|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 43 occurrences of 38 keywords
|
|
|
Results
Found 13 publication records. Showing 13 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Cecilia S. Gal, Paul B. Kantor, Michael E. Lesk (eds.) |
Protecting Persons While Protecting the People, Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISIPS ![Springer, 978-3-642-10232-5 The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Eugene H. Spafford |
Cyber Security: Assessing Our Vulnerabilities and Developing an Effective Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISIPS ![In: Protecting Persons While Protecting the People, Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers, pp. 20-33, 2008, Springer, 978-3-642-10232-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security policy, vulnerabilities, patching, cyber security, security education |
1 | Roshan K. Thomas, Ravi S. Sandhu, Elisa Bertino, Ismailcem Budak Arpinar, Shouhuai Xu |
Privacy-Preserving Accountable Accuracy Management Systems (PAAMS). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISIPS ![In: Protecting Persons While Protecting the People, Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers, pp. 115-121, 2008, Springer, 978-3-642-10232-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
privacy, accuracy, accountability, entity disambiguation |
1 | Mark K. Goldberg, Malik Magdon-Ismail, Stephen Kelley, Konstantin Mertsalov |
Stable Statistics of the Blogograph. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISIPS ![In: Protecting Persons While Protecting the People, Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers, pp. 104-114, 2008, Springer, 978-3-642-10232-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Social networks, graph theory, blogs |
1 | Giovanni Di Crescenzo |
On the Statistical Dependency of Identity Theft on Demographics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISIPS ![In: Protecting Persons While Protecting the People, Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers, pp. 122-137, 2008, Springer, 978-3-642-10232-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
US Demographics, Statistics, Regression Analysis, Identity Theft |
1 | Slava Kisilevich, Yuval Elovici, Bracha Shapira, Lior Rokach |
kACTUS 2: Privacy Preserving in Classification Tasks Using k-Anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISIPS ![In: Protecting Persons While Protecting the People, Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers, pp. 63-81, 2008, Springer, 978-3-642-10232-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
suppression, data mining, anonymity, generalization, privacy preserving |
1 | Stephen E. Fienberg, Yuval Nardi, Aleksandra B. Slavkovic |
Valid Statistical Analysis for Logistic Regression with Multiple Sources. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISIPS ![In: Protecting Persons While Protecting the People, Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers, pp. 82-94, 2008, Springer, 978-3-642-10232-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Horizontal Partitioned Data, Secure Logistic Regression, Vertical Partitioned Data, Distributed Databases, Privacy Preserving Data Mining, Log-linear models |
1 | Robyn R. Mace |
Intelligence, Dataveillance, and Information Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISIPS ![In: Protecting Persons While Protecting the People, Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers, pp. 34-44, 2008, Springer, 978-3-642-10232-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
dataveillance, privacy, surveillance, intelligence, terrorism |
1 | Carl E. Landwehr |
Results of Workshops on Privacy Protection Technologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISIPS ![In: Protecting Persons While Protecting the People, Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers, pp. 45-56, 2008, Springer, 978-3-642-10232-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
privacy protection technologies, intelligence community, strategies, workshop |
1 | Maureen Baginski |
Intelligence Policy and the Science of Intelligence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISIPS ![In: Protecting Persons While Protecting the People, Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers, pp. 11-19, 2008, Springer, 978-3-642-10232-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
US Persons, privacy, information sharing |
1 | Paul B. Kantor, Michael E. Lesk |
The Challenges of Seeking Security While Respecting Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISIPS ![In: Protecting Persons While Protecting the People, Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers, pp. 1-10, 2008, Springer, 978-3-642-10232-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
intelligence agencies, computer security, national security, personal privacy |
1 | James J. Horning |
Words Matter: Privacy, Security, and Related Terms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISIPS ![In: Protecting Persons While Protecting the People, Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers, pp. 57-62, 2008, Springer, 978-3-642-10232-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
freedom of speech, security, Privacy, network security, computer security, definitions, homeland security, national security |
1 | Joan T. McNamara |
Suspicious Activity Reporting (SAR). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISIPS ![In: Protecting Persons While Protecting the People, Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers, pp. 95-103, 2008, Springer, 978-3-642-10232-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Suspicious Activity Report (SAR), Institutionalization, Measurement, Standardization, Paradigm Shift |
Displaying result #1 - #13 of 13 (100 per page; Change: )
|
|