The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ARES"( http://dblp.L3S.de/Venues/ARES )

URL (DBLP): http://dblp.uni-trier.de/db/conf/IEEEares

Publication years (Num. hits)
2006 (141) 2007 (155) 2008 (203) 2009 (159) 2010 (109) 2011 (145) 2012 (83) 2013 (110) 2014 (79) 2015 (97) 2016 (108) 2017 (101) 2018 (130) 2019 (108) 2020 (117) 2021 (161) 2022 (159) 2023 (156)
Publication types (Num. hits)
inproceedings(2302) proceedings(19)
Venues (Conferences, Journals, ...)
ARES(2321)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 888 occurrences of 577 keywords

Results
Found 2321 publication records. Showing 2321 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Marcel Busch, Mykolai Protsenko, Tilo Müller A Cloud-Based Compilation and Hardening Platform for Android Apps. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ersi Hodo, Stepan Grebeniuk, Henri Ruotsalainen, Paul Tavolato Anomaly Detection for Simulated IEC-60870-5-104 Trafiic. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Michiel Willocx, Jan Vossaert, Vincent Naessens Security Analysis of Cordova Applications in Google Play. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Saeed Ibrahim Alqahtani, Shujun Li PPAndroid-Benchmarker: Benchmarking Privacy Protection Systems on Android Devices. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Carlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis Establishing Mutually Trusted Channels for Remote Sensing Devices with Trusted Execution Environments. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Peter Mayer 0001, Alexandra Kunz, Melanie Volkamer Reliable Behavioural Factors in the Information Security Context. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Patrik Maier, Zhendong Ma, Roderick Bloem Towards a Secure SCRUM Process for Agile Web Application Development. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mauro Conti, Pallavi Kaliyar, Chhagan Lal REMI: A Reliable and Secure Multicast Routing Protocol for IoT Networks. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Dorottya Papp, Levente Buttyán, Zhendong Ma Towards Semi-automated Detection of Trigger-based Behavior for Software Security Assurance. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Anatoli Kalysch, Johannes Götzfried, Tilo Müller VMAttack: Deobfuscating Virtualization-Based Packed Binaries. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ricardo Neisse, Gary Steri, Igor Nai Fovino A Blockchain-based Approach for Data Accountability and Provenance Tracking. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Arne Bilzhause, Henrich C. Pöhls, Kai Samelin Position Paper: The Past, Present, and Future of Sanitizable and Redactable Signatures. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Partha P. Pal, Nathaniel Soule, Nate Lageman, Shane S. Clark, Marco M. Carvalho, Adrian Granados, Anthony Alves Adaptive Resource Management Enabling Deception (ARMED). Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Anze Mihelic, Blaz Markelj, Igor Bernik, Sabina Zgaga Investigating the darknet: limitations in Slovenian legal system. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Stefano Bistarelli, Francesco Santini 0001 Go with the -Bitcoin- Flow, with Visual Analytics. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sebastian Funke, Alexander Wiesmaier, Jörg Daubert Constrained PET Composition for Measuring Enforced Privacy. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Aljosha Judmayer, Johanna Ullrich, Georg Merzdovnik, Artemios G. Voyiatzis, Edgar R. Weippl Lightweight Address Hopping for Defending the IPv6 IoT. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Oren Halvani, Christian Winter 0001, Lukas Graner On the Usefulness of Compression Models for Authorship Verification. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Nicolás Notario, Eleonora Ciceri, Alberto Crespo, Eduardo González Real, Ilio Catallo, Sauro Vicini Orchestrating Privacy Enhancing Technologies and Services with BPM Tools: The WITDOM Data Protection Orchestrator. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Aljosa Pasic, Jose-Ramon Martinez-Salio, Susana Gonzalez Zarzosa, Rodrigo Diaz ZONESEC: built-in cyber-security for wide area surveillance system. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Quentin Le Sceller, ElMouatez Billah Karbab, Mourad Debbabi, Farkhund Iqbal SONAR: Automatic Detection of Cyber Security Events over the Twitter Stream. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Nicholas Akinyokun, Vanessa Teague Security and Privacy Implications of NFC-enabled Contactless Payment Systems. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sabine S. Schmidt, Wojciech Mazurczyk, Jörg Keller 0001, Luca Caviglione A New Data-Hiding Approach for IP Telephony Applications with Silence Suppression. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Philipp Kreimel, Oliver Eigner, Paul Tavolato Anomaly-Based Detection and Classification of Attacks in Cyber-Physical Systems. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mustafa Ayoob, Wael Adi, Vassilis Prevelakis Using Ciphers for Failure-Recovery in ITS Systems. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Soha Alboghdady, Stefan Winter 0001, Ahmed Taha 0002, Heng Zhang 0009, Neeraj Suri C'mon: Monitoring the Compliance of Cloud Services to Contracted Properties. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sravani Teja Bulusu, Romain Laborde, Ahmad Samer Wazan, François Barrère, Abdelmalek Benzekri Which Security Requirements Engineering Methodology Should I Choose?: Towards a Requirements Engineering-based Evaluation Approach. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1David Bernhard, Oksana Kulyk, Melanie Volkamer Security Proofs for Participation Privacy, Receipt-Freeness and Ballot Privacy for the Helios Voting Scheme. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Martin Husák, Jaroslav Kaspar, Elias Bou-Harb, Pavel Celeda On the Sequential Pattern and Rule Mining in the Analysis of Cyber Security Alerts. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sigurd Eskeland Fully threshold broadcast encryption. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Zeeshan Ali Khan, Johanna Ullrich, Artemios G. Voyiatzis, Peter Herrmann A Trust-based Resilient Routing Mechanism for the Internet of Things. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Pal-Stefan Murvay, Bogdan Groza DoS Attacks on Controller Area Networks by Fault Injections from the Software Layer. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Kenneth M. Ovens, Gordon Morison Identification and Analysis of Email and Contacts Artefacts on iOS and OS X. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jakub Breier On Analyzing Program Behavior under Fault Injection Attacks. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Joao Paulo Claudino de Sousa, João José Costa Gondim Extraction and Analysis of Volatile Memory in Android Systems: An Approach Focused on Trajectory Reconstruction Based on NMEA 0183 Standard. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Nikhil Tripathi, Neminath Hubballi, Yogendra Singh How Secure are Web Servers? An Empirical Study of Slow HTTP DoS Attacks and Detection. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Toan-Thinh Truong, Duong-Tien Phan, Minh-Triet Tran, Anh Duc Duong, Isao Echizen Provable User Authentication Scheme in Telecare Medicine Information System Using Elliptic Curve Cryptosystem. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Thaís Bardini Idalino, Marina Coelho, Jean Everson Martina Automated Issuance of Digital Certificates through the Use of Federations. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Francesco Mercaldo, Vittoria Nardone, Antonella Santone Ransomware Inside Out. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Konrad-Felix Krentz, Christoph Meinel, Maxim Schnjakin POTR: Practical On-the-Fly Rejection of Injected and Replayed 802.15.4 Frames. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1John Hird, Martin Hawley, Chris Machin Air Traffic Management Security Research in SESAR. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Michael Diener, Leopold Blessing, Nina Rappel Tackling the Cloud Adoption Dilemma - A User Centric Concept to Control Cloud Migration Processes by Using Machine Learning Technologies. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Thomas Schaberreiter, Gerald Quirchmayr, Anna-Maija Juuso, Moussa Ouedraogo, Juha Röning Towards a Complex Systems Approach to Legal and Economic Impact Analysis of Critical Infrastructures. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Luigi Stammati, Claudio Pisa, Tooska Dargahi, Alberto Caponi, Giuseppe Bianchi 0001 FEBA: An Action-Based Feature Extraction Framework for Behavioural Identification and Authentication. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kalle Rindell, Sami Hyrynsalmi, Ville Leppänen Case Study of Security Development in an Agile Environment: Building Identity Management for a Government Agency. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Maria Leitner, Arndt Bonitz Authentication in the Context of E-Participation: Current Practice, Challenges and Recommendations. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Christos Iliou, George Kalpakis, Theodora Tsikrika, Stefanos Vrochidis, Ioannis Kompatsiaris Hybrid Focused Crawling for Homemade Explosives Discovery on Surface and Dark Web. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Enrico Mariconti, Jeremiah Onaolapo, Gordon J. Ross, Gianluca Stringhini What's Your Major Threat? On the Differences between the Network Behavior of Targeted and Commodity Malware. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Doris di Marco, Alessandro Manzo, Marco Ivaldi, John Hird Security Testing with Controller-Pilot Data Link Communications. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Manabu Hirano, Hiromu Ogawa A Log-Structured Block Preservation and Restoration System for Proactive Forensic Data Collection in the Cloud. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Evangelos Arvanitakis, Michael Petychakis, Evmorfia Biliri, Ariadni Michalitsi-Psarrou, Panagiotis Kokkinakos, Fenareti Lampathaki, Dimitrios Askounis Social Analytics in an Enterprise Context: From Manufacturing to Software Development. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Brian Greaves, Marijke Coetzee SmartNet: Secure Content Sharing for Peer-to-Peer Smart Group Spaces. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Johannes Götzfried, Nico Dorr, Ralph Palutke, Tilo Müller HyperCrypt: Hypervisor-Based Encryption of Kernel and User Space. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kostantinos Papadamou, Riginos Samaras, Michael Sirivianos Ensuring the Authenticity and Fidelity of Captured Photos Using Trusted Execution and Mobile Application Licensing Capabilities. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Chad Heitzenrater, Andrew C. Simpson Misuse, Abuse and Reuse: Economic Utility Functions for Characterising Security Requirements. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Maria Spyropoulou, Khurshid Ahmad 0001 Disaster-Related Public Speeches: The Role of Emotions. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Alexandr Vasenev, Lorena Montoya, Andrea Ceccarelli A Hazus-Based Method for Assessing Robustness of Electricity Supply to Critical Smart Grid Consumers during Flood Events. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Claudio Porretti, Raoul Lahaije, Denis Kolev A New Vision for ATM Security Management: The Security Management Platform. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Bernd Jäger, Reiner Kraft, Sebastian Luhn, Annika Selzer, Ulrich Waldmann Access Control and Data Separation Metrics in Cloud Infrastructures. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sainath Batthala, Mayank Swarnkar, Neminath Hubballi, Maitreya Natu VoIP Profiler: Profiling Voice over IP User Communication Behavior. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jose Rubio-Hernan, Luca De Cicco, Joaquín García-Alfaro Revisiting a Watermark-Based Detection Scheme to Handle Cyber-Physical Attacks. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sabine Gründer-Fahrer, Christian Berger 0005, Antje Schlaf, Gerhard Heyer Computational, Communicative, and Legal Conditions for Using Social Media in Disaster Management in Germany. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Lukas Dresel, Mykolai Protsenko, Tilo Müller ARTIST: The Android Runtime Instrumentation Toolkit. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Murdoch Watney Law Enforcement Access to Password Protected and/or Encrypted Mobile Data. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Bojan Suzic, Andreas Reiter Towards Secure Collaboration in Federated Cloud Environments. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Aleksandar Hudic, Matthias Flittner, Thomas Lorünser, Philipp M. Radl, Roland Bless Towards a Unified Secure Cloud Service Development and Deployment Life-Cycle. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Stefanos Malliaros, Christoforos Ntantogian, Christos Xenakis Protecting Sensitive Information in the Volatile Memory from Disclosure Attacks. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Patrício Domingues, Miguel Frade Digital Forensic Artifacts of the Cortana Device Search Cache on Windows 10 Desktop. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Daniel Spiekermann, Tobias Eggendorfer Towards Digital Investigation in Virtual Networks: A Study of Challenges and Open Problems. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Marián Kühnel, Ulrike Meyer Classification of Short Messages Initiated by Mobile Malware. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Martin Gilje Jaatun, Rainer Koelle Cyber Security Incident Management in the Aviation Domain. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Lyes Bayou, Nora Cuppens-Boulahia, David Espes, Frédéric Cuppens Towards a CDS-based Intrusion Detection Deployment Scheme for Securing Industrial Wireless Sensor Networks. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Patrick Pleinevaux Towards a Metamodel for SABSA Conceptual Architecture Descriptions. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Wilfried Mayer, Aaron Zauner, Martin Schmiedecker, Markus Huber 0001 No Need for Black Chambers: Testing TLS in the E-mail Ecosystem at Large. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Bernard Stepien, Amy P. Felty Using Expert Systems to Statically Detect "Dynamic" Conflicts in XACML. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Johannes Bauer 0004, Felix C. Freiling Towards Cycle-Accurate Emulation of Cortex-M Code to Detect Timing Side Channels. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jason W. Clark Threat from Within: Case Studies of Insiders Who Committed Information Technology Sabotage. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Laura García, Ricardo J. Rodríguez A Peek under the Hood of iOS Malware. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Svrana Kumar, Logesh Madhavan, Mangalam Nagappan, Biplab Sikdar 0001 Malware in Pirated Software: Case Study of Malware Encounters in Personal Computers. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Damian Jackson, Paul Hayes Ensuring Security of Data and Information Flow in Emergency Response Decision Support. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Thomas Lorünser, Daniel Slamanig, Thomas Länger, Henrich C. Pöhls PRISMACLOUD Tools: A Cryptographic Toolbox for Increasing Security in Cloud Services. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Vaishnavi Mohan, Lotfi Ben Othmane SecDevOps: Is It a Marketing Buzzword? - Mapping Research on Security in DevOps. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Tosin Daniel Oyetoyan, Daniela Soares Cruzes, Martin Gilje Jaatun An Empirical Study on the Relationship between Software Security Skills, Usage and Training Needs in Agile Settings. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Gustavo Gonzalez Granadillo, Alexander Motzek, Joaquín García-Alfaro, Hervé Debar Selection of Mitigation Actions Based on Financial and Operational Impact Assessments. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sebastian Franken, Sabine Kolvenbach, Wolfgang Gräther Involving End Users into Collaborative Software Development: The Showcase of CloudTeams. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Gabriela Gheorghe, Muhammad Rizwan Asghar, Jean Lancrenon, Sankalp Ghatpande SPARER: Secure Cloud-Proof Storage for e-Health Scenarios. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Eric Medvet, Francesco Mercaldo Exploring the Usage of Topic Modeling for Android Malware Static Analysis. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Tanja Heuer, Ina Schiering, Frank Klawonn, Alexander Gabel, Martin Seeger Recognizing Time-Efficiently Local Botnet Infections - A Case Study. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Lotfi Ben Othmane, Azmat Ali Towards Effective Security Assurance for Incremental Software Development the Case of Zen Cart Application. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sauro Vicini, Francesco Alberti, Nicolás Notario, Alberto Crespo, Juan Ramón Troncoso-Pastoriza, Alberto Sanna Co-creating Security-and-Privacy-by-Design Systems. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sokratis Vavilis, Alexandru Ionut Egner, Milan Petkovic, Nicola Zannone Role Mining with Missing Values. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Alberto Ferrante, Eric Medvet, Francesco Mercaldo, Jelena Milosevic, Corrado Aaron Visaggio Spotting the Malicious Moment: Characterizing Malware Behavior Using Dynamic Features. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Muhammad Ajmal Azad, Syed Khurram Rizvi Caller-Centrality: Identifying Telemarketers in a VoIP Network. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sanaah Al Salami, Joonsang Baek, Khaled Salah 0001, Ernesto Damiani Lightweight Encryption for Smart Home. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Miriam Marciel, José González Cabañas, Yonas Mitike Kassa, Roberto Gonzalez, Mohamed Ahmed 0001 The Value of Online Users: Empirical Evaluation of the Price of Personalized Ads. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Alexander Böhm 0004, Benjamin Taubmann, Hans P. Reiser Geographic Localization of an Anonymous Social Network Message Data Set. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Arnaud Oglaza, Romain Laborde, Abdelmalek Benzekri, François Barrère A Recommender-Based System for Assisting Non-technical Users in Managing Android Permissions. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Saad Alqahtany, Nathan L. Clarke, Steven Furnell, Christoph Reich A Forensic Acquisition and Analysis System for IaaS: Architectural Model and Experiment. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jenni Reuben, Leonardo A. Martucci, Simone Fischer-Hübner, Heather S. Packer, Hans Hedbom, Luc Moreau 0001 Privacy Impact Assessment Template for Provenance. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Antonio M. Espinoza, Jeffrey Knockel, Pedro Comesaña Alfaro, Jedidiah R. Crandall V-DIFT: Vector-Based Dynamic Information Flow Tracking with Application to Locating Cryptographic Keys for Reverse Engineering. Search on Bibsonomy ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
Displaying result #901 - #1000 of 2321 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license