider Threats. Search on Bibsonomy Insider Threats in Cyber Security The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
49Jason Crampton, Michael Huth 0001 Towards an Access-Control Framework for Countering Insider Threats. Search on Bibsonomy Insider Threats in Cyber Security The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
49Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst 10341 Report - Insider Threats: Strategies for Prevention, Mitigation, and Response. Search on Bibsonomy Insider Threats: Strategies for Prevention, Mitigation, and Response The full citation details ... 2010 DBLP  BibTeX  RDF
49Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst 10341 Abstracts Collection - Insider Threats: Strategies for Prevention, Mitigation, and Response. Search on Bibsonomy Insider Threats: Strategies for Prevention, Mitigation, and Response The full citation details ... 2010 DBLP  BibTeX  RDF
49William R. Claycomb, Dongwan Shin Detecting insider activity using enhanced directory virtualization. Search on Bibsonomy Insider Threats@CCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
49John Tuttle, Robert J. Walls, Erik G. Learned-Miller, Brian Neil Levine Reverse engineering for mobile systems forensics with Ares. Search on Bibsonomy Insider Threats@CCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
49Amir Harel, Asaf Shabtai, Lior Rokach, Yuval Elovici M-score: estimating the potential damage of data leakage incident by assigning misuseability weight. Search on Bibsonomy Insider Threats@CCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
49Dawn M. Cappelli Using empirical insider threat case data to design a mitigation strategy. Search on Bibsonomy Insider Threats@CCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
49Emil Stefanov, Mikhail Atallah Duress detection for authentication attacks against multiple administrators. Search on Bibsonomy Insider Threats@CCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
49Ruj Akavipat, Apurv Dhadphale, Apu Kapadia, Matthew Wright 0001 ReDS: reputation for directory services in P2P systems. Search on Bibsonomy Insider Threats@CCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
49Suraj Nellikar, David M. Nicol, Jai J. Choi Role-based differentiation for insider detection algorithms. Search on Bibsonomy Insider Threats@CCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
49Ma'ayan Gafny, Asaf Shabtai, Lior Rokach, Yuval Elovici Detecting data misuse by applying context-based data linkage. Search on Bibsonomy Insider Threats@CCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
49Christian W. Probst, Jeffrey Hunker, Matt Bishop, Dieter Gollmann 08302 Summary - Countering Insider Threats. Search on Bibsonomy Countering Insider Threats The full citation details ... 2008 DBLP  BibTeX  RDF
49Matt Bishop, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst 08302 Abstracts Collection - Countering Insider Threats. Search on Bibsonomy Countering Insider Threats The full citation details ... 2008 DBLP  BibTeX  RDF
46Dianxiang Xu, Vivek Goel, Kendall E. Nygard An Aspect-Oriented Approach to Security Requirements Analysis. Search on Bibsonomy COMPSAC (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF use case, aspect-oriented software development, Security requirements, threats, mitigation
44Punam Bedi, Vandana Gandotra, Archana Singhal, Vandita Vats, Neha Mishra Avoiding Threats Using Multi Agent System Planning for Web Based Systems. Search on Bibsonomy ICCCI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF HTN, GOAP, MASPTA, Multi agent system, Threat modeling
44Haruhiko Kaiya, Kouta Sasaki, Kenji Kaijiri PORTAM: Policy, Requirements and Threats Analyzer for Mobile Code Application. Search on Bibsonomy QSIC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
44Mark W. Storer, Kevin M. Greenan, Ethan L. Miller Long-term threats to secure archives. Search on Bibsonomy StorageSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF secret splitting, cryptography, encryption, threat modeling, secure storage, archival storage, survivable storage
44Joaquín García-Alfaro, Michel Barbeau, Evangelos Kranakis Security Threats on EPC Based RFID Systems. Search on Bibsonomy ITNG The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Electronic Product Code (EPC), Radio frequency identification (RFID), Network security, Wireless security, Threats analysis, Information systems security
40Joon S. Park, Joseph Giordano Role-based profile analysis for scalable and accurate insider-anomaly detection. Search on Bibsonomy IPCCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
39Charles B. Haley, Robin C. Laney, Bashar Nuseibeh Deriving security requirements from crosscutting threat descriptions. Search on Bibsonomy AOSD The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security requirements, threats, problem frames, assets
38Simon D. Byers, Aviel D. Rubin, David P. Kormann Defending against an Internet-based attack on the physical world. Search on Bibsonomy WPES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Internet Threats, automated attacks, comuter security, internet threats, computer security, cybercrime
38Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst (eds.) Insider Threats: Strategies for Prevention, Mitigation, and Response, 22.08. - 26.08.2010 Search on Bibsonomy Insider Threats: Strategies for Prevention, Mitigation, and Response The full citation details ... 2010 DBLP  BibTeX  RDF
38George Magklaras, Steven Furnell Insider Threat Specification as a Threat Mitigation Technique. Search on Bibsonomy Insider Threats in Cyber Security The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
38Lizzie Coles-Kemp, Marianthi Theoharidou Insider Threat and Information Security Management. Search on Bibsonomy Insider Threats in Cyber Security The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
38Ulrich Flegel, Florian Kerschbaum, Philip Miseldine, Ganna Monakova, Richard Wacker, Frank Leymann Legally Sustainable Solutions for Privacy Issues in Collaborative Fraud Detection. Search on Bibsonomy Insider Threats in Cyber Security The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
38Matt Bishop, Sophie Engle, Deborah A. Frincke, Carrie Gates, Frank L. Greitzer, Sean Peisert, Sean Whalen A Risk Management Approach to the "Insider Threat". Search on Bibsonomy Insider Threats in Cyber Security The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
38Ulrich Flegel, Julien Vayssière, Gunter Bitz A State of the Art Survey of Fraud Detection Technology. Search on Bibsonomy Insider Threats in Cyber Security The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
38Frank L. Greitzer, Deborah A. Frincke Combining Traditional Cyber Security Audit Data with Psychosocial Data: Towards Predictive Modeling for Insider Threat Mitigation. Search on Bibsonomy Insider Threats in Cyber Security The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
38Matt Bishop, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst (eds.) Countering Insider Threats, 20.07. - 25.07.2008 Search on Bibsonomy Countering Insider Threats The full citation details ... 2008 DBLP  BibTeX  RDF
38Ulrich Flegel, Julien Vayssière, Gunter Bitz Fraud Detection from a Business Perspective: Future Directions and Challenges. Search on Bibsonomy Countering Insider Threats The full citation details ... 2008 DBLP  BibTeX  RDF
38Ulrich Flegel, Florian Kerschbaum, Richard Wacker Collaborative Fraud Detection in Outsourcing Scenarios: Issues of and Solutions for Privacy and Confidentiality. Search on Bibsonomy Countering Insider Threats The full citation details ... 2008 DBLP  BibTeX  RDF
38Rebecca N. Wright, Peter G. Neumann (eds.) Network Threats, Proceedings of a DIMACS Workshop, December 2-4, 1996 Search on Bibsonomy Network Threats The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
38Mike Burmester, Yvo Desmedt, Gregory Kabatianskii Trust and security: A new look at the Byzantine generals problem. Search on Bibsonomy Network Threats The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
38Sarvar Patel Information leakage in encrypted key exchange. Search on Bibsonomy Network Threats The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
38Robert J. Hall 0001 Channels: Avoiding unwanted electronic mail. Search on Bibsonomy Network Threats The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
38 Foreword. Search on Bibsonomy Network Threats The full citation details ... 1996 DBLP  BibTeX  RDF
38Dan S. Wallach, Jim A. Roskind, Edward W. Felten Flexible, extensible Java security using digital signatures. Search on Bibsonomy Network Threats The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
38Marc Joye, Jean-Jacques Quisquater Cryptanalysis of RSA-type cryptosystems: A visit. Search on Bibsonomy Network Threats The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
38Dan Zhou, Shiu-Kai Chin Verifying privacy enhanced mail functions with higher order logic. Search on Bibsonomy Network Threats The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
38Cynthia Cullen Demonstration of hacker techniques. Search on Bibsonomy Network Threats The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
38 Preface. Search on Bibsonomy Network Threats The full citation details ... 1996 DBLP  BibTeX  RDF
38Catherine Meadows 0001 A representation of protocol attacks for risk assessment. Search on Bibsonomy Network Threats The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
38Adam Shostack Observed weaknesses in security dynamics' client/server protocol. Search on Bibsonomy Network Threats The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
38Drew Dean Web security: A high level view. Search on Bibsonomy Network Threats The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
38Lanxiang Chen, Dan Feng 0001, Liang Ming The Security Threats and Corresponding Measures to Distributed Storage Systems. Search on Bibsonomy APPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF process of security, threat modeling, security threat, storage security, security measure
38Joon S. Park, Joseph Giordano Access Control Requirements for Preventing Insider Threats. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
38Elena Ivankina, Camille Salinesi Eliciting Requirements by Analysing Threats Caused by Users. Search on Bibsonomy SERA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
37Leila Amgoud, Jean-François Bonnefon, Henri Prade The Logical Handling of Threats, Rewards, Tips, and Warnings. Search on Bibsonomy ECSQARU The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Threats/Rewards, Tips/Warnings, Negotiation, Argumentation
37Jiawen Su, Daniel W. Manchala Trust vs. Threats: Recovery and Survival in Electronic Commerce. Search on Bibsonomy ICDCS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Trust protocols, EC Threats, Trust, Anonymity, Electronic Commerce
33Yuan Tian 0003, Biao Song, Eui-nam Huh A threat-based privacy preservation system in untrusted environment. Search on Bibsonomy ICHIT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF threaten, privacy, purpose
33Fabrício A. Braz, Eduardo B. Fernández, Michael VanHilst Eliciting Security Requirements through Misuse Activities. Search on Bibsonomy DEXA Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF software engineering, security requirements, security patterns
33Shanai Ardi, David Byers, Per Håkon Meland, Inger Anne Tøndel, Nahid Shahmehri How can the developer benefit from security modeling? Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
33Evan Cooke, Zhuoqing Morley Mao, Farnam Jahanian Hotspots: The Root Causes of Non-Uniformity in Self-Propagating Malware. Search on Bibsonomy DSN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Ghi Paul Im, Richard L. Baskerville A longitudinal study of information system threat categories: the enduring problem of human error. Search on Bibsonomy Data Base The full citation details ... 2005 DBLP  DOI  BibTeX  RDF information infrastructure protection, information system threat, information system threat taxonomy, software quality and reliability, information security, computer security, human error, software defects
33Dianxiang Xu, Kendall E. Nygard A threat-driven approach to modeling and verifying secure software. Search on Bibsonomy ASE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF aspect-oriented Petri nets, verification, Petri nets, aspect-oriented software development, software security, threat modeling
33Garfield Zhiping Wu, Sylvia L. Osborn, Xin Jin Database Intrusion Detection Using Role Profiling with Role Hierarchy. Search on Bibsonomy Secure Data Management The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Role profiling, Intrusion detection, RBAC, Database security, Insider threats
33Jackie Phahlamohlaka Globalisation and national security issues for the state: Implications for national ICT policies. Search on Bibsonomy HCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF national ICT policies, information and communications technologies, security threats, Globalisation, national security
33Marcelo Masera, Igor Nai Fovino A Service-Oriented Approach for Assessing Infrastructure Security. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF systemof- systems, services, attacks, vulnerabilities, threats, Security assessment
33Roland Rieke Modelling and Analysing Network Security Policies in a Given Vulnerability Setting. Search on Bibsonomy CRITIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF attack simulation, network security policies, security modelling and simulation, risk assessment, threats analysis, critical infrastructure protection
33Adam L. Young, Moti Yung Malicious Cryptography: Kleptographic Aspects. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Rabin, malicious cryptography, RSA, public key cryptography, attacks, random oracle, security threats, kleptography, SETUP
33Gustavo A. Santana Torrellas A Network Security Architectural Approach for Systems Integrity using Multi Agent Systems Engineering. Search on Bibsonomy ISPAN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Mobile Agents, Security Architecture, Security Threats
33R. E. Niemeyer Using Web Technologies in Two MLS Environments: A Security Analysis. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF World Wide Web technologies, multi-level secure systems, single-level network environments, Web browser software, security sensitivity level, information transfer, security boundaries, security classification, network client, malicious code insertion, Trojan horse code, primary information flow direction, Internet, HTTP, Web server, security of data, intranet, threats, security vulnerabilities, computer viruses, database server, HyperText Transfer Protocol, denial of service attacks
33Ning Zhang, Qi Shi 0001 Security Issues in an EDI Environment. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF EDI environment, electronic transmission, trade related documents, EDI system, EDI specific security requirement, non repudiation of receipt, heterogeneous system platform, protocol, electronic data interchange, Electronic Data Interchange, security threats, security issues
31Ganthan Narayana Samy, Rabiah Ahmad, Zuraini Ismail Threats to Health Information Security. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
31Brandon M. Malone, Ambareen Siraj Tracking requirements and threats for secure software development. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF requirements tracking, security engineering, misuse case
31Stylianos Basagiannis, Panagiotis Katsaros, Andrew Pombortsis, Nikolaos Alexiou 0001 A Probabilistic Attacker Model for Quantitative Verification of DoS Security Threats. Search on Bibsonomy COMPSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, model checking, Denial of Service
31Guillermo Horacio Ramirez Caceres, Yoshimi Teshigawara A Knowledge-Based Tool to Support Clear Relationship between Threats and Countermeasures Based on International Standards. Search on Bibsonomy APNOMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Jorrit N. Herder, Herbert Bos, Ben Gras, Philip Homburg, Andrew S. Tanenbaum Countering IPC Threats in Multiserver Operating Systems (A Fundamental Requirement for Dependability). Search on Bibsonomy PRDC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Luk Boral, Maria Disla, Shivraj Patil, Jari Williams, Joon S. Park Countering Insider Threats in Personal Devices. Search on Bibsonomy ISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
31Cyril Onwubiko, Andrew P. Lenaghan Managing Security Threats and Vulnerabilities for Small to Medium Enterprises. Search on Bibsonomy ISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
31Christine Laurendeau, Michel Barbeau Threats to Security in DSRC/WAVE. Search on Bibsonomy ADHOC-NOW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
31Bharat K. Bhargava, Leszek Lilien Vulnerabilities and Threats in Distributed Systems. Search on Bibsonomy ICDCIT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
30Tobias Hoppe, Stefan Kiltz, Jana Dittmann Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures. Search on Bibsonomy SAFECOMP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Practical tests, Exemplary threats and countermeasures, Safety, Automotive, IT-Security
27Wihem Arsac, Luca Compagna, Samuel Paul Kaluvuri, Serena Elisa Ponta Security validation tool for business processes. Search on Bibsonomy SACMAT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Yu Wang 0002, Jiang Xu 0001, Shengxi Huang, Weichen Liu, Huazhong Yang A case study of on-chip sensor network in multiprocessor system-on-chip. Search on Bibsonomy CASES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF sensor network, reliability, low-power, system on chip, dynamic control, power grid noise
27Natalia Stakhanova, Oleg Stakhanov, Ali A. Ghorbani 0001 A Behavioral Model of Ideologically-motivated "Snowball" Attacks. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ideological attacks, conceptual model, cyber attacks
27Xin Liu, Peidong Zhu, Yuxing Peng 0001 SEM: A Security Evaluation Model for Inter-domain Routing System in the Internet. Search on Bibsonomy IPOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security Threat Situation, BGP, Security Evaluation
27Klara Nahrstedt Need for integrated quality of service and quality of protection in mobile systems. Search on Bibsonomy MSWiM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, multimedia, cryptography
27Xuezhong Liu, Zengliang Liu Evaluating Method of Security Threat Based on Attacking-Path Graph Model. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Christos Xenakis, Danae Apostolopoulou, Angeliki Panou, Ioannis Stavrakakis A Qualitative Risk Analysis for the GPRS Technology. Search on Bibsonomy EUC (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Ding-Long Huang, Pei-Luen Patrick Rau, Gavriel Salvendy A Survey of Factors Influencing People's Perception of Information Security. Search on Bibsonomy HCI (4) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Perception, Survey, Information Security, Factor Analysis
27Kerstin Voß Enhance Self-managing Grids by Risk Management. Search on Bibsonomy ICNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Shunsuke Soeda, Tomoyuki Kaneko, Tetsuro Tanaka Dual Lambda Search and Shogi Endgames. Search on Bibsonomy ACG The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Dave Stainforth, Andrew P. Martin, Andrew Simpson, Carl Christensen, Jamie Kettleborough, Tolu Aina, Myles Allen Security Principles for Public-Resource Modeling Research. Search on Bibsonomy WETICE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
27Seongje Cho, Chulyean Chang, Joonmo Kim, Jongmoo Choi A Study on Monitoring and Protecting Computer System against Interception Threat. Search on Bibsonomy Human.Society@Internet 2003 The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
27Jeff Rollason SUPER-SOMA - Solving Tactical Exchanges in Shogi without Tree Searching. Search on Bibsonomy Computers and Games The full citation details ... 2000 DBLP  DOI  BibTeX  RDF shotest, soma, super-soma, evaluation, search, shogi
26Duc T. Ha, Shambhu J. Upadhyaya, Hung Q. Ngo 0001, Suranjan Pramanik, Ramkumar Chinchani, Sunu Mathew Insider Threat Analysis Using Information-Centric Modeling. (PDF / PS) Search on Bibsonomy IFIP Int. Conf. Digital Forensics The full citation details ... 2007 DBLP  DOI  BibTeX  RDF capability acquisition graphs, key challenge graphs, Insider threats
Displaying result #1 - #100 of 4562 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license