Results
Found 6468 publication records. Showing 6468 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
31 | Joseph P. Trien, Robert K. Abercrombie, Frederick T. Sheldon |
4th annual cyber security and information intelligence research workshop. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSIIRW ![In: Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, CSIIRW '08, Oak Ridge, Tennessee, USA, May 12-14, 2008, pp. 14:1-14:5, 2008, ACM, 978-1-60558-098-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Jon B. Weissman, Vipin Kumar 0001, Varun Chandola, Eric Eilertson, Levent Ertöz, György J. Simon, Seonho Kim, Jinoh Kim |
DDDAS/ITR: A Data Mining and Exploration Middleware for Grid and Distributed Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (1) ![In: Computational Science - ICCS 2007, 7th International Conference Beijing, China, May 27-30, 2007, Proceedings, Part I, pp. 1222-1229, 2007, Springer, 978-3-540-72583-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Data mining, Grid Computing |
31 | Dan Li 0002, Kefei Wang, Jitender S. Deogun |
A Fuzzy Anomaly Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISI ![In: Intelligence and Security Informatics, International Workshop, WISI 2006, Singapore, April 9, 2006, Proceedings, pp. 167-168, 2006, Springer, 3-540-33361-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Andrew H. Sung, Srinivas Mukkamala |
The Feature Selection and Intrusion Detection Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIAN ![In: Advances in Computer Science - ASIAN 2004, Higher-Level Decision Making, 9th Asian Computing Science Conference, Dedicated to Jean-Louis Lassez on the Occasion of His 5th Cycle Birthday, Chiang Mai, Thailand, December 8-10, 2004, Proceedings, pp. 468-482, 2004, Springer, 3-540-24087-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
31 | Srinivas Mukkamala, Andrew H. Sung |
A Comparative Study of Techniques for Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICTAI ![In: 15th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2003), 3-5 November 2003, Sacramento, California, USA, pp. 570-, 2003, IEEE Computer Society, 0-7695-2038-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
intrusion detection, information security, AI techniques |
31 | Frank L. Greitzer, Olga Anna Kuchar, Kristy Huston |
Cognitive science implications for enhancing training effectiveness in a serious gaming context. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM J. Educ. Resour. Comput. ![In: ACM J. Educ. Resour. Comput. 7(3), pp. 2, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
cognitive principles, cyber security education, training effectiveness, Serious gaming, computer-based training |
31 | Hicham Amellal, Abdelmajid Meslouhi, Abderahim El Allati, Anass El Haddadi |
QKD Protocols Security Between Theory and Engineering Implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Computer Networks and Cyber Security ![In: Handbook of Computer Networks and Cyber Security, Principles and Paradigms., pp. 741-762, 2020, Springer, 978-3-030-22276-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Anil Kumar, Ravinder Kumar |
Privacy Preservation of Electronic Health Record: Current Status and Future Direction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Computer Networks and Cyber Security ![In: Handbook of Computer Networks and Cyber Security, Principles and Paradigms., pp. 715-739, 2020, Springer, 978-3-030-22276-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Sudesh Rani, Poonam Saini |
Fog Computing: Applications and Secure Data Aggregation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Computer Networks and Cyber Security ![In: Handbook of Computer Networks and Cyber Security, Principles and Paradigms., pp. 475-492, 2020, Springer, 978-3-030-22276-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Chaitanya Vemulapalli, Sanjay Kumar Madria, Mark Linderman |
Security Frameworks in Mobile Cloud Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Computer Networks and Cyber Security ![In: Handbook of Computer Networks and Cyber Security, Principles and Paradigms., pp. 1-41, 2020, Springer, 978-3-030-22276-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Usha Jain, Muzzammil Hussain |
Underwater Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Computer Networks and Cyber Security ![In: Handbook of Computer Networks and Cyber Security, Principles and Paradigms., pp. 227-245, 2020, Springer, 978-3-030-22276-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Cyrus F. Nourani |
Trees, Cryptosignatures, and Cyberspace Mobile Agent Interfaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Computer Networks and Cyber Security ![In: Handbook of Computer Networks and Cyber Security, Principles and Paradigms., pp. 807-823, 2020, Springer, 978-3-030-22276-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Kale Rahul Vishwanath, Bharadwaj Veeravalli, Xiaoli Wang |
A Practicable Machine Learning Solution for Security-Cognizant Data Placement on Cloud Platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Computer Networks and Cyber Security ![In: Handbook of Computer Networks and Cyber Security, Principles and Paradigms., pp. 111-131, 2020, Springer, 978-3-030-22276-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Mohammed Saeed Alkatheiri, Abdur Rashid Sangi, Satish Anamalamudi |
Physical Unclonable Function (PUF)-Based Security in Internet of Things (IoT): Key Challenges and Solutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Computer Networks and Cyber Security ![In: Handbook of Computer Networks and Cyber Security, Principles and Paradigms., pp. 461-473, 2020, Springer, 978-3-030-22276-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Ravinder Kumar, Hitesh Singh |
Recent Trends in Text Steganography with Experimental Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Computer Networks and Cyber Security ![In: Handbook of Computer Networks and Cyber Security, Principles and Paradigms., pp. 849-872, 2020, Springer, 978-3-030-22276-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Tushar Ubale, Ankit Kumar Jain |
Survey on DDoS Attack Techniques and Solutions in Software-Defined Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Computer Networks and Cyber Security ![In: Handbook of Computer Networks and Cyber Security, Principles and Paradigms., pp. 389-419, 2020, Springer, 978-3-030-22276-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Priyanka Dhaka, Bharti Nagpal |
ABFT: Analytics to Uplift Big Social Events Using Forensic Tools. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Computer Networks and Cyber Security ![In: Handbook of Computer Networks and Cyber Security, Principles and Paradigms., pp. 929-948, 2020, Springer, 978-3-030-22276-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Arpita Sarkar, Binod Kumar Singh |
A Novel Session Key Generation and Secure Communication Establishment Protocol Using Fingerprint Biometrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Computer Networks and Cyber Security ![In: Handbook of Computer Networks and Cyber Security, Principles and Paradigms., pp. 777-805, 2020, Springer, 978-3-030-22276-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Mohamed Alloghani, Thar Baker, Dhiya Al-Jumeily, Abir Hussain, Jamila Mustafina, Ahmed J. Aljaaf |
A Systematic Review on Security and Privacy Issues in Mobile Devices and Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Computer Networks and Cyber Security ![In: Handbook of Computer Networks and Cyber Security, Principles and Paradigms., pp. 585-608, 2020, Springer, 978-3-030-22276-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Andrea Vázquez-Ingelmo, Á. M. Moreno-Montero, Francisco José García-Peñalvo |
Threats Behind Default Configurations of Network Devices: Wired Local Network Attacks and Their Countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Computer Networks and Cyber Security ![In: Handbook of Computer Networks and Cyber Security, Principles and Paradigms., pp. 133-172, 2020, Springer, 978-3-030-22276-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Moumita Roy, Chandreyee Chowdhury, Nauman Aslam |
Security and Privacy Issues in Wireless Sensor and Body Area Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Computer Networks and Cyber Security ![In: Handbook of Computer Networks and Cyber Security, Principles and Paradigms., pp. 173-200, 2020, Springer, 978-3-030-22276-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Mahendra Kumar Murmu, Awadhesh Kumar Singh |
Security Issues in Cognitive Radio Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Computer Networks and Cyber Security ![In: Handbook of Computer Networks and Cyber Security, Principles and Paradigms., pp. 247-264, 2020, Springer, 978-3-030-22276-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | R. Vinayakumar, K. P. Soman, Prabaharan Poornachandran |
DeepDGA-MINet: Cost-Sensitive Deep Learning Based Framework for Handling Multiclass Imbalanced DGA Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Computer Networks and Cyber Security ![In: Handbook of Computer Networks and Cyber Security, Principles and Paradigms., pp. 905-928, 2020, Springer, 978-3-030-22276-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Palvi Aggarwal, Cleotilde Gonzalez, Varun Dutt |
HackIt: A Real-Time Simulation Tool for Studying Real-World Cyberattacks in the Laboratory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Computer Networks and Cyber Security ![In: Handbook of Computer Networks and Cyber Security, Principles and Paradigms., pp. 949-959, 2020, Springer, 978-3-030-22276-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Dharavath Ramesh, Syam Kumar Pasupuleti |
A Novel AckIBE-Based Secure Cloud Data Management Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Computer Networks and Cyber Security ![In: Handbook of Computer Networks and Cyber Security, Principles and Paradigms., pp. 91-110, 2020, Springer, 978-3-030-22276-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Kishore Bhamidipati, Soorya Annadurai |
Permutation-Substitution Based Image Encryption Algorithms Using Pseudorandom Number Generators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Computer Networks and Cyber Security ![In: Handbook of Computer Networks and Cyber Security, Principles and Paradigms., pp. 825-848, 2020, Springer, 978-3-030-22276-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Aakanksha Tewari, Brij B. Gupta |
An Analysis of Provable Security Frameworks for RFID Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Computer Networks and Cyber Security ![In: Handbook of Computer Networks and Cyber Security, Principles and Paradigms., pp. 635-651, 2020, Springer, 978-3-030-22276-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Prachi Gulihar, Brij B. Gupta |
Cooperative Mechanisms for Defending Distributed Denial of Service (DDoS) Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Computer Networks and Cyber Security ![In: Handbook of Computer Networks and Cyber Security, Principles and Paradigms., pp. 421-443, 2020, Springer, 978-3-030-22276-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Mouhammd Al-Kasassbeh 0001, Safaa Mohammed, Mohammad Alauthman, Ammar Almomani |
Feature Selection Using a Machine Learning to Classify a Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Computer Networks and Cyber Security ![In: Handbook of Computer Networks and Cyber Security, Principles and Paradigms., pp. 889-904, 2020, Springer, 978-3-030-22276-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Manjunath Kotari, Niranjan N. Chiplunkar |
Investigation of Security Issues in Distributed System Monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Computer Networks and Cyber Security ![In: Handbook of Computer Networks and Cyber Security, Principles and Paradigms., pp. 609-634, 2020, Springer, 978-3-030-22276-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Rachna Jain, Nikita Jain, Anand Nayyar |
Security and Privacy in Social Networks: Data and Structural Anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Computer Networks and Cyber Security ![In: Handbook of Computer Networks and Cyber Security, Principles and Paradigms., pp. 265-293, 2020, Springer, 978-3-030-22276-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Richa, Teek Parval Sharma, Ajay Kumar Sharma |
Heterogeneous-Internet of Vehicles (Het-IoV) in Twenty-First Century: A Comprehensive Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Computer Networks and Cyber Security ![In: Handbook of Computer Networks and Cyber Security, Principles and Paradigms., pp. 555-584, 2020, Springer, 978-3-030-22276-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Priyanka Datta, Shanu Bhardwaj, Surya Narayan Panda, Sarvesh Tanwar, Sumit Badotra |
Survey of Security and Privacy Issues on Biometric System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Computer Networks and Cyber Security ![In: Handbook of Computer Networks and Cyber Security, Principles and Paradigms., pp. 763-776, 2020, Springer, 978-3-030-22276-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Mouna Jouini, Latifa Ben Arfa Rabai |
Towards New Quantitative Cybersecurity Risk Analysis Models for Information Systems: A Cloud Computing Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Computer Networks and Cyber Security ![In: Handbook of Computer Networks and Cyber Security, Principles and Paradigms., pp. 63-90, 2020, Springer, 978-3-030-22276-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Avani Vyas, Sujata Pal |
Preventing Security and Privacy Attacks in WBANs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Computer Networks and Cyber Security ![In: Handbook of Computer Networks and Cyber Security, Principles and Paradigms., pp. 201-225, 2020, Springer, 978-3-030-22276-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Arash Shaghaghi, Mohamed Ali Kâafar, Rajkumar Buyya, Sanjay Jha 0001 |
Software-Defined Network (SDN) Data Plane Security: Issues, Solutions, and Future Directions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Computer Networks and Cyber Security ![In: Handbook of Computer Networks and Cyber Security, Principles and Paradigms., pp. 341-387, 2020, Springer, 978-3-030-22276-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Ahmed M. Manasrah, M. A. Shannaq, Mahmoud Abu Nasir |
An Investigation Study of Privacy Preserving in Cloud Computing Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Computer Networks and Cyber Security ![In: Handbook of Computer Networks and Cyber Security, Principles and Paradigms., pp. 43-61, 2020, Springer, 978-3-030-22276-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Kishor Kumar Gulla, P. Viswanath, Suresh Babu Veluru, R. Raja Kumar |
Machine Learning Based Intrusion Detection Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Computer Networks and Cyber Security ![In: Handbook of Computer Networks and Cyber Security, Principles and Paradigms., pp. 873-888, 2020, Springer, 978-3-030-22276-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Christos Stergiou 0002, Andreas P. Plageras, Konstantinos E. Psannis, Brij B. Gupta |
Secure Machine Learning Scenario from Big Data in Cloud Computing via Internet of Things Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Computer Networks and Cyber Security ![In: Handbook of Computer Networks and Cyber Security, Principles and Paradigms., pp. 525-554, 2020, Springer, 978-3-030-22276-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Sangeeta Mittal, Shivani Tyagi |
Computational Techniques for Real-Time Credit Card Fraud Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Computer Networks and Cyber Security ![In: Handbook of Computer Networks and Cyber Security, Principles and Paradigms., pp. 653-681, 2020, Springer, 978-3-030-22276-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Sumit Badotra, Surya Narayan Panda |
Software-Defined Networking: A Novel Approach to Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Computer Networks and Cyber Security ![In: Handbook of Computer Networks and Cyber Security, Principles and Paradigms., pp. 313-339, 2020, Springer, 978-3-030-22276-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Bhumika Paharia, Kriti Bhushan |
A Comprehensive Review of Distributed Denial of Service (DDoS) Attacks in Fog Computing Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Computer Networks and Cyber Security ![In: Handbook of Computer Networks and Cyber Security, Principles and Paradigms., pp. 493-524, 2020, Springer, 978-3-030-22276-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Bharat Bhushan, Gadadhar Sahoo |
Requirements, Protocols, and Security Challenges in Wireless Sensor Networks: An Industrial Perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Computer Networks and Cyber Security ![In: Handbook of Computer Networks and Cyber Security, Principles and Paradigms., pp. 683-713, 2020, Springer, 978-3-030-22276-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Biswarup Samanta |
Epidemic Modelling for the Spread of Bots Through DDoS Attack in E-Commerce Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Computer Networks and Cyber Security ![In: Handbook of Computer Networks and Cyber Security, Principles and Paradigms., pp. 445-459, 2020, Springer, 978-3-030-22276-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Przemyslaw Blaskiewicz, Lucjan Hanzlik, Kamil Kluczniak, Lukasz Krzywiecki, Miroslaw Kutylowski, Marcin Slowik, Marta Wszola |
Pseudonymous Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Advances in Cyber Security ![In: Advances in Cyber Security: Principles, Techniques, and Applications., pp. 185-255, 2019, Springer, 978-981-13-1482-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
31 | Joonsang Baek, Willy Susilo, Khaled Salah 0001, Jun Su Ha, Ernesto Damiani, Ilsun You |
Stateful Public-Key Encryption: A Security Solution for Resource-Constrained Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Advances in Cyber Security ![In: Advances in Cyber Security: Principles, Techniques, and Applications., pp. 1-22, 2019, Springer, 978-981-13-1482-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
31 | Zijian Zhang 0001, Jialing He, Liehuang Zhu, Kui Ren 0001 |
Non-intrusive Load Monitoring Algorithms for Privacy Mining in Smart Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Advances in Cyber Security ![In: Advances in Cyber Security: Principles, Techniques, and Applications., pp. 23-48, 2019, Springer, 978-981-13-1482-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
31 | Yang-Wai Chow, Willy Susilo, Pairat Thorncharoensri |
CAPTCHA Design and Security Issues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Advances in Cyber Security ![In: Advances in Cyber Security: Principles, Techniques, and Applications., pp. 69-92, 2019, Springer, 978-981-13-1482-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
31 | Jianghua Liu, Yang Xiang 0001, Wanlei Zhou 0001, Xinyi Huang 0001, Jinhua Ma |
Data Authentication with Privacy Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Advances in Cyber Security ![In: Advances in Cyber Security: Principles, Techniques, and Applications., pp. 115-142, 2019, Springer, 978-981-13-1482-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
31 | Zuoxia Yu, Man Ho Au, Rupeng Yang |
Accountable Anonymous Credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Advances in Cyber Security ![In: Advances in Cyber Security: Principles, Techniques, and Applications., pp. 49-68, 2019, Springer, 978-981-13-1482-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
31 | Jesus Diaz, Seung Geol Choi, David Arroyo, Angelos D. Keromytis, Francisco B. Rodríguez, Moti Yung |
A Methodology for Retrofitting Privacy and Its Application to e-Shopping Transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Advances in Cyber Security ![In: Advances in Cyber Security: Principles, Techniques, and Applications., pp. 143-183, 2019, Springer, 978-981-13-1482-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
31 | Joseph K. Liu |
Ring Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Advances in Cyber Security ![In: Advances in Cyber Security: Principles, Techniques, and Applications., pp. 93-114, 2019, Springer, 978-981-13-1482-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
31 | Pierangela Samarati, Indrajit Ray, Indrakshi Ray (eds.) |
From Database to Cyber Security - Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday ![Search on Bibsonomy](Pics/bibsonomy.png) |
From Database to Cyber Security ![Springer, 978-3-030-04833-4 The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
31 | Sharad Mehrotra, Kerim Yasin Oktay, Shantanu Sharma 0001 |
Exploiting Data Sensitivity on Partitioned Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
From Database to Cyber Security ![In: From Database to Cyber Security - Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday, pp. 274-299, 2018, Springer, 978-3-030-04833-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
31 | Steven Noel |
A Review of Graph Approaches to Network Security Analytics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
From Database to Cyber Security ![In: From Database to Cyber Security - Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday, pp. 300-323, 2018, Springer, 978-3-030-04833-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
31 | Shang Li 0001, Srijan Kumar, Tudor Dumitras, V. S. Subrahmanian |
Breaking Bad: Forecasting Adversarial Android Bad Behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
From Database to Cyber Security ![In: From Database to Cyber Security - Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday, pp. 405-431, 2018, Springer, 978-3-030-04833-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
31 | Angelo Genovese, Enrique Muñoz Ballester, Vincenzo Piuri, Fabio Scotti |
Advanced Biometric Technologies: Emerging Scenarios and Research Trends. ![Search on Bibsonomy](Pics/bibsonomy.png) |
From Database to Cyber Security ![In: From Database to Cyber Security - Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday, pp. 324-352, 2018, Springer, 978-3-030-04833-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
31 | Sankardas Roy, Dewan Chaulagain, Shiva Bhusal |
Static Analysis for Security Vetting of Android Apps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
From Database to Cyber Security ![In: From Database to Cyber Security - Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday, pp. 375-404, 2018, Springer, 978-3-030-04833-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
31 | Ramaswamy Chandramouli |
Comprehensive Security Assurance Measures for Virtualized Server Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
From Database to Cyber Security ![In: From Database to Cyber Security - Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday, pp. 55-77, 2018, Springer, 978-3-030-04833-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
31 | Yvo Desmedt, Arash Shaghaghi |
Function-Based Access Control (FBAC): Towards Preventing Insider Threats in Organizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
From Database to Cyber Security ![In: From Database to Cyber Security - Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday, pp. 143-165, 2018, Springer, 978-3-030-04833-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
31 | Saptarshi Das, Barsha Mitra, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural |
Policy Engineering in RBAC and ABAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
From Database to Cyber Security ![In: From Database to Cyber Security - Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday, pp. 24-54, 2018, Springer, 978-3-030-04833-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
31 | Lingyu Wang 0001, Mengyuan Zhang 0001, Anoop Singhal |
Network Security Metrics: From Known Vulnerabilities to Zero Day Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
From Database to Cyber Security ![In: From Database to Cyber Security - Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday, pp. 450-469, 2018, Springer, 978-3-030-04833-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
31 | Tao Lin, Chen Zhong, John Yen, Peng Liu 0005 |
Retrieval of Relevant Historical Data Triage Operations in Security Operation Centers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
From Database to Cyber Security ![In: From Database to Cyber Security - Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday, pp. 227-243, 2018, Springer, 978-3-030-04833-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
31 | Massimiliano Albanese |
From Cyber Situational Awareness to Adaptive Cyber Defense: Leveling the Cyber Playing Field. ![Search on Bibsonomy](Pics/bibsonomy.png) |
From Database to Cyber Security ![In: From Database to Cyber Security - Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday, pp. 1-23, 2018, Springer, 978-3-030-04833-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
31 | Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati |
Access Privacy in the Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
From Database to Cyber Security ![In: From Database to Cyber Security - Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday, pp. 186-205, 2018, Springer, 978-3-030-04833-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
31 | Stelvio Cimato, Ernesto Damiani |
Some Ideas on Privacy-Aware Data Analytics in the Internet-of-Everything. ![Search on Bibsonomy](Pics/bibsonomy.png) |
From Database to Cyber Security ![In: From Database to Cyber Security - Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday, pp. 113-124, 2018, Springer, 978-3-030-04833-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
31 | Mauro Conti, Edlira Dushku, Luigi V. Mancini |
Distributed Services Attestation in IoT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
From Database to Cyber Security ![In: From Database to Cyber Security - Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday, pp. 261-273, 2018, Springer, 978-3-030-04833-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
31 | Sabrina De Capitani di Vimercati, Sara Foresti, Giovanni Livraga, Vincenzo Piuri, Pierangela Samarati |
Supporting Users in Cloud Plan Selection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
From Database to Cyber Security ![In: From Database to Cyber Security - Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday, pp. 244-260, 2018, Springer, 978-3-030-04833-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
31 | Frédéric Cuppens, Nora Cuppens-Boulahia |
Stratification Based Model for Security Policy with Exceptions and Contraries to Duty. ![Search on Bibsonomy](Pics/bibsonomy.png) |
From Database to Cyber Security ![In: From Database to Cyber Security - Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday, pp. 78-103, 2018, Springer, 978-3-030-04833-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
31 | Roberto Di Pietro, Flavio Lombardi |
Virtualization Technologies and Cloud Security: Advantages, Issues, and Perspectives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
From Database to Cyber Security ![In: From Database to Cyber Security - Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday, pp. 166-185, 2018, Springer, 978-3-030-04833-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
31 | Karim Eldefrawy, Rafail Ostrovsky, Moti Yung |
Theoretical Foundations for Mobile Target Defense: Proactive Secret Sharing and Secure Multiparty Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
From Database to Cyber Security ![In: From Database to Cyber Security - Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday, pp. 470-486, 2018, Springer, 978-3-030-04833-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
31 | George Cybenko, Gabriel Fortunato Stocco |
Asymptotic Behavior of Attack Graph Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
From Database to Cyber Security ![In: From Database to Cyber Security - Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday, pp. 104-112, 2018, Springer, 978-3-030-04833-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
31 | Zi Chu, Steven Gianvecchio, Haining Wang |
Bot or Human? A Behavior-Based Online Bot Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
From Database to Cyber Security ![In: From Database to Cyber Security - Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday, pp. 432-449, 2018, Springer, 978-3-030-04833-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
31 | Enrico Bacis, Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Marco Rosa, Pierangela Samarati |
Protecting Resources and Regulating Access in Cloud-Based Object Storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
From Database to Cyber Security ![In: From Database to Cyber Security - Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday, pp. 125-142, 2018, Springer, 978-3-030-04833-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
31 | Bruhadeshwar Bezawada, Indrakshi Ray |
Attribute-Based Encryption: Applications and Future Directions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
From Database to Cyber Security ![In: From Database to Cyber Security - Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday, pp. 353-374, 2018, Springer, 978-3-030-04833-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
31 | David R. Martinez, William W. Streilein, Kevin M. Carter 0001, Arunesh Sinha (eds.) |
Artificial Intelligence for Cyber Security, Papers from the 2016 AAAI Workshop, Phoenix, Arizona, USA, February 12, 2016. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI Workshop: Artificial Intelligence for Cyber Security ![AAAI Press The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
31 | Marcus Paul Gutierrez, Christopher Kiekintveld |
Bandits for Cybersecurity: Adaptive Intrusion Detection Using Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI Workshop: Artificial Intelligence for Cyber Security ![In: Artificial Intelligence for Cyber Security, Papers from the 2016 AAAI Workshop, Phoenix, Arizona, USA, February 12, 2016., 2016, AAAI Press. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
31 | Eric Nunes, Paulo Shakarian, Gerardo I. Simari |
Toward Argumentation-Based Cyber Attribution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI Workshop: Artificial Intelligence for Cyber Security ![In: Artificial Intelligence for Cyber Security, Papers from the 2016 AAAI Workshop, Phoenix, Arizona, USA, February 12, 2016., 2016, AAAI Press. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
31 | Zareen Syed, Ankur Padia, Tim Finin, M. Lisa Mathews, Anupam Joshi |
UCO: A Unified Cybersecurity Ontology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI Workshop: Artificial Intelligence for Cyber Security ![In: Artificial Intelligence for Cyber Security, Papers from the 2016 AAAI Workshop, Phoenix, Arizona, USA, February 12, 2016., 2016, AAAI Press. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
31 | J. Benton 0001, Robert P. Goldman, Mark H. Burstein, Joseph Mueller, Paul Robertson 0001, Dan Cerys, Andreas Hoffman, Rusty Bobrow |
Active Perception for Cyber Intrusion Detection and Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI Workshop: Artificial Intelligence for Cyber Security ![In: Artificial Intelligence for Cyber Security, Papers from the 2016 AAAI Workshop, Phoenix, Arizona, USA, February 12, 2016., 2016, AAAI Press. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
31 | Diane Oyen, Blake Anderson, Christine M. Anderson-Cook |
Bayesian Networks with Prior Knowledge for Malware Phylogenetics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI Workshop: Artificial Intelligence for Cyber Security ![In: Artificial Intelligence for Cyber Security, Papers from the 2016 AAAI Workshop, Phoenix, Arizona, USA, February 12, 2016., 2016, AAAI Press. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
31 | Blake Anderson, David A. McGrew, Subharthi Paul |
Discovering Human and Machine Readable Descriptions of Malware Families. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI Workshop: Artificial Intelligence for Cyber Security ![In: Artificial Intelligence for Cyber Security, Papers from the 2016 AAAI Workshop, Phoenix, Arizona, USA, February 12, 2016., 2016, AAAI Press. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
31 | Paulo Shakarian, Jana Shakarian |
Socio-Cultural Modeling for Cyber Threat Actors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI Workshop: Artificial Intelligence for Cyber Security ![In: Artificial Intelligence for Cyber Security, Papers from the 2016 AAAI Workshop, Phoenix, Arizona, USA, February 12, 2016., 2016, AAAI Press. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
31 | Bruno Korbar, Jim Blythe, Ross Koppel, Vijay H. Kothari, Sean W. Smith |
Validating an Agent-Based Model of Human Password Behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI Workshop: Artificial Intelligence for Cyber Security ![In: Artificial Intelligence for Cyber Security, Papers from the 2016 AAAI Workshop, Phoenix, Arizona, USA, February 12, 2016., 2016, AAAI Press. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
31 | Parinaz Naghizadeh, Mingyan Liu |
Inter-Temporal Incentives in Security Information Sharing Agreements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI Workshop: Artificial Intelligence for Cyber Security ![In: Artificial Intelligence for Cyber Security, Papers from the 2016 AAAI Workshop, Phoenix, Arizona, USA, February 12, 2016., 2016, AAAI Press. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
31 | Sajjad Dadkhah, Azizah Abd Manaf, Somayeh Sadeghi |
Efficient Image Authentication and Tamper Localization Algorithm Using Active Watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Bio-inspiring Cyber Security and Cloud Services ![In: Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations, pp. 115-148, 2014, Springer, 978-3-662-43615-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
31 | Mona M. Soliman, Aboul Ella Hassanien, Hoda M. Onsi |
An Optimized Approach for Medical Image Watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Bio-inspiring Cyber Security and Cloud Services ![In: Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations, pp. 71-91, 2014, Springer, 978-3-662-43615-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
31 | Ayman M. Bahaa Eldin |
A Bio-inspired Comprehensive Distributed Correlation Approach for Intrusion Detection Alerts and Events. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Bio-inspiring Cyber Security and Cloud Services ![In: Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations, pp. 3-38, 2014, Springer, 978-3-662-43615-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
31 | Amira Sayed A. Aziz, Aboul Ella Hassanien |
Multilayer Machine Learning-Based Intrusion Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Bio-inspiring Cyber Security and Cloud Services ![In: Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations, pp. 225-247, 2014, Springer, 978-3-662-43615-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
31 | Mohamed Azab, Mohamed Eltoweissy |
Bio-inspired Evolutionary Sensory System for Cyber-Physical System Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Bio-inspiring Cyber Security and Cloud Services ![In: Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations, pp. 39-69, 2014, Springer, 978-3-662-43615-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
31 | Abdallah Meraoumia, Salim Chitroub, Ahmed Bouridane |
Biometric Recognition Systems Using Multispectral Imaging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Bio-inspiring Cyber Security and Cloud Services ![In: Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations, pp. 321-347, 2014, Springer, 978-3-662-43615-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
31 | Mona M. Soliman, Aboul Ella Hassanien, Hoda M. Onsi |
Bio-inspiring Techniques in Watermarking Medical Images: A Review. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Bio-inspiring Cyber Security and Cloud Services ![In: Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations, pp. 93-114, 2014, Springer, 978-3-662-43615-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
31 | D. Satish Kumar, N. Nagarajan, Ahmad Taher Azar |
An Improved Key Management Scheme with High Security in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Bio-inspiring Cyber Security and Cloud Services ![In: Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations, pp. 249-264, 2014, Springer, 978-3-662-43615-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
31 | Sameh Hussein, Nashwa Abdelbaki |
Towards Cloud Customers Self-Monitoring and Availability-Monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Bio-inspiring Cyber Security and Cloud Services ![In: Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations, pp. 565-585, 2014, Springer, 978-3-662-43615-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
31 | N. L. Manasa, A. Govardhan 0001, Ch. Satyanarayana |
Fusion of Multiple Biometric Traits: Fingerprint, Palmprint and Iris. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Bio-inspiring Cyber Security and Cloud Services ![In: Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations, pp. 287-320, 2014, Springer, 978-3-662-43615-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
31 | Rajesh P. Barnwal, Nirnay Ghosh, Soumya K. Ghosh 0001 |
Data and Application Security in Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Bio-inspiring Cyber Security and Cloud Services ![In: Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations, pp. 479-495, 2014, Springer, 978-3-662-43615-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
31 | Qurban A. Memon |
Secured and Networked Emergency Notification Without GPS Enabled Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Bio-inspiring Cyber Security and Cloud Services ![In: Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations, pp. 541-563, 2014, Springer, 978-3-662-43615-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
31 | Behzad Nazarbakhsh, Azizah Abd Manaf |
Image Pre-processing Techniques for Enhancing the Performance of Real-Time Face Recognition System Using PCA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Bio-inspiring Cyber Security and Cloud Services ![In: Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations, pp. 383-422, 2014, Springer, 978-3-662-43615-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
31 | Tarek Gaber, Aboul Ella Hassanien |
An Overview of Self-Protection and Self-Healing in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Bio-inspiring Cyber Security and Cloud Services ![In: Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations, pp. 185-202, 2014, Springer, 978-3-662-43615-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
31 | Mohamed Sarrab, Nasser Alalwan, Ahmed Alzahrani 0001, Mahdi Kordestani |
Cybercrime Investigation Challenges: Middle East and North Africa. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Bio-inspiring Cyber Security and Cloud Services ![In: Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations, pp. 203-223, 2014, Springer, 978-3-662-43615-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
Displaying result #201 - #300 of 6468 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ >>] |