The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "CyberSecurity"( http://dblp.L3S.de/Venues/CyberSecurity )

URL (DBLP): http://dblp.uni-trier.de/db/conf/cybersecurity

Publication years (Num. hits)
2012 (29)
Publication types (Num. hits)
inproceedings(28) proceedings(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 29 publication records. Showing 29 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Satyajeet Nimgaonkar, Srujan Kotikela, Mahadevan Gomathisankaran CTrust: A Framework for Secure and Trustworthy Application Execution in Cloud Computing. Search on Bibsonomy CyberSecurity The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Hanchen Song, Chris Muelder, Kwan-Liu Ma Crucial Nodes Centric Visual Monitoring and Analysis of Computer Networks. Search on Bibsonomy CyberSecurity The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Pallavi Patil, Pavol Zavarsky, Dale Lindskog, Ron Ruhl Fault Tree Analysis of Accidental Insider Security Events. Search on Bibsonomy CyberSecurity The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Tanja Zseby Is IPv6 Ready for the Smart Grid? Search on Bibsonomy CyberSecurity The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Bo Zhou 0001, David Llewellyn-Jones, Qi Shi 0001, Muhammad Asim 0001, Madjid Merabti, David J. Lamb A Compose Language-Based Framework for Secure Service Composition. Search on Bibsonomy CyberSecurity The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Fernando Sanchez, Zhenhai Duan A Sender-Centric Approach to Detecting Phishing Emails. Search on Bibsonomy CyberSecurity The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Wade Gasior, Li Yang Exploring Covert Channel in Android Platform. Search on Bibsonomy CyberSecurity The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Marlies Rybnicek, Rainer Poisel, Manfred Ruzicka, Simon Tjoa A Generic Approach to Critical Infrastructure Modeling and Simulation. Search on Bibsonomy CyberSecurity The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ahmed Aleroud, George Karabatis A Contextual Anomaly Detection Approach to Discover Zero-Day Attacks. Search on Bibsonomy CyberSecurity The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Chung-Wei Lin, Alberto L. Sangiovanni-Vincentelli Cyber-Security for the Controller Area Network (CAN) Communication Protocol. Search on Bibsonomy CyberSecurity The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Nazari Skrupsky, Maliheh Monshizadeh, Prithvi Bisht, Timothy L. Hinrichs, V. N. Venkatakrishnan, Lenore D. Zuck WAVES: Automatic Synthesis of Client-Side Validation Code for Web Applications. Search on Bibsonomy CyberSecurity The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Todd Baumeister, Yingfei Dong, Zhenhai Duan, Guanyu Tian A Routing Table Insertion (RTI) Attack on Freenet. Search on Bibsonomy CyberSecurity The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Simon Reay Atkinson, David Walker 0002, Kevin Beaulne, Liaquat Hossain Cyber - Transparencies, Assurance and Deterrence. Search on Bibsonomy CyberSecurity The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Denise Ferebee, Dipankar Dasgupta, Qishi Wu A Cyber-Security Storm MAP. Search on Bibsonomy CyberSecurity The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Johannes de Vries, Hans Hoogstraaten, Jan van den Berg, Semir Daskapan Systems for Detecting Advanced Persistent Threats: A Development Roadmap Using Intelligent Data Analysis. Search on Bibsonomy CyberSecurity The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Paul Giura, Wei Wang A Context-Based Detection Framework for Advanced Persistent Threats. Search on Bibsonomy CyberSecurity The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Sharif Hassan, Ratan Guha Security and Integrity Analysis Using Indicators. Search on Bibsonomy CyberSecurity The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Olga Kulikova, Ronald Heil, Jan van den Berg, Wolter Pieters Cyber Crisis Management: A Decision-Support Framework for Disclosing Security Incident Information. Search on Bibsonomy CyberSecurity The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Shlomi Dolev, Niv Gilboa, Marina Kopeetsky Permanent Revocation in Attribute Based Broadcast Encryption. Search on Bibsonomy CyberSecurity The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Alex Doyal, Justin Zhan, Huiming Anna Yu Towards Defeating DDoS Attacks. Search on Bibsonomy CyberSecurity The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Kazuya Kishimoto, Kenji Ohira, Yukiko Yamaguchi, Hirofumi Yamaki, Hiroki Takakura An Adaptive Honeypot System to Capture IPv6 Address Scans. Search on Bibsonomy CyberSecurity The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Anass Bayaga, Stephen Flowerday Principal Causes of Information Communication Technology (ICT) Risk Failure in an SME. Search on Bibsonomy CyberSecurity The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Munene W. Kanampiu, Justin Zhan A Dynamic Covert Passive Actors Detection Scheme for a Healthy Networked Community. Search on Bibsonomy CyberSecurity The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1 2012 ASE International Conference on Cyber Security, Alexandria, VA, USA, December 14-16, 2012 Search on Bibsonomy CyberSecurity The full citation details ... 2012 DBLP  BibTeX  RDF
1Woohyun Shim, Luca Allodi, Fabio Massacci Crime Pays If You Are Just an Average Hacker. Search on Bibsonomy CyberSecurity The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Andre Abadie, Duminda Wijesekera Leveraging an Inventory of the Cognitive Radio Attack Surface. Search on Bibsonomy CyberSecurity The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jun Dai, Xiaoyan Sun 0003, Peng Liu 0005, Nicklaus A. Giacobe Gaining Big Picture Awareness through an Interconnected Cross-Layer Situation Knowledge Reference Model. Search on Bibsonomy CyberSecurity The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Robert F. Erbacher, Steve E. Hutchinson Extending Case-Based Reasoning to Network Alert Reporting. Search on Bibsonomy CyberSecurity The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Shams Zawoad, Ragib Hasan I Have the Proof: Providing Proofs of Past Data Possession in Cloud Forensics. Search on Bibsonomy CyberSecurity The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #29 of 29 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license