The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "SIN"( http://dblp.L3S.de/Venues/SIN )

URL (DBLP): http://dblp.uni-trier.de/db/conf/sin

Publication years (Num. hits)
2009 (51) 2010 (41) 2011 (44) 2012 (34) 2013 (90) 2014 (83) 2015 (63) 2016 (34) 2017 (50) 2018 (29) 2019 (29) 2020 (35) 2021 (28) 2022 (39) 2023 (35)
Publication types (Num. hits)
inproceedings(670) proceedings(15)
Venues (Conferences, Journals, ...)
SIN(685)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 146 occurrences of 129 keywords

Results
Found 685 publication records. Showing 685 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1A. Yu. Boruchinkin Secure voice communication system with hardware encryption of data on hands-free headset. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Gaurav Somani 0001, Manoj Singh Gaur, Dheeraj Sanghi DDoS/EDoS attack in cloud: affecting everyone out there! Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Malik S. K. Awan, Mohammed A. AlGhamdi, Sultan H. Almotiri, Pete Burnap, Omer F. Rana A classification framework for distinct cyber-attacks based on occurrence patterns. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Subhasish Banerjee, Manash Pratim Dutta, Chandan Tilak Bhunia A perfect dynamic-id and biometric based remote user authentication scheme under multi-server environments using smart cards. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Tatiana V. Stepanova, Dmitry P. Zegzhda Large-scale systems security evolution: control theory approach. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Rajat Subhra Goswami, Subhasish Banerjee, Manash Pratim Dutta, Chandan Tilak Bhunia Absolute key variation technique of automatic variable key in cryptography. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Nilesh Chakraborty, Samrat Mondal Few notes towards making honeyword system more secure and usable. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ramakrishna Thurimella, Rinku Dewri, William Mitchell Record linkage applications in health services research: opportunities and challenges. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Alexander Barabanov, Alexey Markov Modern trends in the regulatory framework of the information security compliance assessment in Russia based on common criteria. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Natalia G. Miloslavskaya, Alexander I. Tolstoy, Vladislav Petrov Secure e-Learning portal for teaching business continuity and information security management. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Alexander Barabanov, Alexey Markov, Andrey Fadin, Valentin Tsirlov, Igor Shakhalov Synthesis of secure software development controls. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Francesco Buccafurri, Lidia Fotia, Angelo Furfaro, Alfredo Garro, Matteo Giacalone, Andrea Tundis An analytical processing approach to supporting cyber security compliance assessment. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ludmila K. Babenko, Alina Trepacheva Cryptanalysis of factoring-based fully homomorphic encryption. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1André Rifaut, Christophe Feltus, Slim Turki, Djamel Khadraoui Analysis of the impact of ethical issues on the management of the access rights. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Daria Chukova, Alexey Pakhomov Profile-based students assignment to core financial intelligence unit departments. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Evstifeeva Natalia Alexandrovna, Evstifeeva Olga Urievna Approbation of the methodology for web monitoring of terrorism- and extremism-related content. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Sergey Lapin Access control model D-TBAC subject to the requirements to tasks' performing. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Alexey Zhukov Lightweight cryptography: modern development paradigms. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Evgeny Sergeevich Abramov, Elena Basan, Oleg B. Makarevich Trust management system for mobile cluster-based wireless sensor network. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ecir Ugur Küçüksille, Mehmet Ali Yalçinkaya, Samet Ganal Developing a penetration test methodology in ensuring router security and testing it in a virtual laboratory. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Sergey Zapechnikov, Natalia G. Miloslavskaya, Alexander I. Tolstoy Modeling of next-generation firewalls as queueing services. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jithu Raphel, P. Vinod 0001 Information theoretic method for classification of packed and encoded files. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Oleg B. Makarevich, Ron Poet, Atilla Elçi, Manoj Singh Gaur, Mehmet A. Orgun, Ludmila K. Babenko, Md. Sadek Ferdous, Anthony T. S. Ho, Vijay Laxmi, Josef Pieprzyk (eds.) Proceedings of the 8th International Conference on Security of Information and Networks, SIN 2015, Sochi, Russian Federation, September 8-10, 2015 Search on Bibsonomy SIN The full citation details ... 2015 DBLP  BibTeX  RDF
1Dmitry Mikhaylov, Andrey Starikovskiy, Grigoriy Lebedev, Dmitry Rubin, Alexey Egorov, Eugeniy Uleykin, Alexander Boruchinkin, Anastasia M. Tolstaya Developing a system for text-messages protection. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Vladimir V. Glukhov, Igor V. Ilin, A. B. Anisiforov Problems of data protection in industrial corporations enterprise architecture. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Alexey A. Tselykh, Dmitry Petukhov Web service for detecting credit card fraud in near real-time. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Tatiana V. Stepanova, Alexander I. Pechenkin, Daria S. Lavrova Ontology-based big data approach to automated penetration testing of large-scale heterogeneous systems. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Anna Epishkina, Konstantin Kogos Protection from binary and multi-symbol packet length covert channels. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Margarita Knyazeva, Alexander N. Tselykh, Alexey A. Tselykh, Elena Popkova A graph-based data mining approach to preventing financial fraud: a case study. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ron Poet The use of mobile devices in authentication. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Naila Mukhtar, Muhammad Shamim Baig, L. A. Khan Improved trust based key management for end-to-end secure communication in cellular networks. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Maxim Anikeev Improvement of treeless signature schemes implementation by random oracle buffering. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Vladimir Eliseev, Yury Shabalin Dynamic response recognition by neural network to detect network host anomaly activity. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ludmila K. Babenko, Philipp Burtyka, Oleg B. Makarevich, Alina Trepacheva The general model of secure computation system. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Bharat Buddhdev, Rati Bhan, Manoj Singh Gaur, Vijay Laxmi DynaDroid: dynamic binary instrumentation based app behavior monitoring framework. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Valeriy O. Osipyan Mathematical modelling of cryptosystems based on Diophantine problem with gamma superposition method. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Emmanouil Vasilomanolakis, Shankar Karuppayah, Panayotis Kikiras, Max Mühlhäuser A honeypot-driven cyber incident monitor: lessons learned and steps ahead. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Andrey Shalyapin, Vadim Zhukov Case based analysis in information security incidents management system. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Alexander Shukhman, Petr Polezhaev, Yuri Ushakov, Leonid Legashev, Veniamin N. Tarasov, Nadezhda F. Bakhareva Development of network security tools for enterprise software-defined networks. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Alexander Tarasov Modern techniques of function-level fault tolerance in MFM-systems. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1N. V. Narendra Kumar, R. K. Shyamasundar Labelled mobile ambients model for information flow security in distributed systems. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Naghmeh Moradpoor Sheykhkanloo SQL-IDS: evaluation of SQLi attack detection and classification based on machine learning techniques. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Brian A. Soeder, K. Suzanne Barber Trustworthiness of Identity Attributes. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Bernd Conrad, Fatemeh Shirazi Analyzing the Effectiveness of DoS Attacks on Tor. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Tobias F. Pfeffer, Paula Herber, Jörg Schneider 0001 Reverse Engineering of ARM Binaries Using Formal Transformations. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ivan Gudymenko A Privacy-Preserving E-Ticketing System for Public Transportation Supporting Fine-Granular Billing and Local Validation. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Soumik Mondal, Patrick Bours Continuous Authentication using Fuzzy Logic. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Nishant Garg, Kuldeep Pareek, Manoj Singh Gaur, Vijay Laxmi, Chhagan Lal Analysis of Identity Forging Attack in MANETs. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hervé Cholez, Christophe Feltus Towards an Innovative Systemic Approach of Risk Management. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ecem Ünal, Erkay Savas Bandwidth-Optimized Parallel Private Information Retrieval. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, Michele Scandale Differential Fault Analysis for Block Ciphers: an Automated Conservative Analysis. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Vikas Jaiman, Gaurav Somani 0001 An Order Preserving Encryption Scheme for Cloud Computing. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ibrahim Lahmer, Ning Zhang 0001 MapReduce: MR Model Abstraction for Future Security Study. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mohammad Puttaroo, Peter Komisarczuk, Renato Cordeiro de Amorim Challenges in developing Capture-HPC exclusion lists. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sebastian Abt, Sebastian Gärtner, Harald Baier A Small Data Approach to Identification of Individuals on the Transport Layer using Statistical Behaviour Templates. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Neila Rjaibi, Latifa Ben Arfa Rabai Deploying Suitable Countermeasures to Solve the Security Problems within an E-learning Environment. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Kiran B. Raja, Ramachandra Raghavendra, Christoph Busch 0001, Soumik Mondal An Empirical Study of Smartphone Based Iris Recognition in Visible Spectrum. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hani Moaiteq Aljahdali, Ron Poet Users' Perceptions of Recognition-Based Graphical Passwords: A Qualitative Study on Culturally Familiar Graphical Passwords. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Philipp Burtyka, Oleg B. Makarevich Symmetric Fully Homomorphic Encryption Using Decidable Matrix Equations. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Parth Bhatt, Johny de Souza, Nelson Uto, Jefferson Capovilla, Jose Resende, Danilo Suiama Implementation Aspects of MeterGoat, a Smart Meter Security Training Platform. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Greig Paul, James Irvine 0001 A Protocol For Storage Limitations and Upgrades in Decentralised Networks. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mohammad A. AlAhmad, Imad Fakhri Alshaikhli Design and Analysis of a New Hash Function Gear. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Monika Singh 0001, Divya Bansal, Sanjeev Sofat Detecting Malicious Users in Twitter using Classifiers. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Cihangir Tezcan, Halil Kemal Taskin, Murat Demircioglu Improbable Differential Attacks on Serpent using Undisturbed Bits. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Giovanni Bottazzi, Gianluigi Me The Botnet Revenue Model. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Shahid Alam, Issa Traoré, Ibrahim Sogukpinar Current Trends and the Future of Metamorphic Malware Detection. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Peter Pisarcík, Pavol Sokol Framework for distributed virtual honeynets. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ahmad Kamal Ramli, Karim Djemame Autonomic management for convergent networks to support robustness of appliance technologies. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mehrdad Sepehri Sharbaf A New Perspective to Information Security: Total Quality Information Security Management. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Chalee Vorakulpipat, Chantri Polprasert, Siwaruk Siwamogsatham Managing Mobile Device Security in Critical Infrastructure Sectors. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Anatoly Malyuk, Natalia G. Miloslavskaya Information Security Theory Development. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Alina Trepacheva, Liudmila Babenko Known Plaintexts Attack on Polynomial based Homomorphic Encryption. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Md. Sadek Ferdous, Gethin Norman, Ron Poet Mathematical Modelling of Identity, Identity Management and Other Related Topics. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Natalia G. Miloslavskaya, Mikhail Senatorov, Alexander I. Tolstoy, Sergey Zapechnikov Big Data Information Security Maintenance. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Paraskevas Sarris, Lewis Mackenzie, Soumyadeb Chowdhury A Novel Authentication Scheme for Online Transactions. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Muhammad Adnan 0008, Antonio Lima, Luca Rossi 0004, Suresh Veluru 0001, Paul A. Longley, Mirco Musolesi, Muttukrishnan Rajarajan The Uncertainty of Identity Toolset: Analysing Digital Traces for User Profiling. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Smita Naval, Vijay Laxmi, Neha Gupta, Manoj Singh Gaur, Muttukrishnan Rajarajan Exploring Worm Behaviors using DTW. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jikku Kuriakose, Vinod P. 0001 Towards the Detection of Undetectable Metamorphic Malware. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Christoph Hochreiner, Markus Huber 0001, Georg Merzdovnik, Edgar R. Weippl Towards Practical Methods to Protect the Privacy of Location Information with Mobile Devices. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Shivam Aggarwal, Vishal Kumar, S. D. Sudarsan Identification and Detection of Phishing Emails Using Natural Language Processing Techniques. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sufyan Salim Mahmood AlDabbagh, Imad Fakhri Taha Al Shaikhli, Mohammad A. AlAhmad HISEC: A New Lightweight Block Cipher Algorithm. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Alwyn Goh, Geong Sen Poh, Voon-Yee Vee, Kok Boon Chong, Xin Zhe Khooi, Chanan Zhuo Ern Loh, Zhi Yuan Eng Human Visualisation of Cryptographic Code Using Progressive Multi-Scale Resolution. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Atilla Elçi Isn't the Time Ripe for a Standard Ontology on Security of Information and Networks? Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hossain Shahriar, Hisham M. Haddad Content Provider Leakage Vulnerability Detection in Android Applications. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Abdulaziz Almehmadi, Khalil El-Khatib On the Possibility of Insider Threat Detection Using Physiological Signal Monitoring. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hifaa Bait Baraka, Huaglory Tianfield Intrusion Detection System for Cloud Environment. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hani Moaiteq Aljahdali, Ron Poet Educated Guessing Attacks on Culturally Familiar Graphical Passwords Using Personal Information on Social Networks. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Thu Yein Win, Huaglory Tianfield, Quentin Mair, Taimur Al Said, Omer F. Rana Virtual Machine Introspection. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ron Poet, Muttukrishnan Rajarajan (eds.) Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014 Search on Bibsonomy SIN The full citation details ... 2014 DBLP  BibTeX  RDF
1Peter Aufner, Georg Merzdovnik, Markus Huber 0001, Edgar R. Weippl Plugin in the Middle - Minimising Security Risks in Mobile Middleware Implementations. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Marco Tiloca Efficient Protection of Response Messages in DTLS-Based Secure Multicast Communication. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Xavier J. A. Bellekens, Christos Tachtatzis, Robert C. Atkinson, Craig Renfrew, Tony Kirkham A Highly-Efficient Memory-Compression Scheme for GPU-Accelerated Intrusion Detection Systems. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Alina Trepacheva Cryptanalysis of Polynomial based Homomorphic Encryption. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Amardeep Singh, Divya Bansal, Sanjeev Sofat An Approach of Privacy Preserving based Publishing in Twitter. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Rahul Kumar, Indraveni K, Aakash Kumar Goel Automated Session Fixation Vulnerability Detection in Web Applications using the Set-Cookie HTTP response header in cookies. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Komminist Weldemariam, Hossain Shahriar, Vamshee Krishna Devendran Dynamic Analysis of Web Objects. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Fawad Khan, Sarmad Ullah Khan, Muhammad Roman, Muhammad Usman Abbasi Location Identity Based Content Security Scheme for Content Centric Networking. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ashok Singh Sairam, Rahul Kumar, Pratima Biswas Implementation of an Adaptive Traffic-aware Firewall. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Christophe Feltus, Damien Nicolas, Claude Poupart Towards a HL7 based Metamodeling Integration Approach for Embracing the Privacy of Healthcare Patient Records Administration. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ashish Saini, Ekta Gandotra, Divya Bansal, Sanjeev Sofat Classification of PE Files using Static Analysis. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #400 of 685 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license