|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 2004 occurrences of 1111 keywords
|
|
|
Results
Found 4563 publication records. Showing 4562 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
64 | Joaquín García-Alfaro, Michel Barbeau, Evangelos Kranakis |
Analysis of Threats to the Security of EPC Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNSR ![In: Sixth Annual Conference on Communication Networks and Services Research (CNSR 2008), 5-8 May 2008, Halifax, Nova Scotia, Canada, pp. 67-74, 2008, IEEE Computer Society, 978-0-7695-3135-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Electronic Product Code (EPC), Radio frequency identification (RFID), Network Security, Wireless Security, Threats analysis |
58 | Spyros C. Kontogiannis, Paul G. Spirakis |
Equilibrium Points in Fear of Correlated Threats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WINE ![In: Internet and Network Economics, 4th International Workshop, WINE 2008, Shanghai, China, December 17-20, 2008. Proceedings, pp. 210-221, 2008, Springer, 978-3-540-92184-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
57 | Ménel Lassoued |
Intentional Services Specification Enhancement with Scenario-Based Techniques to Analyze Security Threats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2008, 28 July - 1 August 2008, Turku, Finland, pp. 613-618, 2008, IEEE Computer Society, 978-0-7695-3262-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
intentional service, scenario, security threats |
53 | Dianxiang Xu, Kendall E. Nygard |
Threat-Driven Modeling and Verification of Secure Software Using Aspect-Oriented Petri Nets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 32(4), pp. 265-278, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
aspect-oriented Petri nets, modeling, verification, Petri nets, aspect-oriented software development, Software security, threat modeling |
51 | Rabiah Ahmad, Ganthan Narayana Samy, Nuzulha Khilwani Ibrahim, Peter A. Bath, Zuraini Ismail |
Threats Identification in Healthcare Information Systems Using Genetic Algorithm and Cox Regression. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 757-760, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
51 | Robert C. Newman |
Cybercrime, identity theft, and fraud: practicing safe internet - network security threats and vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 68-78, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
internet fraud, identity theft, cybercrime |
51 | Tracy Hall, Austen Rainer, Dorota Jagielska |
Using Software Development Progress Data to Understand Threats to Project Outcomes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE METRICS ![In: 11th IEEE International Symposium on Software Metrics (METRICS 2005), 19-22 September 2005, Como Italy, pp. 18, 2005, IEEE Computer Society, 0-7695-2371-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
51 | Terika McCall, Megan Threats, Malvika Pillai, Adnan Lakdawala, Clinton S. Bolton III |
Recommendations for design of a mobile application to support management of anxiety and depression among Black American women. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Frontiers Digit. Health ![In: Frontiers Digit. Health 4, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
50 | Cyril Onwubiko, Andrew P. Lenaghan |
An Evolutionary Approach in Threats Detection for Distributed Security Defence Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings, pp. 696-698, 2006, Springer, 3-540-34478-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security defence framework, genetic algorithms, security threats |
49 | Ehab Al-Shaer, Brent Lagesse, Craig A. Shue (eds.) |
Proceedings of the 2010 ACM workshop on Insider threats, Insider Threats '10, Chicago, Illinois, USA, October 8, 2010 ![Search on Bibsonomy](Pics/bibsonomy.png) |
Insider Threats@CCS ![ACM, 978-1-4503-0092-6 The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
49 | Christian W. Probst, Jeffrey Hunker, Dieter Gollmann, Matt Bishop |
Aspects of Insider Threats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Insider Threats in Cyber Security ![In: Insider Threats in Cyber Security, pp. 1-15, 2010, Springer, 978-1-4419-7132-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
49 | Peter G. Neumann |
Combatting Insider Threats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Insider Threats in Cyber Security ![In: Insider Threats in Cyber Security, pp. 17-44, 2010, Springer, 978-1-4419-7132-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
49 | Brian M. Bowen, Malek Ben Salem 0001, Angelos D. Keromytis, Salvatore J. Stolfo |
Monitoring Technologies for Mitigating Insider Threats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Insider Threats in Cyber Security ![In: Insider Threats in Cyber Security, pp. 197-217, 2010, Springer, 978-1-4419-7132-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
49 | Jason Crampton, Michael Huth 0001 |
Towards an Access-Control Framework for Countering Insider Threats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Insider Threats in Cyber Security ![In: Insider Threats in Cyber Security, pp. 173-195, 2010, Springer, 978-1-4419-7132-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
49 | Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst |
10341 Report - Insider Threats: Strategies for Prevention, Mitigation, and Response. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Insider Threats: Strategies for Prevention, Mitigation, and Response ![In: Insider Threats: Strategies for Prevention, Mitigation, and Response, 22.08. - 26.08.2010, 2010, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
49 | Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst |
10341 Abstracts Collection - Insider Threats: Strategies for Prevention, Mitigation, and Response. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Insider Threats: Strategies for Prevention, Mitigation, and Response ![In: Insider Threats: Strategies for Prevention, Mitigation, and Response, 22.08. - 26.08.2010, 2010, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
49 | William R. Claycomb, Dongwan Shin |
Detecting insider activity using enhanced directory virtualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Insider Threats@CCS ![In: Proceedings of the 2010 ACM workshop on Insider threats, Insider Threats '10, Chicago, Illinois, USA, October 8, 2010, pp. 29-36, 2010, ACM, 978-1-4503-0092-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
49 | John Tuttle, Robert J. Walls, Erik G. Learned-Miller, Brian Neil Levine |
Reverse engineering for mobile systems forensics with Ares. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Insider Threats@CCS ![In: Proceedings of the 2010 ACM workshop on Insider threats, Insider Threats '10, Chicago, Illinois, USA, October 8, 2010, pp. 21-28, 2010, ACM, 978-1-4503-0092-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
49 | Amir Harel, Asaf Shabtai, Lior Rokach, Yuval Elovici |
M-score: estimating the potential damage of data leakage incident by assigning misuseability weight. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Insider Threats@CCS ![In: Proceedings of the 2010 ACM workshop on Insider threats, Insider Threats '10, Chicago, Illinois, USA, October 8, 2010, pp. 13-20, 2010, ACM, 978-1-4503-0092-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
49 | Dawn M. Cappelli |
Using empirical insider threat case data to design a mitigation strategy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Insider Threats@CCS ![In: Proceedings of the 2010 ACM workshop on Insider threats, Insider Threats '10, Chicago, Illinois, USA, October 8, 2010, pp. 1-2, 2010, ACM, 978-1-4503-0092-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
49 | Emil Stefanov, Mikhail Atallah |
Duress detection for authentication attacks against multiple administrators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Insider Threats@CCS ![In: Proceedings of the 2010 ACM workshop on Insider threats, Insider Threats '10, Chicago, Illinois, USA, October 8, 2010, pp. 37-46, 2010, ACM, 978-1-4503-0092-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
49 | Ruj Akavipat, Apurv Dhadphale, Apu Kapadia, Matthew Wright 0001 |
ReDS: reputation for directory services in P2P systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Insider Threats@CCS ![In: Proceedings of the 2010 ACM workshop on Insider threats, Insider Threats '10, Chicago, Illinois, USA, October 8, 2010, pp. 47-54, 2010, ACM, 978-1-4503-0092-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
49 | Suraj Nellikar, David M. Nicol, Jai J. Choi |
Role-based differentiation for insider detection algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Insider Threats@CCS ![In: Proceedings of the 2010 ACM workshop on Insider threats, Insider Threats '10, Chicago, Illinois, USA, October 8, 2010, pp. 55-62, 2010, ACM, 978-1-4503-0092-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
49 | Ma'ayan Gafny, Asaf Shabtai, Lior Rokach, Yuval Elovici |
Detecting data misuse by applying context-based data linkage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Insider Threats@CCS ![In: Proceedings of the 2010 ACM workshop on Insider threats, Insider Threats '10, Chicago, Illinois, USA, October 8, 2010, pp. 3-12, 2010, ACM, 978-1-4503-0092-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
49 | Christian W. Probst, Jeffrey Hunker, Matt Bishop, Dieter Gollmann |
08302 Summary - Countering Insider Threats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Countering Insider Threats ![In: Countering Insider Threats, 20.07. - 25.07.2008, 2008, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
49 | Matt Bishop, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst |
08302 Abstracts Collection - Countering Insider Threats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Countering Insider Threats ![In: Countering Insider Threats, 20.07. - 25.07.2008, 2008, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
46 | Dianxiang Xu, Vivek Goel, Kendall E. Nygard |
An Aspect-Oriented Approach to Security Requirements Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (2) ![In: 30th Annual International Computer Software and Applications Conference, COMPSAC 2006, Chicago, Illinois, USA, September 17-21, 2006. Volume 2, pp. 79-82, 2006, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
use case, aspect-oriented software development, Security requirements, threats, mitigation |
44 | Punam Bedi, Vandana Gandotra, Archana Singhal, Vandita Vats, Neha Mishra |
Avoiding Threats Using Multi Agent System Planning for Web Based Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCI ![In: Computational Collective Intelligence. Semantic Web, Social Networks and Multiagent Systems, First International Conference, ICCCI 2009, Wroclaw, Poland, October 5-7, 2009. Proceedings, pp. 709-719, 2009, Springer, 978-3-642-04440-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
HTN, GOAP, MASPTA, Multi agent system, Threat modeling |
44 | Haruhiko Kaiya, Kouta Sasaki, Kenji Kaijiri |
PORTAM: Policy, Requirements and Threats Analyzer for Mobile Code Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QSIC ![In: Sixth International Conference on Quality Software (QSIC 2006), 26-28 October 2006, Beijing, China, pp. 125-132, 2006, IEEE Computer Society, 0-7695-2718-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Mark W. Storer, Kevin M. Greenan, Ethan L. Miller |
Long-term threats to secure archives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
StorageSS ![In: Proceedings of the 2006 ACM Workshop On Storage Security And Survivability, StorageSS 2006, Alexandria, VA, USA, October 30, 2006, pp. 9-16, 2006, ACM, 1-59593-552-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
secret splitting, cryptography, encryption, threat modeling, secure storage, archival storage, survivable storage |
44 | Joaquín García-Alfaro, Michel Barbeau, Evangelos Kranakis |
Security Threats on EPC Based RFID Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Fifth International Conference on Information Technology: New Generations (ITNG 2008), 7-8 April 2008, Las Vegas, Nevada, USA, pp. 1242-1244, 2008, IEEE Computer Society, 978-0-7695-3099-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Electronic Product Code (EPC), Radio frequency identification (RFID), Network security, Wireless security, Threats analysis, Information systems security |
40 | Joon S. Park, Joseph Giordano |
Role-based profile analysis for scalable and accurate insider-anomaly detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPCCC ![In: Proceedings of the 25th IEEE International Performance Computing and Communications Conference, IPCCC 2006, April 10-12, 2006, Phoenix, Arizona, USA, 2006, IEEE, 1-4244-0198-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
39 | Charles B. Haley, Robin C. Laney, Bashar Nuseibeh |
Deriving security requirements from crosscutting threat descriptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AOSD ![In: Proceedings of the 3rd International Conference on Aspect-Oriented Software Development, AOSD 2004, Lancaster, UK, March 22-24, 2004, pp. 112-121, 2004, ACM, 1-58113-842-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
security requirements, threats, problem frames, assets |
38 | Simon D. Byers, Aviel D. Rubin, David P. Kormann |
Defending against an Internet-based attack on the physical world. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, WPES 2002, Washington, DC, USA, November 21, 2002, pp. 11-18, 2002, ACM, 1-58113-633-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Internet Threats, automated attacks, comuter security, internet threats, computer security, cybercrime |
38 | Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst (eds.) |
Insider Threats: Strategies for Prevention, Mitigation, and Response, 22.08. - 26.08.2010 ![Search on Bibsonomy](Pics/bibsonomy.png) |
Insider Threats: Strategies for Prevention, Mitigation, and Response ![Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
38 | George Magklaras, Steven Furnell |
Insider Threat Specification as a Threat Mitigation Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Insider Threats in Cyber Security ![In: Insider Threats in Cyber Security, pp. 219-244, 2010, Springer, 978-1-4419-7132-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
38 | Lizzie Coles-Kemp, Marianthi Theoharidou |
Insider Threat and Information Security Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Insider Threats in Cyber Security ![In: Insider Threats in Cyber Security, pp. 45-71, 2010, Springer, 978-1-4419-7132-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
38 | Ulrich Flegel, Florian Kerschbaum, Philip Miseldine, Ganna Monakova, Richard Wacker, Frank Leymann |
Legally Sustainable Solutions for Privacy Issues in Collaborative Fraud Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Insider Threats in Cyber Security ![In: Insider Threats in Cyber Security, pp. 139-171, 2010, Springer, 978-1-4419-7132-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
38 | Matt Bishop, Sophie Engle, Deborah A. Frincke, Carrie Gates, Frank L. Greitzer, Sean Peisert, Sean Whalen |
A Risk Management Approach to the "Insider Threat". ![Search on Bibsonomy](Pics/bibsonomy.png) |
Insider Threats in Cyber Security ![In: Insider Threats in Cyber Security, pp. 115-137, 2010, Springer, 978-1-4419-7132-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
38 | Ulrich Flegel, Julien Vayssière, Gunter Bitz |
A State of the Art Survey of Fraud Detection Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Insider Threats in Cyber Security ![In: Insider Threats in Cyber Security, pp. 73-84, 2010, Springer, 978-1-4419-7132-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
38 | Frank L. Greitzer, Deborah A. Frincke |
Combining Traditional Cyber Security Audit Data with Psychosocial Data: Towards Predictive Modeling for Insider Threat Mitigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Insider Threats in Cyber Security ![In: Insider Threats in Cyber Security, pp. 85-113, 2010, Springer, 978-1-4419-7132-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
38 | Matt Bishop, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst (eds.) |
Countering Insider Threats, 20.07. - 25.07.2008 ![Search on Bibsonomy](Pics/bibsonomy.png) |
Countering Insider Threats ![Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
38 | Ulrich Flegel, Julien Vayssière, Gunter Bitz |
Fraud Detection from a Business Perspective: Future Directions and Challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Countering Insider Threats ![In: Countering Insider Threats, 20.07. - 25.07.2008, 2008, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
38 | Ulrich Flegel, Florian Kerschbaum, Richard Wacker |
Collaborative Fraud Detection in Outsourcing Scenarios: Issues of and Solutions for Privacy and Confidentiality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Countering Insider Threats ![In: Countering Insider Threats, 20.07. - 25.07.2008, 2008, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
38 | Rebecca N. Wright, Peter G. Neumann (eds.) |
Network Threats, Proceedings of a DIMACS Workshop, December 2-4, 1996 ![Search on Bibsonomy](Pics/bibsonomy.png) |
Network Threats ![DIMACS/AMS, 978-0-8218-0832-0 The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
38 | Mike Burmester, Yvo Desmedt, Gregory Kabatianskii |
Trust and security: A new look at the Byzantine generals problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Network Threats ![In: Network Threats, Proceedings of a DIMACS Workshop, December 2-4, 1996, pp. 75-83, 1996, DIMACS/AMS, 978-0-8218-0832-0. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
38 | Sarvar Patel |
Information leakage in encrypted key exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Network Threats ![In: Network Threats, Proceedings of a DIMACS Workshop, December 2-4, 1996, pp. 33-40, 1996, DIMACS/AMS, 978-0-8218-0832-0. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
38 | Robert J. Hall 0001 |
Channels: Avoiding unwanted electronic mail. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Network Threats ![In: Network Threats, Proceedings of a DIMACS Workshop, December 2-4, 1996, pp. 85-101, 1996, DIMACS/AMS, 978-0-8218-0832-0. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
38 | |
Foreword. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Network Threats ![In: Network Threats, Proceedings of a DIMACS Workshop, December 2-4, 1996, pp. ix-, 1996, DIMACS/AMS, 978-0-8218-0832-0. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP BibTeX RDF |
|
38 | Dan S. Wallach, Jim A. Roskind, Edward W. Felten |
Flexible, extensible Java security using digital signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Network Threats ![In: Network Threats, Proceedings of a DIMACS Workshop, December 2-4, 1996, pp. 59-74, 1996, DIMACS/AMS, 978-0-8218-0832-0. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
38 | Marc Joye, Jean-Jacques Quisquater |
Cryptanalysis of RSA-type cryptosystems: A visit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Network Threats ![In: Network Threats, Proceedings of a DIMACS Workshop, December 2-4, 1996, pp. 21-31, 1996, DIMACS/AMS, 978-0-8218-0832-0. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
38 | Dan Zhou, Shiu-Kai Chin |
Verifying privacy enhanced mail functions with higher order logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Network Threats ![In: Network Threats, Proceedings of a DIMACS Workshop, December 2-4, 1996, pp. 11-20, 1996, DIMACS/AMS, 978-0-8218-0832-0. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
38 | Cynthia Cullen |
Demonstration of hacker techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Network Threats ![In: Network Threats, Proceedings of a DIMACS Workshop, December 2-4, 1996, pp. 103-110, 1996, DIMACS/AMS, 978-0-8218-0832-0. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
38 | |
Preface. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Network Threats ![In: Network Threats, Proceedings of a DIMACS Workshop, December 2-4, 1996, pp. xi-, 1996, DIMACS/AMS, 978-0-8218-0832-0. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP BibTeX RDF |
|
38 | Catherine Meadows 0001 |
A representation of protocol attacks for risk assessment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Network Threats ![In: Network Threats, Proceedings of a DIMACS Workshop, December 2-4, 1996, pp. 1-10, 1996, DIMACS/AMS, 978-0-8218-0832-0. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
38 | Adam Shostack |
Observed weaknesses in security dynamics' client/server protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Network Threats ![In: Network Threats, Proceedings of a DIMACS Workshop, December 2-4, 1996, pp. 41-54, 1996, DIMACS/AMS, 978-0-8218-0832-0. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
38 | Drew Dean |
Web security: A high level view. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Network Threats ![In: Network Threats, Proceedings of a DIMACS Workshop, December 2-4, 1996, pp. 55-57, 1996, DIMACS/AMS, 978-0-8218-0832-0. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
38 | Lanxiang Chen, Dan Feng 0001, Liang Ming |
The Security Threats and Corresponding Measures to Distributed Storage Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APPT ![In: Advanced Parallel Processing Technologies, 7th International Symposium, APPT 2007, Guangzhou, China, November 22-23, 2007, Proceedings, pp. 551-559, 2007, Springer, 978-3-540-76836-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
process of security, threat modeling, security threat, storage security, security measure |
38 | Joon S. Park, Joseph Giordano |
Access Control Requirements for Preventing Insider Threats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings, pp. 529-534, 2006, Springer, 3-540-34478-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
38 | Elena Ivankina, Camille Salinesi |
Eliciting Requirements by Analysing Threats Caused by Users. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SERA ![In: Third ACIS International Conference on Software Engineering, Research, Management and Applications (SERA 2005), 11-13 August 2005, Mt. Pleasant, MI, USA, pp. 104-111, 2005, IEEE Computer Society, 0-7695-2297-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Leila Amgoud, Jean-François Bonnefon, Henri Prade |
The Logical Handling of Threats, Rewards, Tips, and Warnings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECSQARU ![In: Symbolic and Quantitative Approaches to Reasoning with Uncertainty, 9th European Conference, ECSQARU 2007, Hammamet, Tunisia, October 31 - November 2, 2007, Proceedings, pp. 235-246, 2007, Springer, 978-3-540-75255-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Threats/Rewards, Tips/Warnings, Negotiation, Argumentation |
37 | Jiawen Su, Daniel W. Manchala |
Trust vs. Threats: Recovery and Survival in Electronic Commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: Proceedings of the 19th International Conference on Distributed Computing Systems, Austin, TX, USA, May 31 - June 4, 1999, pp. 126-133, 1999, IEEE Computer Society, 0-7695-0222-9. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Trust protocols, EC Threats, Trust, Anonymity, Electronic Commerce |
33 | Yuan Tian 0003, Biao Song, Eui-nam Huh |
A threat-based privacy preservation system in untrusted environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICHIT ![In: Proceedings of the 2009 International Conference on Hybrid Information Technology, ICHIT 2009, Daejeon, Korea, August 27-29, 2009, pp. 102-107, 2009, ACM, 978-1-60558-662-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
threaten, privacy, purpose |
33 | Fabrício A. Braz, Eduardo B. Fernández, Michael VanHilst |
Eliciting Security Requirements through Misuse Activities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 19th International Workshop on Database and Expert Systems Applications (DEXA 2008), 1-5 September 2008, Turin, Italy, pp. 328-333, 2008, IEEE Computer Society, 978-0-7695-3299-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
software engineering, security requirements, security patterns |
33 | Shanai Ardi, David Byers, Per Håkon Meland, Inger Anne Tøndel, Nahid Shahmehri |
How can the developer benefit from security modeling? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria, pp. 1017-1025, 2007, IEEE Computer Society, 0-7695-2775-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Evan Cooke, Zhuoqing Morley Mao, Farnam Jahanian |
Hotspots: The Root Causes of Non-Uniformity in Self-Propagating Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: 2006 International Conference on Dependable Systems and Networks (DSN 2006), 25-28 June 2006, Philadelphia, Pennsylvania, USA, Proceedings, pp. 179-188, 2006, IEEE Computer Society, 0-7695-2607-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Ghi Paul Im, Richard L. Baskerville |
A longitudinal study of information system threat categories: the enduring problem of human error. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Base ![In: Data Base 36(4), pp. 68-79, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
information infrastructure protection, information system threat, information system threat taxonomy, software quality and reliability, information security, computer security, human error, software defects |
33 | Dianxiang Xu, Kendall E. Nygard |
A threat-driven approach to modeling and verifying secure software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASE ![In: 20th IEEE/ACM International Conference on Automated Software Engineering (ASE 2005), November 7-11, 2005, Long Beach, CA, USA, pp. 342-346, 2005, ACM, 1-58113-993-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
aspect-oriented Petri nets, verification, Petri nets, aspect-oriented software development, software security, threat modeling |
33 | Garfield Zhiping Wu, Sylvia L. Osborn, Xin Jin |
Database Intrusion Detection Using Role Profiling with Role Hierarchy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Data Management ![In: Secure Data Management, 6th VLDB Workshop, SDM 2009, Lyon, France, August 28, 2009. Proceedings, pp. 33-48, 2009, Springer, 978-3-642-04218-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Role profiling, Intrusion detection, RBAC, Database security, Insider threats |
33 | Jackie Phahlamohlaka |
Globalisation and national security issues for the state: Implications for national ICT policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCC ![In: Social Dimensions of Information And Communication Technology Policy, Proceedings of the Eighth International Conference on Human Choice and Computers (HCC8), IFIP TC 9, Pretoria, South Africa, September 25-26, 2008, pp. 95-107, 2008, Springer, 978-0-387-84821-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
national ICT policies, information and communications technologies, security threats, Globalisation, national security |
33 | Marcelo Masera, Igor Nai Fovino |
A Service-Oriented Approach for Assessing Infrastructure Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection, Post-Proceedings of the First Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA, March 19-21, 2007, pp. 367-379, 2007, Springer, 978-0-387-75461-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
systemof- systems, services, attacks, vulnerabilities, threats, Security assessment |
33 | Roland Rieke |
Modelling and Analysing Network Security Policies in a Given Vulnerability Setting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRITIS ![In: Critical Information Infrastructures Security, First International Workshop, CRITIS 2006, Samos, Greece, August 31 - September 1, 2006, Revised Papers, pp. 67-78, 2006, Springer, 3-540-69083-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
attack simulation, network security policies, security modelling and simulation, risk assessment, threats analysis, critical infrastructure protection |
33 | Adam L. Young, Moti Yung |
Malicious Cryptography: Kleptographic Aspects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2005, The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings, pp. 7-18, 2005, Springer, 3-540-24399-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Rabin, malicious cryptography, RSA, public key cryptography, attacks, random oracle, security threats, kleptography, SETUP |
33 | Gustavo A. Santana Torrellas |
A Network Security Architectural Approach for Systems Integrity using Multi Agent Systems Engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPAN ![In: 7th International Symposium on Parallel Architectures, Algorithms, and Networks (I-SPAN 2004), 10-12 May 2004, Hong Kong, SAR, China, pp. 600-606, 2004, IEEE Computer Society, 0-7695-2135-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Mobile Agents, Security Architecture, Security Threats |
33 | R. E. Niemeyer |
Using Web Technologies in Two MLS Environments: A Security Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 205-, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
World Wide Web technologies, multi-level secure systems, single-level network environments, Web browser software, security sensitivity level, information transfer, security boundaries, security classification, network client, malicious code insertion, Trojan horse code, primary information flow direction, Internet, HTTP, Web server, security of data, intranet, threats, security vulnerabilities, computer viruses, database server, HyperText Transfer Protocol, denial of service attacks |
33 | Ning Zhang, Qi Shi 0001 |
Security Issues in an EDI Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA, pp. 129-136, 1996, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
EDI environment, electronic transmission, trade related documents, EDI system, EDI specific security requirement, non repudiation of receipt, heterogeneous system platform, protocol, electronic data interchange, Electronic Data Interchange, security threats, security issues |
31 | Ganthan Narayana Samy, Rabiah Ahmad, Zuraini Ismail |
Threats to Health Information Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 540-543, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Brandon M. Malone, Ambareen Siraj |
Tracking requirements and threats for secure software development. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference ![In: Proceedings of the 46th Annual Southeast Regional Conference, 2008, Auburn, Alabama, USA, March 28-29, 2008, pp. 278-281, 2008, ACM, 978-1-60558-105-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
requirements tracking, security engineering, misuse case |
31 | Stylianos Basagiannis, Panagiotis Katsaros, Andrew Pombortsis, Nikolaos Alexiou 0001 |
A Probabilistic Attacker Model for Quantitative Verification of DoS Security Threats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2008, 28 July - 1 August 2008, Turku, Finland, pp. 12-19, 2008, IEEE Computer Society, 978-0-7695-3262-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, model checking, Denial of Service |
31 | Guillermo Horacio Ramirez Caceres, Yoshimi Teshigawara |
A Knowledge-Based Tool to Support Clear Relationship between Threats and Countermeasures Based on International Standards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APNOMS ![In: Challenges for Next Generation Network Operations and Service Management, 11th Asia-Pacific Network Operations and Management Symposium, APNOMS 2008, Beijing, China, October 22-24, 2008. Proceedings, pp. 523-526, 2008, Springer, 978-3-540-88622-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Jorrit N. Herder, Herbert Bos, Ben Gras, Philip Homburg, Andrew S. Tanenbaum |
Countering IPC Threats in Multiserver Operating Systems (A Fundamental Requirement for Dependability). ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRDC ![In: 14th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2008, 15-17 December 2008, Taipei, Taiwan, pp. 112-121, 2008, IEEE Computer Society, 978-0-7695-3448-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Luk Boral, Maria Disla, Shivraj Patil, Jari Williams, Joon S. Park |
Countering Insider Threats in Personal Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE International Conference on Intelligence and Security Informatics, ISI 2007, New Brunswick, New Jersey, USA, May 23-24, 2007, Proceedings, pp. 365, 2007, IEEE, 1-4244-1329-X. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Cyril Onwubiko, Andrew P. Lenaghan |
Managing Security Threats and Vulnerabilities for Small to Medium Enterprises. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE International Conference on Intelligence and Security Informatics, ISI 2007, New Brunswick, New Jersey, USA, May 23-24, 2007, Proceedings, pp. 244-249, 2007, IEEE, 1-4244-1329-X. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Christine Laurendeau, Michel Barbeau |
Threats to Security in DSRC/WAVE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADHOC-NOW ![In: Ad-Hoc, Mobile, and Wireless Networks, 5th International Conference, ADHOC-NOW 2006, Ottawa, Canada, August 17-19, 2006, Proceedings, pp. 266-279, 2006, Springer, 3-540-37246-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Bharat K. Bhargava, Leszek Lilien |
Vulnerabilities and Threats in Distributed Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCIT ![In: Distributed Computing and Internet Technology, First International Conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004, Proceedings, pp. 146-157, 2004, Springer, 3-540-24075-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Tobias Hoppe, Stefan Kiltz, Jana Dittmann |
Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAFECOMP ![In: Computer Safety, Reliability, and Security, 27th International Conference, SAFECOMP 2008, Newcastle upon Tyne, UK, September 22-25, 2008, Proceedings, pp. 235-248, 2008, Springer, 978-3-540-87697-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Practical tests, Exemplary threats and countermeasures, Safety, Automotive, IT-Security |
27 | Wihem Arsac, Luca Compagna, Samuel Paul Kaluvuri, Serena Elisa Ponta |
Security validation tool for business processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 16th ACM Symposium on Access Control Models and Technologies, SACMAT 2011, Innsbruck, Austria, June 15-17, 2011, Proceedings, pp. 143-144, 2011, ACM, 978-1-4503-0688-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Yu Wang 0002, Jiang Xu 0001, Shengxi Huang, Weichen Liu, Huazhong Yang |
A case study of on-chip sensor network in multiprocessor system-on-chip. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CASES ![In: Proceedings of the 2009 International Conference on Compilers, Architecture, and Synthesis for Embedded Systems, CASES 2009, Grenoble, France, October 11-16, 2009, pp. 241-250, 2009, ACM. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
sensor network, reliability, low-power, system on chip, dynamic control, power grid noise |
27 | Natalia Stakhanova, Oleg Stakhanov, Ali A. Ghorbani 0001 |
A Behavioral Model of Ideologically-motivated "Snowball" Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 88-95, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
ideological attacks, conceptual model, cyber attacks |
27 | Xin Liu, Peidong Zhu, Yuxing Peng 0001 |
SEM: A Security Evaluation Model for Inter-domain Routing System in the Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPOM ![In: IP Operations and Management, 8th IEEE International Workshop, IPOM 2008, Samos Island, Greece, September 22-26, 2008, Proceedings, pp. 142-153, 2008, Springer, 978-3-540-87356-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Security Threat Situation, BGP, Security Evaluation |
27 | Klara Nahrstedt |
Need for integrated quality of service and quality of protection in mobile systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSWiM ![In: Proceedings of the 11th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, MSWiM 2008, Vancouver, British Columbia, Canada, October 27-31, 2008, pp. 148, 2008, ACM, 978-1-60558-235-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, multimedia, cryptography |
27 | Xuezhong Liu, Zengliang Liu |
Evaluating Method of Security Threat Based on Attacking-Path Graph Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 1127-1132, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Christos Xenakis, Danae Apostolopoulou, Angeliki Panou, Ioannis Stavrakakis |
A Qualitative Risk Analysis for the GPRS Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC (2) ![In: 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), Shanghai, China, December 17-20, 2008, Volume II: Workshops, pp. 61-68, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Ding-Long Huang, Pei-Luen Patrick Rau, Gavriel Salvendy |
A Survey of Factors Influencing People's Perception of Information Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (4) ![In: Human-Computer Interaction. HCI Applications and Services, 12th International Conference, HCI International 2007, Beijing, China, July 22-27, 2007, Proceedings, Part IV, pp. 906-915, 2007, Springer, 978-3-540-73109-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Perception, Survey, Information Security, Factor Analysis |
27 | Kerstin Voß |
Enhance Self-managing Grids by Risk Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNS ![In: Third International Conference on Networking and Services (ICNS 2007), June 19-25, 2007, Athens, Greece, pp. 27, 2007, IEEE Computer Society, 978-0-7695-2858-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Shunsuke Soeda, Tomoyuki Kaneko, Tetsuro Tanaka |
Dual Lambda Search and Shogi Endgames. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACG ![In: Advances in Computer Games, 11th International Conference, ACG 2005, Taipei, Taiwan, September 6-9, 2005. Revised Papers, pp. 126-139, 2006, Springer, 3-540-48887-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Dave Stainforth, Andrew P. Martin, Andrew Simpson, Carl Christensen, Jamie Kettleborough, Tolu Aina, Myles Allen |
Security Principles for Public-Resource Modeling Research. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 13th IEEE International Workshops on Enabling Technologies (WETICE 2004), Infrastructure for Collaborative Enterprises, 14-16 June 2004, Modena, Italy, pp. 319-324, 2004, IEEE Computer Society, 0-7695-2183-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Seongje Cho, Chulyean Chang, Joonmo Kim, Jongmoo Choi |
A Study on Monitoring and Protecting Computer System against Interception Threat. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Human.Society@Internet 2003 ![In: Web Communication Technologies and Internet-Related Social Issues - HSI 2003, Second International Conference on Human Society@Internet, Seoul, Korea, June 18-20, 2003, Proceedings, pp. 96-105, 2003, Springer, 3-540-40456-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
27 | Jeff Rollason |
SUPER-SOMA - Solving Tactical Exchanges in Shogi without Tree Searching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computers and Games ![In: Computers and Games, Second International Conference, CG 2000, Hamamatsu, Japan, October 26-28, 2000, Revised Papers, pp. 277-296, 2000, Springer, 3-540-43080-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
shotest, soma, super-soma, evaluation, search, shogi |
26 | Duc T. Ha, Shambhu J. Upadhyaya, Hung Q. Ngo 0001, Suranjan Pramanik, Ramkumar Chinchani, Sunu Mathew |
Insider Threat Analysis Using Information-Centric Modeling. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFIP Int. Conf. Digital Forensics ![In: Advances in Digital Forensics III - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 28-31, 2007, pp. 55-73, 2007, Springer, 978-0-387-73741-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
capability acquisition graphs, key challenge graphs, Insider threats |
Displaying result #1 - #100 of 4562 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|