The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "CSIIRW"( http://dblp.L3S.de/Venues/CSIIRW )

URL (DBLP): http://dblp.uni-trier.de/db/conf/csiirw

Publication years (Num. hits)
2008 (45) 2009 (70) 2010 (85) 2011 (84) 2013 (64)
Publication types (Num. hits)
inproceedings(343) proceedings(5)
Venues (Conferences, Journals, ...)
CSIIRW(348)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 348 publication records. Showing 348 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Qian Wei, Jingsha He, Xing Zhang Behavioral model for secure group communication in wireless mesh networks. Search on Bibsonomy CSIIRW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Michael S. Kirkpatrick, Elisa Bertino, Sam Kerr PUF ROKs: generating read-once keys from physically unclonable functions. Search on Bibsonomy CSIIRW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Arpan Roy, Dong Seong Kim 0001, Kishor S. Trivedi Cyber security analysis using attack countermeasure trees. Search on Bibsonomy CSIIRW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Kaliappa Ravindran Managing Robustness of Distributed Applications Under Uncertainties: An Information Assurance Perspective. Search on Bibsonomy CSIIRW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Josef D. Allen, Xiuwen Liu, Liam M. Mayron, Washington Mio On generalization of performance of classifiers for steganalysis. Search on Bibsonomy CSIIRW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Melissa Hathaway Cyberspace policy review and blueprint for research priorities. Search on Bibsonomy CSIIRW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1John P. McDermott, Leo Freitas Using formal methods for security in the Xenon project. Search on Bibsonomy CSIIRW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Sean McGurk Coordinating and guiding federal, state and private sector cybersecurity initiatives. Search on Bibsonomy CSIIRW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Todd Jackson, Christian Wimmer, Michael Franz Multi-variant program execution for vulnerability detection and analysis. Search on Bibsonomy CSIIRW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Young Hee Park, Douglas S. Reeves, Vikram Mulukutla, Balaji Sundaravel Fast malware classification by automated behavioral graph matching. Search on Bibsonomy CSIIRW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Justin Myers, Michael R. Grimaila, Robert F. Mills Adding value to log event correlation using distributed techniques. Search on Bibsonomy CSIIRW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jack Harris, Raquel L. Hill Building a trusted image for embedded systems. Search on Bibsonomy CSIIRW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Michael E. Bartell CIO/CTO perspectives panel. Search on Bibsonomy CSIIRW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Mahadevan Gomathisankaran, Gayatri Mehta, Kamesh Namuduri Power, performance and security optimized hardware design for H.264. Search on Bibsonomy CSIIRW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yang Zhang, Taolun Chai, Chih-Cheng Hung Local binary patterns for face recognition under varying variations. Search on Bibsonomy CSIIRW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Daniel J. Quinlan, Cory Cohen Discovery of C++ data structures from binaries. Search on Bibsonomy CSIIRW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Wonjun Lee 0002, Anna Cinzia Squicciarini, Elisa Bertino Vulnerabilities leading to denial of services attacks in grid computing systems: a survey. Search on Bibsonomy CSIIRW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Zhanshan (Sam) Ma, Frederick T. Sheldon, Axel W. Krings The handicap principle, strategic information warfare and the paradox of asymmetry. Search on Bibsonomy CSIIRW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Richard R. Brooks, Juan Deng Lies and the lying liars that tell them: a fair and balanced look at TLS. Search on Bibsonomy CSIIRW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Stan L. Bowie, Brenda S. Lenard, Craig A. Shue Towards an empirical measure for assessing public attitudes regarding government cybercrime countermeasures. Search on Bibsonomy CSIIRW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Anis Ben Aissa, Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili 0001 Modeling stakeholder/value dependency through mean failure cost. Search on Bibsonomy CSIIRW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1John McHugh, Teryl Taylor, Jeff Janies Cuckoo bags for exploring multikey data. Search on Bibsonomy CSIIRW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Adam Hahn, Benjamin Kregel, Manimaran Govindarasu, Justin Fitzpatrick, Rafi Adnan, Siddharth Sridhar, Michael Higdon Development of the PowerCyber SCADA security testbed. Search on Bibsonomy CSIIRW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Varun Chandola, Shyam Boriah, Vipin Kumar 0001 A reference based analysis framework for analyzing system call traces. Search on Bibsonomy CSIIRW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Matthew K. Wright, Apu Kapadia, Mohan Kumar, Apurv Dhadphale ReDS: reputation for directory services in P2P systems. Search on Bibsonomy CSIIRW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Stephen Groat, Matthew Dunlop, Randy C. Marchany, Joseph G. Tront The privacy implications of stateless IPv6 addressing. Search on Bibsonomy CSIIRW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Kenton Born, David Gustafson NgViz: detecting DNS tunnels through n-gram visualization and quantitative analysis. Search on Bibsonomy CSIIRW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1James D. Parham, Jeffrey Todd McDonald, Michael R. Grimaila, Yong C. Kim A Java based component identification tool for measuring the strength of circuit protections. Search on Bibsonomy CSIIRW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Haricharan Rengamani, Shambhu J. Upadhyaya, H. Raghav Rao, Ponnurangam Kumaraguru Protecting senior citizens from cyber security attacks in the e-health scenario: an international perspective. Search on Bibsonomy CSIIRW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Timothy Daly, Luanne Burns Concordia: a Google for malware. Search on Bibsonomy CSIIRW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ramy Eltarras, Mohamed Eltoweissy, Stephan Olariu, Ing-Ray Chen Towards trustworthy shared networked sensor-actuator systems. Search on Bibsonomy CSIIRW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Frederick T. Sheldon, Stacy J. Prowell, Robert K. Abercrombie, Axel W. Krings (eds.) Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, CSIIRW 2010, Oak Ridge, TN, USA, April 21-23, 2010 Search on Bibsonomy CSIIRW The full citation details ... 2010 DBLP  BibTeX  RDF
1Scott Augenbaum A break down in trust, the emerging threat of cyber crime in connection with our dependence on web 2.0 technologies. Search on Bibsonomy CSIIRW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Brian A. Malloy, Murali Sitaraman, Jason O. Hallstrom Detecting overflow vulnerabilities using automated verification. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Sajal K. Das 0001 Pervasively secured infrastructures: a multi-layer mathematical framework. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Chin-Tser Huang, John Gerdes Jr. Privacy-preserving multi-dimensional credentialing using veiled certificates. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jiang Bian 0001, Remzi Seker, Srini Ramaswamy JigDFS in container communities for international cargo security. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Monty McDougal Castle warrior: redefining 21st century network defense. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Darrell M. Kienzle, Ryan Persaud, Matthew C. Elder External monitoring of endpoint configuration compliance. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Li Yang 0001, Alma Cemerlic Integrating Dirichlet reputation into usage control. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Axel W. Krings, Li Tan, Clinton Jeffery, Robert Rinker Resilient multi-core systems: a hierarchical formal model for N-variant executions. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Eduardo B. Fernández, Jie Wu 0001, María M. Larrondo-Petrie, Yifeng Shao On building secure SCADA systems using security patterns. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Russell Cameron Thomas Total cost of security: a method for managing risks and incentives across the extended enterprise. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Erik M. Ferragut A dynamic erasure code for multicasting live data. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Robert J. Stratton III Internet security threat landscape: scaling to meet the threat. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Suvrojit Das, Arijit Chattopadhayay, Dipesh Kumar Kalyani, Monojit Saha File-system intrusion detection by preserving MAC DTS: a loadable kernel module based approach for LINUX kernel 2.6.x. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Bhavani Thuraisingham Assured information sharing between trustworthy, semi-trustworthy and untrustworthy coalition partners. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Qishi Wu, Denise Ferebee, Yunyue Lin, Dipankar Dasgupta Monitoring security events using integrated correlation-based techniques. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Christopher T. Rathgeb, Gregory D. Peterson Secure processing using dynamic partial reconfiguration. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Philip Tricca A pipeline development toolkit in support of secure information flow goals. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1George Louthan, Brady Deetz, Matthew Walker, John Hale Content-based alternatives to conventional network monitoring systems. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Richard Gesick, Caner Saritac, Chih-Cheng Hung Automatic image analysis process for the detection of concealed weapons. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Dipankar Dasgupta, Sudip Saha A biologically inspired password authentication system. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Mark Hartong, Rajni Goel, Duminda Wijesekera Meta-models for misuse cases. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Richard C. Linger, Stacy J. Prowell, Kirk Sayre Computing the behavior of malicious code with function extraction technology. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Munawar Hafiz, Ralph E. Johnson Security-oriented program transformations. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1George Hull Security and complexity...are we on the wrong road? Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Marco Carvalho 0001 A distributed reinforcement learning approach to mission survivability in tactical MANETs. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Asesh Das, Y. V. Ramana Reddy, Luyi Wang, Sumitra Reddy Information intelligence in cloud computing: how can Vijjana, a collaborative, self-organizing, domain centric knowledge network model help. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Harkeerat Bedi, Li Yang 0001, Joseph M. Kizza Fair electronic exchange using biometrics. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Justin Myers, Michael R. Grimaila, Robert F. Mills Towards insider threat detection using web server logs. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Carlton Pu, John P. Imlay Jr. Spam and denial of information attacks and defenses. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Anoop Singhal, Xinming Ou Techniques for enterprise network security metrics. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ju An Wang, Minzhe Guo OVM: an ontology for vulnerability management. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jose Romero-Mariona, Hadar Ziv, Debra J. Richardson, Dennis Bystritsky Towards usable cyber security requirements. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Yi Hu, Brajendra Panda A traceability link mining approach for identifying insider threats. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1John McHugh, Robert C. Armstrong, Thomas A. Longstaff, Daniel Quinlan, Frederick T. Sheldon, Deborah A. Frincke DOE grass roots panel. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Zhanshan (Sam) Ma, Axel W. Krings, Frederick T. Sheldon An outline of the three-layer survivability analysis architecture for strategic information warfare research. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Zhanshan (Sam) Ma, Axel W. Krings, Richard C. Millar Introduction of first passage time (FPT) analysis for software reliability and network security. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jianyong Dai, Ratan K. Guha, Joohan Lee Feature set selection in data mining techniques for unknown virus detection: a comparison study. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Mike Hinchey We can't get there from here!: the paradox of developing new classes of complex systems. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Steve McKinney, Douglas S. Reeves User identification via process profiling: extended abstract. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Frederick T. Sheldon, Greg Peterson, Axel W. Krings, Robert K. Abercrombie, Ali Mili 0001 (eds.) Fifth Cyber Security and Information Intelligence Research Workshop, CSIIRW '09, Knoxville, TN, USA, April 13-15, 2009 Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  BibTeX  RDF
1Daniel Wyschogrod, Jeffrey Dezso Using automatic signature generation as a sensor backend. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Nabil R. Adam Cyber-physical systems security. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ting Yu 0001, Dhivya Sivasubramanian, Tao Xie 0001 Security policy testing via automated program code generation. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Clive Blackwell A security architecture to protect against the insider threat from damage, fraud and theft. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Miron Abramovici, Paul Bradley Integrated circuit security: new threats and solutions. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Kyungsoo Im, John D. McGregor Debugging support for security properties of software architectures. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Doug Maughan, George Hull, Salvatore J. Stolfo, Robert J. Stratton III Keynote panel. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Edward Ray, Eugene Schultz Virtualization security. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ambareen Siraj Data fusion for improved situational understanding. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Levent Erkök, John Matthews High assurance programming in Cryptol. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Alper K. Caglayan, Mike Toothaker, Dan Drapeau, Dustin Burke, Gerry Eaton Behavioral analysis of fast flux service networks. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1John McHugh Long term data storage issues for situational awareness. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1William Eberle, Lawrence B. Holder Graph-based approaches to insider threat detection. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Giorgia Lodi, Leonardo Querzoni, Roberto Baldoni, Mirco Marchetti, Michele Colajanni, Vita Bortnikov, Gregory V. Chockler, Eliezer Dekel, Gennady Laventman, Alexey Roytman Defending financial infrastructures through early warning systems: the intelligence cloud approach. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Daniel J. Quinlan, Thomas Panas Source code and binary analysis of software defects. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Wonjun Lee 0002, Anna Cinzia Squicciarini, Elisa Bertino An assessment of accountability policies for large-scale distributed computing systems. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Charles N. Payne Jr., Richard C. O'Brien, J. Thomas Haigh The case for prevention-based, host-resident defenses in the modern PCS network. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Doug Maughan National cyber security research assessment and roadmap. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Kamesh Namuduri An active trust model based on zero knowledge proofs for airborne networks. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Robert C. Armstrong, Jackson R. Mayo Leveraging complexity in software for cybersecurity. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Philip C. Ritchey, Jorge R. Ramos, Vernon Rego A framework for synthetic stego. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Francesca Merighi, Stefano Ravaioli u-Vote: a convenient on-line e-voting system. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Anis Ben Aissa, Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili 0001 Quantifying security threats and their impact. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1S. Srinivasan 0002 Privacy-aware security applications using RFID technology. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Salvatore J. Stolfo Polymorphic shellcode: the demise of signature-based detection. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Stefan Fenz, Thomas Neubauer How to determine threat probabilities using ontologies and Bayesian networks. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Marianne Winslett, Adam J. Lee, Kenneth J. Perano Trust negotiation: authorization for virtual organizations. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 348 (100 per page; Change: )
Pages: [<<][1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license