|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1664 occurrences of 928 keywords
|
|
|
Results
Found 6558 publication records. Showing 6558 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
112 | Hyung-Jong Kim 0002 |
Vulnerability Modeling and Simulation for DNS Intrusion Tolerance System Construction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIS ![In: Artificial Intelligence and Simulation, 13th International Conference on AI, Simulation, and Planning in High Autonomy Systems, AIS 2004, Jeju Island, Korea, October 4-6, 2004, Revised Selected Papers, pp. 81-89, 2004, Springer, 3-540-24476-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Atomic Vulnerability, DNS, Intrusion Tolerance, Vulnerability Analysis, DEVS formalism |
105 | HyungJong Kim, KyungHee Koh, DongHoon Shin, HongGeun Kim |
Vulnerability Assessment Simulation for Information Infrastructure Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfraSec ![In: Infrastructure Security, International Conference, InfraSec 2002 Bristol, UK, October 1-3, 2002, Proceedings, pp. 145-161, 2002, Springer, 3-540-44309-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Knowledge-Based Simulation, Modeling and Simulation, Vulnerability Analysis, Information Infrastructure, Vulnerability Assessment |
100 | Hasan Cavusoglu, Huseyin Cavusoglu, Srinivasan Raghunathan |
Efficiency of Vulnerability Disclosure Mechanisms to Disseminate Vulnerability Knowledge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 33(3), pp. 171-185, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
disclosure mechanisms, responsible vulnerability disclosure, game theory, Information security, economic modeling, software vulnerabilities |
91 | David Brumley, James Newsome, Dawn Song, Hao Wang, Somesh Jha |
Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 5(4), pp. 224-241, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
83 | Aviral Shrivastava, Jongeun Lee, Reiley Jeyapaul |
Cache vulnerability equations for protecting data in embedded processor caches from soft errors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCTES ![In: Proceedings of the ACM SIGPLAN/SIGBED 2010 conference on Languages, compilers, and tools for embedded systems, LCTES 2010, Stockholm, Sweden, April 13-15, 2010, pp. 143-152, 2010, ACM, 978-1-60558-953-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
cache vulnerability, static analysis, embedded processors, soft errors, code transformation, compiler technique |
83 | Wangyuan Zhang, Xin Fu, Tao Li 0006, José A. B. Fortes |
An Analysis of Microarchitecture Vulnerability to Soft Errors on Simultaneous Multithreaded Architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPASS ![In: 2007 IEEE International Symposium on Performance Analysis of Systems and Software, April 25-27, 2007, San Jose, California, USA, Proceedings, pp. 169-178, 2007, IEEE Computer Society, 1-4244-1081-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
thread-aware reliability optimization, microarchitecture vulnerability, simultaneous multithreaded architecture, semiconductor transient fault, microprocessor reliability, processor throughput, soft error vulnerability analysis, SPEC CPU 2000 benchmark, microarchitecture structure, microarchitecture reliability profile, fetch policy, thread-level parallelism, multithreading architecture |
76 | Cuisong Yu, Zhenchun Hao, Jiahu Wang, Zhenhua Wang, Shouchang Hao |
Based on Fuzzy Clustering Theory: Vulnerability Classification Research of Water Resources System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSKD (3) ![In: Fifth International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2008, 18-20 October 2008, Jinan, Shandong, China, Proceedings, Volume 3, pp. 518-522, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
76 | David Brumley, James Newsome, Dawn Xiaodong Song, Hao Wang, Somesh Jha |
Towards Automatic Generation of Vulnerability-Based Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2006 IEEE Symposium on Security and Privacy (S&P 2006), 21-24 May 2006, Berkeley, California, USA, pp. 2-16, 2006, IEEE Computer Society, 0-7695-2574-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
76 | Youngsup Kim, Seung Yub Baek, Geuk Lee |
Intelligent Tool for Enterprise Vulnerability Assessment on a Distributed Network Environment Using Nessus and OVAL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (2) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part II, pp. 1056-1061, 2005, Springer, 3-540-28895-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
76 | Fanglu Guo, Yang Yu, Tzi-cker Chiueh |
Automated and Safe Vulnerability Assessment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 21st Annual Computer Security Applications Conference (ACSAC 2005), 5-9 December 2005, Tucson, AZ, USA, pp. 150-159, 2005, IEEE Computer Society, 0-7695-2461-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
76 | Haitao Tian, Liusheng Huang, Zhi Zhou, Hui Zhang |
Common Vulnerability Markup Language. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings, pp. 228-240, 2003, Springer, 3-540-20208-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
76 | Zhichun Li, Gao Xia, Hongyu Gao, Yi Tang 0002, Yan Chen 0004, Bin Liu 0001, Junchen Jiang, Yuezhou Lv |
NetShield: massive semantics-based vulnerability signature matching for high-speed networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2010 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, New Delhi, India, August 30 -September 3, 2010, pp. 279-290, 2010, ACM, 978-1-4503-0201-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
vulnerability signature, intrusion detection, deep packet inspection, signature matching |
76 | Ashlesha Joshi, Samuel T. King, George W. Dunlap, Peter M. Chen |
Detecting past and present intrusions through vulnerability-specific predicates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOSP ![In: Proceedings of the 20th ACM Symposium on Operating Systems Principles 2005, SOSP 2005, Brighton, UK, October 23-26, 2005, pp. 91-104, 2005, ACM, 1-59593-079-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
IntroVirt, virtual-machine introspection, virtual-machine replay, vulnerability-specific predicates, intrusion detection, semantic gap |
75 | Karen Scarfone, Peter Mell |
Vulnerability scoring for security configuration settings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![In: Proceedings of the 4th ACM Workshop on Quality of Protection, QoP 2008, Alexandria, VA, USA, October 27, 2008, pp. 3-8, 2008, ACM, 978-1-60558-321-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
common configuration scoring system (ccss), common vulnerability scoring system (cvss), security configuration, vulnerability scoring, risk assessment, vulnerability |
69 | Ping Chen 0003, Yi Wang, Zhi Xin, Bing Mao, Li Xie 0001 |
BRICK: A Binary Tool for Run-Time Detecting and Locating Integer-Based Vulnerability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan, pp. 208-215, 2009, IEEE Computer Society, 978-1-4244-3572-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
69 | Haitao Tian, Liusheng Huang, Zhi Zhou, Yonglong Luo |
Arm up Administrators: Automated Vulnerability Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPAN ![In: 7th International Symposium on Parallel Architectures, Algorithms, and Networks (I-SPAN 2004), 10-12 May 2004, Hong Kong, SAR, China, pp. 587-593, 2004, IEEE Computer Society, 0-7695-2135-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
68 | Vilas Sridharan, David R. Kaeli |
Using hardware vulnerability factors to enhance AVF analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCA ![In: 37th International Symposium on Computer Architecture (ISCA 2010), June 19-23, 2010, Saint-Malo, France, pp. 461-472, 2010, ACM, 978-1-4503-0053-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
architectural vulnerability factor, fault tolerance, reliability |
68 | Ashish Arora, Anand Nandkumar, Rahul Telang |
Does information security attack frequency increase with vulnerability disclosure? An empirical analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Frontiers ![In: Inf. Syst. Frontiers 8(5), pp. 350-362, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Disclosure policy, Risk management, Economics, Patching, Software vulnerability |
68 | Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan |
An OVAL-based active vulnerability assessment system for enterprise computer networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Frontiers ![In: Inf. Syst. Frontiers 10(5), pp. 573-588, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Open vulnerability assessment language, Attack path, Network security, Relational database management system, Predicate logic, Security vulnerability |
62 | Christian Frühwirth, Tomi Männistö |
Improving CVSS-based vulnerability prioritization and response with context information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESEM ![In: Proceedings of the Third International Symposium on Empirical Software Engineering and Measurement, ESEM 2009, October 15-16, 2009, Lake Buena Vista, Florida, USA, pp. 535-544, 2009, IEEE Computer Society, 978-1-4244-4842-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
62 | Ryan Iwahashi, Daniela Alvim Seabra de Oliveira, Shyhtsun Felix Wu, Jedidiah R. Crandall, Young-Jun Heo, Jintae Oh, Jong-Soo Jang |
Towards Automatically Generating Double-Free Vulnerability Signatures Using Petri Nets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 114-130, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
61 | Xuejiao Liu, Debao Xiao, Nian Ma, Jie Yu |
A Scalable, Vulnerability Modeling and Correlating Method for Network Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Infoscale ![In: Scalable Information Systems, 4th International ICST Conference, Infoscale 2009, Hong Kong, June 10-11, 2009, Revised Selected Papers, pp. 217-227, 2009, Springer, 978-3-642-10484-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
vulnerability correlation, modeling, scalable, Network security |
61 | Rahul Telang, Sunil Wattal |
An Empirical Analysis of the Impact of Software Vulnerability Announcements on Firm Stock Price. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 33(8), pp. 544-557, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
software vendors, quality, Information security, patching, software vulnerability, event-study |
61 | Davide Balzarotti, Marco Cova, Viktoria Felmetsger, Giovanni Vigna |
Multi-module vulnerability analysis of web-based applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 25-35, 2007, ACM, 978-1-59593-703-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
multi-step attacks, static analysis, web applications, dynamic analysis, vulnerability analysis |
60 | Jaziar Radianti, Jose J. Gonzalez |
Understanding Hidden Information Security Threats: The Vulnerability Black Market. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), CD-ROM / Abstracts Proceedings, 3-6 January 2007, Waikoloa, Big Island, HI, USA, pp. 156, 2007, IEEE Computer Society, 0-7695-2755-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Vulnerability Black Market, Information Security, System Dynamics, Software Vulnerability, Integrated Operations |
54 | Geraldine Vache |
Vulnerability analysis for a quantitative security evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESEM ![In: Proceedings of the Third International Symposium on Empirical Software Engineering and Measurement, ESEM 2009, October 15-16, 2009, Lake Buena Vista, Florida, USA, pp. 526-534, 2009, IEEE Computer Society, 978-1-4244-4842-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
54 | Ching-Huang Lin, Chih-Hao Chen, Chi-Sung Laih |
A Study and Implementation of Vulnerability Assessment and Misconfiguration Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSCC ![In: Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, Yilan, Taiwan, 9-12 December 2008, pp. 1252-1257, 2008, IEEE Computer Society, 978-0-7695-3473-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
54 | David McKinney |
Vulnerability Bazaar. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 5(6), pp. 69-73, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
54 | Jinyoo Kim, Yashwant K. Malaiya, Indrakshi Ray |
Vulnerability Discovery in Multi-Version Software Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HASE ![In: Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), November 14-16, 2007, Dallas, Texas, USA, pp. 141-148, 2007, IEEE Computer Society, 0-7695-3043-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
54 | Geuk Lee, Youngsup Kim, Sang-Jo Youk |
Development of Oval Based Vulnerability Management Tool (OVMT) on a Distributed Network Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (3) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 10th International Conference, KES 2006, Bournemouth, UK, October 9-11, 2006, Proceedings, Part III, pp. 1042-1049, 2006, Springer, 3-540-46542-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
54 | Andy Ozment |
Improving vulnerability discovery models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![In: Proceedings of the 3th ACM Workshop on Quality of Protection, QoP 2007, Alexandria, VA, USA, October 29, 2007, pp. 6-11, 2007, ACM, 978-1-59593-885-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
measuring software security, measuring vulnerabilities, vulnerability discovery model, security metrics |
54 | Mohammad Ebrahim Rafiei, Mohsen Taherian, Hamid Mousavi, Ali Movaghar 0001, Rasool Jalili |
Vulnerability Analysis in VGBPS Using Prolog. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSEN ![In: International Symposium on Fundamentals of Software Engineering, International Symposium, FSEN 2007, Tehran, Iran, April 17-19, 2007, Proceedings, pp. 404-411, 2007, Springer, 978-3-540-75697-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Protection System, Safety Problem, Prolog, Vulnerability Analysis |
48 | Helen J. Wang, Chuanxiong Guo, Daniel R. Simon, Alf Zugenmaier |
Shield: vulnerability-driven network filters for preventing known vulnerability exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 30 - September 3, 2004, Portland, Oregon, USA, pp. 193-204, 2004, ACM, 1-58113-862-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
generic protocol analyzer, network filter, vulnerability signature, worm defense, patching |
48 | Ha-Thanh Le, Deepak Subramanian, Wen-Jing Hsu, Peter Kok Keong Loh |
Scoring Web-Based Vulnerability Impact Using Property-Based Vulnerability Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops ![In: 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2010, Perth, Australia, 20-13 April 2010, pp. 431-436, 2010, IEEE Computer Society, 978-0-7695-4019-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Web application vulnerability, vulnerable property relationship graph (VPRG), vulnerable property relationship matrix (VPRM), vulnerability impact score |
47 | Kyle Coffey, Leandros A. Maglaras, Richard Smith 0002, Helge Janicke, Mohamed Amine Ferrag, Abdelouahid Derhab, Mithun Mukherjee 0001, Stylianos Rallis, Awais Yousaf |
Vulnerability Assessment of Cyber Security for SCADA Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Guide to Vulnerability Analysis for Computer Networks and Systems ![In: Guide to Vulnerability Analysis for Computer Networks and Systems - An Artificial Intelligence Approach, pp. 59-80, 2018, Springer, 978-3-319-92623-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
47 | Igor V. Kotenko, Elena Doynikova, Andrey Chechulin, Andrey Fedorchenko |
AI- and Metrics-Based Vulnerability-Centric Cyber Security Assessment and Countermeasure Selection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Guide to Vulnerability Analysis for Computer Networks and Systems ![In: Guide to Vulnerability Analysis for Computer Networks and Systems - An Artificial Intelligence Approach, pp. 101-130, 2018, Springer, 978-3-319-92623-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
47 | Yi Shi 0001, Yalin E. Sagduyu, Kemal Davaslioglu, Renato Levy |
Vulnerability Detection and Analysis in Adversarial Deep Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Guide to Vulnerability Analysis for Computer Networks and Systems ![In: Guide to Vulnerability Analysis for Computer Networks and Systems - An Artificial Intelligence Approach, pp. 211-234, 2018, Springer, 978-3-319-92623-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
47 | Saad Khan 0001, Simon Parkinson |
Review into State of the Art of Vulnerability Assessment using Artificial Intelligence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Guide to Vulnerability Analysis for Computer Networks and Systems ![In: Guide to Vulnerability Analysis for Computer Networks and Systems - An Artificial Intelligence Approach, pp. 3-32, 2018, Springer, 978-3-319-92623-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
47 | Patrick Tague, David Slater, Jason Rogers, Radha Poovendran |
Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 6(2), pp. 111-123, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Sebastian Roschke, Feng Cheng 0002, Robert Schuppenies, Christoph Meinel |
Towards Unifying Vulnerability Information for Attack Graph Construction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 218-233, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Steve Counsell, Stephen Swift |
An Empirical Study of Potential Vulnerability Faults in Java Open-Source Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Innovative Techniques in Instruction Technology, E-learning, E-assessment, and Education ![In: Innovative Techniques in Instruction Technology, E-learning, E-assessment, and Education, Proceedings of the 2007 International Conference on Engineering Education, Instructional Technology, Assessment, and E-learning (EIAE 2007), part of the International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 2007), Bridgeport, CT, USA, December 3-12, 2007, pp. 514-519, 2008, Springer, 978-1-4020-8738-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
47 | HyunChul Joh, Jinyoo Kim, Yashwant K. Malaiya |
Vulnerability Discovery Modeling Using Weibull Distribution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSRE ![In: 19th International Symposium on Software Reliability Engineering (ISSRE 2008), 11-14 November 2008, Seattle/Redmond, WA, USA, pp. 299-300, 2008, IEEE Computer Society, 978-0-7695-3405-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
47 | Nabil Schear, David R. Albrecht, Nikita Borisov |
High-Speed Matching of Vulnerability Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings, pp. 155-174, 2008, Springer, 978-3-540-87402-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
47 | José Fonseca 0002, Marco Vieira, Henrique Madeira |
Testing and Comparing Web Vulnerability Scanning Tools for SQL Injection and XSS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRDC ![In: 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2007), 17-19 December, 2007, Melbourne, Victoria, Australia, pp. 365-372, 2007, IEEE Computer Society, 0-7695-3054-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
47 | Muhammad Abedin, Syeda Nessa, Ehab Al-Shaer, Latifur Khan |
Vulnerability analysis For evaluating quality of protection of security policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![In: Proceedings of the 2nd ACM Workshop on Quality of Protection, QoP 2006, Alexandria, VA, USA, October 30, 2006, pp. 49-52, 2006, ACM, 1-59593-553-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security, evaluation, metric, policy |
47 | Hossein Asadi 0001, Vilas Sridharan, Mehdi Baradaran Tahoori, David R. Kaeli |
Vulnerability analysis of L2 cache elements to single event upsets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DATE ![In: Proceedings of the Conference on Design, Automation and Test in Europe, DATE 2006, Munich, Germany, March 6-10, 2006, pp. 1276-1281, 2006, European Design and Automation Association, Leuven, Belgium, 3-9810801-1-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
47 | Young-Ju Han, Jin S. Yang, Beom-Hwan Chang, Jung C. Na, Tai-Myung Chung |
The Vulnerability Assessment for Active Networks; Model, Policy, Procedures, and Performance Evaluations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part I, pp. 191-198, 2004, Springer, 3-540-22054-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
47 | William A. Arbaugh, William L. Fithen, John McHugh |
Windows of Vulnerability: A Case Study Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 33(12), pp. 52-59, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
46 | Mohammad Ali Hadavi, Hossein Shirazi, Hasan Mokhtari Sangchi, Vahid Saber Hamishagi |
Software Security; A Vulnerability Activity Revisit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 866-872, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, design, implementation, software, Vulnerability, Activity |
46 | Marcus Kaiser, Claus C. Hilgetag |
Edge vulnerability in neural and metabolic networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Biol. Cybern. ![In: Biol. Cybern. 90(5), pp. 311-317, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Brain networks, Edge betweenness, Cluster, Small world, Network vulnerability |
45 | James Walden, Maureen Doyle, Grant A. Welch, Michael Whelan |
Security of open source web applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESEM ![In: Proceedings of the Third International Symposium on Empirical Software Engineering and Measurement, ESEM 2009, October 15-16, 2009, Lake Buena Vista, Florida, USA, pp. 545-553, 2009, IEEE Computer Society, 978-1-4244-4842-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
45 | Somak Bhattacharya, S. K. Ghosh |
Security Threat Prediction in a Local Area Network Using Statistical Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), Proceedings, 26-30 March 2007, Long Beach, California, USA, pp. 1-8, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
45 | Furkan Tari, A. Ant Ozok, Stephen H. Holden |
A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the 2nd Symposium on Usable Privacy and Security, SOUPS 2006, Pittsburgh, Pennsylvania, USA, July 12-14, 2006, pp. 56-66, 2006, ACM, 1-59593-448-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
authentication, human factors, usable security, graphical passwords, social engineering, shoulder surfing, password security |
44 | Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu 0003 |
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 562-572, 2007, ACM, 978-1-59593-703-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
memory corruption, debugging, vulnerability analysis |
44 | Mohd A. Bashar, Ganesh Krishnan, Markus G. Kuhn, Eugene H. Spafford, Samuel S. Wagstaff Jr. |
Low-threat security patches and tools. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSM ![In: 1997 International Conference on Software Maintenance (ICSM '97), 1-3 October 1997, Bari, Italy, Proceedings, pp. 306-313, 1997, IEEE Computer Society, 0-8186-8013-X. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
low-threat security patches, dangerous information, vulnerability information, software vendor, binary program patch, differential application times, cryptoprocessors, enciphered operating systems, synchronization, reverse engineering, customization, security of data, security tools |
39 | Aaron Steele |
Ontological Vulnerability Assessment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISE Workshops ![In: Web Information Systems Engineering - WISE 2008 Workshops, WISE 2008 International Workshops, Auckland, New Zealand, September 1-4, 2008. Proceedings, pp. 24-35, 2008, Springer, 978-3-540-85199-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Diptikalyan Saha |
Extending logical attack graphs for efficient vulnerability analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008, pp. 63-74, 2008, ACM, 978-1-59593-810-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
logic programming, attack graphs, incremental analysis |
39 | Yulong Wang, Fangchun Yang, Qibo Sun |
Measuring Network Vulnerability Based on Pathology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WAIM ![In: The Ninth International Conference on Web-Age Information Management, WAIM 2008, July 20-22, 2008, Zhangjiajie, China, pp. 640-646, 2008, IEEE Computer Society, 978-0-7695-3185-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
39 | HyunChul Joh, Yashwant K. Malaiya |
Seasonality in Vulnerability Discovery in Major Software Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSRE ![In: 19th International Symposium on Software Reliability Engineering (ISSRE 2008), 11-14 November 2008, Seattle/Redmond, WA, USA, pp. 297-298, 2008, IEEE Computer Society, 978-0-7695-3405-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Makoto Sugihara |
SEU Vulnerability of Multiprocessor Systems and Task Scheduling for Heterogeneous Multiprocessor Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISQED ![In: 9th International Symposium on Quality of Electronic Design (ISQED 2008), 17-19 March 2008, San Jose, CA, USA, pp. 757-762, 2008, IEEE Computer Society, 978-0-7695-3117-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Heterogeneous Multiprocessor Systems, Reliability, Task Scheduling, Soft Error, Single Event Upset |
39 | David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong Song |
Creating Vulnerability Signatures Using Weakest Preconditions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 20th IEEE Computer Security Foundations Symposium, CSF 2007, 6-8 July 2007, Venice, Italy, pp. 311-325, 2007, IEEE Computer Society, 0-7695-2819-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Shuai Wang 0006, Jie S. Hu, Sotirios G. Ziavras |
On the Characterization of Data Cache Vulnerability in High-Performance Embedded Microprocessors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSAMOS ![In: Proceedings of 2006 International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation (IC-SAMOS 2006), Samos, Greece, July 17-20, 2006, pp. 14-20, 2006, IEEE, 1-4244-0155-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
39 | Josh Dehlinger, Qian Feng, Lan Hu |
SSVChecker: unifying static security vulnerability detection tools in an Eclipse plug-in. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ETX ![In: Proceedings of the 2006 OOPSLA workshop on Eclipse Technology eXchange, ETX 2006, Portland, Oregon, USA, October 22-23, 2006, pp. 30-34, 2006, ACM, 1-59593-621-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security auditing, software security, secure programming |
39 | Karthik N. Kannan, Rahul Telang, Hao Xu |
Economic Analysis of the Market for Software Vulnerability Disclosure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 37th Hawaii International Conference on System Sciences (HICSS-37 2004), CD-ROM / Abstracts Proceedings, 5-8 January 2004, Big Island, HI, USA, 2004, IEEE Computer Society, 0-7695-2056-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
39 | Young-Ju Han, Jin S. Yang, Beom-Hwan Chang, Tai-Myung Chung |
SVAM: The Scalable Vulnerability Analysis Model Based on Active Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: Information Networking, Networking Technologies for Broadband and Mobile Networks, International Conference ICOIN 2004, Busan, Korea, February 18-20, 2004, Revised Selected Papers, pp. 857-866, 2004, Springer, 3-540-23034-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
39 | Silvia Rapicetta, Vittorio Zanon |
GIS-based method for the environmental vulnerability assessment to volcanic ashfall at Etna Volcano. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GeoInformatica ![In: GeoInformatica 13(3), pp. 267-276, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Environmental vulnerability, Corine land cover, Volcanic risk, GIS |
39 | Yong-Jun You, Sung-Do Chi |
SIMVA: simulation-based network vulnerability analysis system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SpringSim ![In: Proceedings of the 2009 Spring Simulation Multiconference, SpringSim 2009, San Diego, California, USA, March 22-27, 2009, 2009, SCS/ACM. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
SES/MB, vulnerability analysis system, simulation, network security, DEVS |
39 | Charles Reis, John Dunagan, Helen J. Wang, Opher Dubrovsky, Saher Esmeir |
BrowserShield: Vulnerability-driven filtering of dynamic HTML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Web ![In: ACM Trans. Web 1(3), pp. 11, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
code rewriting, JavaScript, Web browser, vulnerability |
39 | Giorgos Valvis, Despina Polemi |
An XML-Based Data Model for Vulnerability Assessment Reports. ![Search on Bibsonomy](Pics/bibsonomy.png) |
I3E ![In: Challenges of Expanding Internet: E-Commerce, E-Business, and E-Government, 5th IFIP Conference e-Commerce, e-Business, and e-Government (I3E'2OO5), October 28-30, 2005, Poznan, Poland, pp. 513-526, 2005, Springer, 978-0-387-28753-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
XML modeling, Vulnerability assessment |
37 | Swathi Nambiar Kadala Manikoth, Fabio Di Troia, Mark Stamp 0001 |
Masquerade Detection on Mobile Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Guide to Vulnerability Analysis for Computer Networks and Systems ![In: Guide to Vulnerability Analysis for Computer Networks and Systems - An Artificial Intelligence Approach, pp. 301-315, 2018, Springer, 978-3-319-92623-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
37 | Suvodeep Mazumdar, Jing Wang |
Big Data and Cyber Security: A Visual Analytics Perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Guide to Vulnerability Analysis for Computer Networks and Systems ![In: Guide to Vulnerability Analysis for Computer Networks and Systems - An Artificial Intelligence Approach, pp. 367-381, 2018, Springer, 978-3-319-92623-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
37 | Steven Walker-Roberts, Mohammad Hammoudeh |
Artificial Intelligence Agents as Mediators of Trustless Security Systems and Distributed Computing Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Guide to Vulnerability Analysis for Computer Networks and Systems ![In: Guide to Vulnerability Analysis for Computer Networks and Systems - An Artificial Intelligence Approach, pp. 131-155, 2018, Springer, 978-3-319-92623-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
37 | Deebiga Rajeswaran, Fabio Di Troia, Thomas H. Austin, Mark Stamp 0001 |
Function Call Graphs Versus Machine Learning for Malware Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Guide to Vulnerability Analysis for Computer Networks and Systems ![In: Guide to Vulnerability Analysis for Computer Networks and Systems - An Artificial Intelligence Approach, pp. 259-279, 2018, Springer, 978-3-319-92623-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
37 | Mark Stamp 0001 |
A Survey of Machine Learning Algorithms and Their Application in Information Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Guide to Vulnerability Analysis for Computer Networks and Systems ![In: Guide to Vulnerability Analysis for Computer Networks and Systems - An Artificial Intelligence Approach, pp. 33-55, 2018, Springer, 978-3-319-92623-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
37 | Alexandros Chrysikos, Stephen McGuire |
A Predictive Model for Risk and Trust Assessment in Cloud Computing: Taxonomy and Analysis for Attack Pattern Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Guide to Vulnerability Analysis for Computer Networks and Systems ![In: Guide to Vulnerability Analysis for Computer Networks and Systems - An Artificial Intelligence Approach, pp. 81-99, 2018, Springer, 978-3-319-92623-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
37 | Bo Zhou 0001, Curtis L. Maines, Stephen Tang 0001, Qi Shi 0001 |
A Framework for the Visualisation of Cyber Security Requirements and Its Application in BPMN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Guide to Vulnerability Analysis for Computer Networks and Systems ![In: Guide to Vulnerability Analysis for Computer Networks and Systems - An Artificial Intelligence Approach, pp. 339-366, 2018, Springer, 978-3-319-92623-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
37 | Saad Khan 0001, Simon Parkinson |
Automated Planning of Administrative Tasks Using Historic Events: A File System Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Guide to Vulnerability Analysis for Computer Networks and Systems ![In: Guide to Vulnerability Analysis for Computer Networks and Systems - An Artificial Intelligence Approach, pp. 159-182, 2018, Springer, 978-3-319-92623-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
37 | Vivin Paliath, Paulo Shakarian |
Defending Against Chained Cyber-Attacks by Adversarial Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Guide to Vulnerability Analysis for Computer Networks and Systems ![In: Guide to Vulnerability Analysis for Computer Networks and Systems - An Artificial Intelligence Approach, pp. 183-209, 2018, Springer, 978-3-319-92623-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
37 | Dhiviya Dhanasekar, Fabio Di Troia, Katerina Potika, Mark Stamp 0001 |
Detecting Encrypted and Polymorphic Malware Using Hidden Markov Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Guide to Vulnerability Analysis for Computer Networks and Systems ![In: Guide to Vulnerability Analysis for Computer Networks and Systems - An Artificial Intelligence Approach, pp. 281-299, 2018, Springer, 978-3-319-92623-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
37 | Liam Grant, Simon Parkinson |
Identifying File Interaction Patterns in Ransomware Behaviour. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Guide to Vulnerability Analysis for Computer Networks and Systems ![In: Guide to Vulnerability Analysis for Computer Networks and Systems - An Artificial Intelligence Approach, pp. 317-335, 2018, Springer, 978-3-319-92623-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
37 | Muhammad Ajmal Azad, Junaid Arshad, Farhan Riaz |
SOCIO-LENS: Spotting Unsolicited Caller Through Network Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Guide to Vulnerability Analysis for Computer Networks and Systems ![In: Guide to Vulnerability Analysis for Computer Networks and Systems - An Artificial Intelligence Approach, pp. 235-258, 2018, Springer, 978-3-319-92623-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
37 | Panos M. Pardalos, Vitaliy A. Yatsenko, Michael B. Fenn, Arkadii A. Chikrii |
Bilinear Markovian Processes of Search for Stationary and Moving Objects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Examining Robustness and Vulnerability of Networked Systems ![In: Examining Robustness and Vulnerability of Networked Systems, pp. 209-230, 2014, IOS Press, 978-1-61499-390-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
37 | Yuriy Stoyan, Petro Stetsyuk, Tatiana E. Romanova |
Optimal Balanced Packing Using Phi-Function Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Examining Robustness and Vulnerability of Networked Systems ![In: Examining Robustness and Vulnerability of Networked Systems, pp. 251-271, 2014, IOS Press, 978-1-61499-390-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
37 | Zhen Kan, John M. Shea, Warren E. Dixon |
Navigation Function Based Decentralized Control of A Multi-Agent System with Network Connectivity Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Examining Robustness and Vulnerability of Networked Systems ![In: Examining Robustness and Vulnerability of Networked Systems, pp. 104-119, 2014, IOS Press, 978-1-61499-390-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
37 | Foad Mahdavi Pajouh, Alexander Veremyev, Vladimir Boginski |
Analysis and Design of Robust Network Clusters with Bounded Diameter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Examining Robustness and Vulnerability of Networked Systems ![In: Examining Robustness and Vulnerability of Networked Systems, pp. 141-160, 2014, IOS Press, 978-1-61499-390-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
37 | Vardan Sargsyan, Arman Sargsyan, Armen Ghazaryan |
Distributed Computer Attack Detection System for Corporate Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Examining Robustness and Vulnerability of Networked Systems ![In: Examining Robustness and Vulnerability of Networked Systems, pp. 243-250, 2014, IOS Press, 978-1-61499-390-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
37 | Alexander Gutfraind |
Monotonic and Non-Monotonic Infections on Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Examining Robustness and Vulnerability of Networked Systems ![In: Examining Robustness and Vulnerability of Networked Systems, pp. 93-103, 2014, IOS Press, 978-1-61499-390-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
37 | Oleg Burdakov, Patrick Doherty 0001, Jonas Kvarnström |
Local Search for Hop-Constrained Directed Steiner Tree Problem with Application to UAV-Based Multi-Target Surveillance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Examining Robustness and Vulnerability of Networked Systems ![In: Examining Robustness and Vulnerability of Networked Systems, pp. 26-50, 2014, IOS Press, 978-1-61499-390-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
37 | Yannis Marinakis, Athanasios Migdalas |
Multiobjective Particle Swarm Optimization for a Multicast Routing Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Examining Robustness and Vulnerability of Networked Systems ![In: Examining Robustness and Vulnerability of Networked Systems, pp. 161-175, 2014, IOS Press, 978-1-61499-390-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
37 | Siddhartha S. Mehta, William MacKunis, Jess Willard Curtis |
Robust Networked Control Systems with Communication Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Examining Robustness and Vulnerability of Networked Systems ![In: Examining Robustness and Vulnerability of Networked Systems, pp. 176-191, 2014, IOS Press, 978-1-61499-390-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
37 | Sonia Cafieri, Pierre Hansen, Nenad Mladenovic |
Variable Neighborhood Search for Edge-Ratio Network Clustering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Examining Robustness and Vulnerability of Networked Systems ![In: Examining Robustness and Vulnerability of Networked Systems, pp. 51-64, 2014, IOS Press, 978-1-61499-390-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
37 | Marta S. R. Monteiro, Dalila B. M. M. Fontes, Fernando A. C. C. Fontes |
Hop-Constrained Tree-Shaped Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Examining Robustness and Vulnerability of Networked Systems ![In: Examining Robustness and Vulnerability of Networked Systems, pp. 192-208, 2014, IOS Press, 978-1-61499-390-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
37 | Mario Ventresca, Dionne M. Aleman |
Approximation Algorithms for Detecting Critical Nodes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Examining Robustness and Vulnerability of Networked Systems ![In: Examining Robustness and Vulnerability of Networked Systems, pp. 289-305, 2014, IOS Press, 978-1-61499-390-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
37 | Satish Vadlamani, Hugh R. Medal, Burak Eksioglu |
Security in Wireless Networks: A Tutorial. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Examining Robustness and Vulnerability of Networked Systems ![In: Examining Robustness and Vulnerability of Networked Systems, pp. 272-288, 2014, IOS Press, 978-1-61499-390-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
37 | Austin Buchanan, Nannan Chen, Xin Ma 0002 |
Using GRASP for the Cover by s-Defective Independent Sets Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Examining Robustness and Vulnerability of Networked Systems ![In: Examining Robustness and Vulnerability of Networked Systems, pp. 17-25, 2014, IOS Press, 978-1-61499-390-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
37 | Nickolay A. Kuznetsov |
Evaluation of the Reliability of Repairable s - t Networks by Fast Simulation Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Examining Robustness and Vulnerability of Networked Systems ![In: Examining Robustness and Vulnerability of Networked Systems, pp. 120-140, 2014, IOS Press, 978-1-61499-390-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
37 | Joydeep Banerjee, Arun Das 0002, Arunabha Sen |
A Survey of Interdependency Models for Critical Infrastructure Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Examining Robustness and Vulnerability of Networked Systems ![In: Examining Robustness and Vulnerability of Networked Systems, pp. 1-16, 2014, IOS Press, 978-1-61499-390-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
37 | Paola Festa |
On Data Clustering: Exact and Approximate Solutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Examining Robustness and Vulnerability of Networked Systems ![In: Examining Robustness and Vulnerability of Networked Systems, pp. 65-82, 2014, IOS Press, 978-1-61499-390-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
37 | Krishna Reddy Gujjula, Krishnan Ayalur Seshadrinathan, Amirhossein Meisami |
A Hybrid Metaheuristic for the Maximum k-Plex Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Examining Robustness and Vulnerability of Networked Systems ![In: Examining Robustness and Vulnerability of Networked Systems, pp. 83-92, 2014, IOS Press, 978-1-61499-390-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
37 | Maciej Rysz, Foad Mahdavi Pajouh, Pavlo A. Krokhmal, Eduardo L. Pasiliao |
On Risk-Averse Weighted k-Club Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Examining Robustness and Vulnerability of Networked Systems ![In: Examining Robustness and Vulnerability of Networked Systems, pp. 231-242, 2014, IOS Press, 978-1-61499-390-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 6558 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|