The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "CSIIRW"( http://dblp.L3S.de/Venues/CSIIRW )

URL (DBLP): http://dblp.uni-trier.de/db/conf/csiirw

Publication years (Num. hits)
2008 (45) 2009 (70) 2010 (85) 2011 (84) 2013 (64)
Publication types (Num. hits)
inproceedings(343) proceedings(5)
Venues (Conferences, Journals, ...)
CSIIRW(348)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 348 publication records. Showing 348 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Richard R. Brooks, Oluwakemi Hambolu, Paul Marusich, Yu Fu 0005, Saiprasad Balachandran Creating a tailored trustworthy space for democracy advocates using hostile host. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Emilie Hogan, John R. Johnson, Mahantesh Halappanavar Graph coarsening for path finding in cybersecurity graphs. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Rui Xie, Rose F. Gamble An architecture for cross-cloud auditing. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ike Patterson, James J. Nutaro, Glenn Allgood, Phani Teja Kuruganti, David Fugate Optimizing investments in cyber-security for critical infrastructure. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Janusz Zalewski, Steven Drager 0001, William McKeever, Andrew J. Kornecki Threat modeling for security assessment in cyberphysical systems. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Dimitrios Mermigas, Constantinos Patsakis, Sotirios Pirounias Quantification of information systems security with stochastic calculus. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ganesh Ram Santhanam, Zachary J. Oster, Samik Basu 0001 Identifying a preferred countermeasure strategy for attack graphs. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ravi Akella, Bruce M. McMillin Modeling and verification of security properties for critical infrastructure protection. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1James J. Nutaro, Glenn Allgood, Phani Teja Kuruganti, Darren Highfill Using simulation to engineer cybersecurity requirements. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ilker Özçelik, Richard R. Brooks Operational system testing for designed in security. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ahmed Serageldin, Axel W. Krings, Ahmed Abdel-Rahim A survivable critical infrastructure control application. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Matthew Butler 0003, Steven Reed, Peter J. Hawrylak, John Hale Implementing graceful RFID privilege reduction. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Avinash R. Desai, Michael S. Hsiao, Chao Wang 0001, Leyla Nazhandali, T. Simin Hall Interlocking obfuscation for anti-tamper hardware. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Travis L. Bauer, Richard Colbaugh, Kristin Glass, David Schnizlein Use of transfer entropy to infer relationships from behavior. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Lee M. Hively, Jeffrey Todd McDonald Theorem-based, data-driven, cyber event detection. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sean Crosby, Marco M. Carvalho, Dan Kidwell A layered approach to understanding network dependencies on moving target defense mechanisms. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Michael Duren, Hal Aldridge, Robert K. Abercrombie, Frederick T. Sheldon Designing and operating through compromise: architectural analysis of CKMS for the advanced metering infrastructure. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Lahiru S. Gallege, Dimuthu Gamage, James H. Hill, Rajeev R. Raje Trust contract of a service and its role in service selection for distributed software systems. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Lu Yu 0001, Richard R. Brooks Applying POMDP to moving target optimization. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Cindy Finke, Jonathan Butts, Robert F. Mills ADS-B encryption: confidentiality in the friendly skies. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1David Schwab, Li Yang 0001 Entity authentication in a mobile-cloud environment. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Christopher S. Oehmen, Elena S. Peterson, Jeremy Teuton Evolutionary drift models for moving target defense. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Justin M. Beaver, Christopher T. Symons, Robert E. Gillen A learning system for discriminating variants of malicious network traffic. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Robert K. Abercrombie, Frederick T. Sheldon, Katie R. Hauser, Margaret W. Lantz, Ali Mili 0001 Failure impact analysis of key management in AMI using cybernomic situational assessment (CSA). Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yevgeniy Vorobeychik, Michael Z. Lee, Adam Anderson 0002, Mitch Adair, William Atkins, Alan Berryhill, Dominic Chen, Ben Cook, Jeremy Erickson, Steve Hurd, Ron Olsberg, Lyndon Pierson, Owen Redwood Fireaxe: the DHS secure design competition pilot. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Rayford B. Vaughn, Thomas H. Morris, Elena Sitnikova Development & expansion of an industrial control system security laboratory and an international research collaboration. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Katherine C. Cameron, Richard R. Brooks, Juan Deng Cost-effective quality assurance of wireless network security. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hui Lin 0005, Adam J. Slagell, Catello Di Martino, Zbigniew Kalbarczyk, Ravishankar K. Iyer Adapting Bro into SCADA: building a specification-based intrusion detection system for the DNP3 protocol. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Neal Dawes, Bryan Prosser, Errin W. Fulp, A. David McKinnon Using mobile agents and overlay networks to secure electrical networks. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Read Sprabery, Thomas H. Morris, Shengyi Pan, Uttam Adhikari, Vahid Madani Protocol mutation intrusion detection for synchrophasor communications. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Zach Harbort, Conor Fellin Gesture-oriented data sharing. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ryan Goodfellow, Robert Braden, Terry Benzel, David E. Bakken First steps toward scientific cyber-security experimentation in wide-area cyber-physical systems. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Maggie X. Cheng, Mariesa L. Crow, Robert F. Erbacher Vulnerability analysis of a smart grid with monitoring and control system. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Charles N. Payne Jr., Jason Sonnek, Steven A. Harp XEBHRA: a virtualized platform for cross domain information sharing. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Maggie X. Cheng, Quanmin Ye, Robert F. Erbacher Visualizing graph features for fast port scan detection. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Marco M. Carvalho, Thomas C. Eskridge, Larry Bunch, Jeffrey M. Bradshaw, Adam Dalton 0001, Paul J. Feltovich, James Lott, Dan Kidwell A human-agent teamwork command and control framework for moving target defense (MTC2). Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Michael Duren, John Walsh, Hal Aldridge, Meng-Day (Mandel) Yu Resilient device authentication system (RDAS) through SIOMETRICS. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Frederick T. Sheldon, Annarita Giani, Axel W. Krings, Robert K. Abercrombie (eds.) Cyber Security and Information Intelligence, CSIIRW '13, Oak Ridge, TN, USA, January 8-10, 2013 Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  BibTeX  RDF
1Hasan Cam, Pierre Mouallem Mission-aware time-dependent cyber asset criticality and resilience. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Reese Moore, Stephen Groat, Randy C. Marchany, Joseph G. Tront Using transport layer multihoming to enhance network layer moving target defenses. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Shubhalaxmi Kher, Victor Nutt, Dipankar Dasgupta, Mohd. Hasan Ali, Paul Mixon A prediction model for anomalies in smart grid with sensor network. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Qian Chen 0019, Sherif Abdelwahed, Weston Monceaux Towards automatic security management: a model-based approach. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jarilyn M. Hernández, Line Pouchard, Jeffrey Todd McDonald, Stacy J. Prowell Developing a power measurement framework for cyber defense. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Annarita Giani, Russell Bent Addressing smart grid cyber security. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Richard C. Linger, Mark G. Pleszkoch, Stacy J. Prowell, Kirk Sayre, T. Scott Ankrum Computing legacy software behavior to understand functionality and security properties: an IBM/370 demonstration. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jason J. Haas, J. D. Doak, Jason R. Hamlet Machine-oriented biometrics and cocooning for dynamic network defense. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Lianyu Zhao, Richard R. Brooks Tailoring trusted semantic information. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Rattikorn Hewett, Phongphun Kijsanayothin Securing system controllers in critical infrastructures. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Adam Hahn, Manimaran Govindarasu Model-based intrustion detection for the smart grid (MINDS). Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Justin Yackoski, Jason H. Li, Scott A. DeLoach, Xinming Ou Mission-oriented moving target defense based on cryptographically strong network dynamics. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jason M. Carter Locating executable fragments with Concordia, a scalable, semantics-based architecture. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Chen Lu, Richard R. Brooks Timing analysis in P2P botnet traffic using probabilistic context-free grammars. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Richard R. Brooks, Benafsh Husain, SeokBae Yun, Juan Deng Security and performance evaluation of security protocols. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Erik M. Ferragut, Jason A. Laska, Bogdan D. Czejdo, Alexander Melin Addressing the challenges of anomaly detection for cyber physical energy grid systems. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Dennis K. Holstein On the use of the Clark-Wilson security model to protect industrial automation control systems. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jeffrey Segall, Michael J. Mayhew, Michael Atighetchi, Rachel Greenstadt Assessing trustworthiness in collaborative environments. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Michael J. Lewis Characterizing risk. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Shengyi Pan, Thomas H. Morris, Uttam Adhikari, Vahid Madani Causal event graphs cyber-physical system intrusion detection system. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jeyasingam Nivethan, Mauricio Papa, Peter J. Hawrylak Estimating link availability and timing delays in ethernet-based networks. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Frederick T. Sheldon, Daniel Fetzer, David Manz, Jingshan Huang, Stuart Goose, Thomas H. Morris, Jiangbo Dang, Jonathan Kirsch, Dong Wei 0009 Intrinsically resilient energy control systems. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Joshua Howes, James Solderitsch, Ignatius Chen, Jonté Craighead Enabling trustworthy spaces via orchestrated analytical security. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Rodrigo Sanches Miani, Michel Cukier, Bruno Bogaz Zarpelão, Leonardo de Souza Mendes Relationships between information security metrics: an empirical study. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Victor Balogun, Axel W. Krings On the impact of jamming attacks on cooperative spectrum sensing in cognitive radio networks. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Aaron Paulos, Partha P. Pal, Richard E. Schantz, Brett Benyo Moving target defense (MTD) in an adaptive execution environment. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Arun Velagapalli, Mahalingam Ramkumar Minimizing the TCB for securing SCADA systems. Search on Bibsonomy CSIIRW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Thoshitha T. Gamage, Ravi Akella, Thomas P. Roth, Bruce M. McMillin Information flow security in cyber-physical systems. Search on Bibsonomy CSIIRW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Rich Nolan, Peter P. Chen Supporting velocity of investigation with behavior analysis of malware. Search on Bibsonomy CSIIRW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Curtis Taylor, Craug Shue Implementing a "moving target" system to protect servers. Search on Bibsonomy CSIIRW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sunirmal Khatua, Nandini Mukherjee, Nabendu Chaki A new agent based security framework for collaborative cloud environment. Search on Bibsonomy CSIIRW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Frederick T. Sheldon, Robert K. Abercrombie, Axel W. Krings (eds.) Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, CSIIRW 2011, Oak Ridge, TN, USA, October 12-14, 2011 Search on Bibsonomy CSIIRW The full citation details ... 2011 DBLP  BibTeX  RDF
1Debra Frincke National Laboratory panel. Search on Bibsonomy CSIIRW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Thomas W. Edgar, David O. Manz, Thomas E. Carroll Towards an experimental testbed facility for cyber-physical security research. Search on Bibsonomy CSIIRW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Matthew Butler 0003, Peter J. Hawrylak, John Hale Graceful privilege reduction in RFID security. Search on Bibsonomy CSIIRW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Robert F. Erbacher, Steve E. Hutchinson, Joshua Edwards Web traffic profiling and characterization. Search on Bibsonomy CSIIRW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jiayin Li, Daigu Zhang, Meikang Qiu, Yongxin Zhu 0001, Ju Shen Security protection on FPGA against differential power analysis attacks. Search on Bibsonomy CSIIRW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Lucille McMinn, Jonathan Butts, David Robinson, Billy Rios Exploiting the critical infrastructure via nontraditional system inputs. Search on Bibsonomy CSIIRW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Janusz Zalewski, Steven Drager 0001, William McKeever, Andrew J. Kornecki Can we measure security and how? Search on Bibsonomy CSIIRW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Dipankar Dasgupta, Md. Moshiur Rahman A framework for estimating security coverage for cloud service insurance. Search on Bibsonomy CSIIRW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Michael A. Brown Plenary Keynote Speaker: Rear Admiral Michael A. Brown, DoD/DHS. Search on Bibsonomy CSIIRW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jonathan Kirsch, Stuart Goose, Yair Amir, Paul M. Skare Toward survivable SCADA. Search on Bibsonomy CSIIRW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1William L. Sousan, Robin A. Gandhi, Qiuming Zhu, William R. Mahoney Using anomalous event patterns in control systems for tamper detection. Search on Bibsonomy CSIIRW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Thomas H. Morris, Shengyi Pan, Jeremy Lewis, Jonathan Moorhead, Nicolas H. Younan, Roger L. King, Mark Freund, Vahid Madani Cybersecurity risk testing of substation phasor measurement units and phasor data concentrators. Search on Bibsonomy CSIIRW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Bereket Mathewos Hambebo, Marco M. Carvalho, Fredric M. Ham Network traffic classification using a parallel neural network classifier architecture. Search on Bibsonomy CSIIRW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mohamed Azab, Mohamed Eltoweissy Towards a cooperative autonomous resilient defense platform for cyber-physical systems. Search on Bibsonomy CSIIRW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ilker Özçelik, Richard R. Brooks Security experimentation using operational systems. Search on Bibsonomy CSIIRW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Marco M. Carvalho, Carlos Perez An evolutionary multi-agent approach to anomaly detection and cyber defense. Search on Bibsonomy CSIIRW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Wade Gasior, Li Yang 0001 Network covert channels on the Android platform. Search on Bibsonomy CSIIRW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jason Carter An architecture for Concordia. Search on Bibsonomy CSIIRW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Zhanshan (Sam) Ma, Hongju (Daisy) Chen, Jiajin Zhang, Axel W. Krings, Frederick T. Sheldon Has the cyber warfare threat been overstated?: a cheap talk game-theoretic analysis on the Google-hacking claim? Search on Bibsonomy CSIIRW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Daniel Bilar, James Solderitsch, Elvis Hovor Monitoring smart grid operations and maintaining mission assurance through adaptive computer network defenses. Search on Bibsonomy CSIIRW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mark R. Heckman, Roger R. Schell, Edwards E. Reed Using a high assurance TCB for infrastructure security. Search on Bibsonomy CSIIRW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Gregory Neal Akers Plenary Speaker: Gregory Neal Akers, CISCO. Search on Bibsonomy CSIIRW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jinpeng Wei, Calton Pu, Keke Chen Flying under the radar: maintaining control of kernel without changing kernel code or persistent data structures. Search on Bibsonomy CSIIRW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1John Bumgarner Plenary Speaker: John Bumgarner, U.S. Cyber Consequences Unit. Search on Bibsonomy CSIIRW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Luanne Burns, Christina Selby, Thomas A. Longstaff DART3: DHS assistant for R&D tracking and technology transfer. Search on Bibsonomy CSIIRW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Robert Osborn Transforming NNSA information, collaboration and security. Search on Bibsonomy CSIIRW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Timothy Calver, Michael R. Grimaila, Jeffrey W. Humphries An empirical analysis of the cascade error reconciliation protocol for quantum key distribution. Search on Bibsonomy CSIIRW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Kevin W. Hamlen, Peng Liu 0005, Murat Kantarcioglu, Bhavani Thuraisingham, Ting Yu 0001 Identity management for cloud computing: developments and directions. Search on Bibsonomy CSIIRW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Carol Hawk Key questions for the day on cryptographic key management. Search on Bibsonomy CSIIRW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Dipankar Dasgupta, Mohd. Hassan Ali, Robert K. Abercrombie, Bob G. Schlicher, Frederick T. Sheldon, Marco Carvalho 0001 Secure VM for monitoring industrial process controllers. Search on Bibsonomy CSIIRW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 348 (100 per page; Change: )
Pages: [1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license