The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "SafeConfig"( http://dblp.L3S.de/Venues/SafeConfig )

URL (DBLP): http://dblp.uni-trier.de/db/conf/safeconfig

Publication years (Num. hits)
2009-2010 (25) 2011 (18) 2012-2014 (21)
Publication types (Num. hits)
inproceedings(60) proceedings(4)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 64 publication records. Showing 64 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Kun Sun 0001, Sushil Jajodia Protecting Enterprise Networks through Attack Surface Expansion. Search on Bibsonomy SafeConfig The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mohammed Noraden Alsaleh, Ehab Al-Shaer Enterprise Risk Assessment Based on Compliance Reports and Vulnerability Scoring Systems. Search on Bibsonomy SafeConfig The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jeremy Tate, T. Charles Clancy Secure and Tamper Proof Code Management. Search on Bibsonomy SafeConfig The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Lujo Bauer Human Factors, Defaults, and Automation: Challenges and Opporunities. Search on Bibsonomy SafeConfig The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ehab Al-Shaer, Krishna Kant 0001 (eds.) Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence and Automation, SafeConfig '14, Scottsdale, Arizona, USA, November 3, 2014 Search on Bibsonomy SafeConfig The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Carl A. Gunter Detecting Roles and Anomalies in Hospital Access Audit Logs. Search on Bibsonomy SafeConfig The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yasuyuki Tanaka, Atsuhiro Goto n-ROPdetector: Proposal of a Method to Detect the ROP Attack Code on the Network. Search on Bibsonomy SafeConfig The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Fida Gillani, Ehab Al-Shaer Improving Efficiency of Spam Detection using Economic Model. Search on Bibsonomy SafeConfig The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ping Chen, Nick Nikiforakis, Lieven Desmet, Christophe Huygens Security Analysis of the Chinese Web: How well is it protected? Search on Bibsonomy SafeConfig The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ehab Al-Shaer, Xinming Ou, Geoffrey G. Xie (eds.) Automated Security Management [papers from SafeConfig 2012, Baltimore Inner Harbor, MD, USA] Search on Bibsonomy SafeConfig The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mohammed Noraden Alsaleh, Ehab Al-Shaer, Adel El-Atawy Towards a Unified Modeling and Verification of Network and System Security Configurations. Search on Bibsonomy SafeConfig The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ichita Higurashi, Akira Kanaoka, Masahiko Kato, Eiji Okamoto Discovery of Unexpected Services and Communication Paths in Networked Systems. Search on Bibsonomy SafeConfig The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mohammad Ashiqur Rahman, Ehab Al-Shaer A Declarative Logic-Based Approach for Threat Analysis of Advanced Metering Infrastructure. Search on Bibsonomy SafeConfig The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Shankaranarayanan Puzhavakath Narayanan, Seungjoon Lee, Subhabrata Sen GCNav: Generic Configuration Navigation System. Search on Bibsonomy SafeConfig The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Masahiko Kato, Takumi Matsunami, Akira Kanaoka, Hiroshi Koide, Eiji Okamoto Tracing Advanced Persistent Threats in Networked Systems. Search on Bibsonomy SafeConfig The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Hayawardh Vijayakumar, Trent Jaeger The Right Files at the Right Time. Search on Bibsonomy SafeConfig The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Martín Barrère, Gaetan Hurel, Remi Badonnel, Olivier Festor Increasing Android Security Using a Lightweight OVAL-Based Vulnerability Assessment Framework. Search on Bibsonomy SafeConfig The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Nazia Badar, Jaideep Vaidya, Vijayalakshmi Atluri, Basit Shafiq Risk Based Access Control Using Classification. Search on Bibsonomy SafeConfig The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mingyi Zhao, Peng Liu 0005 Modeling and Checking the Security of DIFC System Configurations. Search on Bibsonomy SafeConfig The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Meixing Le, Krishna Kant 0001, Sushil Jajodia Rule Configuration Checking in Secure Cooperative Data Access. Search on Bibsonomy SafeConfig The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Michael R. Clement, Dennis M. Volpano Programmable Diagnostic Network Measurement with Localization and Traffic Observation. Search on Bibsonomy SafeConfig The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Sanjai Narain, Sharad Malik, Ehab Al-Shaer Towards Eliminating Configuration Errors in Cyber Infrastructure. Search on Bibsonomy SafeConfig The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Simon N. Foley, William M. Fitzgerald, Wayne Mac Adams Federated Autonomic Network Access Control. Search on Bibsonomy SafeConfig The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Fida Gillani, Umar Kalim, Noman Latif, Syed Ali Khayam Decision Theoretic Approach to Detect Anomalies beyond Enterprise Boundaries. Search on Bibsonomy SafeConfig The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ehab Al-Shaer, Mohammed Noraden Alsaleh ConfigChecker: A tool for comprehensive security configuration analytics. Search on Bibsonomy SafeConfig The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mohammad Ashiqur Rahman, Ehab Al-Shaer AMIAnalyzer: Security analysis of AMI configurations. Search on Bibsonomy SafeConfig The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Hicham El Khoury, Romain Laborde, François Barrère, Abdelmalek Benzekri, Maroun Chamoun A Generic Data Flow Security Model. Search on Bibsonomy SafeConfig The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1William M. Fitzgerald, Simon N. Foley Reasoning about the Security Configuration of SAN Switch Fabrics. Search on Bibsonomy SafeConfig The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Xin Sun 0002, Jinliang Wei, Sanjay G. Rao, Geoffrey G. Xie A software toolkit for visualizing enterprise routing design. Search on Bibsonomy SafeConfig The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mohammed Noraden Alsaleh, Ehab Al-Shaer SCAP Based Configuration Analytics for Comprehensive Compliance Checking. Search on Bibsonomy SafeConfig The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Rick Kuhn Vulnerability Hierarchies in Access Control Configurations. Search on Bibsonomy SafeConfig The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Eugen Leontie, Gedare Bloom, Rahul Simha Automation for Creating and Configuring Security Manifests for Hardware Containers. Search on Bibsonomy SafeConfig The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Saeed Al-Haj, Ehab Al-Shaer Measuring Firewall Security. Search on Bibsonomy SafeConfig The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yousra Javed, Maliha Nazir, Muhammad Murtaza Khan, Syed Ali Khayam, Shujun Li Captchæcker: Reconfigurable CAPTCHAs based on automated security and usability analysis. Search on Bibsonomy SafeConfig The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Krishna Kant 0001, Meixing Le, Sushil Jajodia Security Considerations in Data Center Configuration Management. Search on Bibsonomy SafeConfig The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ludi Akue, Emmanuel Lavinal, Michelle Sibilla A Dynamic Configuration Validation Language. Search on Bibsonomy SafeConfig The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Said Marouf, Mohamed Shehab SEGrapher: Visualization-based SELinux Policy Analysis. Search on Bibsonomy SafeConfig The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Michael B. Crouse, Errin W. Fulp A moving target environment for computer configurations using Genetic Algorithms. Search on Bibsonomy SafeConfig The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Saeed Al-Haj, Ehab Al-Shaer CloudChecker: An imperative framework for cloud configuration management. Search on Bibsonomy SafeConfig The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Chris Giblin, Marcel Graf, Günter Karjoth, Andreas Wespi, Ian M. Molloy, Jorge Lobo 0001, Seraphin B. Calo Towards an integrated approach to role engineering. Search on Bibsonomy SafeConfig The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Bart Van Brabant, Thomas Delaet, Wouter Joosen Authorizing and directing configuration updates in contemporary it infrastructures. Search on Bibsonomy SafeConfig The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Padmalochan Bera, Soumya Maity, Soumya Kanti Ghosh 0001 Generating policy based security implementation in enterprise network: a formal framework. Search on Bibsonomy SafeConfig The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Divya Muthukumaran, Sandra Julieta Rueda, Hayawardh Vijayakumar, Trent Jaeger Cut me some security. Search on Bibsonomy SafeConfig The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Michael Atighetchi, Jonathan Webb, Partha P. Pal, Joseph P. Loyall, Azer Bestavros, Michael J. Mayhew Dynamic cross domain information sharing: a concept paper on flexible adaptive policy management. Search on Bibsonomy SafeConfig The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ehab Al-Shaer, Saeed Al-Haj FlowChecker: configuration analysis and verification of federated openflow infrastructures. Search on Bibsonomy SafeConfig The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Palanivel A. Kodeswaran, Anupam Joshi, Timothy W. Finin, Filip Perich A declarative approach for secure and robust routing. Search on Bibsonomy SafeConfig The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Hongxin Hu, Gail-Joon Ahn, Ketan Kulkarni FAME: a firewall anomaly management environment. Search on Bibsonomy SafeConfig The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Sunil Kumar Ghai, Prateek Nigam, Ponnurangam Kumaraguru Cue: a framework for generating meaningful feedback in XACML. Search on Bibsonomy SafeConfig The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Saman A. Zonouz, Kaustubh R. Joshi, William H. Sanders Cost-aware systemwide intrusion defense via online forensics and on-demand detector deployment. Search on Bibsonomy SafeConfig The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Fahimeh Raja, Kirstie Hawkey, Pooya Jaferian, Konstantin Beznosov, Kellogg S. Booth It's too complicated, so i turned it off!: expectations, perceptions, and misconceptions of personal firewalls. Search on Bibsonomy SafeConfig The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1William M. Fitzgerald, Simon N. Foley Management of heterogeneous security access control configuration using an ontology engineering approach. Search on Bibsonomy SafeConfig The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Tony Sager, Gail-Joon Ahn, Krishna Kant 0001, Heather Richter Lipford (eds.) 3rd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig 2010, Chicago, IL, USA, October 4, 2010 Search on Bibsonomy SafeConfig The full citation details ... 2010 DBLP  BibTeX  RDF
1Robert Craven, Jorge Lobo 0001, Emil Lupu, Alessandra Russo, Morris Sloman Security policy refinement using data integration: a position paper. Search on Bibsonomy SafeConfig The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Hamed Okhravi, Ryan H. Kagin, David M. Nicol PolicyGlobe: a framework for integrating network and operating system security policies. Search on Bibsonomy SafeConfig The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Md. Endadul Hoque, Farzana Rahman, Sheikh Iqbal Ahamed, Lin Liu 0001 Trust based security auto-configuration for smart assisted living environments. Search on Bibsonomy SafeConfig The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jason Watson, Michael Whitney, Heather Richter Lipford Configuring audience-oriented privacy policies. Search on Bibsonomy SafeConfig The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Mohammad Tanviruzzaman, Sheikh Iqbal Ahamed, Chowdhury Sharif Hasan, Casey O'Brien ePet: when cellular phone learns to recognize its owner. Search on Bibsonomy SafeConfig The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Mirko Montanari, Roy H. Campbell Multi-aspect security configuration assessment. Search on Bibsonomy SafeConfig The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ehab Al-Shaer, Mohamed G. Gouda, Jorge Lobo 0001, Sanjai Narain, Felix Wu (eds.) Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009 Search on Bibsonomy SafeConfig The full citation details ... 2009 DBLP  BibTeX  RDF
1Alwyn Goodloe, Carl A. Gunter Completeness of discovery protocols. Search on Bibsonomy SafeConfig The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Taghrid Samak, Adel El-Atawy, Ehab Al-Shaer Towards network security policy generation for configuration analysis and testing. Search on Bibsonomy SafeConfig The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Andreas Voellmy Proof of an interdomain policy: a load-balancing multi-homed network. Search on Bibsonomy SafeConfig The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Sunil Krothapalli, Xin Sun 0002, Yu-Wei Eric Sung, Suan Aik Yeo, Sanjay G. Rao A toolkit for automating and visualizing VLAN configuration. Search on Bibsonomy SafeConfig The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Anitra Babic, Huijun Xiong, Danfeng Yao, Liviu Iftode Building robust authentication systems with activity-based personal questions. Search on Bibsonomy SafeConfig The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #64 of 64 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license