The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for assurance with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1960-1978 (19) 1979-1982 (15) 1983-1985 (15) 1986 (17) 1987-1988 (23) 1989-1990 (19) 1991-1992 (25) 1993 (27) 1994 (27) 1995 (26) 1996 (67) 1997 (74) 1998 (71) 1999 (103) 2000 (128) 2001 (150) 2002 (164) 2003 (244) 2004 (279) 2005 (441) 2006 (350) 2007 (486) 2008 (473) 2009 (725) 2010 (339) 2011 (752) 2012 (219) 2013 (199) 2014 (258) 2015 (296) 2016 (286) 2017 (243) 2018 (239) 2019 (263) 2020 (244) 2021 (211) 2022 (241) 2023 (276) 2024 (58)
Publication types (Num. hits)
article(1531) book(16) incollection(476) inproceedings(5893) phdthesis(94) proceedings(82)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 3691 occurrences of 1860 keywords

Results
Found 8092 publication records. Showing 8092 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
27William Hugh Murray Ownership and Custody of Data. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Ian Clark Role-Based Access Control. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Polly Perryman Kuver Object-Based Applications: Testing. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Mansour Sheikhan Chaotic-Based Communication Systems. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Harold F. Tipton Information Security Controls: Types. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Franjo Majstor, Guy Vancollie Encryption Key Management. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27K. Narayanaswamy Denial-of-Service Attacks. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Roxanne E. Burkey Software Piracy. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Jeff Misrahi Business Partnerships: Validation. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27William Stackpole Application Layer Security: Network Protocols. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Carl B. Jackson Business Continuity Planning: Evolution in Response to Major News Events. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Chris Hare Electronic Commerce: Auditing. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Micki Krause Healthcare Industry. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Edward H. Freeman Bally v. Faber. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Ben Rothke Fax Machines. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Mano Paul Bluesnarfing. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Carl B. Jackson Business Continuity Management: Testing, Maintenance, Training, and Awareness. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Sasan Hamidi Distributed Computing: Grid Environment. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Nick Halvorson Information Security Management Systems (ISMSs): Risk Diagnosis and Treatment. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Ken Buszta Directory Security. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Geoffrey C. Grabow Public Key Hierarchy. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Michael Pike Malicious Code: Organized Crime. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Anderson Ramos Inspection Technologies: Deep Packets. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Timothy R. Stacey Awareness and Training: Briefing for the End User. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Edward H. Freeman State of Washington v. Heckel. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Ken M. Shaurette Intrusion Detection Systems (IDSs). Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Carl B. Jackson Business Continuity Planning: Process Reengineering. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Marcus Rogers Social Engineering: Mitigation. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Glenn Cater Service Oriented Architecture (SOA). Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Todd Fitzgerald Information Security Governance: Corporate Organization, Frameworks, and Reporting. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Marcus Rogers, Sean C. Leshney Virtualization and Digital Investigations. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Patricia A. P. Fisher Operations Security: Controls. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27David A. Litzau Surveillance: Closed-Circuit Television and Video. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Bryan T. Koch Enclaves: Enterprise as Extranet. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Paul A. Henry Firewall Architectures: Other Issues. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27William Stackpole IP Security Protocol Working Group (IPSec). Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Felicia M. Nicastro Patch Management: Process. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27William A. Yarberry Jr. PBX Firewalls. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Don Evans Systems Integrity Engineering: Distributed Processing Concepts and Corresponding Security-Relevant Issues. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Christopher A. Pilewski Computer Crime. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Steven F. Blanding Network Layer Security. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27George G. McBride Software Development Lifecycles: Security Assessments. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27William Stallings E-Mail: Pretty Good Privacy. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Ralph Spencer Poore Covert Channels: Analysis and Recommendations. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Kevin Castellow Identity Management Systems: Components. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Bonnie A. Goins Pilewski Standards. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Tyson Heyn Redundant Arrays of Independent Disks (RAID). Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Ed Skoudis Hackers: Attacks and Defenses. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Chris Hare Customer Relationship Management (CRM). Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Ken Doughty Business Continuity Management: Maintenance Processes. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Ken M. Shaurette, Thomas J. Schleppenbach Spyware. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Mollie E. Krehnke IT Governance Institute (ITGI). Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Thomas J. Bray Downsizing: Maintaining Information Security. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Christopher A. Pilewski, Bonnie A. Goins Pilewski Architecture: Secure. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Sasan Hamidi Security Information Management: Myths and Facts. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Judith M. Myerson Biometrics: New Methods. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Alex Golod Access Controls: PKI-Based. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27William Hugh Murray Communication Protocols and Services. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Matunda Nyanchama, Anna Wilson Enterprise Security Information. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Harold F. Tipton Information Security Management: Purpose. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Samantha Thomas Planning for the Future: Challenges. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Lee Imrey Internet Service Providers (ISPs): Accountability. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Gerald L. Kovacich Information Warfare. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27James S. Tiller Security Breaches: Reporting. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Lynda L. McGhie Patch Management. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Lynda L. McGhie Health Insurance Portability and Accountability Act (HIPAA). Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Todd Fitzgerald Insider Threats. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Ralph Spencer Poore Cryptography: Key Management: History and Myths. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Carl B. Jackson Business Impact Analysis: Business Process Mapping. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Mollie E. Krehnke, David C. Krehnke Configuration Management: Process Stages. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Alan Berman, Jeffrey L. Ott Security Controls: Dial-Up. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Alan B. Sterneckert Incident Response: Management. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27William Hugh Murray Database Integrity. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Ed Skoudis Sploits. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Ross A. Leo Single Sign-On: Enterprise. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Sandy Bacik Data Centers: Site Selection and Facility Design. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Jaymes Williams Physical Security: Threat after September 11th, 2001. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Dean Bushmiller Accountability. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Thomas Welch Forensics: Computer Crime Investigation. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Ken M. Shaurette, Thomas J. Schleppenbach Business Continuity Planning. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27William Tompkins Management Commitment. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Timothy R. Stacey Business Continuity Planning: Best Practices and Program Maturity. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Lynda L. McGhie Identity Management. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Anthony Bruno Voice Communications: Voice-over-IP (VoIP) Protocols. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Ben Rothke Radio Frequency Identification (RFID). Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27E. Eugene Schultz Malicious Code: Rootkits. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Michael J. Corby Outsourcing. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Chris Hare Network Technologies. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Louis B. Fried Technology Convergence: Security. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Chris Hare Voice Security. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Samuel W. Chun Identity-Based Self-Defending Network: 5W Network. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Gerald L. Kovacich, Andy Jones, Perry G. Luzwick Information Warfare: Tactics. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Carl F. Endorf Return on Investment (ROI). Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Paul A. Henry Malicious Code: Fast-Scanning Worms. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Michael Vangelos Incident Response: Managing. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Ed Skoudis Hackers: Hiring Ex-Criminal. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Jeffery J. Lowder Host-Based Firewalls: Case Study. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Ron Woerner Risk Management. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27R. Scott McCoy Physical Security: Mantraps and Turnstiles. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Mano Paul Mashups and Composite Applications. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
Displaying result #401 - #500 of 8092 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license