The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for fps with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1971-1988 (15) 1989-1997 (18) 1998-2001 (20) 2002-2003 (18) 2004 (27) 2005 (45) 2006 (56) 2007 (59) 2008 (80) 2009 (38) 2010 (20) 2011 (32) 2012 (45) 2013 (42) 2014 (62) 2015 (41) 2016 (36) 2017 (44) 2018 (40) 2019 (46) 2020 (35) 2021 (40) 2022 (52) 2023 (68) 2024 (9)
Publication types (Num. hits)
article(177) book(2) incollection(3) inproceedings(788) phdthesis(3) proceedings(15)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 386 occurrences of 306 keywords

Results
Found 988 publication records. Showing 988 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
38William Briguglio, Sherif Saad Interpreting Machine Learning Malware Detectors Which Leverage N-gram Analysis. Search on Bibsonomy FPS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
38Lalia Saoudi, Kamel Adi, Younes Boudraa A Rejection-Based Approach for Detecting SQL Injection Vulnerabilities in Web Applications. Search on Bibsonomy FPS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
38Alessandro Cantelli Forti, Michele Colajanni Digital Forensics in Vessel Transportation Systems. Search on Bibsonomy FPS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
38Charles Morisset, Sowmya Ravidas, Nicola Zannone On Attribute Retrieval in ABAC. Search on Bibsonomy FPS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
38David Gérault, Pascal Lafourcade 0001 Towards Secure TMIS Protocols. Search on Bibsonomy FPS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
38Maël Nogues, David Brosset, Hanan Hindy, Xavier J. A. Bellekens, Yvon Kermarrec Labelled Network Capture Generation for Anomaly Detection. Search on Bibsonomy FPS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
38Simon Tanner, Ilian Vogels, Roger Wattenhofer Protecting Android Apps from Repackaging Using Native Code. Search on Bibsonomy FPS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
38Mohammed Alshahrani, Issa Traoré, Sherif Saad Lightweight IoT Mutual Authentication Scheme Based on Transient Identities and Transactions History. Search on Bibsonomy FPS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
38Silvio Ranise, Giada Sciarretta, Alessandro Tomasi 0001 Enroll, and Authentication Will Follow - eID-Based Enrollment for a Customized, Secure, and Frictionless Authentication Experience. Search on Bibsonomy FPS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
38Nadjate Saidani, Kamel Adi, Mohand Saïd Allili Semantic Representation Based on Deep Learning for Spam Detection. Search on Bibsonomy FPS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
38Hossein Shirazi, Indrakshi Ray, Charles Anderson 0001 Using Machine Learning to Detect Anomalies in Embedded Networks in Heavy Vehicles. Search on Bibsonomy FPS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
38Pascal Lafourcade 0001, Mike Nopere, Jérémy Picot, Daniela Pizzuti, Etienne Roudeix Security Analysis of Auctionity: A Blockchain Based E-Auction. Search on Bibsonomy FPS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
38Jaimin Modi, Issa Traoré, Asem Ghaleb, Karim Ganame, Sherif Ahmed Detecting Ransomware in Encrypted Web Traffic. Search on Bibsonomy FPS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
38Davy Preuveneers, Wouter Joosen TATIS: Trustworthy APIs for Threat Intelligence Sharing with UMA and CP-ABE. Search on Bibsonomy FPS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
38Muhammad Mohzary, Srikanth Tadisetty, Kambiz Ghazinour A Privacy Protection Layer for Wearable Devices. Search on Bibsonomy FPS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
38Pascal Lafourcade 0001, Marius Lombard-Platet Get-your-ID: Decentralized Proof of Identity. Search on Bibsonomy FPS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
38Emil Shirima, Kambiz Ghazinour Towards Privacy-Aware Smart Surveillance. Search on Bibsonomy FPS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
38Meng Yang, Guang Gong Lempel-Ziv Compression with Randomized Input-Output for Anti-compression Side-Channel Attacks Under HTTPS/TLS. Search on Bibsonomy FPS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
38Edoukou Berenger Ayebie, Hafsa Assidi, El Mamoun Souidi An Efficient Identification Scheme Based on Rank Metric. Search on Bibsonomy FPS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
38Johannes Blömer, Nils Löken Dynamic Searchable Encryption with Access Control. Search on Bibsonomy FPS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
38Hakuei Sugimoto, Ryota Hatano, Natsu Shoji, Kazuo Sakiyama Validating the DFA Attack Resistance of AES (Short Paper). Search on Bibsonomy FPS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
38Peter Amthor 0001, Martin Rabe Command Dependencies in Heuristic Safety Analysis of Access Control Models. Search on Bibsonomy FPS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
38Sepideh Avizheh, Reihaneh Safavi-Naini, Shuai Li Secure Logging with Security Against Adaptive Crash Attack. Search on Bibsonomy FPS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
38Routa Moussaileb, Nora Cuppens, Jean-Louis Lanet, Hélène Le Bouder Ransomware Network Traffic Analysis for Pre-encryption Alert. Search on Bibsonomy FPS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
38Guang Gong, Morgan He, Raghvendra Rohit 0001, Yunjie Yi U-EPS: An Ultra-small and Efficient Post-quantum Signature Scheme. Search on Bibsonomy FPS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
38Daniel Servos, Michael Bauer Incorporating Off-Line Attribute Delegation into Hierarchical Group and Attribute-Based Access Control. Search on Bibsonomy FPS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
38Mohamad Mansouri, Beyza Bozdemir, Melek Önen, Orhan Ermis PAC: Privacy-Preserving Arrhythmia Classification with Neural Networks. Search on Bibsonomy FPS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
38Abdessamad Imine, José M. Fernandez 0001, Jean-Yves Marion, Luigi Logrippo, Joaquín García-Alfaro (eds.) Foundations and Practice of Security - 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers Search on Bibsonomy FPS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
38Antonio Nehme, Vitor Jesus, Khaled Mahbub, Ali E. Abdallah Fine-Grained Access Control for Microservices. Search on Bibsonomy FPS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
38Mariana Segovia, Ana Rosa Cavalli, Nora Cuppens, Joaquín García-Alfaro A Study on Mitigation Techniques for SCADA-Driven Cyber-Physical Systems (Position Paper). Search on Bibsonomy FPS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
38Guang Gong Securing Internet-of-Things. Search on Bibsonomy FPS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
38Sébanjila Kevin Bukasa, Ludovic Claudepierre, Ronan Lashermes, Jean-Louis Lanet When Fault Injection Collides with Hardware Complexity. Search on Bibsonomy FPS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
38David Bissessar, Maryam Hezaveh, Fayzah Alshammari, Carlisle Adams Mobile Travel Credentials. Search on Bibsonomy FPS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
38Erick Eduardo Bernal Martinez, Bella Oh, Feng Li 0001, Xiao Luo 0002 Evading Deep Neural Network and Random Forest Classifiers by Generating Adversarial Samples. Search on Bibsonomy FPS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
38Luigi Logrippo, Abdelouadoud Stambouli Configuring Data Flows in the Internet of Things for Security and Privacy Requirements. Search on Bibsonomy FPS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
38Onur Duman, Amr M. Youssef Fault Analysis of the New Ukrainian Hash Function Standard: Kupyna. Search on Bibsonomy FPS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
38Xavier Bultel, Radu Ciucanu, Matthieu Giraud, Pascal Lafourcade 0001, Lihua Ye Secure Joins with MapReduce. Search on Bibsonomy FPS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
38Léopold Ouairy, Hélène Le Bouder, Jean-Louis Lanet Protection of Systems Against Fuzzing Attacks. Search on Bibsonomy FPS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
38Yuri Gil Dantas, Tobias Hamann, Heiko Mantel A Comparative Study Across Static and Dynamic Side-Channel Countermeasures. Search on Bibsonomy FPS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
38Thang Bui, Scott D. Stoller, Jiajie Li Mining Relationship-Based Access Control Policies from Incomplete and Noisy Data. Search on Bibsonomy FPS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
38Aniss Chohra, Mourad Debbabi, Paria Shirani Daedalus: Network Anomaly Detection on IDS Stream Logs. Search on Bibsonomy FPS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
38Tahir Ahmad, Silvio Ranise Validating Requirements of Access Control for Cloud-Edge IoT Solutions (Short Paper). Search on Bibsonomy FPS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
38Vignesh M. Pagadala, Indrakshi Ray Achieving Mobile-Health Privacy Using Attribute-Based Access Control. Search on Bibsonomy FPS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
38Hibiki Ono, Yoshifumi Manabe Card-Based Cryptographic Protocols with the Minimum Number of Cards Using Private Operations. Search on Bibsonomy FPS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
38Tobias Hamann, Heiko Mantel Decentralized Dynamic Security Enforcement for Mobile Applications with CliSeAuDroid. Search on Bibsonomy FPS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
38Sébastien Gambs Privacy and Ethical Challenges in Big Data. Search on Bibsonomy FPS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
38Giovanni Di Crescenzo Cryptographic Formula Obfuscation. Search on Bibsonomy FPS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
38Suryadipta Majumdar, Taous Madi, Yosr Jarraya, Makan Pourzandi, Lingyu Wang 0001, Mourad Debbabi Cloud Security Auditing: Major Approaches and Existing Challenges. Search on Bibsonomy FPS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
38Frédéric Cuppens, Lingyu Wang 0001, Nora Cuppens-Boulahia, Nadia Tawbi, Joaquín García-Alfaro (eds.) Foundations and Practice of Security - 9th International Symposium, FPS 2016, Québec City, QC, Canada, October 24-25, 2016, Revised Selected Papers Search on Bibsonomy FPS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
38Maxime Puys, Marie-Laure Potet, Abdelaziz Khaled Generation of Applicative Attacks Scenarios Against Industrial Systems. Search on Bibsonomy FPS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
38Elliott Blot, Jannik Dreier, Pascal Lafourcade 0001 Formal Analysis of Combinations of Secure Protocols. Search on Bibsonomy FPS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
38Alexey Rabin, Ehud Gudes Secure Protocol of ABAC Certificates Revocation and Delegation. Search on Bibsonomy FPS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
38Konrad-Felix Krentz, Christoph Meinel, Hendrik Graupner More Lightweight, yet Stronger 802.15.4 Security Through an Intra-layer Optimization. Search on Bibsonomy FPS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
38Shujie Cui, Muhammad Rizwan Asghar, Steven D. Galbraith, Giovanni Russello ObliviousDB: Practical and Efficient Searchable Encryption with Controllable Leakage. Search on Bibsonomy FPS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
38Sunny Raj, Laura Pullum, Arvind Ramanathan, Sumit Kumar Jha 0001 SATYA : Defending Against Adversarial Attacks Using Statistical Hypothesis Testing. Search on Bibsonomy FPS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
38Johannes Blömer, Peter Günther 0001, Volker Krummel, Nils Löken Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations. Search on Bibsonomy FPS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
38Harry Halpin A Roadmap for High Assurance Cryptography. Search on Bibsonomy FPS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
38Gustavo Gonzalez Granadillo, Elena Doynikova, Igor V. Kotenko, Joaquín García-Alfaro Attack Graph-Based Countermeasure Selection Using a Stateful Return on Investment Metric. Search on Bibsonomy FPS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
38Khalid Shahbar, Nur Zincir-Heywood Weighted Factors for Evaluating Anonymity. Search on Bibsonomy FPS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
38Richard Gay, Jinwei Hu, Heiko Mantel, Sogol Mazaheri Relationship-Based Access Control for Resharing in Decentralized Online Social Networks. Search on Bibsonomy FPS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
38Sergei Tikhomirov Ethereum: State of Knowledge and Research Perspectives. Search on Bibsonomy FPS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
38Mohamed Recem Boussaha, Raphaël Khoury, Sylvain Hallé Monitoring of Security Properties Using BeepBeep. Search on Bibsonomy FPS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
38Nina Bindel, Johannes Buchmann 0001, Juliane Krämer, Heiko Mantel, Johannes Schickel, Alexandra Weber Bounding the Cache-Side-Channel Leakage of Lattice-Based Signature Schemes Using Program Semantics. Search on Bibsonomy FPS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
38Alberto Ferrante, Miroslaw Malek, Fabio Martinelli, Francesco Mercaldo, Jelena Milosevic Extinguishing Ransomware - A Hybrid Approach to Android Ransomware Detection. Search on Bibsonomy FPS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
38Daniel Fraunholz, Christoph Lipps, Marc Zimmermann, Simon Duque Antón, Johannes Karl Martin Mueller, Hans Dieter Schotten Deception in Information Security: Legal Considerations in the Context of German and European Law. Search on Bibsonomy FPS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
38Tushar Kanti Saha, Takeshi Koshiba Privacy-Preserving Equality Test Towards Big Data. Search on Bibsonomy FPS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
38Luigi Logrippo Multi-level Access Control, Directed Graphs and Partial Orders in Flow Control for Data Secrecy and Privacy. Search on Bibsonomy FPS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
38Olivier Pereira, Florentin Rochet, Cyrille Wiedling Formal Analysis of the FIDO 1.x Protocol. Search on Bibsonomy FPS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
38Julio Navarro, Véronique Legrand, Sofiane Lagraa, Jérôme François, Abdelkader Lahmadi, Giulia De Santis, Olivier Festor, Nadira Lammari, Fayçal Hamdi 0001, Aline Deruyver, Quentin Goux, Morgan Allard, Pierre Parrend HuMa: A Multi-layer Framework for Threat Analysis in a Heterogeneous Log Environment. Search on Bibsonomy FPS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
38Joaquín García-Alfaro, Evangelos Kranakis, Guillaume Bonfante (eds.) Foundations and Practice of Security - 8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papers Search on Bibsonomy FPS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
38Raphaël Khoury, Sébastien Gaboury, Sylvain Hallé Three Views of Log Trace Triaging. Search on Bibsonomy FPS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
38Zhongtian Chen, Hao Han Attack Mitigation by Data Structure Randomization. Search on Bibsonomy FPS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
38Guillaume Bonfante, Julien Oury Nogues Function Classification for the Retro-Engineering of Malwares. Search on Bibsonomy FPS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
38Tushar Kanti Saha, Takeshi Koshiba An Enhancement of Privacy-Preserving Wildcards Pattern Matching. Search on Bibsonomy FPS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
38Mina Sheikhalishahi, Mohamed Mejri, Nadia Tawbi, Fabio Martinelli Privacy-Aware Data Sharing in a Tree-Based Categorical Clustering Algorithm. Search on Bibsonomy FPS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
38Salaheddine Zerkane, David Espes, Philippe Le Parc, Frédéric Cuppens Vulnerability Analysis of Software Defined Networking. Search on Bibsonomy FPS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
38Andrew Bedford, Sébastien Garvin, Josée Desharnais, Nadia Tawbi, Hana Ajakan, Frédéric Audet, Bernard Lebel Andrana: Quick and Accurate Malware Detection for Android. Search on Bibsonomy FPS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
38Olivier Blazy, Xavier Bultel, Pascal Lafourcade 0001 Anonymizable Ring Signature Without Pairing. Search on Bibsonomy FPS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
38Tarek Bouyahia, Nora Cuppens-Boulahia, Frédéric Cuppens, Fabien Autrel Multi-Criteria Recommender Approach for Supporting Intrusion Response System. Search on Bibsonomy FPS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
38Mickael Emirkanian-Bouchard, Lingyu Wang 0001 Towards Metric-Driven, Application-Specific Visualization of Attack Graphs. Search on Bibsonomy FPS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
38Hélène Le Bouder, Ronan Lashermes, Yanis Linge, Gaël Thomas 0002, Jean-Yves Zie A Multi-round Side Channel Attack on AES Using Belief Propagation. Search on Bibsonomy FPS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
38Nadine Herold, Matthias Wachs, Stephan-Alexander Posselt, Georg Carle An Optimal Metric-Aware Response Selection Strategy for Intrusion Response Systems. Search on Bibsonomy FPS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
38Lyes Bayou, David Espes, Nora Cuppens-Boulahia, Frédéric Cuppens Security Analysis of WirelessHART Communication Scheme. Search on Bibsonomy FPS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
38Sofiene Boulares, Kamel Adi, Luigi Logrippo Insider Threat Likelihood Assessment for Access Control Systems: Quantitative Approach. Search on Bibsonomy FPS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
38Richard E. Harang, Peter Mell Micro-signatures: The Effectiveness of Known Bad N-Grams for Network Anomaly Detection. Search on Bibsonomy FPS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
38Nawaf Alhebaishi, Lingyu Wang 0001, Sushil Jajodia, Anoop Singhal Threat Modeling for Cloud Data Center Infrastructures. Search on Bibsonomy FPS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
38Deepak Subramanian, Guillaume Hiet, Christophe Bidan A Self-correcting Information Flow Control Model for the Web-Browser. Search on Bibsonomy FPS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
38Daniel Servos, Sylvia L. Osborn Strategies for Incorporating Delegation into Attribute-Based Access Control (ABAC). Search on Bibsonomy FPS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
38Antonio La Marra, Fabio Martinelli, Andrea Saracino, Mina Sheikhalishahi MalProfiler: Automatic and Effective Classification of Android Malicious Apps in Behavioral Classes. Search on Bibsonomy FPS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
38Oscar M. Guillen, Fabrizio De Santis, Ralf Brederlow, Georg Sigl Towards Side-Channel Secure Firmware Updates - A Minimalist Anomaly Detection Approach. Search on Bibsonomy FPS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
38Erkan Ersan, Lior Malka, Bruce M. Kapron Semantically Non-preserving Transformations for Antivirus Evaluation. Search on Bibsonomy FPS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
38Jurek Czyzowicz, Adrian Kosowski, Evangelos Kranakis, Najmeh Taleb Patrolling Trees with Mobile Robots. Search on Bibsonomy FPS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
38Saed Alrabaee, Paria Shirani, Mourad Debbabi, Lingyu Wang 0001 On the Feasibility of Malware Authorship Attribution. Search on Bibsonomy FPS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
38Frédéric Cuppens, Joaquín García-Alfaro, Nur Zincir-Heywood, Philip W. L. Fong (eds.) Foundations and Practice of Security - 7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers Search on Bibsonomy FPS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
38Guangye Sui, Mohamed Mejri Security Enforcement by Rewriting: An Algebraic Approach. Search on Bibsonomy FPS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
38Pascal Lafourcade 0001, Maxime Puys Performance Evaluations of Cryptographic Protocols Verification Tools Dealing with Algebraic Properties. Search on Bibsonomy FPS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
38Pascal Bissig, Philipp Brandes, Jonas Passerini, Roger Wattenhofer Inferring Touch from Motion in Real World Data. Search on Bibsonomy FPS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
38Minh Hai Nguyen, Mizuhito Ogawa, Quan Thanh Tho Obfuscation Code Localization Based on CFG Generation of Malware. Search on Bibsonomy FPS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
38Meriam Ben-Ghorbel-Talbi, François Lesueur, Gaetan Perrin Information Flow Control on a Multi-paradigm Web Application for SQL Injection Prevention. Search on Bibsonomy FPS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
38Evangelos Kranakis, Danny Krizanc Optimization Problems in Infrastructure Security. Search on Bibsonomy FPS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 988 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license