The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for prevention with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1956-1979 (15) 1980-1985 (18) 1986-1989 (18) 1990-1991 (22) 1992-1993 (20) 1994-1995 (20) 1996-1997 (30) 1998 (21) 1999 (36) 2000 (30) 2001 (49) 2002 (56) 2003 (103) 2004 (137) 2005 (202) 2006 (194) 2007 (230) 2008 (224) 2009 (298) 2010 (155) 2011 (208) 2012 (207) 2013 (234) 2014 (230) 2015 (241) 2016 (291) 2017 (286) 2018 (298) 2019 (371) 2020 (377) 2021 (400) 2022 (410) 2023 (438) 2024 (75)
Publication types (Num. hits)
article(2110) book(5) data(1) incollection(35) inproceedings(3680) phdthesis(95) proceedings(18)
Venues (Conferences, Journals, ...)
CoRR(230) ICDP(196) IEEE Access(90) Sensors(82) ICOST(50) AMIA(44) eHealth(44) EMBC(34) HICSS(31) CaPTion@MICCAI(29) SMC(26) MedInfo(24) MIE(23) Frontiers Digit. Health(22) Comput. Secur.(21) ICC(21) More (+10 of total 2255)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1403 occurrences of 958 keywords

Results
Found 5944 publication records. Showing 5944 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
18Tian Song, Zhizhong Tang, Dongsheng Wang 0002 Multilevel Pattern Matching Architecture for Network Intrusion Detection and Prevention System. Search on Bibsonomy ICESS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Vaddadi P. Chandu, Karandeep Singh, Ravi Baskaran A Model for Prevention of Software Piracy through Secure Distribution. Search on Bibsonomy SCSS (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Joaquín García-Alfaro, Guillermo Navarro-Arribas Prevention of Cross-Site Scripting Attacks on Current Web Applications. Search on Bibsonomy OTM Conferences (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Security Policies, Software Protection, Code Injection Attacks
18Osama Dandash, Yiling Wang, Phu Dung Le, Bala Srinivasan 0002 A new Dynamic Key Generation Scheme for Fraudulent Internet Payment Prevention. Search on Bibsonomy ITNG The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Mohsen Beheshti, Richard A. Wasniowski Data Fusion Support for Intrusion Detection and Prevention. Search on Bibsonomy ITNG The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Pablo García Bringas Intensive Use of Bayesian Belief Networks for the Unified, Flexible and Adaptable Analysis of Misuses and Anomalies in Network Intrusion Detection and Prevention Systems. Search on Bibsonomy DEXA Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Lizhong Xie, Jun Bi, Jianping Wu An Authentication Based Source Address Spoofing Prevention Method Deployed in IPv6 Edge Network. Search on Bibsonomy International Conference on Computational Science (4) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Source Address Spoofing, Edge Network, IPv6
18Byoung-Koo Kim, Seungyong Yoon, Jintae Oh ATPS - Adaptive Threat Prevention System for High-Performance Intrusion Detection and Response. Search on Bibsonomy APNOMS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF header lookup, intrusion detection, pattern matching
18Takashi Kokawa, Yoshiya Takeuchi, Ryota Sakamoto, Hitoshi Ogawa, Victor V. Kryssanov An Agent-Based System for the Prevention of Earthquake-Induced Disasters. Search on Bibsonomy ICTAI (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Wei Li 0020, Tzi-cker Chiueh Automated Format String Attack Prevention for Win32/X86 Binaries. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Lin Tan 0001, Brett Brotherton, Timothy Sherwood Bit-split string-matching engines for intrusion detection and prevention. Search on Bibsonomy ACM Trans. Archit. Code Optim. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF String-matching architecture, state machine splitting, security
18Dae Y. Kim, Sunil Kim, Lynn Choi, Hyogon Kim A High-Throughput System Architecture for Deep Packet Filtering in Network Intrusion Prevention. Search on Bibsonomy ARCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Xia Yu, Shuoyu Wang A Health Check and Prediction System for Lifestyle-Related Disease Prevention. Search on Bibsonomy ICICIC (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Steven Davy, Brendan Jennings, John Strassner Conflict Prevention Via Model-Driven Policy Refinement. Search on Bibsonomy DSOM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Jun Bi, Jianping Wu, Miao Zhang Enable a Trustworthy Network by Source Address Spoofing Prevention Routers: A Formal Description. Search on Bibsonomy EUC Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Source Address Spoofing, Source Address Validation, Network Security
18Chih-Chiang Wu, Sung-Hua Wen, Nen-Fu Huang Smart Architecture for High-Speed Intrusion Detection and Prevention Systems. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Chuanfu Zhang, Yunsheng Liu, Tong Zhang 0008, Yabing Zha, Wei Zhang Comments on Order-Based Deadlock Prevention Protocol with Parallel Requests in "A Deadlock and Livelock Free Protocol for Decentralized Internet Resource Co-allocation". Search on Bibsonomy APWeb Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF ODP3, Deadlock, Co-allocation, Livelock
18Lynne E. Hall, Karen Padmore, Mike Hodge, Giles Oatley Designing a Virtual Learning Environment to Support the Study of Crime and Its Prevention for Teenagers. Search on Bibsonomy Edutainment The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18John Haggerty, Qi Shi 0001, Madjid Merabti Early detection and prevention of denial-of-service attacks: a novel mechanism with propagated traced-back attack blocking. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Fabrice Axisa, P. M. Schmitt, Claudine Géhin, Georges Delhomme, Eric McAdams, André Dittmar Flexible technologies and smart clothing for citizen medicine, home healthcare, and disease prevention. Search on Bibsonomy IEEE Trans. Inf. Technol. Biomed. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Ajay Mahimkar, Vitaly Shmatikov Game-Based Analysis of Denial-of-Service Prevention Protocols. Search on Bibsonomy CSFW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Xiaoguang Li, Ge Yu 0001, Daling Wang, Yubin Bao ESPClust: An Effective Skew Prevention Method for Model-Based Document Clustering. Search on Bibsonomy CICLing The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Xiaoguang Li, Ge Yu 0001, Daling Wang MMPClust: A Skew Prevention Algorithm for Model-Based Document Clustering. Search on Bibsonomy DASFAA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Herbert Bos, Kaiming Huang Towards Software-Based Signature Detection for Intrusion Prevention on the Network Card. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF distributed firewall, network processors
18Anat Bremler-Barr, Hanoch Levy Spoofing prevention method. Search on Bibsonomy INFOCOM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Chuanfu Zhang, Yunsheng Liu, Tong Zhang 0008, Yabing Zha, Kedi Huang A Deadlock Prevention Approach based on Atomic Transaction for Resource Co-allocation. Search on Bibsonomy SKG The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Hai Jin 0001, Zhiling Yang, Jianhua Sun 0002, Xuping Tu, Zongfen Han CIPS: Coordinated Intrusion Prevention System. Search on Bibsonomy ICOIN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Erzsébet Németh, Rozália Lakner, Katalin M. Hangos, Ian T. Cameron Prediction-Based Diagnosis and Loss Prevention Using Model-Based Reasoning. Search on Bibsonomy IEA/AIE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Seongje Cho, Hyeyoung Chang, HongGeun Kim, WoongChul Choi SoIDPS: Sensor Objects-Based Intrusion Detection and Prevention System and Its Implementation. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Lin Tan 0001, Timothy Sherwood A High Throughput String Matching Architecture for Intrusion Detection and Prevention. Search on Bibsonomy ISCA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18ZhiWu Li 0001, MengChu Zhou An Effective FMS Deadlock Prevention Policy based on Elementary Siphons. Search on Bibsonomy ICRA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Milenko Drinic, Darko Kirovski A Hardware-Software Platform for Intrusion Prevention. Search on Bibsonomy MICRO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Xinyou Zhang, Chengzhong Li, Wenbin Zheng Intrusion Prevention System Design. Search on Bibsonomy CIT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Zhiwu Li 0001, Weixian Cao, Anrong Wang Analysis of a siphon-based deadlock prevention policy for flexible manufacturing systems. Search on Bibsonomy ICARCV The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Yi-Sheng Huang, Jenn-Huei Lin, Chien-Nin Hsu Comparison of deadlock prevention policies in FMS based on Petri nets siphons. Search on Bibsonomy SMC (5) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18ZhiWu Li 0001, Anrong Wang, Hua Lin A deadlock prevention approach for FMS using siphons and the theory of regions. Search on Bibsonomy SMC (6) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Murat Uzam, MengChu Zhou Iterative synthesis of Petri net based deadlock prevention policy for flexible manufacturing systems. Search on Bibsonomy SMC (5) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Carolina González, Juan C. Burguillo-Rial, Juan Carlos Vidal, Martín Llamas Nistal SINCO: Intelligent System in Disease Prevention and Control. An Architectural Approach. Search on Bibsonomy ISBMDA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Carla Coffin, Chad Saunders, Chandra Thomas, Andrea Loewen, Norman Campbell, William A. Ghali Using Intelligent Agents to Repurpose Administrative Data in Fostering Disease Prevention in an Outpatient Context: The Case of Pneumococcal Vaccination. Search on Bibsonomy HICSS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Alvaro A. Cárdenas, Svetlana Radosavac, John S. Baras Detection and prevention of MAC layer misbehavior in ad hoc networks. Search on Bibsonomy SASN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF ad hoc networks, intrusion detection, MAC layer
18Sungchang Lee, Ha Young Yun, Mi Lu Load Balanced Onion Relay for Prevention of Traffic Analysis in Ad Hoc Networks. Search on Bibsonomy ICOIN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Roberto Battistoni, Emanuele Gabrielli, Luigi V. Mancini A Host Intrusion Prevention System for Windows Operating Systems. Search on Bibsonomy ESORICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Richard E. Newman, Ira S. Moskowitz, Paul F. Syverson, Andrei Serjantov Metrics for Trafic Analysis Prevention. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
18P. Sharma, P. Shah, S. Bhattacharya Mirror Hopping Approach for Selective Denial of Service Prevention. Search on Bibsonomy WORDS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Mirror sites, E-Commerce, Information Security, Denial of Service, HTTP
18Ramaprabhu Janakiraman, Marcel Waldvogel, Qi Zhang Indra: A peer-to-peer approach to network intrusion detection and prevention. Search on Bibsonomy WETICE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
18John A. Halderman Evaluating New Copy-Prevention Techniques for Audio CDs. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
18Eric Rigaud, Franck Guarnieri Toward an Agent Oriented Virtual Organization Dedicated to Risk Prevention in Small and Medium Size Companies. Search on Bibsonomy DEXA Workshops The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
18James Tracy, Liwu Chang, Ira S. Moskowitz An Agent-Based Approach to Inference Prevention in Distributed Database Systems. Search on Bibsonomy ICTAI The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
18Kihong Park, Heejo Lee On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets. Search on Bibsonomy SIGCOMM The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
18Josef Pieprzyk, Xian-Mo Zhang Cheating Prevention in Secret Sharing over GF(pt). Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Nonlinear Secret Sharing, Cheating Immunity, Secret Sharing
18Ming-Dou Ker, Wen-Yu Lo, Tung-Yang Chen, Howard Tang, S.-S. Chen, Mu-Chun Wang Compact Layout Rule Extraction for Latchup Prevention in a 0.25-?m Shallow-Trench-Isolation Silicided Bulk CMOS Process. Search on Bibsonomy ISQED The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
18P. Krishna Reddy, Subhash Bhalla Deadlock Prevention in a Distributed Database System. Search on Bibsonomy SIGMOD Rec. The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
15Joshua Mason, Sam Small, Fabian Monrose, Greg MacManus English shellcode. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF shellcode, natural language, network emulation
15Iftikhar Ahmad 0002, Azween B. Abdullah, Abdullah Sharaf Alghamdi Application of artificial neural network in detection of DOS attacks. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF internet control message protocol, multiple layered perceptron, resilient backpropagation, neural network, artificial neural network, false positive, dataset, false negative, detection rate, denial of service attack
15Mihoko Otake, Motoichiro Kato, Toshihisa Takagi, Hajime Asama Coimagination Method: Communication Support System with Collected Images and Its Evaluation via Memory Task. Search on Bibsonomy HCI (5) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Lydie Edward, Domitile Lourdeaux, Jean-Paul A. Barthès Human Factors Affecting Decision in Virtual Operator Reasoning. Search on Bibsonomy Brain Informatics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15H. B. Harchegani, A. Farahi, Hossein Shirazi, A. Golabpour, Peyman Almasinejad Using Genetic Algorithm for Prediction of Information for Cache Operation in ?Mobile Database. Search on Bibsonomy WKDD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Asmaa Adnane, Christophe Bidan, Rafael Timóteo de Sousa Júnior Trust-Based Countermeasures for Securing OLSR Protocol. Search on Bibsonomy CSE (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Margaret L. Brandeau Infectious disease Control policy: A role for simulation. Search on Bibsonomy WSC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Ali Farahmand Nejad, Sadegh Kharazmi, Shahabedin Bayati Improving Admission Control Policies in Database Management Systems, Using Data Mining Techniques. Search on Bibsonomy CSSE (4) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Wei Deng Solvang Increasing Eco-efficiency through Holistic Green Supply Chain Management. Search on Bibsonomy ICNSC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Harald Widiger, Stephan Kubisch, Peter Danielis, Jens Schulz, Dirk Timmermann, Thomas Bahls, Daniel Duchow IPclip: An architecture to restore Trust-by-Wire in packet-switched networks. Search on Bibsonomy LCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Blas Cuesta, Antonio Robles, José Duato Switch-Based Packing Technique for Improving Token Coherence Scalability. Search on Bibsonomy PDCAT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Linfeng Li, Marko Helenius Usability evaluation of anti-phishing toolbars. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Do-Hoon Kim, Taek Lee, Sung-Oh David Jung, Hoh Peter In, Heejo Lee Cyber Threat Trend Analysis Model Using HMM. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Alexey Smirnov 0001, Tzi-cker Chiueh Automatic Patch Generation for Buffer Overflow Attacks. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Achala Upendra Jayatilleke, Chandrajith Ashuboda Marasinghe, Shinji Nakahara, St Nandasara, Achini Jayatilleke, Masamine Jimba Web Based Injury Surveillance System (WBISS) for Road Traffic Injuries. Search on Bibsonomy CIT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Péter L. Venetianer, Zhong Zhang, Andrew W. Scanlon, Yongtong Hu, Alan J. Lipton Video verification of point of sale transactions. Search on Bibsonomy AVSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Thinh Ngoc Tran, Surin Kittitornkun FPGA-Based Cuckoo Hashing for Pattern Matching in NIDS/NIPS. Search on Bibsonomy APNOMS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF NIPS, FPGA, Pattern Matching, NIDS, Cuckoo Hashing
15Dinei A. F. Florêncio, Cormac Herley Analysis and Improvement of Anti-Phishing Schemes. Search on Bibsonomy SEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Jörg Platte, Edwin Naroska, Kai Grundmann A Cache Design for a Security Architecture for Microprocessors (SAM). Search on Bibsonomy ARCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Willem de Bruijn, Asia Slowinska, Kees van Reeuwijk, Tomás Hrubý, Li Xu, Herbert Bos SafeCard: A Gigabit IPS on the Network Card. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Xiaoming Fu 0001, Jon Crowcroft GONE: an infrastructure overlay for resilient, DoS-limiting networking. Search on Bibsonomy NOSSDAV The full citation details ... 2006 DBLP  DOI  BibTeX  RDF general internet signaling transport, overlay networking, denial-of-service, resilience, host identity protocol
15Jung-Taek Seo, Yun-ju Kim, Eung Ki Park, Sang-Won Lee, Taeshik Shon, Jongsub Moon Design and Implementation of a Patch Management System to Remove Security Vulnerability in Multi-platforms. Search on Bibsonomy FSKD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Zhaoyu Liu, Roopesh Uppala A Dynamic Countermeasure Method for Large-Scale Network Attacks. Search on Bibsonomy DASC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Felix Salfner, Miroslaw Malek Proactive Fault Handling for System Availability Enhancement. Search on Bibsonomy IPDPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Joon Heo, Choong Seon Hong An Efficient and Secured Media Access Mechanism Using the Intelligent Coordinator in Low-Rate WPAN Environment. Search on Bibsonomy KES (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Maria-Cruz Villa-Uriol, Falko Kuester, Oscar García Pañella, J. Andres Fernandez Munuera Avatar-centric Risk Evaluation. Search on Bibsonomy ISM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Ana Paula R. da Silva, Marcelo H. T. Martins, Bruno P. S. Rocha, Antonio Alfredo Ferreira Loureiro, Linnyer Beatrys Ruiz, Hao Chi Wong Decentralized intrusion detection in wireless sensor networks. Search on Bibsonomy Q2SWinet The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, wireless sensor networks, intrusion detection
15Nen-Fu Huang, Chia-Nan Kao, Hsien-Wei Hung, Gin-Yuan Jai, Chia-Lin Lin Apply Data Mining to Defense-in-Depth Network Security System. Search on Bibsonomy AINA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Felix Chan, Dora Vasileva Marinova, Michael McAleer Modelling the asymmetric volatility of anti-pollution patents in the USA. Search on Bibsonomy Scientometrics The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15John Kingston, Burkhard Schafer 0001, Wim Vandenberghe Towards a Financial Fraud Ontology: A Legal Modelling Approach. Search on Bibsonomy Artif. Intell. Law The full citation details ... 2004 DBLP  DOI  BibTeX  RDF financial fraud, user requirement analysis, World Wide Web, knowledge modeling, evidence, law, legal ontology
15Elisavet Konstantinou, Vasiliki Liagkou, Paul G. Spirakis, Yannis C. Stamatiou, Moti Yung Electronic National Lotteries. Search on Bibsonomy Financial Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Jean-Pierre Hubaux New Research Challenges for the Security of Ad Hoc and Sensor Networks. Search on Bibsonomy ESAS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Chun-Fei Hsu, Wen-June Wang, Tsu-Tian Lee, Chih-Min Lin Longitudinal control of vehicle platoon via wavelet neural network. Search on Bibsonomy SMC (4) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Yu Fang, Randy H. Katz, T. V. Lakshman Gigabit Rate Packet Pattern-Matching Using TCAM. Search on Bibsonomy ICNP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15John Kingston, Burkhard Schafer 0001, Wim Vandenberghe No Model Behaviour: Ontologies for Fraud Detection. Search on Bibsonomy Law and the Semantic Web The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
15Tzyy-Kuen Tien, Shih-Chieh Chang, Tong-Kai Tsai Crosstalk alleviation for dynamic PLAs. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
15Dale Dzemydiene, Vitalija Rudzkiene Multiple Regression Analysis in Crime Pattern Warehouse for Decision Support. Search on Bibsonomy DEXA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
15Domenico Cotroneo, L. Peluso, Simon Pietro Romano, Giorgio Ventre An active security protocol against DoS attacks. Search on Bibsonomy ISCC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Network Security, Denial of Service, Signaling protocols
15Darko Kirovski, Milenko Drinic, Miodrag Potkonjak Enabling trusted software integrity. Search on Bibsonomy ASPLOS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
15Udo Fritzke Jr., Philippe Ingels Transactions on Partially Replicated Data Based on Reliable and Atomic Multicasts. Search on Bibsonomy ICDCS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
15Cleo Condoravdi, Dick Crouch, John O. Everett, Valeria de Paiva, Reinhard Stolle, Daniel G. Bobrow, Martin van den Berg Preventing existence. Search on Bibsonomy FOIS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF knowledge representation, existence, natural language semantics
15Mohamed Kaâniche, Jean-Claude Laprie, Jean-Paul Blanquart A Dependability-Explicit Model for the Development of Computing Systems. Search on Bibsonomy SAFECOMP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
15Joel Troster, John Henshaw, Erich B. Buss Filtering for quality. Search on Bibsonomy CASCON The full citation details ... 1993 DBLP  BibTeX  RDF
15Janet M. Cook Increasing students security awareness: article II. What C.S. graduates don't learn about security concepts and ethical standards. Search on Bibsonomy SIGCSE The full citation details ... 1986 DBLP  DOI  BibTeX  RDF
15Charlie Miller Mobile Attacks and Defense. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF jailbreaking, App Store, Android Market, data execution prevention, DEP, address space layout randomization, ASLR, computer security, malware, SMS, smart phone, Android, iPhone, sandbox, iOS
15Michael P. Papazoglou Making Business Processes Compliant to Standards and Regulations. Search on Bibsonomy EDOC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Compliance constraint detection and prevention, Compliance Request Language, Compliance patterns, Root-cause analysis, Regulatory compliance
15Sixto Ortiz Jr. Taking Business Intelligence to the Masses. Search on Bibsonomy Computer The full citation details ... 2010 DBLP  DOI  BibTeX  RDF wireless intrusion prevention system, WIPS, Wireless Encryption Protocol, Wi-Fi Protected Access, wireless network interference, wired network interference, security, Wi-Fi, access points
15Oh-Heum Kwon, Ha-Joo Song, Sangjoon Park Anchor-Free Localization through Flip-Error-Resistant Map Stitching in Wireless Sensor Network. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF patch and stitch, flip error prevention, Wireless sensor network, localization algorithm
Displaying result #201 - #300 of 5944 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license