|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 2004 occurrences of 1111 keywords
|
|
|
Results
Found 4563 publication records. Showing 4562 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
26 | Daniel A. Ray, Phillip G. Bradford |
An Integrated System for Insider Threat Detection. (PDF / PS) |
IFIP Int. Conf. Digital Forensics |
2007 |
DBLP DOI BibTeX RDF |
proactive forensics, anomaly detection, Insider threats |
26 | Esther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda |
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security. |
DEXA Workshops |
2007 |
DBLP DOI BibTeX RDF |
Threats and Attacks, Security, Trust, Mobile P2P |
26 | C. Corzo, F. Corzo S., Ning Zhang 0001, Andy Carpenter |
Using Automated Banking Certificates to Detect Unauthorised Financial Transactions. |
Financial Cryptography |
2006 |
DBLP DOI BibTeX RDF |
financial fraud, Data integrity, Security architecture, Insider threats |
26 | Mehmet Sahinoglu |
Security Meter: A Practical Decision-Tree Model to Quantify Risk. |
IEEE Secur. Priv. |
2005 |
DBLP DOI BibTeX RDF |
measuring risk, qualitative design, security meter, threats, quantify |
26 | Evan Cooke, Michael D. Bailey, Zhuoqing Morley Mao, David Watson 0001, Farnam Jahanian, Danny McPherson |
Toward understanding distributed blackhole placement. |
WORM |
2004 |
DBLP DOI BibTeX RDF |
blackhole monitoring, blackhole placement, globally scoped threats, internet motion sensor, network security, computer worms |
26 | Patrick C. K. Hung, Kamalakar Karlapalem |
A Paradigm for Security Enforcement in CapBasED-AMS. |
CoopIS |
1997 |
DBLP DOI BibTeX RDF |
security enforcement paradigm, CapBasED-AMS, capability-based event-driven activity management system, activity execution, problem-solving agent, multiple interdependent tasks, task execution, unauthorized modification, pilferage, illegal privacy violation, specification-time data, compile-time data, run-time data, system infrastructure, secure match-making, security constraints, task coordination model, security resource control, role-based resource security model, security policies, task scheduling, security of data, security threats, unauthorized access |
26 | Yuko Murayama |
Configuration Detection as a Problem of Knowledge Discovery in Computer Networks. |
CoopIS |
1997 |
DBLP DOI BibTeX RDF |
configuration detection, network object existence, network object location, network configuration knowledge maintenance, scale problem, management domain partitioning, network address authorisation, network-level threats, security technique, address resolution, data mining, knowledge discovery, computer networks, configuration management, routers, inconsistency, internetworking, dynamic learning, invalidity, hosts |
26 | Jatin N. Hansoty, Mladen A. Vouk, Shyhtsun Felix Wu |
LAVA: Secure Delegation of Mobile Applets: Design, Implementation, and Applications. |
WETICE |
1997 |
DBLP DOI BibTeX RDF |
LAVA, secure delegation, mobile applets, distributed computing paradigm, network-based applications, web-based mobile applets, SNMP network management, design, electronic commerce, intelligent agent, implementation, active networking, system management, computer network management, security threats, prototype implementation |
26 | Ross J. Anderson |
A Security Policy Model for Clinical Information Systems. |
S&P |
1996 |
DBLP DOI BibTeX RDF |
personal health information protection, medical ethics, privacy threats, restricted user numbers, restricted record numbers, strong notification property enforcement, localized information exposure, private banking, intelligence data management, security of data, data privacy, medical information systems, information flow control, DP management, clinical information systems, security policy model |
26 | Myong H. Kang, Ira S. Moskowitz, Bruce E. Montrose, James J. Parsonese |
A Case Study Of Two Nrl Pump Prototypes. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
NRL Pump, data pump, interconnected computer systems, process layer, 4-layer network reference model, DOS-Pump, D-Pump, event-driven Pump, E-Pump, performance, prototypes, congestion control, case study, fairness, open systems, open systems, covert channels, hardware implementation, secure communication, transport layer, reliable communication, threats, denial-of-service attacks |
26 | Julie L. Connolly |
Operation chain link: the deployment of a firewall at Hanscom Air Force Base. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
operation chain link, Hanscom Air Force Base, Electronic Systems Center, unclassified network, Internet threats, network security assessments, hacker break-in, firewall development team, firewall deployment, security management, military computing |
24 | Lundy Lewis, John F. Buford, Gabriel Jakobson |
Inferring threats in urban environments with uncertain and approximate data: an agent-based approach. |
Appl. Intell. |
2009 |
DBLP DOI BibTeX RDF |
Threat assessment, Uncertain/approximate data, Fuzzy, BDI agent, Agent platform, Peer-to-peer overlay |
24 | K. R. Catchpole, A. E. B. Giddings, G. Hirst, T. Dale, G. J. Peek, Marc Roger de Leval |
A method for measuring threats and errors in surgery. |
Cogn. Technol. Work. |
2008 |
DBLP DOI BibTeX RDF |
Non-technical skills, Safety, Teamwork, Error, Surgery |
24 | Stephan Kubisch, Harald Widiger, Peter Danielis, Jens Schulz, Dirk Timmermann, Thomas Bahls, Daniel Duchow |
Countering phishing threats with trust-by-wire in packet-switched ip networks - a conceptual framework. |
IPDPS |
2008 |
DBLP DOI BibTeX RDF |
|
24 | M. Shirantha de Silva, David J. Parish, Peter Sandford, Jonathan M. Sandford |
Automated Detection of Emerging Network Security Threats. |
ICN |
2007 |
DBLP DOI BibTeX RDF |
Honey Net, Network Security, Network Management, Network Monitoring, Honeypot, System Security |
24 | Ignacio J. Martinez-Moyano, Stephen H. Conrad, David F. Andersen |
An Outcome-Based Learning Model to Identify Emerging Threats: Experimental and Simulation Results. |
HICSS |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Elankayer Sithirasenan, Vallipuram Muthukkumarasamy |
Detecting Security Threats in Wireless LANs Using Timing and Behavioral Anomalies. |
ICON |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Komminist Weldemariam, Adolfo Villafiorita, Andrea Mattioli |
Assessing Procedural Risks and Threats in e-Voting: Challenges and an Approach. |
VOTE-ID |
2007 |
DBLP DOI BibTeX RDF |
Procedural Security, Threat Actions, Modeling, e-Voting |
24 | Flora S. Tsai, Kap Luk Chan |
Detecting Cyber Security Threats in Weblogs Using Probabilistic Models. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
cyber terrorism, data mining, blog, weblog, probabilistic latent semantic analysis, cyber security, cyber crime |
24 | P. J. Sandford, David J. Parish, Jonathan M. Sandford |
Detecting security threats in the network core using Data Mining techniques. |
NOMS |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Hyangjin Lee, Jeeyeon Kim |
Privacy threats and issues in mobile RFID. |
ARES |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Amar Singh, Lawrence B. Holder |
Classification of Threats Via a Multi-sensor Security Portal. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Leila Amgoud, Henri Prade |
Formal Handling of Threats and Rewards in a Negotiation Dialogue. |
ArgMAS |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Sang-ho Kim, Choon Seong Leem |
Security Threats and Their Countermeasures of Mobile Portable Computing Devices in Ubiquitous Computing Environments. |
ICCSA (4) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Richard A. Smith |
Background Use of Sensitive Information to Aid in Analysis of Non-sensitive Data on Threats and Vulnerabilities. |
ISI |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Leila Amgoud, Henri Prade |
Formal handling of threats and rewards in a negotiation dialogue. |
AAMAS |
2005 |
DBLP DOI BibTeX RDF |
negotiation, argumentation |
22 | Steven Walker-Roberts, Mohammad Hammoudeh, Omer Aldabbas 0001, Mehmet Aydin 0001, Ali Dehghantanha |
Threats on the horizon: understanding security threats in the era of cyber-physical systems. |
J. Supercomput. |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Mohammad Wazid, Sherali Zeadally, Ashok Kumar Das |
Mobile Banking: Evolution and Threats: Malware Threats and Security Solutions. |
IEEE Consumer Electron. Mag. |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Artur Rot, Boguslaw Olszewski |
Advanced Persistent Threats Attacks in Cyberspace. Threats, Vulnerabilities, Methods of Protection. |
FedCSIS (Position Papers) |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Stefano Zatti |
The Protection of Space Missions: Threats and Cyber Threats. |
ICISS |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Yassir Hashem, Hassan Takabi, Ram Dantu, Rodney D. Nielsen |
A Multi-Modal Neuro-Physiological Study of Malicious Insider Threats. |
MIST@CCS |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Alexandr Vasenev, Lorena Montoya |
Analysing non-malicious threats to urban smart grids by interrelating threats and threat taxonomies. |
ISC2 |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Tabish Rashid, Ioannis Agrafiotis, Jason R. C. Nurse |
A New Take on Detecting Insider Threats: Exploring the Use of Hidden Markov Models. |
MIST@CCS |
2016 |
DBLP BibTeX RDF |
|
22 | Kyungroul Lee, Hyeungjun Yeuk, Kangbin Yim, Suhyun Kim |
Analysis on Manipulation of the MAC Address and Consequent Security Threats. |
MIST@CCS |
2016 |
DBLP BibTeX RDF |
|
22 | Markus Wurzenberger, Florian Skopik, Roman Fiedler, Wolfgang Kastner |
Discovering Insider Threats from Log Data with High-Performance Bioinformatics Tools. |
MIST@CCS |
2016 |
DBLP BibTeX RDF |
|
22 | Florian Kammueller, Manfred Kerber, Christian W. Probst |
Towards Formal Analysis of Insider Threats for Auctions. |
MIST@CCS |
2016 |
DBLP BibTeX RDF |
|
22 | Andrew Stephen McGough, David Wall, John Brennan, Georgios Theodoropoulos 0001, Ed Ruck-Keene, Budi Arief, Carl Gamble, John S. Fitzgerald, Aad P. A. van Moorsel, Sujeewa Alwis |
Insider Threats: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software (Ben-ware). |
MIST@CCS |
2015 |
DBLP DOI BibTeX RDF |
|
22 | Kangbin Yim, Aniello Castiglione, Jeong Hyun Yi, Mauro Migliardi, Ilsun You |
Cyber Threats to Industrial Control Systems. |
MIST@CCS |
2015 |
DBLP DOI BibTeX RDF |
|
22 | Gökhan Kul, Shambhu J. Upadhyaya |
A Preliminary Cyber Ontology for Insider Threats in the Financial Sector. |
MIST@CCS |
2015 |
DBLP DOI BibTeX RDF |
|
22 | William R. Claycomb |
Detecting Insider Threats: Who Is Winning the Game? |
MIST@CCS |
2015 |
DBLP DOI BibTeX RDF |
|
22 | Paul Ferguson |
Observations on Emerging Threats. |
LEET |
2012 |
DBLP BibTeX RDF |
|
22 | Maureen Stillman, Ram Gopal, Erik Guttman, Senthil Sengodan, Matt Holdrege |
Threats Introduced by Reliable Server Pooling (RSerPool) and Requirements for Security in Response to Threats. |
RFC |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Taradas Bandyopadhyay |
Threats, counter-threats and strategic manipulation for non-binary group decision rules. |
Math. Soc. Sci. |
1982 |
DBLP DOI BibTeX RDF |
|
20 | Hector Ouilhet |
Google Sky Map: using your phone as an interface. |
Mobile HCI |
2010 |
DBLP DOI BibTeX RDF |
|
20 | Satnam Singh, Haiying Tu, William Donat, Krishna R. Pattipati, Peter Willett 0001 |
Anomaly Detection via Feature-Aided Tracking and Hidden Markov Models. |
IEEE Trans. Syst. Man Cybern. Part A |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Simon N. Foley, William M. Fitzgerald |
An Approach to Security Policy Configuration Using Semantic Threat Graphs. (PDF / PS) |
DBSec |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Mohammed Hussain, David B. Skillicorn |
Guarantee-Based Access Control. |
CSE (3) |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Daniele Riboni, Claudio Bettini |
Cor-Split: Defending Privacy in Data Re-publication from Historical Correlations and Compromised Tuples. |
SSDBM |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Maurizio Atzori, Francesco Bonchi, Fosca Giannotti, Dino Pedreschi |
Anonymity preserving pattern discovery. |
VLDB J. |
2008 |
DBLP DOI BibTeX RDF |
Individual privacy, anonymity, Knowledge discovery, Privacy preserving data mining, Frequent pattern mining |
20 | Fazirulhisyam Hashim, M. Rubaiyat Kibria, Abbas Jamalipour |
A Detection and Recovery Architecture Against DoS and Worm Attacks in NGMN. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Ruth Breu, Frank Innerhofer-Oberperfler, Artsiom Yautsiukhin |
Quantitative Assessment of Enterprise Security System. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
Information Security, Risk Management |
20 | Tor Stålhane, Guttorm Sindre |
Safety Hazard Identification by Misuse Cases: Experimental Comparison of Text and Diagrams. |
MoDELS |
2008 |
DBLP DOI BibTeX RDF |
safety hazards, experiment, Use cases, misuse cases |
20 | Sojan Markose, Xiaoqing Frank Liu, Bruce M. McMillin |
A Systematic Framework for Structured Object-Oriented Security Requirements Analysis in Embedded Systems. |
EUC (1) |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Stefania Bandini, Franco Celada, Sara Manzoni, Giuseppe Vizzari |
Modelling the immune system: the case of situated cellular agents. |
Nat. Comput. |
2007 |
DBLP DOI BibTeX RDF |
Immune system modeling, Multi-agent systems, Multi-agent based simulation |
20 | William A. Pike, Chad Scherrer, S. Zabriskie |
Putting Security in Context: Visual Correlation of Network Activity with Real-World Information. |
VizSEC |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Muhammad Sher, Thomas Magedanz |
3G-WLAN Convergence: Vulnerability, Attacks Possibilities and Security Model. |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Michael D. Bailey, Jon Oberheide, Jon Andersen, Zhuoqing Morley Mao, Farnam Jahanian, Jose Nazario |
Automated Classification and Analysis of Internet Malware. |
RAID |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Giannis F. Marias, Stelios Dritsas, Marianthi Theoharidou, John Mallios, Dimitris Gritzalis |
SIP Vulnerabilities and Anti-SPIT Mechanisms Assessment. |
ICCCN |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Ren-Chiun Wang, Wen-Shenq Juang, Chin-Laung Lei |
A Simple and Efficient Key Exchange Scheme Against the Smart Card Loss Problem. |
EUC Workshops |
2007 |
DBLP DOI BibTeX RDF |
authentication, smart card, hash function, password, key exchange |
20 | Young-Gab Kim, Jongin Lim 0001 |
HMM-Based Approach for Evaluating Risk Propagation. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum |
The Evolution of RFID Security. |
IEEE Pervasive Comput. |
2006 |
DBLP DOI BibTeX RDF |
security, privacy, radio frequency identification, RFID, history |
20 | Eduardo B. Fernández, Michael VanHilst, María M. Larrondo-Petrie, Shihong Huang |
Defining Security Requirements Through Misuse Actions. |
IFIP Workshop on Advanced Software Engineering |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Wojciech Zamojski, Dariusz Caban |
Introduction to the Dependability Modeling of Computer Systems. |
DepCoS-RELCOMEX |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Aaron J. Rice, John R. McDonnell, Andy Spydell, Stewart Stremler |
A Player for Tactical Air Strike Games Using Evolutionary Computation. |
CIG |
2006 |
DBLP DOI BibTeX RDF |
|
20 | In-Jung Kim, Yoon Jung Chung, YoungGyo Lee, Eul-Gyu Im, Dongho Won |
Information System Modeling for Analysis of Propagation Effects and Levels of Damage. |
ICCSA (3) |
2006 |
DBLP DOI BibTeX RDF |
Damage propagation, Safeguard, Risk analysis, Intrusion, Epidemic |
20 | Young-Gab Kim, Dongwon Jeong, Soo-Hyun Park, Jongin Lim 0001, Doo-Kwon Baik |
Modeling and Simulation for Security Risk Propagation in Critical Information Systems. |
CIS |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Shince Thomas, Devesh Misra, P. R. Lakshmi Eswari, N. Sarat Chandra Babu |
A Transparent End-to-End Security Solution. |
ICISS |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Alan N. Steinberg |
Threat Assessment Technology Development. |
CONTEXT |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Michel Barbeau |
WiMax/802.16 threat analysis. |
Q2SWinet |
2005 |
DBLP DOI BibTeX RDF |
wireless network, WiMax, 802.16, threat analysis |
20 | Sindhu Karthikeyan, Mikhail Nesterenko |
RFID security without extensive cryptography. |
SASN |
2005 |
DBLP DOI BibTeX RDF |
security, privacy, RFID |
20 | Tai-Hoon Kim, Seung-youn Lee |
Design Procedure of IT Systems Security Countermeasures. |
ICCSA (2) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Stefania Bandini, Franco Celada, Sara Manzoni, Roberto Puzone, Giuseppe Vizzari |
Modelling the Immune System with Situated Agents. |
WIRN/NAIS |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Luncheng Lin, Bashar Nuseibeh, Darrel C. Ince, Michael Jackson 0001 |
Using Abuse Frames to Bound the Scope of Security Problems. |
RE |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Otto Kolsi, Teemupekka Virtanen |
MIDP 2.0 Security Enhancements. |
HICSS |
2004 |
DBLP DOI BibTeX RDF |
security, J2ME, MIDP |
20 | Tai-Hoon Kim, Dong Chun Lee |
Reduction Method of Threat Phrases by Classifying Assets. |
ICCSA (1) |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Seung-youn Lee, Myong-Chul Shin, Jae Sang Cha, Tai-Hoon Kim |
Threat Description for Developing Security Countermeasure. |
PCM (1) |
2004 |
DBLP DOI BibTeX RDF |
|
20 | J. William Murdock, David W. Aha, Len Breslow |
Assessing Elaborated Hypotheses: An Interpretive Case-Based Reasoning Approach. |
ICCBR |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Igor Balk |
Bio-Feedback Based Simulator for Mission Critical Training. |
International Conference on Computational Science |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Tai-Hoon Kim, Byung-Gyu No, Dong Chun Lee |
Threat Description for the PP by Using the Concept of the Assets Protected by TOE. |
International Conference on Computational Science |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Richard A. Kemmerer |
Cybersecurity. |
ICSE |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Lance Spitzner |
Honeypots: Catching the Insider Threat. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Randy C. Marchany, Joseph G. Tront |
E-commerce Security Issues. |
HICSS |
2002 |
DBLP DOI BibTeX RDF |
e-commerce, Network Security, e-business, internet security, computer virus |
19 | Manuel Egele, Leyla Bilge, Engin Kirda, Christopher Kruegel |
CAPTCHA smuggling: hijacking web browsing sessions to create CAPTCHA farms. |
SAC |
2010 |
DBLP DOI BibTeX RDF |
attack, CAPTCHA, security threats, real-world experiments |
19 | J. Lakshmi, S. K. Nandy 0001 |
I/O Virtualization Architecture for Security. |
CIT |
2010 |
DBLP DOI BibTeX RDF |
I/O virtualization, unconstrained DMA, security threats, denial of service attack |
19 | Shinyoung Lim, Tae Hwan Oh, Young B. Choi, Lakshman Tamil |
Security Issues on Wireless Body Area Network for Remote Healthcare Monitoring. |
SUTC/UMC |
2010 |
DBLP DOI BibTeX RDF |
remote health monitoring system, sensor network, risk assessment, security threats, Wireless body area network |
19 | Liancheng Shan, Ning Jiang |
Research on Security Mechanisms of SIP-Based VoIP System. |
HIS (2) |
2009 |
DBLP DOI BibTeX RDF |
SIP, VoIP, Security threats |
19 | Suhair Hafez Amer, John A. Hamilton Jr. |
Understanding security architecture. |
SpringSim |
2008 |
DBLP DOI BibTeX RDF |
policy, security architecture, security threats, security attacks |
19 | Olivier Thonnard, Jouni Viinikka, Corrado Leita, Marc Dacier |
Automating the Analysis of Honeypot Data (Extended Abstract). |
RAID |
2008 |
DBLP DOI BibTeX RDF |
Internet threats analysis, malicious behavior characterization, Honeypots |
19 | Tiago H. Kobayashi, Aguinaldo B. Batista, João Paulo S. Medeiros, José Macedo F. Filho, Agostinho M. Brito Jr., Paulo S. Motta Pires |
Analysis of Malicious Traffic in Modbus/TCP Communications. |
CRITIS |
2008 |
DBLP DOI BibTeX RDF |
Critical Information Infrastructure Protection, Malicious Traffic Analysis, Threats and Attacks to AT Infrastructures, Automation Technology Security |
19 | Muhammad Sher, Thomas Magedanz |
Protecting IP Multimedia Subsystem (IMS) Service Delivery Platform from Time Independent Attacks. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
Intrusion Detection and Prevention system, IP Multimedia Subsystem, Services Delivery Platform, Security Threats |
19 | Teresa Musiol, Katarzyna Ujma-Wasowicz |
Identification of Threat of Isolation as a Result of Work with a Computer in Free Time. |
HCI (7) |
2007 |
DBLP DOI BibTeX RDF |
sociometric measure, reduction of threats, active recreation, computer, isolation |
19 | Peter G. Neumann |
System and network trustworthiness in perspective. |
CCS |
2006 |
DBLP DOI BibTeX RDF |
security, reliability, networks, risks, survivability, vulnerabilities, trustworthiness, assurance, computer systems, threats |
19 | Iván Arce |
The Land of the Blind. |
IEEE Secur. Priv. |
2005 |
DBLP DOI BibTeX RDF |
Attack trends, emerging threats, security vendors |
19 | Simon D. Byers, Aviel D. Rubin, David P. Kormann |
Defending against an Internet-based attack on the physical world. |
ACM Trans. Internet Techn. |
2004 |
DBLP DOI BibTeX RDF |
Internet threats, automated attacks, cybercrime |
18 | Youngdae Kim, Gae-won You, Seung-won Hwang |
Ranking strategies and threats: a cost-based pareto optimization approach. |
Distributed Parallel Databases |
2009 |
DBLP DOI BibTeX RDF |
Linear programming, Preference, Pareto-optimal, MIP |
18 | Debin Liu, XiaoFeng Wang 0001, L. Jean Camp |
Mitigating Inadvertent Insider Threats with Incentives. |
Financial Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Incentive Engineering, Game Theory, Insider Threat, Human Subject |
18 | William Eberle, Lawrence B. Holder |
Mining for insider threats in business transactions and processes. |
CIDM |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Boris Rozenberg, Ehud Gudes, Yuval Elovici |
SISR - A New Model for Epidemic Spreading of Electronic Threats. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Javier López 0001, Rodrigo Roman, Cristina Alcaraz |
Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks. |
FOSAD |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Paul L. Bannerman |
Toward An Integrated Framework of Software Project Threats. |
Australian Software Engineering Conference |
2008 |
DBLP DOI BibTeX RDF |
|
Displaying result #101 - #200 of 4562 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|