The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ICSSA"( http://dblp.L3S.de/Venues/ICSSA )

URL (DBLP): http://dblp.uni-trier.de/db/conf/icssa

Publication years (Num. hits)
2015-2016 (23) 2017 (25) 2018 (23) 2019-2020 (26)
Publication types (Num. hits)
inproceedings(91) proceedings(6)
Venues (Conferences, Journals, ...)
ICSSA(97)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 97 publication records. Showing 97 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Andreas Kolan, Simon Tjoa, Peter Kieseberg Medical Blockchains and Privacy in Austria - Technical and Legal Aspects. Search on Bibsonomy ICSSA The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Florian Plainer, Klaus Kieseberg, Peter Kieseberg Assessing the sovereignty and security of the Austrian internet. Search on Bibsonomy ICSSA The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Syed Rizvi 0001, Tanner Flock, Travis Flock, Iyonna Williams Anomaly Detection to Protect Networks from Advanced Persistent Threats Using Adaptive Resonance AI Concepts. Search on Bibsonomy ICSSA The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1William B. Crowe, Tae Tom Oh Distributed Unit Security for 5G Base-Stations using Blockchain. Search on Bibsonomy ICSSA The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Bo-Min Kim, Jae-Yoon Ahn, Hyung-Jong Kim A Study on Reflecting User Experience for Sensor-based Android IoT Services. Search on Bibsonomy ICSSA The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Sandeep Romana, Jyostna Grandhi, P. R. Lakshmi Eswari Security Analysis of SOHO Wi-Fi routers. Search on Bibsonomy ICSSA The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1P. Venkata Poojitha, Remya R. K. Menon Document Representations to Improve Topic Modelling. Search on Bibsonomy ICSSA The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1 International Conference on Software Security and Assurance, ICSSA 2020, Altoona, PA, USA, October 28-30, 2020 Search on Bibsonomy ICSSA The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Syed Rizvi 0001, Shakir Campbell, Kieran Alden Why Compliance is needed for Internet of Things? Search on Bibsonomy ICSSA The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Hyekyung Han, KangHoon Lee, Youngbae Jeon, Ji Won Yoon Comparison of various interpolation techniques to infer localization of audio files using ENF signals. Search on Bibsonomy ICSSA The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1William Aiken, Jungwoo Ryoo, Syed Rizvi 0001 An Internet of Things (IoT) Security Assessment for Households. Search on Bibsonomy ICSSA The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Daniel Judt, Patrick Kochberger, Peter Kieseberg, Sebastian Schrittwieser Compiling and Analyzing Open Source Malware for Research Purposes. Search on Bibsonomy ICSSA The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Anthony Avella, Syed Rizvi 0001, Andrew Gibson, Marcus Ryan, Ryan Strimple, Ian Menovich VM based Malware Security Protection on Android Platform. Search on Bibsonomy ICSSA The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Saptarshi Purkayastha, Shreya Goyal, Tyler Phillips, Huanmei Wu, Brandon Haakenson, Xukai Zou Continuous Security through Integration Testing in an Electronic Health Records System. Search on Bibsonomy ICSSA The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1TaeYoung Kim, Hyung-Jong Kim 0002 Blockchain-based Service Performance Evaluation Method Using Native Cloud Environment. Search on Bibsonomy ICSSA The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1 International Conference on Software Security and Assurance, ICSSA 2019, St. Pölten, Austria, July 25-26, 2019 Search on Bibsonomy ICSSA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Thomas Pipek, Martin Pirker Revisiting the Challenges of Input Parsing for Robust and Secure Software. Search on Bibsonomy ICSSA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Peter Kieseberg, Sebastian Schrittwieser, Peter Frühwirt, Edgar R. Weippl Analysis of the Internals of MySQL/InnoDB B+ Tree Index Navigation from a Forensic Perspective. Search on Bibsonomy ICSSA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ankur Shukla, Basel Katt Change Point Problem in Security Vulnerability Discovery Model. Search on Bibsonomy ICSSA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Heimo Müller, Martina Lang, Bernhard Wieser, Robert Reihs, Birgit Pohn, Andreas Holzinger, Kurt Zatloukal Acceptance of Virtual Health Avatars. Search on Bibsonomy ICSSA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Syed Rizvi 0001, Jarrett Imler, Luke Ritchey, Michael Tokar Securing PKES: Integrating Artificial Intelligence Into PKES Forcefield For Anomaly Detection. Search on Bibsonomy ICSSA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Syed Rizvi 0001, Nicholas McIntyre, Jungwoo Ryoo Computing Security Scores for IoT Device Vulnerabilities. Search on Bibsonomy ICSSA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Syed Rizvi 0001, Kieran Alden, Shakir Campbell A Hybrid Framework for Detecting Repackaged Applications on the Android Market. Search on Bibsonomy ICSSA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Patrick Kochberger, Alexander Tauber, Sebastian Schrittwieser Assessment of the Transparency of the Windows Subsystem for Linux (WSL). Search on Bibsonomy ICSSA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Peter Kieseberg, Sebastian Schrittwieser, Edgar R. Weippl Fingerprinting using database steganography. Search on Bibsonomy ICSSA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Sebastian Eresheim, Lukas Daniel Klausner, Patrick Kochberger Anomaly Detection Support Using Process Classification. Search on Bibsonomy ICSSA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Hyung-Jong Kim 0002, Hae Young Lee A Study on the Privacy Protection Layer for Android IoT Services (Lightning Talk). Search on Bibsonomy ICSSA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jungwoo Ryoo, Simon Tjoa, Hojin Ryoo An IoT Risk Analysis Approach for Smart Homes (Work-in-Progress). Search on Bibsonomy ICSSA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hyung-Jong Kim 0002, Soyeon Park A Study on Document Password Management using the Trust-Chain Based SPT (Work-in-Progress). Search on Bibsonomy ICSSA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1William Aiken, Hyoungshick Kim Ignore the Noise: Using Autoencoders against Adversarial Attacks in Reinforcement Learning (Lightning Talk). Search on Bibsonomy ICSSA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Syed Rizvi 0001, Ryan Pipetti, Nicholas McIntyre, Jonathan Todd An Attack Vector for IoT Networks. Search on Bibsonomy ICSSA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sampsa Rauti, Ville Leppänen A Comparison of Online JavaScript Obfuscators. Search on Bibsonomy ICSSA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1SeungJu Cha, Uijeong Kang, EunJung Choi The Image Forensics Analysis of JPEG Image Manipulation (Lightning Talk). Search on Bibsonomy ICSSA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Omar Hreirati, Shahrear Iqbal, Mohammad Zulkernine An Adaptive Dataset for the Evaluation of Android Malware Detection Techniques. Search on Bibsonomy ICSSA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Patrick Kochberger, Florian Seitl Detecting Cryptography through IR Visualization. Search on Bibsonomy ICSSA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yoonjeong Kim, Hyemin Yun, Seongan Lim HNF Implementation Strategy Analysis for Lattice Cryptography (Lightning Talk). Search on Bibsonomy ICSSA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hyo-Kyung Choi, Eun-Jung Choi Discrimination of Facial Image Generated via GAN (Work-in-Progress). Search on Bibsonomy ICSSA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Daehwa Rayer Lee, Hyoungshick Kim An Analysis of Research Trends in Computer Security over the Last Decade. Search on Bibsonomy ICSSA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jihye Lee, Yoonjeong Kim Preventing Bitcoin Selfish Mining Using Transaction Creation Time. Search on Bibsonomy ICSSA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Taehoon Eom, Heesu Kim, SeongMo An, Jong Sou Park, Dong Seong Kim 0001 Android Malware Detection Using Feature Selections and Random Forest. Search on Bibsonomy ICSSA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hae Young Lee, Hyun Min Park, Kyu Don Hwang, GyeongTae Min, Young Sun Park Building a DNS Security Range in a Closed Network (Lightning Talk). Search on Bibsonomy ICSSA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jonathan Myers, Tae (Tom) Oh, William B. Crowe, Ohan Filbach, William McDonnell, Tappan Ajmera, Young Ho Kim, Jeong Neyo Kim Dynamic Internet of Things Malware Detection Using Machine Learning (Work-in-Progress). Search on Bibsonomy ICSSA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Colin DeLeon, Young B. Choi, Jungwoo Ryoo Blockchain and the Protection of Patient Information: Using Blockchain to Protect the Information of Patients in Line with HIPAA (Work-in-Progress). Search on Bibsonomy ICSSA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1 International Conference on Software Security and Assurance, ICSSA 2018, Seoul, Korea (South), July 26-27, 2018 Search on Bibsonomy ICSSA The full citation details ... 2018 DBLP  BibTeX  RDF
1Omar Ochoa, Jessica Steinmann, Yevgeniy Lischuk Towards Eliciting and Analyzing Security Requirements Using Ontologies through Use Case Scenarios (Work-in-Progress). Search on Bibsonomy ICSSA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Seungcheol Choi, Yonghyun Kim, Donghwa Kim 0002, Oh-Jin Kwon, Joonhyung Cho A Case Study: BDA Model for Standalone Radar System (Work-in-Progress). Search on Bibsonomy ICSSA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Marwa A. Elsayed, Mohammad Zulkernine Integrating Security in Cloud Application Development Cycle. Search on Bibsonomy ICSSA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Wonseok Choi 0007, Hyoungshick Kim How to Measure Similarity between Source Codes of Cryptocurrencies for Detecting Plagiarism (Lightning Talk). Search on Bibsonomy ICSSA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Taekkyung Oh, William Aiken, Hyoungshick Kim Hey Siri - Are You There?: Jamming of Voice Commands Using the Resonance Effect (Work-in-Progress). Search on Bibsonomy ICSSA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Stefan Marschalek, Robert Luh, Sebastian Schrittwieser Endpoint Data Classification Using Markov Chains. Search on Bibsonomy ICSSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Martin Valicek, Gregor Schramm, Martin Pirker, Sebastian Schrittwieser Creation and Integration of Remote High Interaction Honeypots. Search on Bibsonomy ICSSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jungwoo Ryoo, Soyoung Kim, Junsung Cho, Hyoungshick Kim, Simon Tjoa, Christopher Derobertis IoE Security Threats and You. Search on Bibsonomy ICSSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Aleem Khalid Alvi, Mohammad Zulkernine Security Pattern Detection Using Ordered Matrix Matching. Search on Bibsonomy ICSSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Joel Margolis, Tae Tom Oh, Suyash Jadhav, Young Ho Kim, Jeong Neyo Kim An In-Depth Analysis of the Mirai Botnet. Search on Bibsonomy ICSSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Youngjoon Ki, Ji Won Yoon An Efficient Method for Securely Storing and Handling of Genomic Data. Search on Bibsonomy ICSSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sangjun Ko, Jusop Choi, Hyoungshick Kim COAT: Code Obfuscation Tool to Evaluate the Performance of Code Plagiarism Detection Tools. Search on Bibsonomy ICSSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hyung-Jong Kim 0002, Hae Young Lee A Quantification of Effectiveness of Simulation Models by Managing Cost of Development. Search on Bibsonomy ICSSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Min Jin Kwon, Gowoon Kwak, Siyoung Jun, Hyung-Jong Kim 0002, Hae Young Lee Enriching Security Education Hands-on Labs with Practical Exercises. Search on Bibsonomy ICSSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Evan Michael English, Daniel Paul Stacey, Syed Rizvi 0001, Donte Perino Cloud Reliability and Independence Standard: A Three Tiered System for Optimal Cloud Storage. Search on Bibsonomy ICSSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Priya Murugesan, Swanima Chinnappa, Alaa S. Alaerjan, Dae-Kyoo Kim Adopting Attribute-Based Access Control to Data Distribution Service. Search on Bibsonomy ICSSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Damjan Buhov, Patrick Kochberger, Richard Thron, Sebastian Schrittwieser Discovering Cryptographic Algorithms in Binary Code Through Loop Enumeration. Search on Bibsonomy ICSSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Walter Fuertes, Anabel Tunala, Ronnie Moncayo, Fausto Meneses, Theofilos Toulkeridis Software-Based Platform for Education and Training of DDoS Attacks Using Virtual Networks. Search on Bibsonomy ICSSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Weike Wang, Muyang Liu, Pei Du, Zongmin Zhao, Yuntong Tian, Qiang Hao, Xiang Wang 0006 An Architectural-Enhanced Secure Embedded System with a Novel Hybrid Search Scheme. Search on Bibsonomy ICSSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Joseph Gualdoni, Andrew Kurtz, Ilva Myzyri, Megan Wheeler, Syed Rizvi 0001 Multi-Layer Defense Model for Securing Online Financial Transactions. Search on Bibsonomy ICSSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1 International Conference on Software Security and Assurance, ICSSA 2017, Altoona, PA, USA, July 24-25, 2017 Search on Bibsonomy ICSSA The full citation details ... 2017 DBLP  BibTeX  RDF
1Xiao Liu 0025, Brett Holden, Dinghao Wu Automated Synthesis of Access Control Lists. Search on Bibsonomy ICSSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hae Young Lee, Young Sun Park Common Requirements for Web Application Vulnerability Scanners for the Internet of Things. Search on Bibsonomy ICSSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sebastian Eresheim, Robert Luh, Sebastian Schrittwieser On the Impact of Kernel Code Vulnerabilities in IoT Devices. Search on Bibsonomy ICSSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hyung-Jong Kim 0002, Soyeon Park Secure Password Translation for Document Protection of SOHO Companies. Search on Bibsonomy ICSSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Wendy Ayala, Walter Fuertes, Fernando Galarraga, Hernán Aules, Theofilos Toulkeridis Software Application to Evaluate the Complexity Theory of the RSA and Elliptic Curves Asymmetric Algorithms. Search on Bibsonomy ICSSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Maryam Davari, Mohammad Zulkernine, Fehmi Jaafar An Automatic Software Vulnerability Classification Framework. Search on Bibsonomy ICSSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Kenneth LaCroix, Yin L. Loo, Young B. Choi Cookies and Sessions: A Study of What They Are, How They Work and How They Can Be Stolen. Search on Bibsonomy ICSSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Priya Anand, Jungwoo Ryoo Security Patterns As Architectural Solution - Mitigating Cross-Site Scripting Attacks in Web Applications. Search on Bibsonomy ICSSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Meenu Ganesh, Priyanka Pednekar, Pooja Prabhuswamy, Divyashri Sreedharan Nair, Younghee Park, Hyeran Jeon CNN-Based Android Malware Detection. Search on Bibsonomy ICSSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Marlies Temper, Simon Tjoa The Applicability of Fuzzy Rough Classifier for Continuous Person Authentication. Search on Bibsonomy ICSSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Franz Wotawa On the Automation of Security Testing. Search on Bibsonomy ICSSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Lauri Koivunen, Sampsa Rauti, Ville Leppänen Applying Internal Interface Diversification to IoT Operating Systems. Search on Bibsonomy ICSSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Priya Anand Overview of Root Causes of Software Vulnerabilities - Technical and User-Side Perspectives. Search on Bibsonomy ICSSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jaegwan Yu, Eunsoo Kim, Hyoungshick Kim, Jun Ho Huh A Framework for Detecting MAC and IP Spoofing Attacks with Network Characteristics. Search on Bibsonomy ICSSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Naurin Farooq Khan, Naveed Ikram Security Requirements Engineering: A Systematic Mapping (2010-2015). Search on Bibsonomy ICSSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Martin Pirker, Andreas Nusser Assessment of Server State via Inter-Clone Differences. Search on Bibsonomy ICSSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Damjan Buhov, Richard Thron, Sebastian Schrittwieser Catch Me if You Can! Transparent Detection of Shellcode. Search on Bibsonomy ICSSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sora Lee, Jinwoo Kim, Sangjun Ko, Hyoungshick Kim A Security Analysis of Paid Subscription Video-on-Demand Services for Online Learning. Search on Bibsonomy ICSSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Su Yeon Choi, Hae Young Lee Toward Automated Scanning for Code Injection Vulnerabilities in HTML5-Based Mobile Apps. Search on Bibsonomy ICSSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Alexandre Melo Braga, Ricardo Dahab Towards a Methodology for the Development of Secure Cryptographic Software. Search on Bibsonomy ICSSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ji-Hyeon Yoon, Jeong Oh Kye, Yongdae Kim, Hae Young Lee Decoder-Free Sino-Korean Shellcode. Search on Bibsonomy ICSSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Oliver Eigner, Philipp Kreimel, Paul Tavolato Detection of Man-in-the-Middle Attacks on Industrial Control Networks. Search on Bibsonomy ICSSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Igor Serov, Maria Leitner An Experimental Approach to Reputation in E-Participation. Search on Bibsonomy ICSSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mathias Wegerer, Simon Tjoa Defeating the Database Adversary Using Deception - A MySQL Database Honeypot. Search on Bibsonomy ICSSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1 International Conference on Software Security and Assurance, ICSSA 2016, St. Pölten, Austria, August 24-25, 2016 Search on Bibsonomy ICSSA The full citation details ... 2016 DBLP  BibTeX  RDF
1Hyunsoo Kim, Hyoungshick Kim, Ji Won Yoon A New Technique Using a Shuffling Method to Protect Confidential Documents from Shoulder Surfers. Search on Bibsonomy ICSSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1John Mitchell, Syed Rizvi 0001, Jungwoo Ryoo A Fuzzy-Logic Approach for Evaluating a Cloud Service Provider. Search on Bibsonomy ICSSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Daehyun Kim, Hyoungshick Kim Performing Clickjacking Attacks in the Wild: 99% are Still Vulnerable! Search on Bibsonomy ICSSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Marlies Temper, Simon Tjoa, Manfred Kaiser Touch to Authenticate - Continuous Biometric Authentication on Mobile Devices. Search on Bibsonomy ICSSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Walter Fuertes, Karina Quimbiulco, Fernando Galarraga, José Luis García-Dorado On the Development of Advanced Parental Control Tools. Search on Bibsonomy ICSSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1 1st International Conference on Software Security and Assurance, ICSSA 2015, Suwon, South Korea, July 27, 2015 Search on Bibsonomy ICSSA The full citation details ... 2015 DBLP  BibTeX  RDF
1Priya Anand, Jungwoo Ryoo, Hyoungshick Kim Addressing Security Challenges in Cloud Computing - A Pattern-Based Approach. Search on Bibsonomy ICSSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #97 of 97 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license