The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for deterrence with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1982-2001 (15) 2002-2004 (16) 2005-2007 (16) 2008-2010 (21) 2011-2012 (20) 2013-2014 (17) 2015-2016 (24) 2017-2018 (25) 2019-2020 (20) 2021-2022 (23) 2023-2024 (15)
Publication types (Num. hits)
article(117) incollection(4) inproceedings(88) phdthesis(3)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 50 occurrences of 39 keywords

Results
Found 212 publication records. Showing 212 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
21Jim Q. Chen Take the rein of cyber deterrence. Search on Bibsonomy CyCon U.S. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Asma Sbaï, Fattehallah Ghadi Impact of Aggregation and Deterrence Function Choice on the Parameters of Gravity Model. Search on Bibsonomy SCA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Zining Yang, Kyungkook Kang, Jacek Kugler An Agent-Based Approach on Conditional Deterrence. Search on Bibsonomy AHFE (7) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Edouard Kujawski A Probabilistic Game-Theoretic Method to Assess Deterrence and Defense Benefits of Security Systems. Search on Bibsonomy Syst. Eng. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21William Casey, Jose Andre Morales, Evan Wright, Quanyan Zhu, Bud Mishra Compliance signaling games: toward modeling the deterrence of insider threats. Search on Bibsonomy Comput. Math. Organ. Theory The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Bo Xu, Zhengchuan Xu, Dahui Li Internet aggression in online communities: a contemporary deterrence perspective. Search on Bibsonomy Inf. Syst. J. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21William Casey, Parisa Memarmoshrefi, Ansgar Kellner, Jose Andre Morales, Bud Mishra Identity Deception and Game Deterrence via Signaling Games. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Morgan M. Shepherd, Roberto J. Mejias Nontechnical Deterrence Effects of Mild and Severe Internet Use Policy Reminders in Reducing Employee Internet Abuse. Search on Bibsonomy Int. J. Hum. Comput. Interact. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Jianqiang Zhang The benefits of consumer rebates: A strategy for gray market deterrence. Search on Bibsonomy Eur. J. Oper. Res. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Michael Foth Factors influencing the intention to comply with data protection regulations in hospitals: based on gender differences in behaviour and deterrence. Search on Bibsonomy Eur. J. Inf. Syst. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Zhihua Xia, Xinhui Wang, Liangao Zhang, Zhan Qin, Xingming Sun, Kui Ren 0001 A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Emmanuel Ajayi Olajubu, Ibrahim Kazeem Ogundoyin, Abiodun Akinwale An Octopus-Inspired Intrusion Deterrence Model in Distributed Computing System. Search on Bibsonomy Comput. Sci. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Zhaohong Wang, Sen-Ching S. Cheung On privacy preference in collusion-deterrence games for secure multi-party computation. Search on Bibsonomy ICASSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Elsa B. Kania Cyber deterrence in times of cyber anarchy - evaluating the divergences in U.S. and Chinese strategic thinking. Search on Bibsonomy CyCon U.S. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Raul Kleber de Souza Boeno, Viriato Soromenho-Marques Climate Deterrence: Disasters and Security After COP 21. Search on Bibsonomy ITDRR The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Mario Silic, Dario Silic, Goran Oblakovic Restrictive Deterrence: Impact of Warning Banner Messages on Repeated Low-trust Software Use. Search on Bibsonomy ICEIS (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Michael Warah Nsoh, Kathleen M. Hargiss, Caroline Howard Information Systems Security Policy Compliance: An Analysis of Management Employee Interpersonal Relationship and the Impact on Deterrence. Search on Bibsonomy Int. J. Strateg. Inf. Technol. Appl. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Özgen Karaer, Feryal Erhun Quality and entry deterrence. Search on Bibsonomy Eur. J. Oper. Res. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Firat Inceoglu Copyright protection and entry deterrence. Search on Bibsonomy Inf. Econ. Policy The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Jon R. Lindsay Tipping the scales: the attribution problem and the feasibility of deterrence against cyberattack. Search on Bibsonomy J. Cybersecur. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Robert J. Elder, Alexander H. Levis, Bahram Yousefi Alternatives to Cyber Warfare: Deterrence and Assurance. Search on Bibsonomy Cyber Warfare The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Mohamad Khattar Awad, Bashar Zogheib, Hamed M. K. Alazemi Optimal penalties for misbehavior deterrence in communication networks. Search on Bibsonomy PACRIM The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Jooyeon Park, Changsoo Sung The Effect of Online Piracy Deterrence on Self-Control and Piracy Intention. Search on Bibsonomy PACIS The full citation details ... 2015 DBLP  BibTeX  RDF
21Chad Heitzenrater, Greg Taylor, Andrew Simpson When the Winning Move is Not to Play: Games of Deterrence in Cyber Security. Search on Bibsonomy GameSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21William Casey, Parisa Memarmoshrefi, Ansgar Kellner, Jose Andre Morales, Bud Mishra Identity Deception and Game Deterrence via Signaling Games. Search on Bibsonomy BICT The full citation details ... 2015 DBLP  BibTeX  RDF
21Annegret Bendiek, Tobias Metzger Deterrence theory in the cyber-century. Search on Bibsonomy GI-Jahrestagung The full citation details ... 2015 DBLP  BibTeX  RDF
21Jude Angelo Ambrose, Roshan G. Ragel, Darshana Jayasinghe, Tuo Li 0001, Sri Parameswaran Side channel attacks in embedded systems: A tale of hostilities and deterrence. Search on Bibsonomy ISQED The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Jin-Hong Park, Dipankar Bandyopadhyay, Elizabeth Letourneau Examining deterrence of adult sex crimes: A semi-parametric intervention time-series approach. Search on Bibsonomy Comput. Stat. Data Anal. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Daphne W. Yiu, Yuehua Xu, William P. Wan The Deterrence Effects of Vicarious Punishments on Corporate Financial Fraud. Search on Bibsonomy Organ. Sci. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Arvind Kumar Misra Modeling the effect of police deterrence on the prevalence of crime in the society. Search on Bibsonomy Appl. Math. Comput. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Selmer Bringsjord, Naveen Sundar Govindarajulu, Simon Ellis, Evan McCarty, John Licato Nuclear deterrence and the logic of deliberative mindreading. Search on Bibsonomy Cogn. Syst. Res. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Lijiao Cheng, Wenli Li, Qingguo Zhai, Russell Smyth Understanding personal use of the Internet at work: An integrated model of neutralization techniques and general deterrence theory. Search on Bibsonomy Comput. Hum. Behav. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Faisal Alanezi, Laurence D. Brooks Combatting Online Fraud in Saudi Arabia Using General Deterrence Theory (GDT). Search on Bibsonomy AMCIS The full citation details ... 2014 DBLP  BibTeX  RDF
21Hao Chen, Wenli Li Understanding Organization Employee's Information Security Omission Behavior: an Integrated Model of Social norm and Deterrence. Search on Bibsonomy PACIS The full citation details ... 2014 DBLP  BibTeX  RDF
21Johann Kranz, Felix Haeussinger Why Deterrence is not enough: The Role of Endogenous Motivations on Employees' Information Security Behavior. Search on Bibsonomy ICIS The full citation details ... 2014 DBLP  BibTeX  RDF
21Morgan M. Shepherd, Roberto J. Mejias, Gary Klein 0001 A Longitudinal Study to Determine Non-technical Deterrence Effects of Severity and Communication of Internet Use Policy for Reducing Employee Internet Abuse. Search on Bibsonomy HICSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Marcus Wiens, Sascha Meng, Frank Schultmann Strategic Deterrence of Terrorist Attacks. Search on Bibsonomy OR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Abhra Roy, Jomon Aliyas Paul Terrorism deterrence in a two country framework: strategic interactions between R&D, defense and pre-emption. Search on Bibsonomy Ann. Oper. Res. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Robert Willison, Merrill Warkentin Beyond Deterrence: An Expanded View of Employee Computer Abuse. Search on Bibsonomy MIS Q. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Ai-nong Zhou Spatial Competition with Entry Deterrence considering Horizontal Product Differentiations. Search on Bibsonomy J. Appl. Math. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Lijiao Cheng, Ying Li, Wenli Li, Eric Holm, Qingguo Zhai Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory. Search on Bibsonomy Comput. Secur. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Takuya Kaneko, Takumi Nagaya, Keisuke Takemori, Yutaka Miyake, Masakatsu Nishigaki A Proposal for the Deterrence of Information Leakage Using Anti-virus Software. Search on Bibsonomy NBiS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Wu Zhou 0001, Xinwen Zhang, Xuxian Jiang AppInk: watermarking android apps for repackaging deterrence. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Britta Dorn, Dominikus Krüger Being Caught between a Rock and a Hard Place in an Election - Voter Deterrence by Deletion of Candidates. Search on Bibsonomy SOFSEM The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Robert C. Seamans Fighting City Hall: Entry Deterrence and Technology Upgrades in Cable TV Markets. Search on Bibsonomy Manag. Sci. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Kjell Hausken, Jun Zhuang 0001 The timing and deterrence of terrorist attacks due to exogenous dynamics. Search on Bibsonomy J. Oper. Res. Soc. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Anat Hovav, John D'Arcy Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the U.S. and South Korea. Search on Bibsonomy Inf. Manag. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21John D'Arcy, Sarv Devaraj Employee Misuse of Information Technology Resources: Testing a Contemporary Deterrence Model. Search on Bibsonomy Decis. Sci. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Kjell Hausken On the Impossibility of Deterrence in Sequential Colonel Blotto Games. Search on Bibsonomy IGTR The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Francesca Giardini Deterrence and transmission as mechanisms ensuring reliability of gossip. Search on Bibsonomy Cogn. Process. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Anastasiou Kartas, Sigi Goode Use, perceived deterrence and the role of software piracy in video game console adoption. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Gurvirender P. Tejay, Sean M. Zadig Investigating the Effectiveness of IS Security Countermeasures towards Cyber Attacker Deterrence. Search on Bibsonomy HICSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Morgan M. Shepherd, Gary Klein 0001 Using Deterrence to Mitigate Employee Internet Abuse. Search on Bibsonomy HICSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Simon Reay Atkinson, David Walker 0002, Kevin Beaulne, Liaquat Hossain Cyber - Transparencies, Assurance and Deterrence. Search on Bibsonomy CyberSecurity The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Henrique Lopes Cardoso, Eugénio C. Oliveira Social control in a normative framework: An adaptive deterrence approach. Search on Bibsonomy Web Intell. Agent Syst. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21L. Robin Keller, Kelly M. Kophazi From the Editors - Deterrence, Multiattribute Utility, and Probability and Bayes' Updating. Search on Bibsonomy Decis. Anal. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Qing Hu 0003, Zhengchuan Xu, Tamara Dinev, Hong Ling Does deterrence work in reducing information security policy abuse by employees? Search on Bibsonomy Commun. ACM The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21John D'Arcy, Tejaswini C. Herath A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings. Search on Bibsonomy Eur. J. Inf. Syst. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Sangseo Park, Anthonie B. Ruighaver, Sean B. Maynard, Atif Ahmad Towards Understanding Deterrence: Information Security Managers' Perspective. Search on Bibsonomy ICITCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Joan Feigenbaum, James A. Hendler, Aaron D. Jaggard, Daniel J. Weitzner, Rebecca N. Wright Accountability and deterrence in online life. Search on Bibsonomy WebSci The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Dmitri Alperovitch Towards establishment of cyberspace deterrence strategy. Search on Bibsonomy CyCon The full citation details ... 2011 DBLP  BibTeX  RDF
21Murat Dogrul, Adil Aslan, Eyyup Celik Developing an international cooperation on cyber defense and deterrence against Cyber terrorism. Search on Bibsonomy CyCon The full citation details ... 2011 DBLP  BibTeX  RDF
21Lisa J. Carlson, Raymond Dacey Social norms and the traditional deterrence game. Search on Bibsonomy Synth. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
21Kenneth Geers The challenge of cyber attack deterrence. Search on Bibsonomy Comput. Law Secur. Rev. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
21Sean M. Zadig, Gurvirender P. Tejay Securing IS assets through hacker deterrence: A case study. Search on Bibsonomy eCrime The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
21Qing Hu 0003, Zhengchuan Xu, Tamara Dinev, Hong Ling Why Individuals Commit Computer Offences in Organizations: Investigating the Roles of Rational Choice, Self-Control, and Deterrence. Search on Bibsonomy PACIS The full citation details ... 2010 DBLP  BibTeX  RDF
21 Fraud Deterrence. Search on Bibsonomy Encyclopedia of Biometrics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21John D'Arcy, Anat Hovav, Dennis F. Galletta User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach. Search on Bibsonomy Inf. Syst. Res. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Tejaswini C. Herath, H. Raghav Rao Protection motivation and deterrence: a framework for security policy compliance in organisations. Search on Bibsonomy Eur. J. Inf. Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Xigen Li, Nico Nergadze Deterrence Effect of Four Legal and Extralegal Factors on Online Copyright Infringement. Search on Bibsonomy J. Comput. Mediat. Commun. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Henrique Lopes Cardoso, Eugénio C. Oliveira Adaptive Deterrence Sanctions in a Normative Framework. Search on Bibsonomy IAT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Peter James Allen Rip, Mix, Burn ... Sue ... ad infinitum: The Effects of Deterrence vs Voluntary Cooperation on Non-commercial Online Copyright Infringing Behaviour. Search on Bibsonomy First Monday The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Nick Malleson Computer Simulations of Criminal Deterrence: from Public Policy to Local Interaction to Individual Behaviour by Pieter Van Baal. Search on Bibsonomy J. Artif. Soc. Soc. Simul. The full citation details ... 2007 DBLP  BibTeX  RDF
21K. Shiokawa, Bei-Lok Hu Non-Markovian Quantum Error Deterrence by Dynamical Decoupling in a General Environment. Search on Bibsonomy Quantum Inf. Process. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Yunchuan Liu, Sunil Gupta, Z. John Zhang Note on Self-Restraint as an Online Entry-Deterrence Strategy. Search on Bibsonomy Manag. Sci. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Abraham L. Wickelgren The effect of exit on entry deterrence strategies. Search on Bibsonomy Games Econ. Behav. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Bram Roth Deterrence under Uncertainty: a Case Study. Search on Bibsonomy JURIX The full citation details ... 2006 DBLP  BibTeX  RDF
21Tiebo Song, Wenfeng Cen, Liangxing Zhang, Xiong Chen The Analyses of Strategic Deterrence Effect's Impact on Strategic Alliance's Decision-Making Based on Horizontally Differentiated Product Market. Search on Bibsonomy APSCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Sang M. Lee, Sang-Gun Lee, Sangjin Yoo An integrative model of computer abuse based on social control and general deterrence theories. Search on Bibsonomy Inf. Manag. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21Cormac Herley, Poorvi L. Vora, Shawn Yang Detection and deterrence of counterfeiting of valuable documents. Search on Bibsonomy ICIP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21Leticia J. Pacheco Designing for effective deterrence: A Markovian approach to modeling and analyzing terrorist behavior within the aviation security environment. Search on Bibsonomy 2004   RDF
21Morton John Canty, Daniel Rothenstein, Rudolf Avenhaus Timely inspection and deterrence. Search on Bibsonomy Eur. J. Oper. Res. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
21C. B. Lee, W. D. Murphy, Leslie R. Fletcher, Jane M. Binner Dynamic entry deterrence in the UK pathology services market. Search on Bibsonomy Eur. J. Oper. Res. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
21Tom Mulhall Where have all the hackers gone?: Part 3 - Motivation and deterrence. Search on Bibsonomy Comput. Secur. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
21Tom Mulhall Where have all the hackers gone? A study in motivation, deterrence, and crime displacement: Part 1 - introduction & methodology. Search on Bibsonomy Comput. Secur. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
21D. Marc Kilgour, F. C. Zagare Uncertainty and the role of the pawn in extended deterrence. Search on Bibsonomy Synth. The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
21Lawrence F. Young Utopians, Cyberpunks, Players, and Other Computer Criminals: Deterrence and the Law. Search on Bibsonomy Security and Control of Information Technology in Society The full citation details ... 1993 DBLP  BibTeX  RDF
21Diana E. D'Angelo You don't have to look like a pirate to be one - the role of academic computing in software piracy deterrence. Search on Bibsonomy SIGUCCS The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
21Stein Weissenberger Deterrence and the design of treaty verification systems. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
21Paul K. Davis A new analytic technique for the study of deterrence, escalation control, and war termination. Search on Bibsonomy Simul. The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
21Jeffrey H. Grotte An Optimizing Nuclear Exchange Model for the Analysis of Nuclear War and Deterrence. Search on Bibsonomy Oper. Res. The full citation details ... 1982 DBLP  DOI  BibTeX  RDF
18Amir Hossein Gholamipour, Elaheh Bozorgzadeh, Lichun Bao Seamless sequence of software defined radio designs through hardware reconfigurability of FPGAs. Search on Bibsonomy ICCD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Kenta Chinomi, Naoko Nitta, Yoshimichi Ito, Noboru Babaguchi PriSurv: Privacy Protected Video Surveillance System Using Adaptive Visual Abstraction. Search on Bibsonomy MMM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Anjali Sardana, Krishan Kumar 0001, Ramesh Chandra Joshi Detection and Honeypot Based Redirection to Counter DDoS Attacks in ISP Domain. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Ibrahim Mostafa Ibrahim, Sherif Hazem Nour El-Din, Abdel Fatah A. Hegazy An Effective and Secure Buyer-Seller Watermarking Protocol. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Mikko T. Siponen, Seppo Pahnila, M. Adam Mahmood Employees' Adherence to Information Security Policies: An Empirical Study. Search on Bibsonomy SEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Lei Shi 0022, Masamitsu Onishi, Kiyoshi Kobayashi A Public-Private-Partnership model with moral hazard of SPC and bank. Search on Bibsonomy SMC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Sabri Saidam Knowledge and e-governance building in conflict affected societies: challenges and mechanisms. Search on Bibsonomy ICEGOV The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Min-Hua Shao A Privacy-Preserving Buyer-Seller Watermarking Protocol with Semi-trust Third Party. Search on Bibsonomy TrustBus The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Digital commerce, conspiracy attacks, security, anonymity, copyright protection
18Syed Naqvi, Philippe Massonet, Alvaro Arenas Scope of Forensics in Grid Computing - Vision and Perspectives. Search on Bibsonomy ISPA Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF forensics techniques, return of security investment, Grid security
Displaying result #101 - #200 of 212 (100 per page; Change: )
Pages: [<<][1][2][3][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license