The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Misuse with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1969-1989 (15) 1990-1996 (19) 1997-1998 (16) 1999 (16) 2000 (17) 2001 (17) 2002 (25) 2003 (36) 2004 (44) 2005 (74) 2006 (74) 2007 (68) 2008 (76) 2009 (56) 2010 (19) 2011 (23) 2012 (24) 2013-2014 (36) 2015 (19) 2016 (22) 2017 (25) 2018 (30) 2019 (44) 2020 (50) 2021 (34) 2022 (48) 2023 (47) 2024 (9)
Publication types (Num. hits)
article(316) incollection(5) inproceedings(651) phdthesis(10) proceedings(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 605 occurrences of 378 keywords

Results
Found 983 publication records. Showing 983 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
16Linjie Pan 0001, Baoquan Cui, Hao Liu, Jiwei Yan, Siqi Wang, Jun Yan 0009, Jian Zhang 0001 Static asynchronous component misuse detection for Android applications. Search on Bibsonomy ESEC/SIGSOFT FSE The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
16Debarun Das, J. Stepanie Rose, Taieb Znati, Pedro J. Bustamante, Martin B. H. Weiss, Marcela M. Gomez Spectrum Misuse Detection in Cooperative Wireless Networks. Search on Bibsonomy CCNC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
16Tamara Radivilova, Lyudmyla Kirichenko, Abed Saif Alghawli, Andrii Ilkov, Maxim Tawalbeh, Petro Zinchenko The Complex Method of Intrusion Detection Based on Anomaly Detection and Misuse Detection. Search on Bibsonomy DESSERT The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
16Xiaoxue Ren, Xinyuan Ye, Zhenchang Xing, Xin Xia 0001, Xiwei Xu 0001, Liming Zhu 0001, Jianling Sun API-Misuse Detection Driven by Fine-Grained API-Constraint Knowledge Graph. Search on Bibsonomy ASE The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
16Xiaoxue Ren, Jiamou Sun, Zhenchang Xing, Xin Xia 0001, Jianling Sun Demystify official API usage directives with crowdsourced API misuse scenarios, erroneous code examples and patches. Search on Bibsonomy ICSE The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
16Sebastian Nielebock 0001, Robert Heumüller, Jacob Krüger, Frank Ortmeier Cooperative API misuse detection using correction rules. Search on Bibsonomy ICSE (NIER) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
16Sebastian Nielebock 0001, Robert Heumüller, Jacob Krüger, Frank Ortmeier Using API-Embedding for API-Misuse Repair. Search on Bibsonomy ICSE (Workshops) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
16Zhiqing Zhang, Pawissakan Chirupphapa, Hiroshi Esaki, Hideya Ochiai XGBoosted Misuse Detection in LAN-Internal Traffic Dataset. Search on Bibsonomy ISI The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
16Aurélien Greuet, Simon Montoya, Guénaël Renault Attack on LAC Key Exchange in Misuse Situation. Search on Bibsonomy CANS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
16Shuyin OuYang, Fan Ge, Li Kuang, Yuyu Yin API Misuse Detection Based on Stacked LSTM. Search on Bibsonomy CollaborateCom (1) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
16Seyyed Ahmad Javadi, Richard Cloete, Jennifer Cobbe, Michelle Seng Ah Lee, Jatinder Singh Monitoring Misuse for Accountable 'Artificial Intelligence as a Service'. Search on Bibsonomy AIES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
16Toby Shevlane, Allan Dafoe The Offense-Defense Balance of Scientific Knowledge: Does Publishing AI Research Reduce Misuse? Search on Bibsonomy AIES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
16Ou Stella Liang, Holly Richitt, Christopher C. Yang, David S. Bennett Online Social Support Seeking among Pregnant Women Coping with Opioid Misuse. Search on Bibsonomy ICHI The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
16Larry Singleton, Rui Zhao 0005, Myoungkyu Song, Harvey P. Siy CryptoTutor: Teaching Secure Coding Practices through Misuse Pattern Detection. Search on Bibsonomy SIGITE The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
16Raffi Khatchadourian, Yiming Tang 0002, Mehdi Bagherzadeh 0001, Baishakhi Ray An Empirical Study on the Use and Misuse of Java 8 Streams. Search on Bibsonomy FASE The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
16Alexandre Melo Braga, Ricardo Dahab, Nuno Antunes, Nuno Laranjeiro, Marco Vieira Understanding How to Use Static Analysis Tools for Detecting Cryptography Misuse in Software. Search on Bibsonomy IEEE Trans. Reliab. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Dimitrios Papamartzivanos, Félix Gómez Mármol, Georgios Kambourakis Introducing Deep Learning Self-Adaptive Misuse Network Intrusion Detection Systems. Search on Bibsonomy IEEE Access The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Sandhya Koteshwara, Amitabh Das, Keshab K. Parhi Architecture Optimization and Performance Comparison of Nonce-Misuse-Resistant Authenticated Encryption Algorithms. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Savannah Bates, Vasiliy N. Leonenko, James Rineer, Georgiy V. Bobashev Using synthetic populations to understand geospatial patterns in opioid related overdose and predicted opioid misuse. Search on Bibsonomy Comput. Math. Organ. Theory The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Majid Afshar, Andrew Phillips, Niranjan S. Karnik, Jeanne Mueller, Daniel To, Richard Gonzalez, Ron Price, Richard S. Cooper, Cara Joyce, Dmitriy Dligach Natural language processing and machine learning to identify alcohol misuse from the electronic health record in trauma patients: development and internal validation. Search on Bibsonomy J. Am. Medical Informatics Assoc. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Dmitriy Dligach, Majid Afshar, Timothy A. Miller Toward a clinical text encoder: pretraining for clinical natural language processing with applications to substance misuse. Search on Bibsonomy J. Am. Medical Informatics Assoc. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Giorgio Calzolari Econometrics exams and round numbers: Use or misuse of indirect estimation methods? Search on Bibsonomy Commun. Stat. Simul. Comput. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Ros Barber Marlowe and overreaching: A misuse of stylometry. Search on Bibsonomy Digit. Scholarsh. Humanit. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Tairong Shi, Jie Guan Real-time state recovery attack against MORUS in nonce-misuse setting. Search on Bibsonomy Sci. China Inf. Sci. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Otobong Inieke Data Security: The Misuse of Technology and Points of Vulnerability in Everyday Information Systems. Search on Bibsonomy Int. J. Digit. Lit. Digit. Competence The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Sven Amann, Hoan Anh Nguyen, Sarah Nadi, Tien N. Nguyen, Mira Mezini A Systematic Evaluation of Static API-Misuse Detectors. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Roger K. Moore, Lucy Skidmore On the Use/Misuse of the Term 'Phoneme'. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
16Linara Adilova, Livin Natious, Siming Chen 0001, Olivier Thonnard, Michael Kamp System Misuse Detection via Informed Behavior Clustering and Modeling. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
16Nikola Banic, Karlo Koscevic, Marko Subasic, Sven Loncaric The Past and the Present of the Color Checker Dataset Misuse. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
16Tam The Nguyen, Phong Minh Vu, Tung Thanh Nguyen API Misuse Correction: A Statistical Approach. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
16Judy Watson, David Lacey, Don V. Kerr, Paul M. Salmon, Natassia Goode Understanding the effects of compromise and misuse of personal details on older people. Search on Bibsonomy Australas. J. Inf. Syst. The full citation details ... 2019 DBLP  BibTeX  RDF
16Shay Gueron, Adam Langley, Yehuda Lindell AES-GCM-SIV: Nonce Misuse-Resistant Authenticated Encryption. Search on Bibsonomy RFC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Emil Björnson Reproducible Research: Best Practices and Potential Misuse [Perspectives]. Search on Bibsonomy IEEE Signal Process. Mag. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Patrick Kresmer, Alexander Zeh CCM-SIV: Single-PRF Nonce-Misuse-Resistant Authenticated Encryption. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
16Mustafa Khairallah Forgery Attack on mixFeed in the Nonce-Misuse Scenario. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
16Ciprian Baetu, F. Betül Durak, Loïs Huguenin-Dumittan, Abdullah Talayhan, Serge Vaudenay Misuse Attacks on Post-Quantum Cryptosystems. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
16Laura Genga, Nicola Zannone, Anna Cinzia Squicciarini Discovering reliable evidence of data misuse by exploiting rule redundancy. Search on Bibsonomy Comput. Secur. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Pierre A. Akiki To var or not to var: how do C# developers use and misuse implicit and explicit typing? Search on Bibsonomy Softw. Qual. J. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Saleh Hamed Alharthi, Yair Levy, Mansour Awaji Empirical Testing of Resistance and Misuse Factors Contributing to Instructors' Use of E-Learning Systems in Saudi Arabia. Search on Bibsonomy AIS Trans. Replication Res. The full citation details ... 2019 DBLP  BibTeX  RDF
16Chi Li, Zuxing Gu, Min Zhou 0001, Jiecheng Wu, Jiarui Zhang, Ming Gu 0001 API Misuse Detection in C Programs: Practice on SSL APIs. Search on Bibsonomy Int. J. Softw. Eng. Knowl. Eng. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Linara Adilova, Livin Natious, Siming Chen 0001, Olivier Thonnard, Michael Kamp System Misuse Detection Via Informed Behavior Clustering and Modeling. Search on Bibsonomy DSN Workshops The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Roger K. Moore, Lucy Skidmore On the Use/Misuse of the Term 'Phoneme'. Search on Bibsonomy INTERSPEECH The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Mohamed El-Attar 0001, Nidal Nasser Refactoring Misuse Case Diagrams using Model Transformation. Search on Bibsonomy ENASE The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Ibrahim Inuwa, Chidi G. Ononiwu, Muhammadou M. O. Kah, Ago K. M. Quaye Mechanisms Fostering the Misuse of Information Systems for Corrupt Practices in the Nigerian Public Sector. Search on Bibsonomy ICT4D (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Abdulrahman Khalid Alnaim, Ahmed Mahmoud Alwakeel, Eduardo B. Fernández A Misuse Pattern for Compromising VMs via Virtual Machine Escape in NFV. Search on Bibsonomy ARES The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Nikola Banic, Karlo Koscevic, Marko Subasic, Sven Loncaric The Past and the Present of the Color Checker Dataset Misuse. Search on Bibsonomy ISPA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Karim Eldefrawy, Ashish Gehani, Alexandre Matton Longitudinal Analysis of Misuse of Bitcoin. Search on Bibsonomy ACNS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Zuxing Gu, Jiecheng Wu, Jiaxiang Liu 0001, Min Zhou 0001, Ming Gu 0001 An Empirical Study on API-Misuse Bugs in Open-Source C Programs. Search on Bibsonomy COMPSAC (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Matthew J. Howard, Rakshit Agrawal Predicting Substance Misuse Admission Rates via Recurrent Neural Networks. Search on Bibsonomy GHTC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Chun Guo 0002, Olivier Pereira, Thomas Peters, François-Xavier Standaert Authenticated Encryption with Nonce Misuse and Physical Leakage: Definitions, Separation Results and First Construction - (Extended Abstract). Search on Bibsonomy LATINCRYPT The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Li Zhang, Jiongyi Chen, Wenrui Diao, Shanqing Guo, Jian Weng 0001, Kehuan Zhang CryptoREX: Large-scale Analysis of Cryptographic Misuse in IoT Devices. Search on Bibsonomy RAID The full citation details ... 2019 DBLP  BibTeX  RDF
16Ciprian Baetu, F. Betül Durak, Loïs Huguenin-Dumittan, Abdullah Talayhan, Serge Vaudenay Misuse Attacks on Post-quantum Cryptosystems. Search on Bibsonomy EUROCRYPT (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Maria Kechagia, Xavier Devroey, Annibale Panichella, Georgios Gousios, Arie van Deursen Effective and efficient API misuse detection via exception propagation and search-based testing. Search on Bibsonomy ISSTA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Sven Amann, Hoan Anh Nguyen, Sarah Nadi, Tien N. Nguyen, Mira Mezini Investigating next steps in static API-misuse detection. Search on Bibsonomy MSR The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Brihat Sharma, Majid Afshar, Dmitriy Dligach, Robert Kanie, Elizabeth Salisbury-Afshar, Niranjan S. Karnik, Cara Joyce Identification of Latent Subtypes of Patients with Opioid Misuse. Search on Bibsonomy AMIA The full citation details ... 2019 DBLP  BibTeX  RDF
16Jerome A. Osheroff, Craig Robbins, Brian S. Alper, David R. Little, Edwin A. Lomotan Results from a Multi-stakeholder Action Plan to Better Leverage Patient-centered Clinical Decision Support in Addressing the Opioid Misuse Crisis. Search on Bibsonomy AMIA The full citation details ... 2019 DBLP  BibTeX  RDF
16Dmitriy Dligach, Majid Afshar, Timothy A. Miller Towards a Universal Document-Level Clinical Text Encoder: Methods for Neural Network Pre-training with Applications to Substance Misuse. Search on Bibsonomy AMIA The full citation details ... 2019 DBLP  BibTeX  RDF
16Jonathan T. Trostle CMCC: Misuse Resistant Authenticated Encryption with Minimal Ciphertext Expansion. Search on Bibsonomy Cryptogr. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
16Xiaocong Jin, Jingchao Sun, Rui Zhang 0007, Yanchao Zhang, Chi Zhang 0001 SpecGuard: Spectrum Misuse Detection in Dynamic Spectrum Access Systems. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
16Vajiheh Hajisalem, Shahram Babaie A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection. Search on Bibsonomy Comput. Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
16Benjamin Stark, Heiko Gewald, Heinrich Lautenbacher, Ulrich Haase, Siegmar Ruff Misuse of 'Break-the-Glass' Policies in Hospitals: Detecting Unauthorized Access to Sensitive Patient Health Data. Search on Bibsonomy Int. J. Inf. Secur. Priv. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
16Weiwen Peng, Lijuan Shen, Yan Shen, Qiuzhuang Sun Reliability analysis of repairable systems with recurrent misuse-induced failures and normal-operation failures. Search on Bibsonomy Reliab. Eng. Syst. Saf. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
16Gürsel Serpen, Ehsan Aghaei Host-based misuse intrusion detection using PCA feature extraction and kNN classification algorithms. Search on Bibsonomy Intell. Data Anal. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
16Xiaopeng Li 0001, Xianshan Qu, Wenyuan Xu 0001, Song Wang 0002, Yan Tong, Lannan Luo Validating the Contextual Information of Outdoor Images for Photo Misuse Detection. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
16Jonne Arjoranta, Marko Siitonen Why Do Players Misuse Emotes in Hearthstone? Negotiating the Use of Communicative Affordances in an Online Multiplayer Game. Search on Bibsonomy Game Stud. The full citation details ... 2018 DBLP  BibTeX  RDF
16Linyuan Zhang, Guoru Ding, Qihui Wu, Zhu Han 0001 Spectrum Sensing Under Spectrum Misuse Behaviors: A Multi-Hypothesis Test Perspective. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
16Chun Guo 0002, Olivier Pereira, Thomas Peters, François-Xavier Standaert Leakage-Resilient Authenticated Encryption with Misuse in the Leveled Leakage Setting: Definitions, Separation Results, and Constructions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
16Neil Thomas Bendle, Moeen Naseer Butt The Misuse of Accounting-Based Approximations of Tobin's q in a World of Market-Based Assets. Search on Bibsonomy Mark. Sci. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
16Sabeeha Fatma Use and Misuse of Technology in Marketing: Cases from India. Search on Bibsonomy Int. J. Technoethics The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
16Francesco Berti, François Koeune, Olivier Pereira, Thomas Peters, François-Xavier Standaert Ciphertext Integrity with Misuse and Leakage: Definition and Efficient Constructions with Symmetric Primitives. Search on Bibsonomy AsiaCCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
16Ildar Muslukhov, Yazan Boshmaf, Konstantin Beznosov Source Attribution of Cryptographic API Misuse in Android Applications. Search on Bibsonomy AsiaCCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
16Dheyaaldin Alsalman, Insu Park The Determinant of Selfless Misuse Intention and the Role of System Resilience under the Context of Disasters. Search on Bibsonomy AMCIS The full citation details ... 2018 DBLP  BibTeX  RDF
16Haohuang Wen, Juanru Li, Yuanyuan Zhang 0002, Dawu Gu An Empirical Study of SDK Credential Misuse in iOS Apps. Search on Bibsonomy APSEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
16Babafemi Odusote, Olawande J. Daramola, Matthew Adigun Towards an extended misuse case framework for elicitation of cloud dependability requirements. Search on Bibsonomy SAICSIT The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
16Feifei Tu, Jiaxin Zhu, Qimu Zheng, Minghui Zhou 0001 Be careful of when: an empirical study on time-related misuse of issue tracking data. Search on Bibsonomy ESEC/SIGSOFT FSE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
16Élise Bigeard, Natalia Grabar, Frantz Thiessard Détection de mésusages de médicaments dans les réseaux sociaux (Detection of drug misuse in social media). Search on Bibsonomy CORIA-TALN-RJC (TALN 2) The full citation details ... 2018 DBLP  BibTeX  RDF
16Corey J. Hayes, Jonathan P. Bona, Mathias Brochhausen Towards the Development of an Opioid Misuse Ontology. Search on Bibsonomy ICBO The full citation details ... 2018 DBLP  BibTeX  RDF
16Peter Leo Gorski, Luigi Lo Iacono, Dominik Wermke, Christian Stransky, Sebastian Möller 0001, Yasemin Acar, Sascha Fahl Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse. Search on Bibsonomy SOUPS @ USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
16Sebastian Nielebock 0001, Robert Heumüller, Frank Ortmeier Commits as a basis for API misuse detection. Search on Bibsonomy SoftwareMining@ASE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
16Burhan Al-Bayati, Nathan L. Clarke, Paul Dowland 0001, Fudong Li 0001 Misuse Detection in a Simulated IaaS Environment. Search on Bibsonomy ETAA@ESORICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
16Tianyi Zhang 0001, Ganesha Upadhyaya, Anastasia Reinhardt, Hridesh Rajan, Miryung Kim Are code examples on an online Q&A forum reliable?: a study of API misuse on stack overflow. Search on Bibsonomy ICSE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
16Élise Bigeard, Natalia Grabar, Frantz Thiessard Typology of Drug Misuse Created from Information Available in Health Fora. Search on Bibsonomy MIE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
16Madiha H. Syed, Eduardo B. Fernández, Julio Moreno A misuse Pattern for DDoS in the IoT. Search on Bibsonomy EuroPLoP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
16Johannes Feichtner, David Missmann, Raphael Spreitzer Automated Binary Analysis on iOS: A Case Study on Cryptographic Misuse in iOS Applications. Search on Bibsonomy WISEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
16Rohini Rajpal, Sanmeet Kaur An Efficient Hybrid Approach Using Misuse Detection and Genetic Algorithm for Network Intrusion Detection. Search on Bibsonomy ICACDS (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
16Eduardo Lopez, Kamran Sartipi Feature engineering in big data for detection of information systems misuse. Search on Bibsonomy CASCON The full citation details ... 2018 DBLP  BibTeX  RDF
16Kevin Milner Detecting the misuse of secrets: foundations, protocols, and verification. Search on Bibsonomy 2018   RDF
16Qinglan Li, Ioana Literat Misuse or misdesign? Yik Yak on college campuses and the moral dimensions of technology design. Search on Bibsonomy First Monday The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
16Sven Amann, Hoan Anh Nguyen, Sarah Nadi, Tien N. Nguyen, Mira Mezini A Systematic Evaluation of API-Misuse Detectors. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
16Ehsan Aghaei, Gürsel Serpen Ensemble classifier for misuse detection using N-gram feature vectors through operating system call traces. Search on Bibsonomy Int. J. Hybrid Intell. Syst. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
16Chitresh Banerjee, Arpita Banerjee, S. K. Sharma Estimating influence of threat using Misuse Case Oriented Quality Requirements (MCOQR) metrics: Security requirements engineering perspective. Search on Bibsonomy Int. J. Hybrid Intell. Syst. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
16Kyung-Hwan Cha, Dae-Ki Kang Experimental analysis of hidden Markov model based secure misuse intrusion trace classification and hacking detection. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
16Jojo Y. C. Mo Misuse of private information as a tort: The implications of Google v Judith Vidal-Hall. Search on Bibsonomy Comput. Law Secur. Rev. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
16Geng Wang, Haiyang Zhang, Fengmei Liu Security Proof of JAMBU under Nonce Respecting and Nonce Misuse Cases. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
16Sergey Agievich EHE: nonce misuse-resistant message authentication. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
16Guillaume Endignoux, Damian Vizár Linking Online Misuse-Resistant Authenticated Encryption and Blockwise Attack Models. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
16Kevin Milner, Cas Cremers, Jiangshan Yu, Mark Ryan 0001 Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
16Jonathan D. Fuller, Benjamin W. P. Ramsey, Mason Rice, John M. Pecarina Misuse-based detection of Z-Wave network attacks. Search on Bibsonomy Comput. Secur. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
16Collin Mulliner, William K. Robertson, Engin Kirda On the misuse of graphical user interface elements to implement security controls. Search on Bibsonomy it Inf. Technol. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
16Dheyaaldin Alsalman, Insu Park The Effect of Perceived System Risks on HIS Misuse Intention: The Role of System Resilience under the Context of Disasters. Search on Bibsonomy AMCIS The full citation details ... 2017 DBLP  BibTeX  RDF
Displaying result #301 - #400 of 983 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license