The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "MMM-ACNS"( http://dblp.L3S.de/Venues/MMM-ACNS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/mmmacns

Publication years (Num. hits)
2001 (29) 2003 (48) 2005 (43) 2010 (28) 2012 (27) 2017 (29)
Publication types (Num. hits)
inproceedings(199) proceedings(5)
Venues (Conferences, Journals, ...)
MMM-ACNS(204)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 62 occurrences of 56 keywords

Results
Found 204 publication records. Showing 204 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Albert Sitek, Zbigniew Kotulski Cardholder's Reputation System for Contextual Risk Management in Payment Transactions. Search on Bibsonomy MMM-ACNS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Alexander Branitskiy, Igor V. Kotenko Network Anomaly Detection Based on an Ensemble of Adaptive Binary Classifiers. Search on Bibsonomy MMM-ACNS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Maxim Kolomeec, Gustavo Gonzalez Granadillo, Elena Doynikova, Andrey Chechulin, Igor V. Kotenko, Hervé Debar Choosing Models for Security Metrics Visualization. Search on Bibsonomy MMM-ACNS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Nanda Kumar Thanigaivelan, Ethiopia Nigussie, Seppo Virtanen, Jouni Isoaho Towards Self-aware Approach for Mobile Devices Security. Search on Bibsonomy MMM-ACNS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Steven Drager 0001, Janusz Zalewski A Novel and Unifying View of Trustworthiness in Cyberphysical Systems. Search on Bibsonomy MMM-ACNS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Laurens Lemaire, Jan Vossaert, Bart De Decker, Vincent Naessens Extending FAST-CPS for the Analysis of Data Flows in Cyber-Physical Systems. Search on Bibsonomy MMM-ACNS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Evgenia Novikova, Ivan Murenin Visualization-Driven Approach to Anomaly Detection in the Movement of Critical Infrastructure. Search on Bibsonomy MMM-ACNS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Qi Dong, Zekun Yang, Yu Chen 0002, Xiaohua Li, Kai Zeng 0001 Anomaly Detection in Cognitive Radio Networks Exploiting Singular Spectrum Analysis. Search on Bibsonomy MMM-ACNS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1An Braeken, Sergey Bezzateev, Abdellah Touhafi, Natalia Voloshina HEPPA: Highly Efficient Privacy Preserving Authentication for ITS. Search on Bibsonomy MMM-ACNS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Marcin Niemiec, Maciej Francikiewicz Security Assessment of Cryptographic Algorithms. Search on Bibsonomy MMM-ACNS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Omar Iraqi, Hanan El Bakkali Toward Third-Party Immune Applications. Search on Bibsonomy MMM-ACNS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Emrah Korkmaz, Matthew Davis, Andrey M. Dolgikh, Victor A. Skormin Detection and Mitigation of Time Delay Injection Attacks on Industrial Control Systems with PLCs. Search on Bibsonomy MMM-ACNS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Janusz Górski, Katarzyna Lukasiewicz Meeting Requirements Imposed by Secure Software Development Standards and Still Remaining Agile. Search on Bibsonomy MMM-ACNS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jacek Rak, John Bay, Igor V. Kotenko, Leonard J. Popyack, Victor A. Skormin, Krzysztof Szczypiorski (eds.) Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings Search on Bibsonomy MMM-ACNS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Anton Kopeikin, Arnur G. Tokhtabayev, Nurlan Tashatov, Dina Satybaldina tLab: A System Enabling Malware Clustering Based on Suspicious Activity Trees. Search on Bibsonomy MMM-ACNS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Vasileios Gkioulos, Stephen D. Wolthusen Security Requirements for the Deployment of Services Across Tactical SOA. Search on Bibsonomy MMM-ACNS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Leonard J. Popyack, Jay Biernat Race Condition Faults in Multi-core Systems. Search on Bibsonomy MMM-ACNS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Roberto Metere, Changyu Dong Automated Cryptographic Analysis of the Pedersen Commitment Scheme. Search on Bibsonomy MMM-ACNS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Matthew Davis, Emrah Korkmaz, Andrey M. Dolgikh, Victor A. Skormin Resident Security System for Government/Industry Owned Computers. Search on Bibsonomy MMM-ACNS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Alexander A. Grusho, Nick A. Grusho, Michael I. Zabezhailo, Alexander Zatsarinny, Elena E. Timonina Information Security of SDN on the Basis of Meta Data. Search on Bibsonomy MMM-ACNS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Alexander A. Grusho Data Mining and Information Security. Search on Bibsonomy MMM-ACNS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jerzy Konorski, Karol Rydzewski Nodal Cooperation Equilibrium Analysis in Multi-hop Wireless Ad Hoc Networks with a Reputation System. Search on Bibsonomy MMM-ACNS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hubert Ostap, Ryszard Antkiewicz A Concept of Clustering-Based Method for Botnet Detection. Search on Bibsonomy MMM-ACNS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Stig Fr. Mjølsnes, Ruxandra F. Olimid Easy 4G/LTE IMSI Catchers for Non-Programmers. Search on Bibsonomy MMM-ACNS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Andrew Hutchison Adapting Enterprise Security Approaches for Evolving Cloud Processing and Networking Models. Search on Bibsonomy MMM-ACNS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Arnur G. Tokhtabayev, Anton Kopeikin, Nurlan Tashatov, Dina Satybaldina Malware Analysis and Detection via Activity Trees in User-Dependent Environment. Search on Bibsonomy MMM-ACNS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Valery I. Korzhik, Ivan Fedyanin, Artur Godlewski, Guillermo Morales-Luna Steganalysis Based on Statistical Properties of the Encrypted Messages. Search on Bibsonomy MMM-ACNS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Vasileios Mavroeidis, Mathew Nicho Quick Response Code Secure: A Cryptographically Secure Anti-Phishing Tool for QR Code Attacks. Search on Bibsonomy MMM-ACNS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Deeraj Nagothu, Andrey M. Dolgikh iCrawl: A Visual High Interaction Web Crawler. Search on Bibsonomy MMM-ACNS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Gustavo Gonzalez Granadillo, Hervé Debar, Grégoire Jacob, Chrystel Gaber, Mohammed Achemlal Individual Countermeasure Selection Based on the Return On Response Investment Index. Search on Bibsonomy MMM-ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Dmitry P. Zegzhda, Tatiana V. Stepanova Stochastic Model of Interaction between Botnets and Distributed Computer Defense Systems. Search on Bibsonomy MMM-ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Peter D. Zegzhda, Dmitry P. Zegzhda, Maxim O. Kalinin, Artem S. Konoplev Security Modeling of Grid Systems Using Petri Nets. Search on Bibsonomy MMM-ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Benjamin Livshits Finding Malware on a Web Scale. Search on Bibsonomy MMM-ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Josée Desharnais, Erwanne P. Kanyabwero, Nadia Tawbi Enforcing Information Flow Policies by a Three-Valued Analysis. Search on Bibsonomy MMM-ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Brendan Kerrigan, Yu Chen 0002 A Study of Entropy Sources in Cloud Computers: Random Number Generation on Cloud Hosts. Search on Bibsonomy MMM-ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Joe-Kai Tsay, Stig Fr. Mjølsnes A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols. Search on Bibsonomy MMM-ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Julian Schütte, Roland Rieke, Timo Winkelvos Model-Based Security Event Management. Search on Bibsonomy MMM-ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Gianluca Dini, Fabio Martinelli, Andrea Saracino, Daniele Sgandurra MADAM: A Multi-level Anomaly Detector for Android Malware. Search on Bibsonomy MMM-ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yosra Ben Mustapha, Hervé Debar, Grégoire Jacob Limitation of Honeypot/Honeynet Databases to Enhance Alert Correlation. Search on Bibsonomy MMM-ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Vasily Desnitsky, Igor V. Kotenko, Andrey Chechulin Configuration-Based Approach to Embedded Device Security. Search on Bibsonomy MMM-ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Viktor Yakovlev, Valery I. Korzhik, Mihail Bakaev, Guillermo Morales-Luna Optimization of Key Distribution Protocols Based on Extractors for Noisy Channels within Active Adversaries. Search on Bibsonomy MMM-ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Roland Rieke, Luigi Coppolino, Andrew Hutchison, Elsa Prieto, Chrystel Gaber Security and Reliability Requirements for Advanced Security Event Management. Search on Bibsonomy MMM-ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Vladimir A. Oleshchuk Trust-Aware RBAC. Search on Bibsonomy MMM-ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Tyrone Cadenhead, Murat Kantarcioglu, Vaibhav Khadilkar, Bhavani Thuraisingham Design and Implementation of a Cloud-Based Assured Information Sharing System. Search on Bibsonomy MMM-ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Fabio Martinelli, Ilaria Matteucci, Charles Morisset From Qualitative to Quantitative Enforcement of Security Policy. Search on Bibsonomy MMM-ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Chaitanya Yavvari, Arnur G. Tokhtabayev, Huzefa Rangwala, Angelos Stavrou Malware Characterization Using Behavioral Components. Search on Bibsonomy MMM-ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Zhaohui Wang, Ryan Johnson 0002, Rahul Murmuria, Angelos Stavrou Exposing Security Risks for Commercial Mobile Devices. Search on Bibsonomy MMM-ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Tigran Avanesov, Yannick Chevalier, Michaël Rusinowitch, Mathieu Turuani Towards the Orchestration of Secured Services under Non-disclosure Policies. Search on Bibsonomy MMM-ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Alexander A. Moldovyan, Nikolay A. Moldovyan, Evgenia Novikova Blind 384-bit Digital Signature Scheme. Search on Bibsonomy MMM-ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Peter D. Zegzhda, Dmitry P. Zegzhda, Alexey V. Nikolskiy Using Graph Theory for Cloud System Security Modeling. Search on Bibsonomy MMM-ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Andrey M. Dolgikh, Tomas Nykodym, Victor A. Skormin, Zachary Birnbaum Using Behavioral Modeling and Customized Normalcy Profiles as Protection against Targeted Cyber-Attacks. Search on Bibsonomy MMM-ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Igor V. Kotenko, Victor A. Skormin (eds.) Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings Search on Bibsonomy MMM-ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Xin Jin, Ravi S. Sandhu, Ram Krishnan RABAC: Role-Centric Attribute-Based Access Control. Search on Bibsonomy MMM-ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Alexander A. Grusho, Nikolai A. Grusho, Elena E. Timonina Alternative Mechanisms for Information Security. Search on Bibsonomy MMM-ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Andrey Chechulin, Igor V. Kotenko, Vasily Desnitsky An Approach for Network Information Flow Analysis for Systems of Embedded Components. Search on Bibsonomy MMM-ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Dmitriy Komashinskiy, Igor V. Kotenko Using Low-Level Dynamic Attributes for Malware Detection Based on Data Mining Methods. Search on Bibsonomy MMM-ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Peter Teufl, Udo Payer, Guenther Lackner From NLP (Natural Language Processing) to MLP (Machine Language Processing). Search on Bibsonomy MMM-ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Vasily Desnitsky, Igor V. Kotenko Security and Scalability of Remote Entrusting Protection. Search on Bibsonomy MMM-ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Shiu-Kai Chin, Sarah Muccio, Susan Older, Thomas N. J. Vestal Policy-Based Design and Verification for Mission Assurance. Search on Bibsonomy MMM-ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Roland Rieke, Zaharina Stoynova Predictive Security Analysis for Event-Driven Processes. Search on Bibsonomy MMM-ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Dmitriy N. Moldovyan, Nikolay A. Moldovyan A New Hard Problem over Non-commutative Finite Groups for Cryptographic Protocols. Search on Bibsonomy MMM-ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Dmitry P. Zegzhda, Peter D. Zegzhda, Maxim O. Kalinin Clarifying Integrity Control at the Trusted Information Environment. Search on Bibsonomy MMM-ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Wojciech Molisz, Jacek Rak A Novel Genetic Approach to Provide Differentiated Levels of Service Resilience in IP-MPLS/WDM Networks. Search on Bibsonomy MMM-ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Leonid Domnitser, Nael B. Abu-Ghazaleh, Dmitry Ponomarev 0001 A Predictive Model for Cache-Based Side Channels in Multicore and Multithreaded Microprocessors. Search on Bibsonomy MMM-ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Bart Preneel Cryptography for Network Security: Failures, Successes and Challenges. Search on Bibsonomy MMM-ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yaroslav A. Markov, Maxim O. Kalinin Intellectual Intrusion Detection with Sequences Alignment Methods. Search on Bibsonomy MMM-ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Glenn S. Benson, Shiu-Kai Chin, Sean Croston, Karthick Jayaraman, Susan Older Credentials Management for High-Value Transactions. Search on Bibsonomy MMM-ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Dieter Gollmann Secure Applications without Secure Infrastructures. Search on Bibsonomy MMM-ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Igor Saenko 0001, Igor V. Kotenko Genetic Optimization of Access Control Schemes in Virtual Local Area Networks. Search on Bibsonomy MMM-ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Antonio Muñoz 0001, Antonio Maña, Pablo Antón In the Track of the Agent Protection: A Solution Based on Cryptographic Hardware. Search on Bibsonomy MMM-ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Raphaël Khoury, Nadia Tawbi Using Equivalence Relations for Corrective Enforcement of Security Policies. Search on Bibsonomy MMM-ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Hervé Debar, Nizar Kheir, Nora Cuppens-Boulahia, Frédéric Cuppens Service Dependencies in Information Systems Security. Search on Bibsonomy MMM-ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jose Andre Morales, Erhan J. Kartaltepe, Shouhuai Xu, Ravi S. Sandhu Symptoms-Based Detection of Bot Processes. Search on Bibsonomy MMM-ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ravi S. Sandhu, Ram Krishnan, Jianwei Niu 0001, William H. Winsborough Group-Centric Models for Secure and Agile Information Sharing. Search on Bibsonomy MMM-ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Alexander A. Grusho, Nikolai A. Grusho, Elena E. Timonina Problems of Modeling in the Analysis of Covert Channels. Search on Bibsonomy MMM-ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Greg Morrisett Integrating Types and Specifications for Secure Software Development. Search on Bibsonomy MMM-ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Krzysztof Sacha Credential Chain Discovery in RTT Trust Management Language. Search on Bibsonomy MMM-ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya, Kevin A. Kwiat QoS-T: QoS Throttling to Elicit User Cooperation in Computer Systems. Search on Bibsonomy MMM-ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ludovic Piètre-Cambacédès, Marc Bouissou Attack and Defense Modeling with BDMP. Search on Bibsonomy MMM-ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Stefan Kraxberger, Peter Danner, Daniel M. Hein Secure Multi-Agent System for Multi-Hop Environments. Search on Bibsonomy MMM-ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Dmitry P. Zegzhda, Ekaterina Rudina Virtual Environment Security Modeling. Search on Bibsonomy MMM-ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Hai Thanh Nguyen 0001, Slobodan Petrovic, Katrin Franke A Comparison of Feature-Selection Methods for Intrusion Detection. Search on Bibsonomy MMM-ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Igor V. Kotenko, Victor A. Skormin (eds.) Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings Search on Bibsonomy MMM-ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Devrim Unal, Ozan Akar, M. Ufuk Çaglayan Model Checking of Location and Mobility Related Security Policy Specifications in Ambient Calculus. Search on Bibsonomy MMM-ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Soon Seok Kim, Sang-Soo Yeo, Hong-Jin Park, Sung Kwon Kim A New Scheme for the Location Information Protection in Mobile Communication Environments. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Félix J. García Clemente, Jesús D. Jiménez Re, Gregorio Martínez Pérez, Antonio Fernandez Gómez-Skarmeta Policy-Driven Routing Management Using CIM. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Jacques Demerjian, Ibrahim Hajjeh, Mohamad Badra, Salim Ferraz A Secure Way to Combine IPsec, NAT & DHCP. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Zhouyi Zhou, Bin Liang, Li Jiang, Wenchang Shi, Yeping He A Formal Description of SECIMOS Operating System. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Martin Schaffer, Peter Schartner Key Escrow with Tree-Based Access Structure. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Vladimir Gorodetsky, Igor V. Kotenko, Victor A. Skormin (eds.) Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Artem Tishkov, Igor V. Kotenko, Ekaterina Sidelnikova Security Checker Architecture for Policy-Based Security Management. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Dmitry P. Zegzhda, Alex M. Vovk Secure Hybrid Operating System "Linux over Fenix". Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Ming-Yuh Huang Critical Information Assurance Challenges for Modern Large-Scale Infrastructures. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Constantine Daicos, Scott Knight A Passive External Web Surveillance Technique for Private Networks. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Duncan A. Buell Calibrating Entropy Functions Applied to Computer Networks. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Bill Tsoumas, Stelios Dritsas, Dimitris Gritzalis An Ontology-Based Approach to Information Systems Security Management. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF IS Security, Security Policy, Security Management, Security Ontology
1Alexei Galatenko, Alexander A. Grusho, Alexander Kniazev, Elena E. Timonina Statistical Covert Channels Through PROXY Server. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Mikhail I. Smirnov Trust by Workflow in Autonomic Communication. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Peter Schartner, Martin Schaffer Unique User-Generated Digital Pseudonyms. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1David M. Nicol, Michael Liljenstam Models and Analysis of Active Worm Defense. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 204 (100 per page; Change: )
Pages: [1][2][3][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license