The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for assurance with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1960-1978 (19) 1979-1982 (15) 1983-1985 (15) 1986 (17) 1987-1988 (23) 1989-1990 (19) 1991-1992 (25) 1993 (27) 1994 (27) 1995 (26) 1996 (67) 1997 (74) 1998 (71) 1999 (103) 2000 (128) 2001 (150) 2002 (164) 2003 (244) 2004 (279) 2005 (441) 2006 (350) 2007 (486) 2008 (473) 2009 (725) 2010 (339) 2011 (752) 2012 (219) 2013 (199) 2014 (258) 2015 (296) 2016 (286) 2017 (243) 2018 (239) 2019 (263) 2020 (244) 2021 (211) 2022 (241) 2023 (276) 2024 (58)
Publication types (Num. hits)
article(1531) book(16) incollection(476) inproceedings(5893) phdthesis(94) proceedings(82)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 3691 occurrences of 1860 keywords

Results
Found 8092 publication records. Showing 8092 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
27Susan D. Hansche Awareness and Training: Appendices. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Todd Fitzgerald Management Commitment: Security Councils. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Jeffrey Davis Defense in Depth: Network, Systems, and Applications Controls. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Craig A. Schiller Espionage: Counter-Economic. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Will Ozier Risk Analysis and Assessment: Risk Assessment Tasks. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Steven F. Blanding Network Router Security. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Chris Hare Policy Development: Needs. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27George Wade Computer Crime: Investigations. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27William Hugh Murray XML and Other Metadata Languages. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Kenneth J. Knapp, R. Franklin Morris Jr. Architecture: Biological Cells. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Matthew J. Decker Physical Layer Security: Networks. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Kenneth F. Belva Pod-Slurping: Other Vulnerabilities. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Lowell Bruce McCulley Application Systems Development. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Samantha Thomas Risk Assessment. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Keith Pasley Application Layer Security. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27James S. Tiller Managed Security Service Providers (MSSPs). Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Ben Rothke Java. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Carol A. Siegel, Ty R. Sagalow, Paul Serritella Cyber-Risk Management: Enterprise-Level Security. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Al Berg Applets: Network Security. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Dennis Seymour Lee Wireless Internet Security: Portable Internet Devices. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Rebecca Herold Fraud: Employee Identification. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27William T. Harding, Anita J. Reed, Robert L. Gray Cookies and Web Bugs. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Carl B. Jackson Business Impact Analysis: Process. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Mollie E. Krehnke, David C. Krehnke Data Access Controls: Sensitive or Critical. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Mark Edmead Steganography. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Stephen James Auditing: Self-Hacking. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27John O. Wylder Personal Accountability: Corporate Information Security Policy. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Sean M. Price Insider Threats: System and Application Weaknesses. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Carl B. Jackson, Mark Carey Risk Management: Enterprise. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Kevin Henry 0001 Physical Security: Melding with Information Systems Security. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Robby Fussell Quantum Computing. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Samuel W. Chun Awareness and Training: Motivational and Psychological Factors. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Paul A. Henry Tokens: Authentication. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27 Glossary. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Mollie E. Krehnke, David C. Krehnke Certification and Accreditation: Methodology. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Praveen Gauravaram, Lars R. Knudsen Cryptographic Hash Functions. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Sean M. Price Information Flow: Selecting Countermeasures. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Georges J. Jahchan Network Content Filtering and Leak Prevention. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27David C. Krehnke Corporate Governance. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Christopher Steinke Physical Security. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Samuel C. McClintock Xml. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Ralph Hoefelmeyer, Theresa E. Phillips Malicious Code. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Mandy Andress Web Applications: Security. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Todd Fitzgerald Phishing. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Bonnie A. Goins Pilewski, Christopher A. Pilewski Network Security. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Todd Fitzgerald Security Policy Development and Distribution: Web-Based. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Al Bredenberg E-Mail: Spam. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Ken M. Shaurette Information Security Basics: Effective Practices. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Chris Hare Virtual Network Computing (VNC) Systems. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Matthew J. Decker Enterprise Security Capability: Common Models. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Sean M. Price Information Flow: Emerging and Potential Techniques and Covert Channels. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Franjo Majstor Storage Area Networks. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Rebecca Herold Incident Response: Privacy Breaches. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Ralph Spencer Poore Global Transmissions: Jurisdictional Issues. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Gilbert Held IPv6: Expanding Internet Support. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Jeffery J. Lowder UNIX Security. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Ron Moritz Internet Mobile Code. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Don Evans Systems Integrity Engineering: Methodology and Motivational Business Values and Issues. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Rebecca Herold Privacy Governance: Effective Methods. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27William A. Yarberry Jr. Telephony Systems: Auditing. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27David MacLeod, Brian T. Geffert, David Deckter Health Insurance Portability and Accountability Act (HIPAA): Security Readiness. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Larry R. Leibrock Digital Forensics and E-Discovery. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Gerald Bowman Physical Security: Mission-Critical Facilities and Data Centers. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Brian Shorten Information Security Policies. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Steven F. Blanding Asynchronous Transfer Mode (ATM): Integrity and Security. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Carol Stucki Forensics: Non-Liturgical Examinations. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Steve Stanek Cryptography: Auditing. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27R. Scott McCoy Perimeter Security. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Kevin Henry 0001 Security Development Lifecycle. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Carl Burney Information Systems Security Officer: Roles and Responsibilities. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Ben Rothke Common Criteria. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Charles R. Hudson Jr. Awareness and Training: Framework. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27E. Eugene Schultz, Eugene H. Spafford Intrusion Detection Systems (IDSs): Implementation. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Michael J. Corby Forensics: Operational. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Debra S. Herrmann Common Criteria: IT Security Evaluation. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Rebecca Herold Privacy Breaches: Policies, Procedures, and Notification. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Keith Pasley Virtual Private Networks (VPNs): Perspectives. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Janice C. Sipior, Burke T. Ward, Georgina R. Roselli Spyware: Ethical and Legal Concerns. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Paul A. Henry Firewall Architectures: Platforms. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27George Richards Workplace Violence. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Don Evans Systems Integrity Engineering: Interoperable Risk Accountability Concepts. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Ken M. Shaurette Risk Management Model: Technology Convergence. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Kevin Henry 0001 Business Continuity Planning: Case Study. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Lynda L. McGhie, Phillip Q. Maier World Wide Web. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Ken M. Shaurette Sarbanes-Oxley Act of 2002 (SOX). Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27George G. McBride Integrated Threat Management. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Craig A. Schiller Mergers and Acquisitions. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Kevin Henry 0001 Operations Security: Support and Control. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Chris Hare Secure Socket Layer (SSL). Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Ronald A. Gove Cryptography: Encryption and. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Kevin Henry 0001 Risk Management and Analysis. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Derek Schatz Security Management Program: Prioritization. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27William Stackpole, Man Nguyen Systems Management: Third-Party Applications and Systems. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Peter S. Tippett Ethics. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Mollie E. Krehnke Crime Prevention: Environmental Design. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Bruce R. Matthews Physical Security: Controlled Access and Layered Defense. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Ed Gabrys Cybercrime: Council of Europe. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27James S. Tiller Virtual Private Networks (VPNs): Leverage. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27James S. Tiller Identity Theft. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Anton Chuvakin Honeypots and Honeynets. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #400 of 8092 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license