The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "FPS"( http://dblp.L3S.de/Venues/FPS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/fps

Publication years (Num. hits)
2011 (20) 2012 (26) 2013 (27) 2014 (26) 2015 (23) 2016 (24) 2017 (21) 2018 (21) 2019 (29) 2020-2021 (41) 2022 (30) 2023 (1)
Publication types (Num. hits)
inproceedings(277) proceedings(12)
Venues (Conferences, Journals, ...)
FPS(289)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 289 publication records. Showing 289 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Mohamad Mansouri, Beyza Bozdemir, Melek Önen, Orhan Ermis PAC: Privacy-Preserving Arrhythmia Classification with Neural Networks. Search on Bibsonomy FPS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Antonio Nehme, Vitor Jesus, Khaled Mahbub, Ali E. Abdallah Fine-Grained Access Control for Microservices. Search on Bibsonomy FPS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mariana Segovia, Ana Rosa Cavalli, Nora Cuppens, Joaquín García-Alfaro A Study on Mitigation Techniques for SCADA-Driven Cyber-Physical Systems (Position Paper). Search on Bibsonomy FPS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Guang Gong Securing Internet-of-Things. Search on Bibsonomy FPS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sébanjila Kevin Bukasa, Ludovic Claudepierre, Ronan Lashermes, Jean-Louis Lanet When Fault Injection Collides with Hardware Complexity. Search on Bibsonomy FPS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1David Bissessar, Maryam Hezaveh, Fayzah Alshammari, Carlisle Adams Mobile Travel Credentials. Search on Bibsonomy FPS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Erick Eduardo Bernal Martinez, Bella Oh, Feng Li 0001, Xiao Luo 0002 Evading Deep Neural Network and Random Forest Classifiers by Generating Adversarial Samples. Search on Bibsonomy FPS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Luigi Logrippo, Abdelouadoud Stambouli Configuring Data Flows in the Internet of Things for Security and Privacy Requirements. Search on Bibsonomy FPS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Onur Duman, Amr M. Youssef Fault Analysis of the New Ukrainian Hash Function Standard: Kupyna. Search on Bibsonomy FPS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Xavier Bultel, Radu Ciucanu, Matthieu Giraud, Pascal Lafourcade 0001, Lihua Ye Secure Joins with MapReduce. Search on Bibsonomy FPS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Abdessamad Imine, José M. Fernandez 0001, Jean-Yves Marion, Luigi Logrippo, Joaquín García-Alfaro (eds.) Foundations and Practice of Security - 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers Search on Bibsonomy FPS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Léopold Ouairy, Hélène Le Bouder, Jean-Louis Lanet Protection of Systems Against Fuzzing Attacks. Search on Bibsonomy FPS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yuri Gil Dantas, Tobias Hamann, Heiko Mantel A Comparative Study Across Static and Dynamic Side-Channel Countermeasures. Search on Bibsonomy FPS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Thang Bui, Scott D. Stoller, Jiajie Li Mining Relationship-Based Access Control Policies from Incomplete and Noisy Data. Search on Bibsonomy FPS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Aniss Chohra, Mourad Debbabi, Paria Shirani Daedalus: Network Anomaly Detection on IDS Stream Logs. Search on Bibsonomy FPS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Tahir Ahmad, Silvio Ranise Validating Requirements of Access Control for Cloud-Edge IoT Solutions (Short Paper). Search on Bibsonomy FPS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Vignesh M. Pagadala, Indrakshi Ray Achieving Mobile-Health Privacy Using Attribute-Based Access Control. Search on Bibsonomy FPS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hibiki Ono, Yoshifumi Manabe Card-Based Cryptographic Protocols with the Minimum Number of Cards Using Private Operations. Search on Bibsonomy FPS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Tobias Hamann, Heiko Mantel Decentralized Dynamic Security Enforcement for Mobile Applications with CliSeAuDroid. Search on Bibsonomy FPS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sébastien Gambs Privacy and Ethical Challenges in Big Data. Search on Bibsonomy FPS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Giovanni Di Crescenzo Cryptographic Formula Obfuscation. Search on Bibsonomy FPS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Suryadipta Majumdar, Taous Madi, Yosr Jarraya, Makan Pourzandi, Lingyu Wang 0001, Mourad Debbabi Cloud Security Auditing: Major Approaches and Existing Challenges. Search on Bibsonomy FPS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Maxime Puys, Marie-Laure Potet, Abdelaziz Khaled Generation of Applicative Attacks Scenarios Against Industrial Systems. Search on Bibsonomy FPS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Elliott Blot, Jannik Dreier, Pascal Lafourcade 0001 Formal Analysis of Combinations of Secure Protocols. Search on Bibsonomy FPS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Alexey Rabin, Ehud Gudes Secure Protocol of ABAC Certificates Revocation and Delegation. Search on Bibsonomy FPS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Konrad-Felix Krentz, Christoph Meinel, Hendrik Graupner More Lightweight, yet Stronger 802.15.4 Security Through an Intra-layer Optimization. Search on Bibsonomy FPS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Shujie Cui, Muhammad Rizwan Asghar, Steven D. Galbraith, Giovanni Russello ObliviousDB: Practical and Efficient Searchable Encryption with Controllable Leakage. Search on Bibsonomy FPS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sunny Raj, Laura Pullum, Arvind Ramanathan, Sumit Kumar Jha 0001 SATYA : Defending Against Adversarial Attacks Using Statistical Hypothesis Testing. Search on Bibsonomy FPS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Johannes Blömer, Peter Günther 0001, Volker Krummel, Nils Löken Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations. Search on Bibsonomy FPS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Harry Halpin A Roadmap for High Assurance Cryptography. Search on Bibsonomy FPS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Gustavo Gonzalez Granadillo, Elena Doynikova, Igor V. Kotenko, Joaquín García-Alfaro Attack Graph-Based Countermeasure Selection Using a Stateful Return on Investment Metric. Search on Bibsonomy FPS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Khalid Shahbar, Nur Zincir-Heywood Weighted Factors for Evaluating Anonymity. Search on Bibsonomy FPS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Richard Gay, Jinwei Hu, Heiko Mantel, Sogol Mazaheri Relationship-Based Access Control for Resharing in Decentralized Online Social Networks. Search on Bibsonomy FPS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sergei Tikhomirov Ethereum: State of Knowledge and Research Perspectives. Search on Bibsonomy FPS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mohamed Recem Boussaha, Raphaël Khoury, Sylvain Hallé Monitoring of Security Properties Using BeepBeep. Search on Bibsonomy FPS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Nina Bindel, Johannes Buchmann 0001, Juliane Krämer, Heiko Mantel, Johannes Schickel, Alexandra Weber Bounding the Cache-Side-Channel Leakage of Lattice-Based Signature Schemes Using Program Semantics. Search on Bibsonomy FPS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Alberto Ferrante, Miroslaw Malek, Fabio Martinelli, Francesco Mercaldo, Jelena Milosevic Extinguishing Ransomware - A Hybrid Approach to Android Ransomware Detection. Search on Bibsonomy FPS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Daniel Fraunholz, Christoph Lipps, Marc Zimmermann, Simon Duque Antón, Johannes Karl Martin Mueller, Hans Dieter Schotten Deception in Information Security: Legal Considerations in the Context of German and European Law. Search on Bibsonomy FPS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Tushar Kanti Saha, Takeshi Koshiba Privacy-Preserving Equality Test Towards Big Data. Search on Bibsonomy FPS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Luigi Logrippo Multi-level Access Control, Directed Graphs and Partial Orders in Flow Control for Data Secrecy and Privacy. Search on Bibsonomy FPS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Olivier Pereira, Florentin Rochet, Cyrille Wiedling Formal Analysis of the FIDO 1.x Protocol. Search on Bibsonomy FPS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Frédéric Cuppens, Lingyu Wang 0001, Nora Cuppens-Boulahia, Nadia Tawbi, Joaquín García-Alfaro (eds.) Foundations and Practice of Security - 9th International Symposium, FPS 2016, Québec City, QC, Canada, October 24-25, 2016, Revised Selected Papers Search on Bibsonomy FPS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Julio Navarro, Véronique Legrand, Sofiane Lagraa, Jérôme François, Abdelkader Lahmadi, Giulia De Santis, Olivier Festor, Nadira Lammari, Fayçal Hamdi 0001, Aline Deruyver, Quentin Goux, Morgan Allard, Pierre Parrend HuMa: A Multi-layer Framework for Threat Analysis in a Heterogeneous Log Environment. Search on Bibsonomy FPS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Raphaël Khoury, Sébastien Gaboury, Sylvain Hallé Three Views of Log Trace Triaging. Search on Bibsonomy FPS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Zhongtian Chen, Hao Han Attack Mitigation by Data Structure Randomization. Search on Bibsonomy FPS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Guillaume Bonfante, Julien Oury Nogues Function Classification for the Retro-Engineering of Malwares. Search on Bibsonomy FPS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Tushar Kanti Saha, Takeshi Koshiba An Enhancement of Privacy-Preserving Wildcards Pattern Matching. Search on Bibsonomy FPS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mina Sheikhalishahi, Mohamed Mejri, Nadia Tawbi, Fabio Martinelli Privacy-Aware Data Sharing in a Tree-Based Categorical Clustering Algorithm. Search on Bibsonomy FPS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Salaheddine Zerkane, David Espes, Philippe Le Parc, Frédéric Cuppens Vulnerability Analysis of Software Defined Networking. Search on Bibsonomy FPS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Andrew Bedford, Sébastien Garvin, Josée Desharnais, Nadia Tawbi, Hana Ajakan, Frédéric Audet, Bernard Lebel Andrana: Quick and Accurate Malware Detection for Android. Search on Bibsonomy FPS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Olivier Blazy, Xavier Bultel, Pascal Lafourcade 0001 Anonymizable Ring Signature Without Pairing. Search on Bibsonomy FPS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Tarek Bouyahia, Nora Cuppens-Boulahia, Frédéric Cuppens, Fabien Autrel Multi-Criteria Recommender Approach for Supporting Intrusion Response System. Search on Bibsonomy FPS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mickael Emirkanian-Bouchard, Lingyu Wang 0001 Towards Metric-Driven, Application-Specific Visualization of Attack Graphs. Search on Bibsonomy FPS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Hélène Le Bouder, Ronan Lashermes, Yanis Linge, Gaël Thomas 0002, Jean-Yves Zie A Multi-round Side Channel Attack on AES Using Belief Propagation. Search on Bibsonomy FPS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Nadine Herold, Matthias Wachs, Stephan-Alexander Posselt, Georg Carle An Optimal Metric-Aware Response Selection Strategy for Intrusion Response Systems. Search on Bibsonomy FPS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Lyes Bayou, David Espes, Nora Cuppens-Boulahia, Frédéric Cuppens Security Analysis of WirelessHART Communication Scheme. Search on Bibsonomy FPS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sofiene Boulares, Kamel Adi, Luigi Logrippo Insider Threat Likelihood Assessment for Access Control Systems: Quantitative Approach. Search on Bibsonomy FPS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Richard E. Harang, Peter Mell Micro-signatures: The Effectiveness of Known Bad N-Grams for Network Anomaly Detection. Search on Bibsonomy FPS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Joaquín García-Alfaro, Evangelos Kranakis, Guillaume Bonfante (eds.) Foundations and Practice of Security - 8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papers Search on Bibsonomy FPS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Nawaf Alhebaishi, Lingyu Wang 0001, Sushil Jajodia, Anoop Singhal Threat Modeling for Cloud Data Center Infrastructures. Search on Bibsonomy FPS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Deepak Subramanian, Guillaume Hiet, Christophe Bidan A Self-correcting Information Flow Control Model for the Web-Browser. Search on Bibsonomy FPS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Daniel Servos, Sylvia L. Osborn Strategies for Incorporating Delegation into Attribute-Based Access Control (ABAC). Search on Bibsonomy FPS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Antonio La Marra, Fabio Martinelli, Andrea Saracino, Mina Sheikhalishahi MalProfiler: Automatic and Effective Classification of Android Malicious Apps in Behavioral Classes. Search on Bibsonomy FPS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Oscar M. Guillen, Fabrizio De Santis, Ralf Brederlow, Georg Sigl Towards Side-Channel Secure Firmware Updates - A Minimalist Anomaly Detection Approach. Search on Bibsonomy FPS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Erkan Ersan, Lior Malka, Bruce M. Kapron Semantically Non-preserving Transformations for Antivirus Evaluation. Search on Bibsonomy FPS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jurek Czyzowicz, Adrian Kosowski, Evangelos Kranakis, Najmeh Taleb Patrolling Trees with Mobile Robots. Search on Bibsonomy FPS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Saed Alrabaee, Paria Shirani, Mourad Debbabi, Lingyu Wang 0001 On the Feasibility of Malware Authorship Attribution. Search on Bibsonomy FPS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Guangye Sui, Mohamed Mejri Security Enforcement by Rewriting: An Algebraic Approach. Search on Bibsonomy FPS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Pascal Lafourcade 0001, Maxime Puys Performance Evaluations of Cryptographic Protocols Verification Tools Dealing with Algebraic Properties. Search on Bibsonomy FPS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Pascal Bissig, Philipp Brandes, Jonas Passerini, Roger Wattenhofer Inferring Touch from Motion in Real World Data. Search on Bibsonomy FPS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Minh Hai Nguyen, Mizuhito Ogawa, Quan Thanh Tho Obfuscation Code Localization Based on CFG Generation of Malware. Search on Bibsonomy FPS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Meriam Ben-Ghorbel-Talbi, François Lesueur, Gaetan Perrin Information Flow Control on a Multi-paradigm Web Application for SQL Injection Prevention. Search on Bibsonomy FPS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Evangelos Kranakis, Danny Krizanc Optimization Problems in Infrastructure Security. Search on Bibsonomy FPS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Sylvain Hallé, Raphaël Khoury Runtime Monitoring of Stream Logic Formulae. Search on Bibsonomy FPS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mina Sheikhalishahi, Andrea Saracino, Mohamed Mejri, Nadia Tawbi, Fabio Martinelli Fast and Effective Clustering of Spam Emails Based on Structural Similarity. Search on Bibsonomy FPS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Tim Waage, Ramaninder Singh Jhajj, Lena Wiese Searchable Encryption in Apache Cassandra. Search on Bibsonomy FPS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Toomas Krips, Jan Willemson Point-Counting Method for Embarrassingly Parallel Evaluation in Secure Computation. Search on Bibsonomy FPS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Adrian Antunez-Veas, Guillermo Navarro-Arribas Onion Routing in Deterministic Delay Tolerant Networks. Search on Bibsonomy FPS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1François Gagnon, Marc-Antoine Ferland, Marc-Antoine Fortier, Simon Desloges, Jonathan Ouellet, Catherine Boileau AndroSSL: A Platform to Test Android Applications Connection Security. Search on Bibsonomy FPS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Paolo Modesti AnBx: Automatic Generation and Verification of Security Protocols Implementations. Search on Bibsonomy FPS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Frédéric Cuppens, Joaquín García-Alfaro, Nur Zincir-Heywood, Philip W. L. Fong (eds.) Foundations and Practice of Security - 7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers Search on Bibsonomy FPS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Fariba Haddadi, Nur Zincir-Heywood A Closer Look at the HTTP and P2P Based Botnets from a Detector's Perspective. Search on Bibsonomy FPS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Geoffroy Couteau, Thomas Peters, David Pointcheval Secure Distributed Computation on Private Inputs. Search on Bibsonomy FPS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Agnès Brelurut, David Gérault, Pascal Lafourcade 0001 Survey of Distance Bounding Protocols and Threats. Search on Bibsonomy FPS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Raphaël Khoury, Sylvain Hallé Runtime Enforcement with Partial Control. Search on Bibsonomy FPS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Anis Bkakria, Frédéric Cuppens, Nora Cuppens-Boulahia, David Gross-Amblard Security Mechanisms Planning to Enforce Security Policies. Search on Bibsonomy FPS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Masaya Yasuda, Takeshi Shimoyama, Narishige Abe, Shigefumi Yamada, Takashi Shinzaki, Takeshi Koshiba Privacy-Preserving Fuzzy Commitment for Biometrics via Layered Error-Correcting Codes. Search on Bibsonomy FPS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Fabio Bellini, Roberto Chiodi, Isabella Mastroeni MIME: A Formal Approach to (Android) Emulation Malware Analysis. Search on Bibsonomy FPS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Rabih Mohsen, Alexandre Miranda Pinto Evaluating Obfuscation Security: A Quantitative Approach. Search on Bibsonomy FPS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Erik Bergström, Rose-Mharie Åhlfeldt Information Classification Enablers. Search on Bibsonomy FPS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Brent Carrara, Carlisle Adams On Acoustic Covert Channels Between Air-Gapped Systems. Search on Bibsonomy FPS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Serguei A. Mokhov, Michael J. Assels, Joey Paquet, Mourad Debbabi Automating MAC Spoofer Evidence Gathering and Encoding for Investigations. Search on Bibsonomy FPS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Luigi Logrippo Logical Method for Reasoning About Access Control and Data Flow Control Models. Search on Bibsonomy FPS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Negar Mosharraf, Anura P. Jayasumana, Indrakshi Ray A Responsive Defense Mechanism Against DDoS Attacks. Search on Bibsonomy FPS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sachini S. Weerawardhana, Subhojeet Mukherjee, Indrajit Ray, Adele E. Howe Automated Extraction of Vulnerability Information for Home Computer Security. Search on Bibsonomy FPS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Daniel Servos, Sylvia L. Osborn HGABAC: Towards a Formal Model of Hierarchical Attribute-Based Access Control. Search on Bibsonomy FPS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Myria Bouhaddi, Mohammed Said Radjef, Kamel Adi A Game Approach for an Efficient Intrusion Detection System in Mobile Ad Hoc Networks. Search on Bibsonomy FPS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. Cavalli Detection of Illegal Control Flow in Android System: Protecting Private Data Used by Smartphone Apps. Search on Bibsonomy FPS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Fabio Martinelli, Francesco Santini 0001 Debating Cybersecurity or Securing a Debate? - (Position Paper). Search on Bibsonomy FPS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Diego A. Ortiz-Yepes Optimizing TLS for Low Bandwidth Environments. Search on Bibsonomy FPS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 289 (100 per page; Change: )
Pages: [<<][1][2][3][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license