The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for protection with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1961-1968 (18) 1969-1973 (23) 1974-1975 (29) 1976 (30) 1977 (21) 1978 (25) 1979 (21) 1980 (15) 1981 (17) 1982 (23) 1983 (18) 1984 (27) 1985 (23) 1986 (23) 1987 (27) 1988 (33) 1989 (44) 1990 (36) 1991 (91) 1992 (55) 1993 (68) 1994 (59) 1995 (65) 1996 (96) 1997 (118) 1998 (131) 1999 (168) 2000 (232) 2001 (339) 2002 (361) 2003 (639) 2004 (843) 2005 (1008) 2006 (1107) 2007 (1175) 2008 (1164) 2009 (987) 2010 (662) 2011 (701) 2012 (807) 2013 (856) 2014 (912) 2015 (802) 2016 (966) 2017 (881) 2018 (1037) 2019 (1164) 2020 (1157) 2021 (1209) 2022 (1166) 2023 (1181) 2024 (253)
Publication types (Num. hits)
article(7850) book(33) data(8) incollection(362) inproceedings(14243) phdthesis(341) proceedings(76)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 7090 occurrences of 2819 keywords

Results
Found 22916 publication records. Showing 22913 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
31Ryan Shayto, Brian Porter, Rodrigo Chandia, Mauricio Papa, Sujeet Shenoi Assessing The Integrity Of Field Devices In Modbus Networks. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Dorsey Wilkin, Richard A. Raines, Paul D. Williams, Kenneth M. Hopkinson Cyberspace Policy For Critical Infrastructures. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Jeffrey Hunker, Robert Hutchinson, Jonathan Margulies Attribution Of Cyber Attacks On Process Control Systems. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Eric Goetz, Sujeet Shenoi (eds.) Critical Infrastructure Protection, Post-Proceedings of the First Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA, March 19-21, 2007 Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  BibTeX  RDF
31Yajuan Tang, Xiapu Luo, Rocky K. C. Chang Protecting Internet Services from Low-Rate DoS Attacks. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF low-rate DoS attacks, detection, Feedback control, countermeasures
31Han Tang, Bruce M. McMillin Security of Information Flow in the Electric Power Grid. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF information flow, confidentiality, power grid, Cyber-physical systems
31Jeffrey L. Hieb, James H. Graham, Sandip C. Patel Security Enhancements for Distributed Control Systems. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF DNP3, role-based authorization, RTU security, secure communication
31Jill Slay, Michael Miller Lessons Learned from the Maroochy Water Breach. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SCADA security, Maroochy Water Services breach
31Jason K. Kopylec, Anita D'Amico, John R. Goodall Visualizing Cascading Failures in Critical Cyber Infrastructures. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Cyber infrastructure, infrastructure dependencies, cascading failures, situational awareness, actor-network theory
31Rodrigo Chandia, Jesús González 0004, Tim Kilpatrick, Mauricio Papa, Sujeet Shenoi Security Strategies for SCADA Networks. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SCADA networks, forensics, security services
31Paul W. Oman, Matthew Phillips Intrusion Detection and Event Monitoring in SCADA Networks. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SCADA networks, Intrusion detection, real-time monitoring
31Jeffrey S. Simonoff, Carlos E. Restrepo, Rae Zimmerman, Zvia Naphtali Analysis of Electrical Power and Oil and Gas Pipeline Failures. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Electrical power, oil and gas pipelines, count regression models, risk
31Stig Ole Johnsen, Rune Ask, Randi Roisli Reducing Risk in Oil and Gas Production Operations. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Oil and gas production, human factors, information security, remote operations
31Bruno Dutertre Formal Modeling and Analysis of the Modbus Protocol. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Modbus, modeling, formal methods, test-case generation
31Yacov Y. Haimes, Joost R. Santos, Kenneth G. Crowther, Matthew Henry, Chenyang Lian, Zhenyu Yan 0001 Risk Analysis in Interdependent Infrastructures. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF interdependent systems, systems engineering, Risk analysis
31Janica Edmonds, Mauricio Papa, Sujeet Shenoi Security Analysis of Multilayer SCADA Protocols. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Multilayer protocols, Modbus TCP, formal methods, security analysis
31Jesús González 0004, Mauricio Papa Passive Scanning in Modbus Networks. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Modbus protocol, passive network scanning, Process control systems
31Neil Robinson, Lorenzo Valeri On the Security Implications of Disruptive Technologies. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Disruptive technologies, security implications, RFID, VoIP, IPv6
31Yurong Xu, Guanling Chen, James Ford, Fillia Makedon Detecting Wormhole Attacks in Wireless Sensor Networks. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF wormhole detection, Wireless sensor networks, distributed algorithm
31Suvda Myagmar, Roy H. Campbell, Marianne Winslett Security Challenges of Reconfigurable Devices in the Power Grid. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF reconfigurable devices, security, software defined radios, Power grid
31Henrik Christiansson, Eric A. M. Luiijf Creating a European SCADA Security Testbed. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security testbed, risk assessment, SCADA systems
31Regis Friend Cassidy, Adrian R. Chavez, Jason Trent, Jorge Mario Urrea Remote Forensic Analysis of Process Control Systems. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF live forensics, EnCase, digital forensics, Process control systems
31Felix Flentge, Uwe Beyer The ISE Metamodel for Critical Infrastructures. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Infrastructure modeling, ISE metamodel, interdependencies
31Scott Dynes, Eric Goetz, Michael Freeman Cyber Security: Are Economic Incentives Adequate? Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF economic incentives, Information security, government policy
31Robert K. Cunningham, Steven Cheung, Martin W. Fong, Ulf Lindqvist, David M. Nicol, Ronald Pawlowski, Eric Robinson, William H. Sanders, Sankalp Singh, Alfonso Valdes, Bradley Woodworth, Michael Zhivich Securing Current and Future Process Control Systems. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF secure platforms, vulnerability testing, access control, intrusion detection, Process control systems
31Roberto Setola Analysis of Interdependencies Between Italy's Economic Sectors. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Italy, economic sectors, input-output inoperability model, interdependencies
31Mark Hartong, Rajni Goel, Duminda Wijesekera Securing Positive Train Control Systems. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Railroad security, positive train control, use cases, misuse cases
31Marcelo Masera, Igor Nai Fovino A Service-Oriented Approach for Assessing Infrastructure Security. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF systemof- systems, services, attacks, vulnerabilities, threats, Security assessment
31Daniel Cross, Justin Hoeckle, Michael K. Lavine, Jason Rubin, Kevin Snow Detecting Non-Discoverable Bluetooth Devices. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Bluetooth security, non-discoverable mode, device discovery
31Robert E. Mullen, Swapna S. Gokhale A Discrete Lognormal Model for Software Defects Affecting Quality of Protection. Search on Bibsonomy Quality of Protection The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
31Simon N. Foley, Stefano Bistarelli, Barry O'Sullivan, John Herbert, Garret Swart Multilevel Security and Quality of Protection. Search on Bibsonomy Quality of Protection The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Ron Banner, Ariel Orda The Power of Tuning: A Novel Approach for the Efficient Design of Survivable Networks. Search on Bibsonomy ICNP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
30Adil Kodian, Anthony Sack, Wayne D. Grover p-Cycle Network Design with Hop Limits and Circumference Limits. Search on Bibsonomy BROADNETS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
30Antonio Servetti, Juan Carlos De Martin Perception-based partial encryption of compressed speech. Search on Bibsonomy IEEE Trans. Speech Audio Process. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
30Hongbin Luo, Hongfang Yu, Lemin Li Comments on "segment shared protection in mesh communication networks with bandwidth guaranteed tunnels". Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF survivable routing, working and protection paths, segment shared protection (SSP)
30Steve R. White, Liam Comerford ABYSS: An Architecture for Software Protection. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1990 DBLP  DOI  BibTeX  RDF software protection architecture, execution protection, software transfer, software back-up, loss guarding, ABYSS, a basic Yorktown security system, uniform security service, software distribution channels, use-once authorization, technical enforcement, rental software, software engineering, security of data, token, computing systems, application software
29Sadie Creese, Paul Hopkins, Siani Pearson, Yun Shen Data Protection-Aware Design for Cloud Services. Search on Bibsonomy CloudCom The full citation details ... 2009 DBLP  DOI  BibTeX  RDF privacy, design pattern, cloud computing, information security, capability maturity model, Data protection
29Vasily Desnitsky, Igor V. Kotenko Design of Entrusting Protocols for Software Protection. Search on Bibsonomy IF&GIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Security protocol design, Remote entrusting, Protocol analysis and verification, Attacks, Software protection
29Martín Abadi, Tim Harris 0001, Mojtaba Mehrara Transactional memory with strong atomicity using off-the-shelf memory protection hardware. Search on Bibsonomy PPoPP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF transactional memory, stm, memory protection, strong atomicity
29Xingbin Bian, Qingxin Zhu Video protection for MPEG-4 FGS with watermarking. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Video content protection, Watermark, MPEG-4 FGS
29Yuh-Jong Hu, Hong-Yi Guo, Guang-De Lin Semantic Enforcement of Privacy Protection Policies via the Combination of Ontologies and Rules. Search on Bibsonomy SUTC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ontology, semantic web, rule, privacy protection, web 3.0, semantic email
29Alfred Bashllari, Dritan Nace A Study on Two New Protection Strategies. Search on Bibsonomy IPOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Protection strategies, rerouting strategies, linear programming, multi-commodity flow, path generation, survivable networks
29Clifford Liem, Yuan Xiang Gu, Harold Johnson A compiler-based infrastructure for software-protection. Search on Bibsonomy PLAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF compiler-based techniques, software protection, tamper resistance, code transformation
29Xiaoxin Chen, Tal Garfinkel, E. Christopher Lewis, Pratap Subrahmanyam, Carl A. Waldspurger, Dan Boneh, Jeffrey S. Dwoskin, Dan R. K. Ports Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems. Search on Bibsonomy ASPLOS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cloaking, multi-shadowing, operating systems, virtual machine monitors, hypervisors, memory protection, VMM
29Ram Kumar 0001, Eddie Kohler, Mani B. Srivastava Harbor: software-based memory protection for sensor nodes. Search on Bibsonomy IPSN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF software fault isolation, memory protection
29Lei Yao, Lei Cao Interleaved turbo codes protection for progressive image transmission with efficient rate allocation. Search on Bibsonomy IWCMC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF interleaving, unequal error protection, product codes, progressive image transmission
29Leandro Fiorin, Gianluca Palermo, Slobodan Lukovic, Cristina Silvano A data protection unit for NoC-based architectures. Search on Bibsonomy CODES+ISSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF multiprocessor system-on-chip (MPSoC), security, embedded systems, data protection, network-on-chip (NoC)
29Bok-Min Goi, Raphael C.-W. Phan, Hean-Teik Chuah Cryptanalysis of Two Non-anonymous Buyer-Seller Watermarking Protocols for Content Protection. Search on Bibsonomy ICCSA (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Security issues in UMS, Authentication in UMS, content protection and DRM, digital watermarking and fingerprinting, protocol
29Hugo L. Jonker, Melanie Volkamer Compliance of RIES to the Proposed e-Voting Protection Profile. Search on Bibsonomy VOTE-ID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Protection Profile, e-voting, RIES
29Mojtaba Mehrara, Todd M. Austin Reliability-aware data placement for partial memory protection in embedded processors. Search on Bibsonomy Memory System Performance and Correctness The full citation details ... 2006 DBLP  DOI  BibTeX  RDF memory lifetime, partial memory protection, selective data placement, embedded systems, soft errors
29Weidong Shi, Hsien-Hsin S. Lee, Chenghuai Lu, Tao Zhang 0037 Attacks and risk analysis for hardware supported software copy protection systems. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2004 DBLP  DOI  BibTeX  RDF attack, tamper resistance, copy protection
29Qian Zhang 0001, Wenwu Zhu 0001, Ya-Qin Zhang Network-Adaptive Rate Control and Unequal Loss Protection with TCP-Friendly Protocol for Scalable Video Over Internet. Search on Bibsonomy J. VLSI Signal Process. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF unequal loss protection, TCP-friendly congestion control, video streaming, rate control, rate-distortion, packetization, bit allocation, scalable video, network-adaptation
29Thiemo Voigt Overload Behaviour and Protection of Event-driven Web Servers. Search on Bibsonomy NETWORKING Workshops The full citation details ... 2002 DBLP  DOI  BibTeX  RDF overload protection, admission control, web server, event-driven
29Ruth Brand Microdata Protection through Noise Addition. Search on Bibsonomy Inference Control in Statistical Databases The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Statistical disclosure control, microdata protection, noise addition
29Francesc Sebé, Josep Domingo-Ferrer Short 3-Secure Fingerprinting Codes for Copyright Protection. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Electronic copyright protection, Buyer collusion, Watermarking, Fingerprinting
29Shiuh-Jeng Wang, Kai-Sheng Yang Watermark Embedding Mechanism Using Modulus-Based for Intellectual Property Protection on Image Data. Search on Bibsonomy EC-Web The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Intellectual property protection, JPEG compression, watermark embedding
29Steven R. Johnston The Impact of Privacy and Data Protection Legislation on the Sharing of Intrusion Detection Information. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2001 DBLP  DOI  BibTeX  RDF trans-border data flow, intrusion detection. (c) Her Majesty the Queen as represented by the Minister of National Defence, acting on behalf of the Communications Security Establishment, 2001, Privacy, data protection, personal information, personal data, Canada
29Simon N. Foley, John P. Morrison Computational paradigms and protection. Search on Bibsonomy NSPW The full citation details ... 2001 DBLP  DOI  BibTeX  RDF functional and dataflow programming, imperative, security models, protection mechanisms, condensed graphs
28Meijia Hou, Dan Wang 0002, Mingwei Xu, Jiahai Yang 0001 Selective Protection: A Cost-Efficient Backup Scheme for Link State Routing. Search on Bibsonomy ICDCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Qi Li 0002, Mingwei Xu, Lingtao Pan, Yong Cui 0001 A Study of Path Protection in Self-Healing Routing. Search on Bibsonomy Networking The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Bin Wu 0002, Kwan Lawrence Yeung, Pin-Han Ho A Comparative Study of Fast Protection Schemes in WDM Mesh Networks. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Diane Prisca Onguetou, Wayne D. Grover A New Insight and Approach to Node Failure Protection with Ordinary p-Cycles. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Anh Quang Pham, Lie-Liang Yang, Lajos Hanzo Unequal Error Protection Irregular Over-Complete Mapping for Wavelet Coded Wireless Video Telephony Using Iterative Source and Channel Decoding. Search on Bibsonomy WCNC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Ahmed E. Kamal 0001, Aditya Ramamoorthy Overlay protection against link failures using network coding. Search on Bibsonomy CISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Grigorios Loukides, Jianhua Shao 0001 Data utility and privacy protection trade-off in k-anonymisation. Search on Bibsonomy PAIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Ireneusz J. Jozwiak, Krzysztof Marczak A Hardware-Based Software Protection Systems - Analysis of Security Dongles with Time Meters. Search on Bibsonomy DepCoS-RELCOMEX The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Mengke Li, Byrav Ramamurthy Dedicated path protection for waveband switching in WDM networks (invited paper). Search on Bibsonomy BROADNETS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Daniel Won-Kyu Hong, Choong Seon Hong, Woo-Sung Kim A Segment-based Protection Scheme for MPLS Network Survivability. Search on Bibsonomy NOMS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Dan Wang 0002, Qian Zhang 0001, Jiangchuan Liu Self-Protection for Wireless Sensor Networks. Search on Bibsonomy ICDCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Mahesh Sivakumar, Krishna M. Sivalingam, Arun K. Somani Partial Protection in Optical WDM Networks: Enhanced Support for Dynamic Traffic. Search on Bibsonomy BROADNETS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Min Wook Kil, Seung Kyeom Kim, Geuk Lee, Youngmi Kwon A Development of Intrusion Detection and Protection System Using Netfilter Framework. Search on Bibsonomy RSFDGrC (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Noélia S. C. Correia, Maria C. R. Medeiros Cost Analysis of Grooming Ports for IP-over-WDM Network Protection. Search on Bibsonomy AICT/SAPIR/ELETE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28G. Suwala, G. Swallow SONET/SDH-like resilience for IP networks: a survey of traffic protection mechanisms. Search on Bibsonomy IEEE Netw. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
28Canhui Ou, Biswanath Mukherjee Differentiated Quality-of-Protection Provisioning in Optical/MPLS Networks. Search on Bibsonomy NETWORKING The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
28Dongming Lu, Changyu Diao Relic protection and digitization technology. Search on Bibsonomy SMC (7) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
28Cheun Ngen Chong, Bin Ren, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Ricardo Corin License Protection with a Tamper-Resistant Token. Search on Bibsonomy WISA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
28Rouying Zhan, Haigang Feng, Qiong Wu 0013, Haolu Xie, Xiaokang Guan, Guang Chen, Albert Z. Wang ESDExtractor: A new technology-independent CAD tool for arbitrary ESD protection device extraction. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28Balázs Gábor Józsa, Dániel Orincsay, András Kern Surviving Multiple Network Failures Using Shared Backup Path Protection. Search on Bibsonomy ISCC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28Lin Li 0002, Narayanan Vijaykrishnan, Mahmut T. Kandemir, Mary Jane Irwin Adapative Error Protection for Energy Efficiency. Search on Bibsonomy ICCAD The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28David W. Griffith, SuKyoung Lee Dynamic Expansion of M : N Protection Groups in GMPLS Optical Networks. Search on Bibsonomy ICPP Workshops The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
28Murari Sridharan, R. Srinivasan 0001, Arun K. Somani On Improving Partial Information Routing With Segmented Path Protection. Search on Bibsonomy ICPP Workshops The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
28Emmett Witchel, Josh Cates, Krste Asanovic Mondrian memory protection. Search on Bibsonomy ASPLOS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
28Stanley H. Horowitz, Arun G. Phadke, James S. Thorp Aspects of Power System Protection in the Post-Restructuring Era. Search on Bibsonomy HICSS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
28Lothar Horbach Privacy and Data Protection in Medicine. Search on Bibsonomy EUROCRYPT The full citation details ... 1982 DBLP  DOI  BibTeX  RDF
28Pedro Reviriego, Juan Antonio Maestro Efficient error detection codes for multiple-bit upset correction in SRAMs with BICS. Search on Bibsonomy ACM Trans. Design Autom. Electr. Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF high-level protection technique, protection against radiation, error correcting codes, Fault tolerant memory
28Weiyi Zhang 0001, Guoliang Xue, Jian Tang 0008, Krishnaiyan Thulasiraman Faster algorithms for construction of recovery trees enhancing QoP and QoS. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF protection and restoration, quality of protection (QoP), redundant trees, quality of service (QoS), bottleneck bandwidth
28Josep Domingo-Ferrer, Anna Oganian, Vicenç Torra Information-Theoretic Disclosure Risk Measures in Statistical Disclosure Control of Tabular Data. Search on Bibsonomy SSDBM The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Tabular data protection, Information theory, Disclosure risk, Statistical database protection
28Dale M. Johnson, Lee A. Benzinger Layering Boundary Protections: An Experiment in Information Assurance. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF DARPA Information Assurance Program, boundary protection layering, attack protection, experiment, security of data, data security, client-server systems, client server system, data privacy, data confidentiality
27Demid Borodin, Ben H. H. Juurlink Protective redundancy overhead reduction using instruction vulnerability factor. Search on Bibsonomy Conf. Computing Frontiers The full citation details ... 2010 DBLP  DOI  BibTeX  RDF instruction vulnerability, selective protection, performance, redundancy, fault detection
27Kisu Kim, Won-Hyuk Lee, Ki-Sung Yu, Jae Yong Lee, Seong-Jin Ahn 0001, Jin-Wook Chung Recovery Schemes for Fast Fault Recovery on GMPLS Network. Search on Bibsonomy ICCSA (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF performance, protection, restoration, fault recovery, GMPLS
27Andrea Fumagalli, Marco Tacca Differentiated reliability (DiR) in wavelength division multiplexing rings. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF differentiated reliability, path protection, reliability, availability, optical networks
27Marc Fetscherin, Matthias Schmid Comparing the usage of digital rights management systems in the music, film, and print industry. Search on Bibsonomy ICEC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF digital content distribution, protection technologies, digital rights management, digital content, piracy
27Lise Cellier, Pierre Dauchez, René Zapata, Masaru Uchiyama Collision avoidance for a two-arm robot by reflex actions: Simulations and experimentations. Search on Bibsonomy J. Intell. Robotic Syst. The full citation details ... 1995 DBLP  DOI  BibTeX  RDF reflex actions, protection zones, collision avoidance, Robot manipulators
27Guillaume Duc, Ronan Keryell Improving virus protection with an efficient secure architecture with memory encryption, integrity and information leakage protection. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Ikuo Takahashi A Comparative Study of Personal Data Protection Bill in Japan with UK Data Protection Act 1998. Search on Bibsonomy SAINT Workshops The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Anniina Huttunen, Ville Oksanen, Juha Laine Digital consumer and user rights in EU policy. Search on Bibsonomy ICEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF contracts, copyright, consumers, European union
26Mansoor Alicherry, Randeep Bhatia Simple pre-provisioning scheme to enable fast restoration. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF fast shared restoration, local reroute, pre-provisioning, approximation algorithms, MPLS, optical
26Ian Goldberg Improving the Robustness of Private Information Retrieval. Search on Bibsonomy S&P The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Jörg Platte, Edwin Naroska, Kai Grundmann A Cache Design for a Security Architecture for Microprocessors (SAM). Search on Bibsonomy ARCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Ragib Hasan, Suvda Myagmar, Adam J. Lee, William Yurcik Toward a threat model for storage systems. Search on Bibsonomy StorageSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, storage system, threat model
Displaying result #201 - #300 of 22913 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license