|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1717 occurrences of 1015 keywords
|
|
|
Results
Found 5607 publication records. Showing 5606 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
23 | Marie Kim, YoungJun Lee, Jaecheol Ryou 0001 |
What Are Possible Security Threats in Ubiquitous Sensor Network Environment? |
APNOMS |
2007 |
DBLP DOI BibTeX RDF |
middleware, security threat, USN |
23 | Stuart E. Schechter, Michael D. Smith 0001 |
How Much Security Is Enough to Stop a Thief?: The Economics of Outsider Theft via Computer Systems and Networks. |
Financial Cryptography |
2003 |
DBLP DOI BibTeX RDF |
Theft, Exploits, Threat Models, Security Economics |
23 | Stuart E. Schechter, Michael D. Smith 0001 |
Access for sale: a new class of worm. |
WORM |
2003 |
DBLP DOI BibTeX RDF |
security, cryptography, economics, incentives, worm, virus, threat modelling |
20 | Ganthan Narayana Samy, Rabiah Ahmad, Zuraini Ismail |
Threats to Health Information Security. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Geoffrey Smith 0001 |
On the Foundations of Quantitative Information Flow. |
FoSSaCS |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Yolanta Beres, Marco Casassa Mont, Jonathan Griffin, Simon Shiu |
Using security metrics coupled with predictive modeling and simulation to assess security processes. |
ESEM |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Steven Koepnick, Derek Norpchen, William R. Sherman, Daniel S. Coming |
Immersive Training for Two-Person Radiological Surveys. |
VR |
2009 |
DBLP DOI BibTeX RDF |
|
20 | S. P. Subasingha, J. Zhang, Kamal Premaratne, Mei-Ling Shyu, Miroslav Kubat, K. K. Rohitha Hewawasam |
Using Association Rules for Classification from Databases Having Class Label Ambiguities: A Belief Theoretic Method. |
Data Mining: Foundations and Practice |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Erik Buchanan, Ryan Roemer, Hovav Shacham, Stefan Savage |
When good instructions go bad: generalizing return-oriented programming to RISC. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
return-into-libc, return-oriented programming, RISC, SPARC |
20 | David Ahmad |
The Contemporary Software Security Landscape. |
IEEE Secur. Priv. |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Wenyan Wu 0002, Jinliang Gao, Ming Zhao, Zu Qian, X. Q. Hou, Y. Han |
Assessing and Optimizing Online Monitoring for Securing the Water Distribution System. |
ICNSC |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Cyril Onwubiko, Andrew P. Lenaghan |
Managing Security Threats and Vulnerabilities for Small to Medium Enterprises. |
ISI |
2007 |
DBLP DOI BibTeX RDF |
|
20 | P. J. Sandford, David J. Parish, Jonathan M. Sandford |
Detecting security threats in the network core using Data Mining techniques. |
NOMS |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Dong Hwi Lee, Kyong Ho Choi, Kuinam J. Kim, Sang Min Park |
Routing Information System and HOIDS for Detection Method of Vicious Attack in Large Networks. |
ISPA Workshops |
2006 |
DBLP DOI BibTeX RDF |
Vicious Attack, Early Warining, Routing Information, Intrusion Detection System |
20 | James S. Okolica, Gilbert L. Peterson, Robert F. Mills |
Using Author Topic to Detect Insider Threats from Email Traffic. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Martin R. Stytz |
Protecting Personal Privacy: Hauling Down the Jolly Roger. |
IEEE Secur. Priv. |
2005 |
DBLP DOI BibTeX RDF |
personal private information, Internet piracy |
20 | Elena Ivankina, Camille Salinesi |
Eliciting Requirements by Analysing Threats Caused by Users. |
SERA |
2005 |
DBLP DOI BibTeX RDF |
|
20 | David P. Forrai, James J. Maier |
Generic models in the advanced IRCM assessment model. |
WSC |
2001 |
DBLP DOI BibTeX RDF |
|
20 | Carmine A. Vaccarino, George Konomos |
Real-Time Simulation For Verification Of Tactical Electronic Warfare System. |
ACM Annual Conference (1) |
1978 |
DBLP DOI BibTeX RDF |
Electronic warfare, Operational flight program, Verification, Real-time simulation |
20 | Nanda Rani, Bikash Saha, Vikas Maurya, Sandeep Kumar Shukla |
TTPXHunter: Actionable Threat Intelligence Extraction as TTPs from Finished Cyber Threat Reports. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
20 | Siva Raja Sindiramutty |
Autonomous Threat Hunting: A Future Paradigm for AI-Driven Threat Intelligence. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
20 | Tongtong Jiang, Guowei Shen, Chun Guo 0004, Yunhe Cui, Bo Xie |
BFLS: Blockchain and Federated Learning for sharing threat detection models as Cyber Threat Intelligence. |
Comput. Networks |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Ángel Casanova Bienzobas, Alfonso Sánchez-Macián |
Threat Trekker: An Approach to Cyber Threat Hunting. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Adam Brian Turner, Stephen McCombie, Allon J. Uhlmann |
Ransomware-Bitcoin Threat Intelligence Sharing Using Structured Threat Information Expression. |
IEEE Secur. Priv. |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Jianli Xie, Wei (Wayne) Huang |
Security Goal Matters: Impact of Threat-Prevention and Threat-Detection Behavior on Security Outcomes. |
PACIS |
2023 |
DBLP BibTeX RDF |
|
20 | Kelsie Edie, Cole Mckee, Adam Duby |
Extending Threat Playbooks for Cyber Threat Intelligence: A Novel Approach for APT Attribution. |
ISDFS |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Cláudio Martins, Ibéria Medeiros |
Generating Quality Threat Intelligence Leveraging OSINT and a Cyber Threat Unified Taxonomy. |
ACM Trans. Priv. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Micah Ashford, James I. Watling, Kristen Hart |
One Shell of a Problem: Cumulative Threat Analysis of Male Sea Turtles Indicates High Anthropogenic Threat for Migratory Individuals and Gulf of Mexico Residents. |
Remote. Sens. |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Babu Pandipati, R. Praveen Sam |
Threat-Path Estimate-Based Watchword-Chunk Algorithm for Advanced Persistent Threat in the Cloud. |
Int. J. Web Serv. Res. |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Peng Gao 0008, Xiaoyuan Liu, Edward Choi, Sibo Ma, Xinyu Yang, Zhengjie Ji, Zilin Zhang, Dawn Song |
ThreatKG: A Threat Knowledge Graph for Automated Open-Source Cyber Threat Intelligence Gathering and Management. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Md. Rayhanur Rahman, Laurie A. Williams |
From Threat Reports to Continuous Threat Intelligence: A Comparison of Attack Technique Extraction Methods from Textual Artifacts. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Ala' Masarweh, Jaafer Al-Saraireh |
Threat led advanced persistent threat penetration test. |
Int. J. Secur. Networks |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Yizhe You, Jun Jiang, Zhengwei Jiang, Peian Yang, Baoxu Liu, Huamin Feng, Xuren Wang, Ning Li |
TIM: threat context-enhanced TTP intelligence mining on unstructured threat data. |
Cybersecur. |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Anne-Sophie Mayer, Franz Strich, Marina Fiedler |
Algorithmic Technologies as Threat to Who We Are: The Effect an IT Identity Threat has on Employees' Work Engagement. |
ICIS |
2022 |
DBLP BibTeX RDF |
|
20 | Nathan Deguara, Junaid Arshad, Anum Paracha, Muhammad Ajmal Azad |
Threat Miner - A Text Analysis Engine for Threat Identification Using Dark Web Data. |
IEEE Big Data |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Angela Horneman, Bob Ditmore, Craig Motell, Matthew Levy |
Predicting the Threat: Investigating Insider Threat Psychological Indicators With Deep Learning. |
HICSS |
2022 |
DBLP BibTeX RDF |
|
20 | Ananthapadmanabhan A, Krishnashree Achuthan |
Threat Modeling and Threat Intelligence System for Cloud using Splunk. |
ISDFS |
2022 |
DBLP DOI BibTeX RDF |
|
20 | François Labrèche, Serge-Olivier Paquette |
Threat Class Predictor: An explainable framework for predicting vulnerability threat using topic and trend modeling. |
CAMLIS |
2022 |
DBLP BibTeX RDF |
|
20 | Hsien-Long Huang, Li-Keng Cheng, Pi-Chuan Sun, Szu-Jung Chou |
The Effects of Perceived Identity Threat and Realistic Threat on the Negative Attitudes and Usage Intentions Toward Hotel Service Robots: The Moderating Effect of the Robot's Anthropomorphism. |
Int. J. Soc. Robotics |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Md. Rayhanur Rahman, Rezvan Mahdavi-Hezaveh, Laurie A. Williams |
What are the attackers doing now? Automating cyber threat intelligence extraction from text on pace with the changing threat landscape: A survey. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
20 | Vasileios Mavroeidis, Siri Bromander |
Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
20 | Vasileios Mavroeidis, Ryan Hohimer, Tim Casey, Audun Jøsang |
Threat Actor Type Inference and Characterization within Cyber Threat Intelligence. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
20 | Francesco Croce, Matthias Hein 0001 |
Adversarial robustness against multiple lp-threat models at the price of one and how to quickly fine-tune robust models to another threat model. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
20 | Huixia Zhang, Guowei Shen, Chun Guo 0004, Yunhe Cui, Chaohui Jiang |
EX-Action: Automatically Extracting Threat Actions from Cyber Threat Intelligence Report Based on Multimodal Learning. |
Secur. Commun. Networks |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Peng Gao 0008, Fei Shao, Xiaoyuan Liu, Xusheng Xiao, Zheng Qin, Fengyuan Xu, Prateek Mittal, Sanjeev R. Kulkarni, Dawn Song |
Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence. |
ICDE |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Dimitri Van Landuyt, Liliana Pasquale, Laurens Sion, Wouter Joosen |
Threat modeling at run time: the case for reflective and adaptive threat management (NIER track). |
SEAMS@ICSE |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Clemens Sauerwein, Daniel Fischer 0003, Milena Rubsamen, Guido Rosenberger, Dirk Stelzer, Ruth Breu |
From Threat Data to Actionable Intelligence: An Exploratory Analysis of the Intelligence Cycle Implementation in Cyber Threat Intelligence Sharing Platforms. |
ARES |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Erlend Bygdås, Lars Andreassen Jaatun, Stian Brekken Antonsen, Anders Ringen, Erlend Eiring |
Evaluating Threat Modeling Tools: Microsoft TMT versus OWASP Threat Dragon. |
CyberSA |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Vasileios Mavroeidis, Ryan Hohimer, Tim Casey, Audun Jøsang |
Threat Actor Type Inference and Characterization within Cyber Threat Intelligence. |
CyCon |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Peng Gao 0008, Fei Shao, Xiaoyuan Liu, Xusheng Xiao, Zheng Qin, Fengyuan Xu, Prateek Mittal, Sanjeev R. Kulkarni, Dawn Song |
Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
20 | Katie Paxton-Fear, Duncan Hodges, Oliver Buckley |
Understanding Insider Threat Attacks Using Natural Language Processing: Automatically Mapping Organic Narrative Reports to Existing Insider Threat Frameworks. |
HCI (30) |
2020 |
DBLP DOI BibTeX RDF |
|
20 | Andrew Fielder |
Modelling the Impact of Threat Intelligence on Advanced Persistent Threat Using Games. |
From Lambda Calculus to Cybersecurity Through Program Analysis |
2020 |
DBLP DOI BibTeX RDF |
|
20 | Rebecca Fribourg, Evan Blanpied, Ludovic Hoyet, Anatole Lécuyer, Ferran Argelaguet |
Influence of Threat Occurrence and Repeatability on the Sense of Embodiment and Threat Response in VR. |
ICAT-EGVE |
2020 |
DBLP DOI BibTeX RDF |
|
20 | Alma-Sophia Merscher, Matthias Gamer |
Freezing of Gaze in Anticipation of Avoidable Threat: A threat-specific proxy for freezing-like behavior in humans. |
ETRA Short Papers |
2020 |
DBLP DOI BibTeX RDF |
|
20 | Sara Boysen, Barbara Hewitt, David Gibbs, Alexander J. McLeod Jr. |
Refining the Threat Calculus of Technology Threat Avoidance Theory. |
Commun. Assoc. Inf. Syst. |
2019 |
DBLP BibTeX RDF |
|
20 | Daniel Qi Chen, Huigang Liang |
Wishful Thinking and IT Threat Avoidance: An Extension to the Technology Threat Avoidance Theory. |
IEEE Trans. Engineering Management |
2019 |
DBLP DOI BibTeX RDF |
|
20 | Ahuokpeme Chibueze Brendan, John McCarthy 0006 |
Taxonomy of Threat Categorization and Threat Intelligence Platform. |
ICGS3 |
2019 |
DBLP DOI BibTeX RDF |
|
20 | Peter Amthor 0001, Daniel Fischer 0003, Winfried E. Kühnhauser, Dirk Stelzer |
Automated Cyber Threat Sensing and Responding: Integrating Threat Intelligence into Security-Policy-Controlled Systems. |
ARES |
2019 |
DBLP DOI BibTeX RDF |
|
20 | Sonali Chandel, Mengdi Yan, Shaojun Chen, Huan Jiang, Tian-Yi Ni |
Threat Intelligence Sharing Community: A Countermeasure Against Advanced Persistent Threat. |
MIPR |
2019 |
DBLP DOI BibTeX RDF |
|
20 | Frank L. Greitzer, Justin Purl, D. E. Sunny Becker, Paul J. Sticha, Yung Mei Leong |
Modeling Expert Judgments of Insider Threat Using Ontology Structure: Effects of Individual Indicator Threat Value and Class Membership. |
HICSS |
2019 |
DBLP BibTeX RDF |
|
20 | Matthew Hull, Thaddeus Eze, Lee Speakman |
Policing The Cyber Threat: Exploring the Threat from Cyber Crime and the Ability of Local Law Enforcement to Respond. |
EISIC |
2018 |
DBLP DOI BibTeX RDF |
|
20 | Derrick Spooner, George Silowash, Daniel Costa, Michael Albrethsen |
Navigating the Insider Threat Tool Landscape: Low Cost Technical Solutions to Jump Start an Insider Threat Program. |
IEEE Symposium on Security and Privacy Workshops |
2018 |
DBLP DOI BibTeX RDF |
|
20 | Ghaith Husari, Xi Niu, Bill Chu, Ehab Al-Shaer |
Using Entropy and Mutual Information to Extract Threat Actions from Cyber Threat Intelligence. |
ISI |
2018 |
DBLP DOI BibTeX RDF |
|
20 | Vasileios Mavroeidis, Siri Bromander |
Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence. |
EISIC |
2017 |
DBLP DOI BibTeX RDF |
|
20 | John Grisham, Sagar Samtani, Mark W. Patton, Hsinchun Chen |
Identifying mobile malware and key threat actors in online hacker forums for proactive cyber threat intelligence. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
20 | William F. Lawless, Donald A. Sofge |
Evaluations: Autonomy and Artificial Intelligence: A Threat or Savior? |
Autonomy and Artificial Intelligence |
2017 |
DBLP DOI BibTeX RDF |
|
20 | Szymon Bobek, Grzegorz J. Nalepa, Antoni Ligeza, Weronika T. Adrian, Krzysztof Kaczor |
Mobile context-based framework for threat monitoring in urban environment with social threat monitor. |
Multim. Tools Appl. |
2016 |
DBLP DOI BibTeX RDF |
|
20 | Lotte Vermeulen, Elena Patricia Núñez Castellar, Dirk P. Janssen, Licia Calvi, Jan Van Looy |
Playing under threat. Examining stereotype threat in female game players. |
Comput. Hum. Behav. |
2016 |
DBLP DOI BibTeX RDF |
|
20 | Jan M. Ahrend, Marina Jirotka, Kevin Jones |
On the collaborative practices of cyber threat intelligence analysts to develop and utilize tacit Threat and Defence Knowledge. |
CyberSA |
2016 |
DBLP DOI BibTeX RDF |
|
20 | David A. Mundie, Samuel J. Perl, Carly L. Huth |
Toward an Ontology for Insider Threat Research: Varieties of Insider Threat Definitions. |
STAST |
2013 |
DBLP DOI BibTeX RDF |
|
20 | Su-Jin Baek, Jong-Won Ko, Jung-Soo Han |
Analysis of Threat-Factors for Biometric-Information Processing Systems According to Goal-Oriented Threat- Modeling. |
ICITCS |
2012 |
DBLP DOI BibTeX RDF |
|
20 | Emily M. Drabant, Janice R. Kuo, Wiveka Ramel, Jens Blechert, Michael D. Edge, Jeff R. Cooper, Philippe R. Goldin, Ahmad R. Hariri, James J. Gross |
Experiential, autonomic, and neural responses during threat anticipation vary as a function of threat intensity and neuroticism. |
NeuroImage |
2011 |
DBLP DOI BibTeX RDF |
|
20 | Katarina Panic, Veroline Cauberghe, Patrick De Pelsmacker |
Impact of an Interactive Anti-Speeding Threat Appeal: How Much Threat Is Too Much? |
Cyberpsychology Behav. Soc. Netw. |
2011 |
DBLP DOI BibTeX RDF |
|
20 | Patrik Lif, Per-Anders Oskarsson, Björn Lindahl, Johan Hedström, Jonathan Svensson |
Multimodal Threat Cueing in Simulated Combat Vehicle with Tactile Information Switching between Threat and Waypoint Indication. |
HCI (11) |
2011 |
DBLP DOI BibTeX RDF |
|
20 | Dale Elvy |
Terrorism, Threat and Time: The Mediating Effect of Terrorist Threat on Public Willingness to Forego Civil Liberties. |
EISIC |
2011 |
DBLP DOI BibTeX RDF |
|
20 | George Magklaras, Steven Furnell |
Insider Threat Specification as a Threat Mitigation Technique. |
Insider Threats in Cyber Security |
2010 |
DBLP DOI BibTeX RDF |
|
20 | Timothy Casey, Patrick Koeberl, Claire Vishik |
Threat agents: a necessary component of threat analysis. |
CSIIRW |
2010 |
DBLP DOI BibTeX RDF |
|
20 | Timothy Casey, Patrick Koeberl, Claire Vishik |
Defining Threat Agents: Towards a More Complete Threat Analysis. |
ISSE |
2010 |
DBLP DOI BibTeX RDF |
|
20 | Christine L. Larson, Joel Aronoff, Issidoros C. Sarinopoulos, David C. Zhu |
Recognizing Threat: A Simple Geometric Shape Activates Neural Circuitry for Threat Detection. |
J. Cogn. Neurosci. |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Robert J. Stratton III |
Internet security threat landscape: scaling to meet the threat. |
CSIIRW |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Leanne M. Williams, Donna M. Palmer, Belinda J. Liddell, Le Song, Evian Gordon |
The 'when' and 'where' of perceiving signals of threat versus non-threat. |
NeuroImage |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Azadeh Nematzadeh, L. Jean Camp |
Threat analysis of online health information system. |
PETRA |
2010 |
DBLP DOI BibTeX RDF |
information health systems, traitor-tracing schemes, privacy, legal aspects |
17 | Márk Jelasity, Vilmos Bilicki |
Scalable P2P Overlays of Very Small Constant Degree: An Emerging Security Threat. |
SSS |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Yuan Tian 0003, Biao Song, Eui-nam Huh |
A threat-based privacy preservation system in untrusted environment. |
ICHIT |
2009 |
DBLP DOI BibTeX RDF |
threaten, privacy, purpose |
17 | Juhani Anttila, Jorma Kajava |
Haste in Knowledge-Intensive Work: A Major Threat to Information Security Management in Business Environments. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Fabien Autrel, Nora Cuppens-Boulahia, Frédéric Cuppens |
Reaction Policy Model Based on Dynamic Organizations and Threat Context. (PDF / PS) |
DBSec |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Ghassan Jabbour, Daniel A. Menascé |
The Insider Threat Security Architecture: A Framework for an Integrated, Inseparable, and Uninterrupted Self-Protection Mechanism. |
CSE (3) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Xiaoli Lin, Pavol Zavarsky, Ron Ruhl, Dale Lindskog |
Threat Modeling for CSRF Attacks. |
CSE (3) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Nuno Amálio, George Spanoudakis |
From Monitoring Templates to Security Monitoring and Threat Detection. |
SECURWARE |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Wei Yu 0002, Nan Zhang 0004, Xinwen Fu, Riccardo Bettati, Wei Zhao 0001 |
On localization attacks to Internet Threat Monitors: An information-theoretic framework. |
DSN |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Nicholas L. Carter, James M. Ferryman |
The SAFEE On-Board Threat Detection System. |
ICVS |
2008 |
DBLP DOI BibTeX RDF |
Planar Homographies, Tracking, Scene Recognition |
17 | Xun Wang, Wei Yu 0002, Xinwen Fu, Dong Xuan, Wei Zhao 0001 |
iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems. |
INFOCOM |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Xun Dong, John A. Clark, Jeremy L. Jacob |
Threat Modelling in User Performed Authentication. |
ICICS |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Qutaibah Althebyan, Brajendra Panda |
Performance analysis of an insider threat mitigation model. |
ICDIM |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Judith E. Y. Rossebø, Scott Cadzow, Paul Sijben |
eTVRA, a Threat, Vulnerability and Risk Assessment Method and Tool for eEurope. |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Koen Buyens, Bart De Win, Wouter Joosen |
Empirical and statistical analysis of risk analysis-driven techniques for threat management. |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Stelios Dritsas, John Mallios, Marianthi Theoharidou, Giannis F. Marias, Dimitris Gritzalis |
Threat Analysis of the Session Initiation Protocol Regarding Spam. |
IPCCC |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Beate Stollberg, Alexander Zipf |
OGC Web Processing Service Interface for Web Service Orchestration Aggregating Geo-processing Services in a Bomb Threat Scenario. |
W2GIS |
2007 |
DBLP DOI BibTeX RDF |
geo-processing, geographical web services, Web Processing Service (WPS), composition, orchestration, disaster management, SDI, service chain |
17 | Dennis M. Moen, J. Mark Pullen |
Private overlay multicast for the defense threat reduction agency collaboration center (DCC). |
SpringSim (3) |
2007 |
DBLP BibTeX RDF |
collaborative networking environments, distributed simulation, overlay multicast |
17 | Duc T. Ha, Shambhu J. Upadhyaya, Hung Q. Ngo 0001, Suranjan Pramanik, Ramkumar Chinchani, Sunu Mathew |
Insider Threat Analysis Using Information-Centric Modeling. (PDF / PS) |
IFIP Int. Conf. Digital Forensics |
2007 |
DBLP DOI BibTeX RDF |
capability acquisition graphs, key challenge graphs, Insider threats |
Displaying result #101 - #200 of 5606 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|