|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 7090 occurrences of 2819 keywords
|
|
|
Results
Found 22916 publication records. Showing 22913 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
31 | Ryan Shayto, Brian Porter, Rodrigo Chandia, Mauricio Papa, Sujeet Shenoi |
Assessing The Integrity Of Field Devices In Modbus Networks. |
Critical Infrastructure Protection |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Dorsey Wilkin, Richard A. Raines, Paul D. Williams, Kenneth M. Hopkinson |
Cyberspace Policy For Critical Infrastructures. |
Critical Infrastructure Protection |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Jeffrey Hunker, Robert Hutchinson, Jonathan Margulies |
Attribution Of Cyber Attacks On Process Control Systems. |
Critical Infrastructure Protection |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Eric Goetz, Sujeet Shenoi (eds.) |
Critical Infrastructure Protection, Post-Proceedings of the First Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA, March 19-21, 2007 |
Critical Infrastructure Protection |
2007 |
DBLP BibTeX RDF |
|
31 | Yajuan Tang, Xiapu Luo, Rocky K. C. Chang |
Protecting Internet Services from Low-Rate DoS Attacks. |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
low-rate DoS attacks, detection, Feedback control, countermeasures |
31 | Han Tang, Bruce M. McMillin |
Security of Information Flow in the Electric Power Grid. |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
information flow, confidentiality, power grid, Cyber-physical systems |
31 | Jeffrey L. Hieb, James H. Graham, Sandip C. Patel |
Security Enhancements for Distributed Control Systems. |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
DNP3, role-based authorization, RTU security, secure communication |
31 | Jill Slay, Michael Miller |
Lessons Learned from the Maroochy Water Breach. |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
SCADA security, Maroochy Water Services breach |
31 | Jason K. Kopylec, Anita D'Amico, John R. Goodall |
Visualizing Cascading Failures in Critical Cyber Infrastructures. |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
Cyber infrastructure, infrastructure dependencies, cascading failures, situational awareness, actor-network theory |
31 | Rodrigo Chandia, Jesús González 0004, Tim Kilpatrick, Mauricio Papa, Sujeet Shenoi |
Security Strategies for SCADA Networks. |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
SCADA networks, forensics, security services |
31 | Paul W. Oman, Matthew Phillips |
Intrusion Detection and Event Monitoring in SCADA Networks. |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
SCADA networks, Intrusion detection, real-time monitoring |
31 | Jeffrey S. Simonoff, Carlos E. Restrepo, Rae Zimmerman, Zvia Naphtali |
Analysis of Electrical Power and Oil and Gas Pipeline Failures. |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
Electrical power, oil and gas pipelines, count regression models, risk |
31 | Stig Ole Johnsen, Rune Ask, Randi Roisli |
Reducing Risk in Oil and Gas Production Operations. |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
Oil and gas production, human factors, information security, remote operations |
31 | Bruno Dutertre |
Formal Modeling and Analysis of the Modbus Protocol. |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
Modbus, modeling, formal methods, test-case generation |
31 | Yacov Y. Haimes, Joost R. Santos, Kenneth G. Crowther, Matthew Henry, Chenyang Lian, Zhenyu Yan 0001 |
Risk Analysis in Interdependent Infrastructures. |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
interdependent systems, systems engineering, Risk analysis |
31 | Janica Edmonds, Mauricio Papa, Sujeet Shenoi |
Security Analysis of Multilayer SCADA Protocols. |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
Multilayer protocols, Modbus TCP, formal methods, security analysis |
31 | Jesús González 0004, Mauricio Papa |
Passive Scanning in Modbus Networks. |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
Modbus protocol, passive network scanning, Process control systems |
31 | Neil Robinson, Lorenzo Valeri |
On the Security Implications of Disruptive Technologies. |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
Disruptive technologies, security implications, RFID, VoIP, IPv6 |
31 | Yurong Xu, Guanling Chen, James Ford, Fillia Makedon |
Detecting Wormhole Attacks in Wireless Sensor Networks. |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
wormhole detection, Wireless sensor networks, distributed algorithm |
31 | Suvda Myagmar, Roy H. Campbell, Marianne Winslett |
Security Challenges of Reconfigurable Devices in the Power Grid. |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
reconfigurable devices, security, software defined radios, Power grid |
31 | Henrik Christiansson, Eric A. M. Luiijf |
Creating a European SCADA Security Testbed. |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
security testbed, risk assessment, SCADA systems |
31 | Regis Friend Cassidy, Adrian R. Chavez, Jason Trent, Jorge Mario Urrea |
Remote Forensic Analysis of Process Control Systems. |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
live forensics, EnCase, digital forensics, Process control systems |
31 | Felix Flentge, Uwe Beyer |
The ISE Metamodel for Critical Infrastructures. |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
Infrastructure modeling, ISE metamodel, interdependencies |
31 | Scott Dynes, Eric Goetz, Michael Freeman |
Cyber Security: Are Economic Incentives Adequate? |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
economic incentives, Information security, government policy |
31 | Robert K. Cunningham, Steven Cheung, Martin W. Fong, Ulf Lindqvist, David M. Nicol, Ronald Pawlowski, Eric Robinson, William H. Sanders, Sankalp Singh, Alfonso Valdes, Bradley Woodworth, Michael Zhivich |
Securing Current and Future Process Control Systems. |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
secure platforms, vulnerability testing, access control, intrusion detection, Process control systems |
31 | Roberto Setola |
Analysis of Interdependencies Between Italy's Economic Sectors. |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
Italy, economic sectors, input-output inoperability model, interdependencies |
31 | Mark Hartong, Rajni Goel, Duminda Wijesekera |
Securing Positive Train Control Systems. |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
Railroad security, positive train control, use cases, misuse cases |
31 | Marcelo Masera, Igor Nai Fovino |
A Service-Oriented Approach for Assessing Infrastructure Security. |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
systemof- systems, services, attacks, vulnerabilities, threats, Security assessment |
31 | Daniel Cross, Justin Hoeckle, Michael K. Lavine, Jason Rubin, Kevin Snow |
Detecting Non-Discoverable Bluetooth Devices. |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
Bluetooth security, non-discoverable mode, device discovery |
31 | Robert E. Mullen, Swapna S. Gokhale |
A Discrete Lognormal Model for Software Defects Affecting Quality of Protection. |
Quality of Protection |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Simon N. Foley, Stefano Bistarelli, Barry O'Sullivan, John Herbert, Garret Swart |
Multilevel Security and Quality of Protection. |
Quality of Protection |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Ron Banner, Ariel Orda |
The Power of Tuning: A Novel Approach for the Efficient Design of Survivable Networks. |
ICNP |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Adil Kodian, Anthony Sack, Wayne D. Grover |
p-Cycle Network Design with Hop Limits and Circumference Limits. |
BROADNETS |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Antonio Servetti, Juan Carlos De Martin |
Perception-based partial encryption of compressed speech. |
IEEE Trans. Speech Audio Process. |
2002 |
DBLP DOI BibTeX RDF |
|
30 | Hongbin Luo, Hongfang Yu, Lemin Li |
Comments on "segment shared protection in mesh communication networks with bandwidth guaranteed tunnels". |
IEEE/ACM Trans. Netw. |
2007 |
DBLP DOI BibTeX RDF |
survivable routing, working and protection paths, segment shared protection (SSP) |
30 | Steve R. White, Liam Comerford |
ABYSS: An Architecture for Software Protection. |
IEEE Trans. Software Eng. |
1990 |
DBLP DOI BibTeX RDF |
software protection architecture, execution protection, software transfer, software back-up, loss guarding, ABYSS, a basic Yorktown security system, uniform security service, software distribution channels, use-once authorization, technical enforcement, rental software, software engineering, security of data, token, computing systems, application software |
29 | Sadie Creese, Paul Hopkins, Siani Pearson, Yun Shen |
Data Protection-Aware Design for Cloud Services. |
CloudCom |
2009 |
DBLP DOI BibTeX RDF |
privacy, design pattern, cloud computing, information security, capability maturity model, Data protection |
29 | Vasily Desnitsky, Igor V. Kotenko |
Design of Entrusting Protocols for Software Protection. |
IF&GIS |
2009 |
DBLP DOI BibTeX RDF |
Security protocol design, Remote entrusting, Protocol analysis and verification, Attacks, Software protection |
29 | Martín Abadi, Tim Harris 0001, Mojtaba Mehrara |
Transactional memory with strong atomicity using off-the-shelf memory protection hardware. |
PPoPP |
2009 |
DBLP DOI BibTeX RDF |
transactional memory, stm, memory protection, strong atomicity |
29 | Xingbin Bian, Qingxin Zhu |
Video protection for MPEG-4 FGS with watermarking. |
Multim. Tools Appl. |
2008 |
DBLP DOI BibTeX RDF |
Video content protection, Watermark, MPEG-4 FGS |
29 | Yuh-Jong Hu, Hong-Yi Guo, Guang-De Lin |
Semantic Enforcement of Privacy Protection Policies via the Combination of Ontologies and Rules. |
SUTC |
2008 |
DBLP DOI BibTeX RDF |
ontology, semantic web, rule, privacy protection, web 3.0, semantic email |
29 | Alfred Bashllari, Dritan Nace |
A Study on Two New Protection Strategies. |
IPOM |
2008 |
DBLP DOI BibTeX RDF |
Protection strategies, rerouting strategies, linear programming, multi-commodity flow, path generation, survivable networks |
29 | Clifford Liem, Yuan Xiang Gu, Harold Johnson |
A compiler-based infrastructure for software-protection. |
PLAS |
2008 |
DBLP DOI BibTeX RDF |
compiler-based techniques, software protection, tamper resistance, code transformation |
29 | Xiaoxin Chen, Tal Garfinkel, E. Christopher Lewis, Pratap Subrahmanyam, Carl A. Waldspurger, Dan Boneh, Jeffrey S. Dwoskin, Dan R. K. Ports |
Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems. |
ASPLOS |
2008 |
DBLP DOI BibTeX RDF |
cloaking, multi-shadowing, operating systems, virtual machine monitors, hypervisors, memory protection, VMM |
29 | Ram Kumar 0001, Eddie Kohler, Mani B. Srivastava |
Harbor: software-based memory protection for sensor nodes. |
IPSN |
2007 |
DBLP DOI BibTeX RDF |
software fault isolation, memory protection |
29 | Lei Yao, Lei Cao |
Interleaved turbo codes protection for progressive image transmission with efficient rate allocation. |
IWCMC |
2007 |
DBLP DOI BibTeX RDF |
interleaving, unequal error protection, product codes, progressive image transmission |
29 | Leandro Fiorin, Gianluca Palermo, Slobodan Lukovic, Cristina Silvano |
A data protection unit for NoC-based architectures. |
CODES+ISSS |
2007 |
DBLP DOI BibTeX RDF |
multiprocessor system-on-chip (MPSoC), security, embedded systems, data protection, network-on-chip (NoC) |
29 | Bok-Min Goi, Raphael C.-W. Phan, Hean-Teik Chuah |
Cryptanalysis of Two Non-anonymous Buyer-Seller Watermarking Protocols for Content Protection. |
ICCSA (1) |
2007 |
DBLP DOI BibTeX RDF |
Security issues in UMS, Authentication in UMS, content protection and DRM, digital watermarking and fingerprinting, protocol |
29 | Hugo L. Jonker, Melanie Volkamer |
Compliance of RIES to the Proposed e-Voting Protection Profile. |
VOTE-ID |
2007 |
DBLP DOI BibTeX RDF |
Protection Profile, e-voting, RIES |
29 | Mojtaba Mehrara, Todd M. Austin |
Reliability-aware data placement for partial memory protection in embedded processors. |
Memory System Performance and Correctness |
2006 |
DBLP DOI BibTeX RDF |
memory lifetime, partial memory protection, selective data placement, embedded systems, soft errors |
29 | Weidong Shi, Hsien-Hsin S. Lee, Chenghuai Lu, Tao Zhang 0037 |
Attacks and risk analysis for hardware supported software copy protection systems. |
Digital Rights Management Workshop |
2004 |
DBLP DOI BibTeX RDF |
attack, tamper resistance, copy protection |
29 | Qian Zhang 0001, Wenwu Zhu 0001, Ya-Qin Zhang |
Network-Adaptive Rate Control and Unequal Loss Protection with TCP-Friendly Protocol for Scalable Video Over Internet. |
J. VLSI Signal Process. |
2003 |
DBLP DOI BibTeX RDF |
unequal loss protection, TCP-friendly congestion control, video streaming, rate control, rate-distortion, packetization, bit allocation, scalable video, network-adaptation |
29 | Thiemo Voigt |
Overload Behaviour and Protection of Event-driven Web Servers. |
NETWORKING Workshops |
2002 |
DBLP DOI BibTeX RDF |
overload protection, admission control, web server, event-driven |
29 | Ruth Brand |
Microdata Protection through Noise Addition. |
Inference Control in Statistical Databases |
2002 |
DBLP DOI BibTeX RDF |
Statistical disclosure control, microdata protection, noise addition |
29 | Francesc Sebé, Josep Domingo-Ferrer |
Short 3-Secure Fingerprinting Codes for Copyright Protection. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
Electronic copyright protection, Buyer collusion, Watermarking, Fingerprinting |
29 | Shiuh-Jeng Wang, Kai-Sheng Yang |
Watermark Embedding Mechanism Using Modulus-Based for Intellectual Property Protection on Image Data. |
EC-Web |
2002 |
DBLP DOI BibTeX RDF |
Intellectual property protection, JPEG compression, watermark embedding |
29 | Steven R. Johnston |
The Impact of Privacy and Data Protection Legislation on the Sharing of Intrusion Detection Information. |
Recent Advances in Intrusion Detection |
2001 |
DBLP DOI BibTeX RDF |
trans-border data flow, intrusion detection. (c) Her Majesty the Queen as represented by the Minister of National Defence, acting on behalf of the Communications Security Establishment, 2001, Privacy, data protection, personal information, personal data, Canada |
29 | Simon N. Foley, John P. Morrison |
Computational paradigms and protection. |
NSPW |
2001 |
DBLP DOI BibTeX RDF |
functional and dataflow programming, imperative, security models, protection mechanisms, condensed graphs |
28 | Meijia Hou, Dan Wang 0002, Mingwei Xu, Jiahai Yang 0001 |
Selective Protection: A Cost-Efficient Backup Scheme for Link State Routing. |
ICDCS |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Qi Li 0002, Mingwei Xu, Lingtao Pan, Yong Cui 0001 |
A Study of Path Protection in Self-Healing Routing. |
Networking |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Bin Wu 0002, Kwan Lawrence Yeung, Pin-Han Ho |
A Comparative Study of Fast Protection Schemes in WDM Mesh Networks. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Diane Prisca Onguetou, Wayne D. Grover |
A New Insight and Approach to Node Failure Protection with Ordinary p-Cycles. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Anh Quang Pham, Lie-Liang Yang, Lajos Hanzo |
Unequal Error Protection Irregular Over-Complete Mapping for Wavelet Coded Wireless Video Telephony Using Iterative Source and Channel Decoding. |
WCNC |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Ahmed E. Kamal 0001, Aditya Ramamoorthy |
Overlay protection against link failures using network coding. |
CISS |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Grigorios Loukides, Jianhua Shao 0001 |
Data utility and privacy protection trade-off in k-anonymisation. |
PAIS |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Ireneusz J. Jozwiak, Krzysztof Marczak |
A Hardware-Based Software Protection Systems - Analysis of Security Dongles with Time Meters. |
DepCoS-RELCOMEX |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Mengke Li, Byrav Ramamurthy |
Dedicated path protection for waveband switching in WDM networks (invited paper). |
BROADNETS |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Daniel Won-Kyu Hong, Choong Seon Hong, Woo-Sung Kim |
A Segment-based Protection Scheme for MPLS Network Survivability. |
NOMS |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Dan Wang 0002, Qian Zhang 0001, Jiangchuan Liu |
Self-Protection for Wireless Sensor Networks. |
ICDCS |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Mahesh Sivakumar, Krishna M. Sivalingam, Arun K. Somani |
Partial Protection in Optical WDM Networks: Enhanced Support for Dynamic Traffic. |
BROADNETS |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Min Wook Kil, Seung Kyeom Kim, Geuk Lee, Youngmi Kwon |
A Development of Intrusion Detection and Protection System Using Netfilter Framework. |
RSFDGrC (2) |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Noélia S. C. Correia, Maria C. R. Medeiros |
Cost Analysis of Grooming Ports for IP-over-WDM Network Protection. |
AICT/SAPIR/ELETE |
2005 |
DBLP DOI BibTeX RDF |
|
28 | G. Suwala, G. Swallow |
SONET/SDH-like resilience for IP networks: a survey of traffic protection mechanisms. |
IEEE Netw. |
2004 |
DBLP DOI BibTeX RDF |
|
28 | Canhui Ou, Biswanath Mukherjee |
Differentiated Quality-of-Protection Provisioning in Optical/MPLS Networks. |
NETWORKING |
2004 |
DBLP DOI BibTeX RDF |
|
28 | Dongming Lu, Changyu Diao |
Relic protection and digitization technology. |
SMC (7) |
2004 |
DBLP DOI BibTeX RDF |
|
28 | Cheun Ngen Chong, Bin Ren, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Ricardo Corin |
License Protection with a Tamper-Resistant Token. |
WISA |
2004 |
DBLP DOI BibTeX RDF |
|
28 | Rouying Zhan, Haigang Feng, Qiong Wu 0013, Haolu Xie, Xiaokang Guan, Guang Chen, Albert Z. Wang |
ESDExtractor: A new technology-independent CAD tool for arbitrary ESD protection device extraction. |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Balázs Gábor Józsa, Dániel Orincsay, András Kern |
Surviving Multiple Network Failures Using Shared Backup Path Protection. |
ISCC |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Lin Li 0002, Narayanan Vijaykrishnan, Mahmut T. Kandemir, Mary Jane Irwin |
Adapative Error Protection for Energy Efficiency. |
ICCAD |
2003 |
DBLP DOI BibTeX RDF |
|
28 | David W. Griffith, SuKyoung Lee |
Dynamic Expansion of M : N Protection Groups in GMPLS Optical Networks. |
ICPP Workshops |
2002 |
DBLP DOI BibTeX RDF |
|
28 | Murari Sridharan, R. Srinivasan 0001, Arun K. Somani |
On Improving Partial Information Routing With Segmented Path Protection. |
ICPP Workshops |
2002 |
DBLP DOI BibTeX RDF |
|
28 | Emmett Witchel, Josh Cates, Krste Asanovic |
Mondrian memory protection. |
ASPLOS |
2002 |
DBLP DOI BibTeX RDF |
|
28 | Stanley H. Horowitz, Arun G. Phadke, James S. Thorp |
Aspects of Power System Protection in the Post-Restructuring Era. |
HICSS |
1999 |
DBLP DOI BibTeX RDF |
|
28 | Lothar Horbach |
Privacy and Data Protection in Medicine. |
EUROCRYPT |
1982 |
DBLP DOI BibTeX RDF |
|
28 | Pedro Reviriego, Juan Antonio Maestro |
Efficient error detection codes for multiple-bit upset correction in SRAMs with BICS. |
ACM Trans. Design Autom. Electr. Syst. |
2009 |
DBLP DOI BibTeX RDF |
high-level protection technique, protection against radiation, error correcting codes, Fault tolerant memory |
28 | Weiyi Zhang 0001, Guoliang Xue, Jian Tang 0008, Krishnaiyan Thulasiraman |
Faster algorithms for construction of recovery trees enhancing QoP and QoS. |
IEEE/ACM Trans. Netw. |
2008 |
DBLP DOI BibTeX RDF |
protection and restoration, quality of protection (QoP), redundant trees, quality of service (QoS), bottleneck bandwidth |
28 | Josep Domingo-Ferrer, Anna Oganian, Vicenç Torra |
Information-Theoretic Disclosure Risk Measures in Statistical Disclosure Control of Tabular Data. |
SSDBM |
2002 |
DBLP DOI BibTeX RDF |
Tabular data protection, Information theory, Disclosure risk, Statistical database protection |
28 | Dale M. Johnson, Lee A. Benzinger |
Layering Boundary Protections: An Experiment in Information Assurance. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
DARPA Information Assurance Program, boundary protection layering, attack protection, experiment, security of data, data security, client-server systems, client server system, data privacy, data confidentiality |
27 | Demid Borodin, Ben H. H. Juurlink |
Protective redundancy overhead reduction using instruction vulnerability factor. |
Conf. Computing Frontiers |
2010 |
DBLP DOI BibTeX RDF |
instruction vulnerability, selective protection, performance, redundancy, fault detection |
27 | Kisu Kim, Won-Hyuk Lee, Ki-Sung Yu, Jae Yong Lee, Seong-Jin Ahn 0001, Jin-Wook Chung |
Recovery Schemes for Fast Fault Recovery on GMPLS Network. |
ICCSA (2) |
2008 |
DBLP DOI BibTeX RDF |
performance, protection, restoration, fault recovery, GMPLS |
27 | Andrea Fumagalli, Marco Tacca |
Differentiated reliability (DiR) in wavelength division multiplexing rings. |
IEEE/ACM Trans. Netw. |
2006 |
DBLP DOI BibTeX RDF |
differentiated reliability, path protection, reliability, availability, optical networks |
27 | Marc Fetscherin, Matthias Schmid |
Comparing the usage of digital rights management systems in the music, film, and print industry. |
ICEC |
2003 |
DBLP DOI BibTeX RDF |
digital content distribution, protection technologies, digital rights management, digital content, piracy |
27 | Lise Cellier, Pierre Dauchez, René Zapata, Masaru Uchiyama |
Collision avoidance for a two-arm robot by reflex actions: Simulations and experimentations. |
J. Intell. Robotic Syst. |
1995 |
DBLP DOI BibTeX RDF |
reflex actions, protection zones, collision avoidance, Robot manipulators |
27 | Guillaume Duc, Ronan Keryell |
Improving virus protection with an efficient secure architecture with memory encryption, integrity and information leakage protection. |
J. Comput. Virol. |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Ikuo Takahashi |
A Comparative Study of Personal Data Protection Bill in Japan with UK Data Protection Act 1998. |
SAINT Workshops |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Anniina Huttunen, Ville Oksanen, Juha Laine |
Digital consumer and user rights in EU policy. |
ICEC |
2008 |
DBLP DOI BibTeX RDF |
contracts, copyright, consumers, European union |
26 | Mansoor Alicherry, Randeep Bhatia |
Simple pre-provisioning scheme to enable fast restoration. |
IEEE/ACM Trans. Netw. |
2007 |
DBLP DOI BibTeX RDF |
fast shared restoration, local reroute, pre-provisioning, approximation algorithms, MPLS, optical |
26 | Ian Goldberg |
Improving the Robustness of Private Information Retrieval. |
S&P |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Jörg Platte, Edwin Naroska, Kai Grundmann |
A Cache Design for a Security Architecture for Microprocessors (SAM). |
ARCS |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Ragib Hasan, Suvda Myagmar, Adam J. Lee, William Yurcik |
Toward a threat model for storage systems. |
StorageSS |
2005 |
DBLP DOI BibTeX RDF |
security, storage system, threat model |
Displaying result #201 - #300 of 22913 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ >>] |
|