The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Threat with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1964-1982 (15) 1983-1989 (16) 1990-1993 (20) 1994-1996 (20) 1997 (15) 1998-1999 (32) 2000 (19) 2001 (38) 2002 (54) 2003 (80) 2004 (129) 2005 (216) 2006 (242) 2007 (314) 2008 (320) 2009 (244) 2010 (113) 2011 (114) 2012 (117) 2013 (132) 2014 (148) 2015 (162) 2016 (200) 2017 (250) 2018 (326) 2019 (348) 2020 (348) 2021 (449) 2022 (499) 2023 (506) 2024 (120)
Publication types (Num. hits)
article(2051) book(11) data(2) incollection(83) inproceedings(3406) phdthesis(53)
Venues (Conferences, Journals, ...)
CoRR(376) Comput. Secur.(83) IEEE Access(83) HICSS(74) ARES(60) ISI(60) NeuroImage(50) IEEE Secur. Priv.(46) Sensors(40) FUSION(38) Netw. Secur.(31) ACSAC(30) CCS(28) RFC(26) SAC(26) IEEE BigData(25) More (+10 of total 1868)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1717 occurrences of 1015 keywords

Results
Found 5607 publication records. Showing 5606 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
23Marie Kim, YoungJun Lee, Jaecheol Ryou 0001 What Are Possible Security Threats in Ubiquitous Sensor Network Environment? Search on Bibsonomy APNOMS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF middleware, security threat, USN
23Stuart E. Schechter, Michael D. Smith 0001 How Much Security Is Enough to Stop a Thief?: The Economics of Outsider Theft via Computer Systems and Networks. Search on Bibsonomy Financial Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Theft, Exploits, Threat Models, Security Economics
23Stuart E. Schechter, Michael D. Smith 0001 Access for sale: a new class of worm. Search on Bibsonomy WORM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF security, cryptography, economics, incentives, worm, virus, threat modelling
20Ganthan Narayana Samy, Rabiah Ahmad, Zuraini Ismail Threats to Health Information Security. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Geoffrey Smith 0001 On the Foundations of Quantitative Information Flow. Search on Bibsonomy FoSSaCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Yolanta Beres, Marco Casassa Mont, Jonathan Griffin, Simon Shiu Using security metrics coupled with predictive modeling and simulation to assess security processes. Search on Bibsonomy ESEM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Steven Koepnick, Derek Norpchen, William R. Sherman, Daniel S. Coming Immersive Training for Two-Person Radiological Surveys. Search on Bibsonomy VR The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20S. P. Subasingha, J. Zhang, Kamal Premaratne, Mei-Ling Shyu, Miroslav Kubat, K. K. Rohitha Hewawasam Using Association Rules for Classification from Databases Having Class Label Ambiguities: A Belief Theoretic Method. Search on Bibsonomy Data Mining: Foundations and Practice The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Erik Buchanan, Ryan Roemer, Hovav Shacham, Stefan Savage When good instructions go bad: generalizing return-oriented programming to RISC. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF return-into-libc, return-oriented programming, RISC, SPARC
20David Ahmad The Contemporary Software Security Landscape. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Wenyan Wu 0002, Jinliang Gao, Ming Zhao, Zu Qian, X. Q. Hou, Y. Han Assessing and Optimizing Online Monitoring for Securing the Water Distribution System. Search on Bibsonomy ICNSC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Cyril Onwubiko, Andrew P. Lenaghan Managing Security Threats and Vulnerabilities for Small to Medium Enterprises. Search on Bibsonomy ISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20P. J. Sandford, David J. Parish, Jonathan M. Sandford Detecting security threats in the network core using Data Mining techniques. Search on Bibsonomy NOMS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Dong Hwi Lee, Kyong Ho Choi, Kuinam J. Kim, Sang Min Park Routing Information System and HOIDS for Detection Method of Vicious Attack in Large Networks. Search on Bibsonomy ISPA Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Vicious Attack, Early Warining, Routing Information, Intrusion Detection System
20James S. Okolica, Gilbert L. Peterson, Robert F. Mills Using Author Topic to Detect Insider Threats from Email Traffic. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Martin R. Stytz Protecting Personal Privacy: Hauling Down the Jolly Roger. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF personal private information, Internet piracy
20Elena Ivankina, Camille Salinesi Eliciting Requirements by Analysing Threats Caused by Users. Search on Bibsonomy SERA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20David P. Forrai, James J. Maier Generic models in the advanced IRCM assessment model. Search on Bibsonomy WSC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
20Carmine A. Vaccarino, George Konomos Real-Time Simulation For Verification Of Tactical Electronic Warfare System. Search on Bibsonomy ACM Annual Conference (1) The full citation details ... 1978 DBLP  DOI  BibTeX  RDF Electronic warfare, Operational flight program, Verification, Real-time simulation
20Nanda Rani, Bikash Saha, Vikas Maurya, Sandeep Kumar Shukla TTPXHunter: Actionable Threat Intelligence Extraction as TTPs from Finished Cyber Threat Reports. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
20Siva Raja Sindiramutty Autonomous Threat Hunting: A Future Paradigm for AI-Driven Threat Intelligence. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
20Tongtong Jiang, Guowei Shen, Chun Guo 0004, Yunhe Cui, Bo Xie BFLS: Blockchain and Federated Learning for sharing threat detection models as Cyber Threat Intelligence. Search on Bibsonomy Comput. Networks The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Ángel Casanova Bienzobas, Alfonso Sánchez-Macián Threat Trekker: An Approach to Cyber Threat Hunting. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Adam Brian Turner, Stephen McCombie, Allon J. Uhlmann Ransomware-Bitcoin Threat Intelligence Sharing Using Structured Threat Information Expression. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Jianli Xie, Wei (Wayne) Huang Security Goal Matters: Impact of Threat-Prevention and Threat-Detection Behavior on Security Outcomes. Search on Bibsonomy PACIS The full citation details ... 2023 DBLP  BibTeX  RDF
20Kelsie Edie, Cole Mckee, Adam Duby Extending Threat Playbooks for Cyber Threat Intelligence: A Novel Approach for APT Attribution. Search on Bibsonomy ISDFS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Cláudio Martins, Ibéria Medeiros Generating Quality Threat Intelligence Leveraging OSINT and a Cyber Threat Unified Taxonomy. Search on Bibsonomy ACM Trans. Priv. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Micah Ashford, James I. Watling, Kristen Hart One Shell of a Problem: Cumulative Threat Analysis of Male Sea Turtles Indicates High Anthropogenic Threat for Migratory Individuals and Gulf of Mexico Residents. Search on Bibsonomy Remote. Sens. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Babu Pandipati, R. Praveen Sam Threat-Path Estimate-Based Watchword-Chunk Algorithm for Advanced Persistent Threat in the Cloud. Search on Bibsonomy Int. J. Web Serv. Res. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Peng Gao 0008, Xiaoyuan Liu, Edward Choi, Sibo Ma, Xinyu Yang, Zhengjie Ji, Zilin Zhang, Dawn Song ThreatKG: A Threat Knowledge Graph for Automated Open-Source Cyber Threat Intelligence Gathering and Management. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Md. Rayhanur Rahman, Laurie A. Williams From Threat Reports to Continuous Threat Intelligence: A Comparison of Attack Technique Extraction Methods from Textual Artifacts. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Ala' Masarweh, Jaafer Al-Saraireh Threat led advanced persistent threat penetration test. Search on Bibsonomy Int. J. Secur. Networks The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Yizhe You, Jun Jiang, Zhengwei Jiang, Peian Yang, Baoxu Liu, Huamin Feng, Xuren Wang, Ning Li TIM: threat context-enhanced TTP intelligence mining on unstructured threat data. Search on Bibsonomy Cybersecur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Anne-Sophie Mayer, Franz Strich, Marina Fiedler Algorithmic Technologies as Threat to Who We Are: The Effect an IT Identity Threat has on Employees' Work Engagement. Search on Bibsonomy ICIS The full citation details ... 2022 DBLP  BibTeX  RDF
20Nathan Deguara, Junaid Arshad, Anum Paracha, Muhammad Ajmal Azad Threat Miner - A Text Analysis Engine for Threat Identification Using Dark Web Data. Search on Bibsonomy IEEE Big Data The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Angela Horneman, Bob Ditmore, Craig Motell, Matthew Levy Predicting the Threat: Investigating Insider Threat Psychological Indicators With Deep Learning. Search on Bibsonomy HICSS The full citation details ... 2022 DBLP  BibTeX  RDF
20Ananthapadmanabhan A, Krishnashree Achuthan Threat Modeling and Threat Intelligence System for Cloud using Splunk. Search on Bibsonomy ISDFS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20François Labrèche, Serge-Olivier Paquette Threat Class Predictor: An explainable framework for predicting vulnerability threat using topic and trend modeling. Search on Bibsonomy CAMLIS The full citation details ... 2022 DBLP  BibTeX  RDF
20Hsien-Long Huang, Li-Keng Cheng, Pi-Chuan Sun, Szu-Jung Chou The Effects of Perceived Identity Threat and Realistic Threat on the Negative Attitudes and Usage Intentions Toward Hotel Service Robots: The Moderating Effect of the Robot's Anthropomorphism. Search on Bibsonomy Int. J. Soc. Robotics The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
20Md. Rayhanur Rahman, Rezvan Mahdavi-Hezaveh, Laurie A. Williams What are the attackers doing now? Automating cyber threat intelligence extraction from text on pace with the changing threat landscape: A survey. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
20Vasileios Mavroeidis, Siri Bromander Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
20Vasileios Mavroeidis, Ryan Hohimer, Tim Casey, Audun Jøsang Threat Actor Type Inference and Characterization within Cyber Threat Intelligence. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
20Francesco Croce, Matthias Hein 0001 Adversarial robustness against multiple lp-threat models at the price of one and how to quickly fine-tune robust models to another threat model. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
20Huixia Zhang, Guowei Shen, Chun Guo 0004, Yunhe Cui, Chaohui Jiang EX-Action: Automatically Extracting Threat Actions from Cyber Threat Intelligence Report Based on Multimodal Learning. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
20Peng Gao 0008, Fei Shao, Xiaoyuan Liu, Xusheng Xiao, Zheng Qin, Fengyuan Xu, Prateek Mittal, Sanjeev R. Kulkarni, Dawn Song Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence. Search on Bibsonomy ICDE The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
20Dimitri Van Landuyt, Liliana Pasquale, Laurens Sion, Wouter Joosen Threat modeling at run time: the case for reflective and adaptive threat management (NIER track). Search on Bibsonomy SEAMS@ICSE The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
20Clemens Sauerwein, Daniel Fischer 0003, Milena Rubsamen, Guido Rosenberger, Dirk Stelzer, Ruth Breu From Threat Data to Actionable Intelligence: An Exploratory Analysis of the Intelligence Cycle Implementation in Cyber Threat Intelligence Sharing Platforms. Search on Bibsonomy ARES The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
20Erlend Bygdås, Lars Andreassen Jaatun, Stian Brekken Antonsen, Anders Ringen, Erlend Eiring Evaluating Threat Modeling Tools: Microsoft TMT versus OWASP Threat Dragon. Search on Bibsonomy CyberSA The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
20Vasileios Mavroeidis, Ryan Hohimer, Tim Casey, Audun Jøsang Threat Actor Type Inference and Characterization within Cyber Threat Intelligence. Search on Bibsonomy CyCon The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
20Peng Gao 0008, Fei Shao, Xiaoyuan Liu, Xusheng Xiao, Zheng Qin, Fengyuan Xu, Prateek Mittal, Sanjeev R. Kulkarni, Dawn Song Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
20Katie Paxton-Fear, Duncan Hodges, Oliver Buckley Understanding Insider Threat Attacks Using Natural Language Processing: Automatically Mapping Organic Narrative Reports to Existing Insider Threat Frameworks. Search on Bibsonomy HCI (30) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
20Andrew Fielder Modelling the Impact of Threat Intelligence on Advanced Persistent Threat Using Games. Search on Bibsonomy From Lambda Calculus to Cybersecurity Through Program Analysis The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
20Rebecca Fribourg, Evan Blanpied, Ludovic Hoyet, Anatole Lécuyer, Ferran Argelaguet Influence of Threat Occurrence and Repeatability on the Sense of Embodiment and Threat Response in VR. Search on Bibsonomy ICAT-EGVE The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
20Alma-Sophia Merscher, Matthias Gamer Freezing of Gaze in Anticipation of Avoidable Threat: A threat-specific proxy for freezing-like behavior in humans. Search on Bibsonomy ETRA Short Papers The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
20Sara Boysen, Barbara Hewitt, David Gibbs, Alexander J. McLeod Jr. Refining the Threat Calculus of Technology Threat Avoidance Theory. Search on Bibsonomy Commun. Assoc. Inf. Syst. The full citation details ... 2019 DBLP  BibTeX  RDF
20Daniel Qi Chen, Huigang Liang Wishful Thinking and IT Threat Avoidance: An Extension to the Technology Threat Avoidance Theory. Search on Bibsonomy IEEE Trans. Engineering Management The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
20Ahuokpeme Chibueze Brendan, John McCarthy 0006 Taxonomy of Threat Categorization and Threat Intelligence Platform. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
20Peter Amthor 0001, Daniel Fischer 0003, Winfried E. Kühnhauser, Dirk Stelzer Automated Cyber Threat Sensing and Responding: Integrating Threat Intelligence into Security-Policy-Controlled Systems. Search on Bibsonomy ARES The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
20Sonali Chandel, Mengdi Yan, Shaojun Chen, Huan Jiang, Tian-Yi Ni Threat Intelligence Sharing Community: A Countermeasure Against Advanced Persistent Threat. Search on Bibsonomy MIPR The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
20Frank L. Greitzer, Justin Purl, D. E. Sunny Becker, Paul J. Sticha, Yung Mei Leong Modeling Expert Judgments of Insider Threat Using Ontology Structure: Effects of Individual Indicator Threat Value and Class Membership. Search on Bibsonomy HICSS The full citation details ... 2019 DBLP  BibTeX  RDF
20Matthew Hull, Thaddeus Eze, Lee Speakman Policing The Cyber Threat: Exploring the Threat from Cyber Crime and the Ability of Local Law Enforcement to Respond. Search on Bibsonomy EISIC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
20Derrick Spooner, George Silowash, Daniel Costa, Michael Albrethsen Navigating the Insider Threat Tool Landscape: Low Cost Technical Solutions to Jump Start an Insider Threat Program. Search on Bibsonomy IEEE Symposium on Security and Privacy Workshops The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
20Ghaith Husari, Xi Niu, Bill Chu, Ehab Al-Shaer Using Entropy and Mutual Information to Extract Threat Actions from Cyber Threat Intelligence. Search on Bibsonomy ISI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
20Vasileios Mavroeidis, Siri Bromander Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence. Search on Bibsonomy EISIC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20John Grisham, Sagar Samtani, Mark W. Patton, Hsinchun Chen Identifying mobile malware and key threat actors in online hacker forums for proactive cyber threat intelligence. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20William F. Lawless, Donald A. Sofge Evaluations: Autonomy and Artificial Intelligence: A Threat or Savior? Search on Bibsonomy Autonomy and Artificial Intelligence The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Szymon Bobek, Grzegorz J. Nalepa, Antoni Ligeza, Weronika T. Adrian, Krzysztof Kaczor Mobile context-based framework for threat monitoring in urban environment with social threat monitor. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
20Lotte Vermeulen, Elena Patricia Núñez Castellar, Dirk P. Janssen, Licia Calvi, Jan Van Looy Playing under threat. Examining stereotype threat in female game players. Search on Bibsonomy Comput. Hum. Behav. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
20Jan M. Ahrend, Marina Jirotka, Kevin Jones On the collaborative practices of cyber threat intelligence analysts to develop and utilize tacit Threat and Defence Knowledge. Search on Bibsonomy CyberSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
20David A. Mundie, Samuel J. Perl, Carly L. Huth Toward an Ontology for Insider Threat Research: Varieties of Insider Threat Definitions. Search on Bibsonomy STAST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
20Su-Jin Baek, Jong-Won Ko, Jung-Soo Han Analysis of Threat-Factors for Biometric-Information Processing Systems According to Goal-Oriented Threat- Modeling. Search on Bibsonomy ICITCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
20Emily M. Drabant, Janice R. Kuo, Wiveka Ramel, Jens Blechert, Michael D. Edge, Jeff R. Cooper, Philippe R. Goldin, Ahmad R. Hariri, James J. Gross Experiential, autonomic, and neural responses during threat anticipation vary as a function of threat intensity and neuroticism. Search on Bibsonomy NeuroImage The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
20Katarina Panic, Veroline Cauberghe, Patrick De Pelsmacker Impact of an Interactive Anti-Speeding Threat Appeal: How Much Threat Is Too Much? Search on Bibsonomy Cyberpsychology Behav. Soc. Netw. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
20Patrik Lif, Per-Anders Oskarsson, Björn Lindahl, Johan Hedström, Jonathan Svensson Multimodal Threat Cueing in Simulated Combat Vehicle with Tactile Information Switching between Threat and Waypoint Indication. Search on Bibsonomy HCI (11) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
20Dale Elvy Terrorism, Threat and Time: The Mediating Effect of Terrorist Threat on Public Willingness to Forego Civil Liberties. Search on Bibsonomy EISIC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
20George Magklaras, Steven Furnell Insider Threat Specification as a Threat Mitigation Technique. Search on Bibsonomy Insider Threats in Cyber Security The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
20Timothy Casey, Patrick Koeberl, Claire Vishik Threat agents: a necessary component of threat analysis. Search on Bibsonomy CSIIRW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
20Timothy Casey, Patrick Koeberl, Claire Vishik Defining Threat Agents: Towards a More Complete Threat Analysis. Search on Bibsonomy ISSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
20Christine L. Larson, Joel Aronoff, Issidoros C. Sarinopoulos, David C. Zhu Recognizing Threat: A Simple Geometric Shape Activates Neural Circuitry for Threat Detection. Search on Bibsonomy J. Cogn. Neurosci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Robert J. Stratton III Internet security threat landscape: scaling to meet the threat. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Leanne M. Williams, Donna M. Palmer, Belinda J. Liddell, Le Song, Evian Gordon The 'when' and 'where' of perceiving signals of threat versus non-threat. Search on Bibsonomy NeuroImage The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Azadeh Nematzadeh, L. Jean Camp Threat analysis of online health information system. Search on Bibsonomy PETRA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF information health systems, traitor-tracing schemes, privacy, legal aspects
17Márk Jelasity, Vilmos Bilicki Scalable P2P Overlays of Very Small Constant Degree: An Emerging Security Threat. Search on Bibsonomy SSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Yuan Tian 0003, Biao Song, Eui-nam Huh A threat-based privacy preservation system in untrusted environment. Search on Bibsonomy ICHIT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF threaten, privacy, purpose
17Juhani Anttila, Jorma Kajava Haste in Knowledge-Intensive Work: A Major Threat to Information Security Management in Business Environments. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Fabien Autrel, Nora Cuppens-Boulahia, Frédéric Cuppens Reaction Policy Model Based on Dynamic Organizations and Threat Context. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Ghassan Jabbour, Daniel A. Menascé The Insider Threat Security Architecture: A Framework for an Integrated, Inseparable, and Uninterrupted Self-Protection Mechanism. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Xiaoli Lin, Pavol Zavarsky, Ron Ruhl, Dale Lindskog Threat Modeling for CSRF Attacks. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Nuno Amálio, George Spanoudakis From Monitoring Templates to Security Monitoring and Threat Detection. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Wei Yu 0002, Nan Zhang 0004, Xinwen Fu, Riccardo Bettati, Wei Zhao 0001 On localization attacks to Internet Threat Monitors: An information-theoretic framework. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Nicholas L. Carter, James M. Ferryman The SAFEE On-Board Threat Detection System. Search on Bibsonomy ICVS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Planar Homographies, Tracking, Scene Recognition
17Xun Wang, Wei Yu 0002, Xinwen Fu, Dong Xuan, Wei Zhao 0001 iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Xun Dong, John A. Clark, Jeremy L. Jacob Threat Modelling in User Performed Authentication. Search on Bibsonomy ICICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Qutaibah Althebyan, Brajendra Panda Performance analysis of an insider threat mitigation model. Search on Bibsonomy ICDIM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Judith E. Y. Rossebø, Scott Cadzow, Paul Sijben eTVRA, a Threat, Vulnerability and Risk Assessment Method and Tool for eEurope. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Koen Buyens, Bart De Win, Wouter Joosen Empirical and statistical analysis of risk analysis-driven techniques for threat management. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Stelios Dritsas, John Mallios, Marianthi Theoharidou, Giannis F. Marias, Dimitris Gritzalis Threat Analysis of the Session Initiation Protocol Regarding Spam. Search on Bibsonomy IPCCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Beate Stollberg, Alexander Zipf OGC Web Processing Service Interface for Web Service Orchestration Aggregating Geo-processing Services in a Bomb Threat Scenario. Search on Bibsonomy W2GIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF geo-processing, geographical web services, Web Processing Service (WPS), composition, orchestration, disaster management, SDI, service chain
17Dennis M. Moen, J. Mark Pullen Private overlay multicast for the defense threat reduction agency collaboration center (DCC). Search on Bibsonomy SpringSim (3) The full citation details ... 2007 DBLP  BibTeX  RDF collaborative networking environments, distributed simulation, overlay multicast
17Duc T. Ha, Shambhu J. Upadhyaya, Hung Q. Ngo 0001, Suranjan Pramanik, Ramkumar Chinchani, Sunu Mathew Insider Threat Analysis Using Information-Centric Modeling. (PDF / PS) Search on Bibsonomy IFIP Int. Conf. Digital Forensics The full citation details ... 2007 DBLP  DOI  BibTeX  RDF capability acquisition graphs, key challenge graphs, Insider threats
Displaying result #101 - #200 of 5606 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license