The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Misuse with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1969-1989 (15) 1990-1996 (19) 1997-1998 (16) 1999 (16) 2000 (17) 2001 (17) 2002 (25) 2003 (36) 2004 (44) 2005 (74) 2006 (74) 2007 (68) 2008 (76) 2009 (56) 2010 (19) 2011 (23) 2012 (24) 2013-2014 (36) 2015 (19) 2016 (22) 2017 (25) 2018 (30) 2019 (44) 2020 (50) 2021 (34) 2022 (48) 2023 (47) 2024 (9)
Publication types (Num. hits)
article(316) incollection(5) inproceedings(651) phdthesis(10) proceedings(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 605 occurrences of 378 keywords

Results
Found 983 publication records. Showing 983 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
20Neil B. Harrison, John H. Meiners The dynamics of changing dynamic memory allocation in a large-scale C++ application. Search on Bibsonomy OOPSLA Companion The full citation details ... 2006 DBLP  DOI  BibTeX  RDF curiously recurring template pattern, memory management, templates
20Marco Domenico Aime, Giorgio Calandriello, Antonio Lioy A Wireless Distributed Intrusion Detection System and a New Attack Model. Search on Bibsonomy ISCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Hyung-Woo Lee Lightweight Wireless Intrusion Detection Systems Against DDoS Attack. Search on Bibsonomy ICCSA (5) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Gil-Han Kim, Hyung-Woo Lee SVM Based False Alarm Minimization Scheme on Intrusion Prevention System. Search on Bibsonomy ICCSA (5) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Intrusion Detection/Prevention, Network Security.1, False Alarm, Multi-class SVM
20Qiang Duan, Chenyi Hu, Han-Chieh Wei Enhancing network intrusion detection systems with interval methods. Search on Bibsonomy SAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF intrusion detection, network control, interval method
20Giovanni Vigna, William K. Robertson, Davide Balzarotti Testing network-based intrusion detection signatures using mutant exploits. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF intrusion detection, security testing, quality metrics
20Peter T. Breuer, Marisol García-Valls Static Deadlock Detection in the Linux Kernel. Search on Bibsonomy Ada-Europe The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Christopher Krügel, Giovanni Vigna Anomaly detection of web-based attacks. Search on Bibsonomy CCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF world-wide web, network security, anomaly detection
20Ruo Ando, Yoshiyasu Takefuji Two-Stage Orthogonal Network Incident Detection for the Adaptive Coordination with SMTP Proxy. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Shambhu J. Upadhyaya Real-Time Intrusion Detection with Emphasis on Insider Attacks. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Ulf Lindqvist, Phillip A. Porras eXpert-BSM: A Host-Based Intrusion Detection Solution for Sun Solaris. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
20Louise Giovane Becker A national perspective on computer security. Search on Bibsonomy ACM Annual Conference The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
19Michael Netter, Eduardo B. Fernández, Günther Pernul Refining the Pattern-Based Reference Model for Electronic Invoices by Incorporating Threats. Search on Bibsonomy ARES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF electronic invoice, misuse activities, threat identification, security patterns
19Sebastian Schmerl, Michael Vogel, René Rietz, Hartmut König Explorative Visualization of Log Data to Support Forensic Analysis and Signature Development. Search on Bibsonomy SADFE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Audit Data Analysis, Attack Signatures, Intrusion Detection, Computer Security, Data Visualization, Computer Forensic, Misuse Detection
19Simona Bernardi 0001, José Merseguer, Robyn R. Lutz Reliability and Availability Requirements Engineering within the Unified Process Using a Dependability Analysis and Modeling Profile. Search on Bibsonomy EDCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF reliability and availability requirements, Unified Modeling Language profile, Unified Process, misuse cases, fault trees
19Alana Platt, Saket S. R. Mengle, Nazli Goharian Improving classification based off-topic search detection via category relationships. Search on Bibsonomy SAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF insider misuse, need-to-know, ontology, user profiles
19Daisuke Mashima, Mustaque Ahamad Using identity credential usage logs to detect anomalous service accesses. Search on Bibsonomy Digital Identity Management The full citation details ... 2009 DBLP  DOI  BibTeX  RDF identity theft and misuse detection, online access log monitoring, risk scoring
19Alana Platt, Nazli Goharian, Saket S. R. Mengle On using user query sequence to detect off-topic search. Search on Bibsonomy SAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF clustering, time series, false alarms, misuse detection
19Vera Marinova-Boncheva Applying a data mining method for intrusion detection. Search on Bibsonomy CompSysTech The full citation details ... 2007 DBLP  DOI  BibTeX  RDF data mining, classification tree, misuse detection
19Ali Borji Combining Heterogeneous Classifiers for Network Intrusion Detection. Search on Bibsonomy ASIAN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Intrusion Detection, PCA, Anomaly Detection, Combined Classifiers, Misuse Detection
19Marcus A. Maloof, Gregory D. Stephens elicit: A System for Detecting Insiders Who Violate Need-to-Know. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF anomaly detection, insider threat, misuse
19Brian A. Pashel Teaching students to hack: ethical implications in teaching students to hack at the university level. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF ethical hacking, student misuse, teaching hacking, hacking
19Ren Hui Gong, Mohammad Zulkernine, Purang Abolmaesumi A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection. Search on Bibsonomy SNPD The full citation details ... 2005 DBLP  DOI  BibTeX  RDF misuse intrusion detection, support-confidence framework, genetic algorithms, software development, Information assurance
19Denis Verdon, Gary McGraw Risk Analysis in Software Design. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF abuse cases, software development, software design, misuse cases
19Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang Abstraction-based intrusion detection in distributed environments. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF intrusion detection, heterogeneous systems, Cooperative information systems, misuse detection
19Ho-Yen Chang, Shyhtsun Felix Wu, Y. Frank Jou Real-time protocol analysis for detecting link-state routing protocol attacks. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF OSPF attacks, knowledge-based IDS, link-state routing protocol security, real-time misuse intrusion detection, real-time network protocol analysis, timed finite state machine, event correlation
19Shiuh-Pyng Shieh, Virgil D. Gligor On a Pattern-Oriented Model for Intrusion Detection. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Access misuse, audit analysis, context-dependent intrusion, operational security problems, rule-based methods, intrusion detection, statistical methods, secure systems
16Yan Pang, Yang Zhang, Tianhao Wang 0001 VGMShield: Mitigating Misuse of Video Generative Models. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Zheyuan Zhang, Zehong Wang, Shifu Hou, Evan Hall, Landon Bachman, Vincent Galassi, Jasmine White, Nitesh V. Chawla, Chuxu Zhang, Yanfang Ye 0001 Diet-ODIN: A Novel Framework for Opioid Misuse Detection with Interpretable Dietary Patterns. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Lukas Pöhler, Valentin Schrader, Alexander Ladwein, Florian von Keller A Technological Perspective on Misuse of Available AI. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Mustafa Khairallah Fast Parallelizable Misuse-Resistant Authenticated Encryption: Low Latency (Decryption-Fast) SIV. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
16Nandita Quaderi The misuse of bibliometrics in research assessment infrastructures. Search on Bibsonomy Inf. Serv. Use The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Jaeun Choi, Byunghwan Jeon, Chunmi Jeon Scalable Learning Framework for Detecting New Types of Twitter Spam with Misuse and Anomaly Detection. Search on Bibsonomy Sensors The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Michael P. Rogers, Hannah Miller Hillberg, Christopher L. Groves Attitudes Towards the Use (and Misuse) of ChatGPT: A Preliminary Study. Search on Bibsonomy SIGCSE (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Mingyuan Huang, Jiachi Chen, Zigui Jiang, Zibin Zheng Revealing Hidden Threats: An Empirical Study of Library Misuse in Smart Contracts. Search on Bibsonomy ICSE The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Mohamed Aly Amin, Adnan Harun Dogan, Elif Sena Kuru, Yigit Sever, Pelin Angin Misuse Detection and Response for Orchestrated Microservices Based Software. Search on Bibsonomy AINA (6) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Akiko Inoue, Chun Guo 0002, Kazuhiko Minematsu Nonce-misuse resilience of Romulus-N and GIFT-COFB. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Mohamed El-Attar 0001 Evaluating the accessibility of a PoN-enabled misuse case notation by the red-green colorblind community. Search on Bibsonomy Softw. Syst. Model. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Donghoon Chang, Deukjo Hong, Jinkeon Kang, Meltem Sönmez Turan Resistance of Ascon Family Against Conditional Cube Attacks in Nonce-Misuse Setting. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Le Quang Thao, Nguyen Duy Thien, Ngo Chi Bach, Duong Duc Cuong, Le Duc Anh, Dang Gia Khanh, Nguyen Ha Minh Hieu, Nguyen Trieu Hoang Minh PesViT: a deep learning approach for detecting misuse of pesticides on farm. Search on Bibsonomy J. Supercomput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Abdul Haq, William H. Woodall A misuse of the EWMA-type statistic in acceptance sampling applications. Search on Bibsonomy Qual. Reliab. Eng. Int. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Mana Azamat, Johann Schütz, Mathias Uslar Use cases also exist for attackers - how to foster the concept of misuse cases. Search on Bibsonomy Elektrotech. Informationstechnik The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Carrie K. Grouse, Maggie W. Waung, A Jay Holmgren, John Mongan, Aaron B. Neinstein, S. Andrew Josephson, Raman R. Khanna Behavioral "nudges" in the electronic health record to reduce waste and misuse: 3 interventions. Search on Bibsonomy J. Am. Medical Informatics Assoc. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Xiaoxue Ren, Xinyuan Ye, Dehai Zhao, Zhenchang Xing, Xiaohu Yang 0001 From Misuse to Mastery: Enhancing Code Generation with Knowledge-Driven AI Chaining. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Amit Seal Ami, Syed Yusuf Ahmed, Radowan Mahmud Redoy, Nathan Cooper, Kaushal Kafle, Kevin Moran, Denys Poshyvanyk, Adwait Nadkarni MASC: A Tool for Mutation-Based Evaluation of Static Crypto-API Misuse Detectors. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Jiyan He, Weitao Feng, Yaosen Min, Jingwei Yi, Kunsheng Tang, Shuai Li, Jie Zhang, Kejiang Chen, Wenbo Zhou, Xing Xie 0001, Weiming Zhang 0001, Nenghai Yu, Shuxin Zheng Control Risk for Potential Misuse of Artificial Intelligence in Science. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Khalid Al-hammuri, Fayez Gebali, Awos Kanan ZTCloudGuard: Zero Trust Context-Aware Access Management Framework to Avoid Misuse Cases in the Era of Generative AI and Cloud-based Health Information Ecosystem. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Xing Wang The misuse of the nonlinear field normalization method: Nonlinear field normalization citation counts at the paper level cannot be added or averaged. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Kweku Kwegyir-Aggrey, Marissa Gerchick, Malika Mohan, Aaron Horowitz, Suresh Venkatasubramanian The Misuse of AUC: What High Impact Risk Assessment Gets Wrong. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Markus Anderljung, Julian Hazell Protecting Society from AI Misuse: When are Restrictions on Capabilities Warranted? Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Bang Wu, He Zhang 0012, Xiangwen Yang, Shuo Wang, Minhui Xue, Shirui Pan, Xingliang Yuan GraphGuard: Detecting and Counteracting Training Data Misuse in Graph Neural Networks. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Chenghao Yang, Tuhin Chakrabarty, Karli R. Hochstatter, Melissa N. Slavin, Nabila El-Bassel, Smaranda Muresan Identifying Self-Disclosures of Use, Misuse and Addiction in Community-based Social Media Posts. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Oscar Karnalim, Hapnes Toba, Meliana Christianti Johan, Erico Darmawan Handoyo, Yehezkiel David Setiawan, Josephine Alvina Luwia Plagiarism and AI Assistance Misuse in Web Programming: Unfair Benefits and Characteristics. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Hapnes Toba, Oscar Karnalim, Meliana Christianti Johan, Terutoshi Tada, Yenni Merlin Djajalaksana, Tristan Vivaldy Inappropriate Benefits and Identification of ChatGPT Misuse in Programming Tests: A Controlled Experiment. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Jonas B. Sandbrink Artificial intelligence and biological misuse: Differentiating risks of language models and biological design tools. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Minzhao Lyu, Hassan Habibi Gharakheili, Vijay Sivaraman A Survey on DNS Encryption: Current Development, Malware Misuse, and Inference Techniques. Search on Bibsonomy ACM Comput. Surv. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Alberto Blanco-Justicia, David Sánchez 0001, Josep Domingo-Ferrer, Krishnamurty Muralidhar A Critical Review on the Use (and Misuse) of Differential Privacy in Machine Learning. Search on Bibsonomy ACM Comput. Surv. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Nitish A, Hanumanthappa J, S. P. Shiva Prakash, Kirill Krinkin On-device context-aware misuse detection framework for heterogeneous IoT edge. Search on Bibsonomy Appl. Intell. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Vincent Meyers, Dennis R. E. Gnad, Nguyen Minh Dang, Falk Schellenberg, Amir Moradi 0001, Mehdi B. Tahoori Stealthy Logic Misuse for Power Analysis Attacks in Multi-Tenant FPGAs (Extended Version). Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
16Xincheng He, Xiaojin Liu 0005, Lei Xu 0003 Python API Misuse Mining and Classification Based on Hybrid Analysis and Attention Mechanism. Search on Bibsonomy Int. J. Softw. Eng. Knowl. Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Jozef Drga, Ivan Homoliak, Juraj Vanco, Athanasios Vasilakos, Martin Peresíni, Petr Hanácek Detecting and Preventing Credential Misuse in OTP-Based Two and Half Factor Authentication Toward Centralized Services Utilizing Blockchain-Based Identity Management. Search on Bibsonomy ICBC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Vitaly Romanov, Gcinizwe Dlamini, Aidar Valeev, Vladimir Ivanov 0001 Leveraging Transformer and Graph Neural Networks for Variable Misuse Detection. Search on Bibsonomy ENASE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Guosheng Xu 0001, Xinyu Wang, Cheng Yu, Haoran Zhao, Yanhui Guo, Jinghong Guo, Chenyu Wang Research on Cryptographic Misuse Detection for Android Applications Based on Dynamic and Static Combination. Search on Bibsonomy AAIA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Cedric Richter, Jan Haltermann, Marie-Christine Jakobs, Felix Pauck, Stefan Schott, Heike Wehrheim Variable Misuse Detection: Software Developers versus Neural Bug Detectors. Search on Bibsonomy Software Engineering The full citation details ... 2023 DBLP  BibTeX  RDF
16Michael Schlichtig, Steffen Sassalla, Krishna Narasimhan, Eric Bodden Introducing FUM: A Framework for API Usage Constraint and Misuse Classification. Search on Bibsonomy Software Engineering The full citation details ... 2023 DBLP  BibTeX  RDF
16Gelareh Hasel Mehri, Inez L. Wester, Federica Paci, Nicola Zannone Mitigating Privilege Misuse in Access Control through Anomaly Detection. Search on Bibsonomy ARES The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Stefan Olafsson, Paola Pedrelli, Byron C. Wallace, Timothy W. Bickmore Accomodating User Expressivity while Maintaining Safety for a Virtual Alcohol Misuse Counselor. Search on Bibsonomy IVA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Sazzadur Rahaman, Miles Frantz, Barton P. Miller, Danfeng (Daphne) Yao SpanL: Creating Algorithms for Automatic API Misuse Detection with Program Analysis Compositions. Search on Bibsonomy ACNS Workshops The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Yuandao Cai, Peisen Yao, Chengfeng Ye, Charles Zhang Place Your Locks Well: Understanding and Detecting Lock Misuse Bugs. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2023 DBLP  BibTeX  RDF
16Amit Seal Ami, Syed Yusuf Ahmed, Radowan Mahmud Redoy, Nathan Cooper, Kaushal Kafle, Kevin Moran, Denys Poshyvanyk, Adwait Nadkarni MASC: A Tool for Mutation-Based Evaluation of Static Crypto-API Misuse Detectors. Search on Bibsonomy ESEC/SIGSOFT FSE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Shivangi Aneja, Chris Bregler, Matthias Nießner COSMOS: Catching Out-of-Context Image Misuse Using Self-Supervised Learning. Search on Bibsonomy AAAI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Michael Schwarz 0007, Julian Erhard, Vesal Vojdani, Simmo Saan, Helmut Seidl When Long Jumps Fall Short: Control-Flow Tracking and Misuse Detection for Non-local Jumps in C. Search on Bibsonomy SOAP@PLDI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Florian Draschbacher, Johannes Feichtner CryptoShield - Automatic On-Device Mitigation for Crypto API Misuse in Android Applications. Search on Bibsonomy AsiaCCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Deepak Panda, Piyush Basia, Kushal Nallavolu, Xin Zhong, Harvey P. Siy, Myoungkyu Song A Statistical Method for API Usage Learning and API Misuse Violation Finding. Search on Bibsonomy SERA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Xiaoxue Ren, Xinyuan Ye, Dehai Zhao, Zhenchang Xing, Xiaohu Yang 0001 From Misuse to Mastery: Enhancing Code Generation with Knowledge-Driven AI Chaining. Search on Bibsonomy ASE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Phoebe Moh, Pubali Datta, Noel Warford, Adam Bates 0001, Nathan Malkin, Michelle L. Mazurek Characterizing Everyday Misuse of Smart Home Devices. Search on Bibsonomy SP The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Xiaoke Wang, Lei Zhao APICAD: Augmenting API Misuse Detection through Specifications from Code and Documents. Search on Bibsonomy ICSE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Kweku Kwegyir-Aggrey, Marissa Gerchick, Malika Mohan, Aaron Horowitz, Suresh Venkatasubramanian The Misuse of AUC: What High Impact Risk Assessment Gets Wrong. Search on Bibsonomy FAccT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Mingcheng Liu, Zhifei Chen Dynamic Type Misuse Detection and Analysis for Python-Based Edge Device Applications. Search on Bibsonomy DASC/PiCom/CBDCom/CyberSciTech The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Oscar Karnalim, Erico Darmawan Handoyo, Hapnes Toba, Yehezkiel David Setiawan, Meliana Christianti Johan, Josephine Alvina Luwia Plagiarism and AI Assistance Misuse in Web Programming: Unfair Benefits and Characteristics. Search on Bibsonomy TALE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Yulin Wu, Zhiwu Xu 0001, Shengchao Qin Detecting API-Misuse Based on Pattern Mining via API Usage Graph with Parameters. Search on Bibsonomy TASE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Arfive Gandhi, Prati Hutari Gani Contributing Factors in Electronic Signature Misuse: A Case Study of Software Engineering Students. Search on Bibsonomy APIT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Bianca Albanese Optimal Child Restraint Design to Reduce the Propensity for Misuse. Search on Bibsonomy 2023   RDF
16Feng Xu, Carol Hsu 0001, Xin (Robert) Luo, Merrill Warkentin Reactions to Abusive Supervision: Neutralization and IS Misuse. Search on Bibsonomy J. Comput. Inf. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Abdulrahman Khalid Alnaim Misuse Patterns from the Threat of Modification of Non-Control Data in Network Function Virtualization. Search on Bibsonomy Future Internet The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16 Substance Misuse Decreases Heart Rate Variability. Search on Bibsonomy J. Sensors The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Pramitha Fernando, Keshawa Dadallage, Tharindu D. Gamage, Chatura Seneviratne, Arjuna Madanayake, Madhusanka Liyanage Proof of Sense: A Novel Consensus Mechanism for Spectrum Misuse Detection. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Anees Ahamed Kaleefathullah, Natasha Merat, Yee Mun Lee, Yke Bauke Eisma, Ruth Madigan, Jorge Garcia, Joost C. F. de Winter External Human-Machine Interfaces Can Be Misleading: An Examination of Trust Development and Misuse in a CAVE-Based Pedestrian Simulation Environment. Search on Bibsonomy Hum. Factors The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Hong Jin Kang, David Lo 0001 Active Learning of Discriminative Subgraph Patterns for API Misuse Detection. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Claudia P. Ayala, Burak Turhan, Xavier Franch, Natalia Juristo Use and Misuse of the Term "Experiment" in Mining Software Repositories Research. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Maxime Lamothe, Heng Li 0007, Weiyi Shang Assisting Example-Based API Misuse Detection via Complementary Artificial Examples. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Michael Schlichtig, Anna-Katharina Wickert, Stefan Krüger, Eric Bodden, Mira Mezini CamBench - Cryptographic API Misuse Detection Tool Benchmark Suite. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Reza Hadi Mogavi, Bingcan Guo, Yuanhao Zhang, Ehsan ul Haq, Pan Hui 0001, Xiaojuan Ma When Gamification Spoils Your Learning: A Qualitative Case Study of Gamification Misuse in a Language-Learning App. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Sinan Wang, Yibo Wang, Xian Zhan, Ying Wang 0038, Yepang Liu 0001, Xiapu Luo, Shing-Chi Cheung Aper: Evolution-Aware Runtime Permission Misuse Detection for Android Apps. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  BibTeX  RDF
16Alberto Blanco-Justicia, David Sánchez 0001, Josep Domingo-Ferrer, Krishnamurty Muralidhar A Critical Review on the Use (and Misuse) of Differential Privacy in Machine Learning. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Minzhao Lyu, Hassan Habibi Gharakheili, Vijay Sivaraman A Survey on DNS Encryption: Current Development, Malware Misuse, and Inference Techniques. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  BibTeX  RDF
16Sebastian Nielebock 0001, Paul Blockhaus, Jacob Krüger, Frank Ortmeier Automated Change Rule Inference for Distance-Based API Misuse Detection. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Jozef Drga, Ivan Homoliak, Juraj Vanco, Martin Peresíni, Petr Hanácek Detecting and Preventing Credential Misuse in OTP-Based Two and Half Factor Authentication Toward Centralized Services Utilizing Blockchain-Based Identity Management. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Hong Jin Kang, David Lo 0001 Active Learning of Discriminative Subgraph Patterns for API Misuse Detection. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Jeff Calder, Reed Coil, Annie Melton, Peter J. Olver, Gilbert Tostevin, Katrina Yezzi-Woodley Use and Misuse of Machine Learning in Anthropology. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 983 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license