The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for threats with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1954-1987 (15) 1988-1993 (16) 1994-1996 (33) 1997 (17) 1998 (16) 1999 (21) 2000 (25) 2001 (30) 2002 (50) 2003 (83) 2004 (118) 2005 (218) 2006 (250) 2007 (330) 2008 (332) 2009 (227) 2010 (121) 2011 (93) 2012 (111) 2013 (105) 2014 (124) 2015 (162) 2016 (189) 2017 (188) 2018 (231) 2019 (223) 2020 (287) 2021 (264) 2022 (259) 2023 (329) 2024 (95)
Publication types (Num. hits)
article(1596) book(11) data(5) incollection(78) inproceedings(2795) phdthesis(63) proceedings(14)
Venues (Conferences, Journals, ...)
CoRR(283) LEET(69) HICSS(59) IEEE Access(56) ARES(49) IEEE Secur. Priv.(49) MIST@CCS(43) ISI(38) Sensors(32) ACSAC(29) Netw. Secur.(29) Comput. Secur.(27) CCS(26) Commun. ACM(18) Computer(18) AsiaCCS(17) More (+10 of total 1688)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 2004 occurrences of 1111 keywords

Results
Found 4563 publication records. Showing 4562 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
13Young-Gab Kim, Jongin Lim 0001 Quantitative Risk Analysis and Evaluation in Information Systems: A Case Study. Search on Bibsonomy International Conference on Computational Science (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Ludovic Courtès, Marc-Olivier Killijian, David Powell Security Rationale for a Cooperative Backup Service for Mobile Devices. Search on Bibsonomy LADC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13William J. Caelli Application Security - Myth Or Reality? Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF OSI security, access control, web services security, mandatory access control, security education, application security, operating system security
13Seonggeun Ryu, Youngsong Mun Enhancement for Security of Peer-to-Peer by Expanding CGA Mechanism. Search on Bibsonomy ICCSA (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Sanguk Noh Autonomous Situation Awareness Through Threat Data Integration. Search on Bibsonomy IRI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Insu Kim, Keecheon Kim Secure Session Management Mechanism in VoIP Service. Search on Bibsonomy ISPA Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Soon-Keow Chong, Jemal H. Abawajy Feedback Credibility Issues In Trust Management Systems. Search on Bibsonomy MUE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Tim Menzies, Oussama El-Rawas, Jairus Hihn, Martin S. Feather, Raymond J. Madachy, Barry W. Boehm The business case for automated software engineering. Search on Bibsonomy ASE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF simulated annealing, COCOMO, bayes, COQUALMO
13Chi-Chih Huang, Pang-Chieh Wang, Ting-Wei Hou Advanced OSGi Security Layer. Search on Bibsonomy AINA Workshops (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Nabil R. Adam, Vandana Pursnani Janeja, Aabhas V. Paliwal, Basit Shafiq, Cédric Ulmer, Volker Gersabeck, Anne Hardy, Christof Bornhövd, Joachim Schaper Approach for Discovering and Handling Crisis in a Service-Oriented Environment. Search on Bibsonomy ISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Sangmi Chai, Raj Sharman, Smitha Patil, Shruta Satam, H. Raghav Rao, Shambhu J. Upadhyaya Surface Transportation and Cyber-Infrastructure: An Exploratory Study. Search on Bibsonomy ISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Bill Neugent Bill Neugent MITRE Fellow, Chief Engineer Information Security Division. Search on Bibsonomy EDOC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Manish C. Kumar, K. Gopinath Recovery from DoS Attacks in MIPv6: Modeling and Validation. Search on Bibsonomy SEFM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Praveen Paruchuri, Jonathan P. Pearce, Milind Tambe, Fernando Ordóñez, Sarit Kraus An efficient heuristic approach for security against multiple adversaries. Search on Bibsonomy AAMAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Bayesian and Stackelberg games, security of agent systems, game theory
13Casey K. Fung, Patrick C. K. Hung, William M. Kearns, Stephen A. Uczekaj Dynamic Workflow Generation with Interoperable Security Alerts in MANET. Search on Bibsonomy IEEE SCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Ricardo Jorge Santos, Jorge Bernardino Global Epidemiological Outbreak Surveillance System Architecture. Search on Bibsonomy IDEAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Maurizio Atzori, Francesco Bonchi, Fosca Giannotti, Dino Pedreschi Towards low-perturbation anonymity preserving pattern discovery. Search on Bibsonomy SAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Igor Nai Fovino, Marcelo Masera Through the Description of Attacks: A Multidimensional View. Search on Bibsonomy SAFECOMP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Security assessment, Attack Pattern
13Ettore Merlo, Dominic Letarte, Giuliano Antoniol Insider and Ousider Threat-Sensitive SQL Injection Vulnerability Analysis in PHP. Search on Bibsonomy WCRE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Keith B. Frikken, Philippe Golle Private social network analysis: how to assemble pieces of a graph privately. Search on Bibsonomy WPES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF privacy, social networks, anonymity, graph
13José M. Fernandez 0001, Pierre-Marc Bureau Optimising malware. Search on Bibsonomy IPCCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Ying Zhang 0022, Evan Cooke, Zhuoqing Morley Mao Internet-scale malware mitigation: combining intelligence of the control and data plane. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF internet motion sensor, routing anomaly, network security, BGP, computer worms
13Lorenz Froihofer, Johannes Osrael, Karl M. Göschka Trading Integrity for Availability by Means of Explicit Runtime Constraints. Search on Bibsonomy COMPSAC (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Horst F. Wedde, Constantin Timm, Muddassar Farooq BeeHiveGuard: A Step Towards Secure Nature Inspired Routing Algorithms. Search on Bibsonomy EvoWorkshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Aleksy Schubert, Jacek Chrzaszcz ESC/Java2 as a Tool to Ensure Security in the Source Code of Java Applications. Search on Bibsonomy SET The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Artem Vorobiev, Jun Han 0004 Security Attack Ontology for Web Services. Search on Bibsonomy SKG The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Matthew Smith 0001, Michael Engel, Thomas Friese, Bernd Freisleben, Gregory A. Koenig, William Yurcik Security Issues in On-Demand Grid and Cluster Computing. Search on Bibsonomy CCGRID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Jérémy Serror, Hui Zang, Jean-Chrysostome Bolot Impact of paging channel overloads or attacks on a cellular network. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF CDMA, attack, paging, overload, queuing systems
13Nabil R. Adam, Vijayalakshmi Atluri, Vandana Pursnani Janeja, Aabhas V. Paliwal, Mahmoud Youssef, Soon Ae Chun, Jim Cooper, John Paczkowski, Christof Bornhövd, Ike Nassi, Joachim Schaper Semantics-based threat structure mining. Search on Bibsonomy DG.O The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Ida Hogganvik, Ketil Stølen A Graphical Approach to Risk Identification, Motivated by Empirical Investigations. Search on Bibsonomy MoDELS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Tanveer A. Zia, Albert Y. Zomaya Security Issues in Wireless Sensor Networks. Search on Bibsonomy ICSNC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13David W. Johnson, Harold Koch Computer Security Risks in the Internet Era: Are Small Business Owners Aware and Proactive?. Search on Bibsonomy HICSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Hyung-Woo Lee Lightweight Wireless Intrusion Detection Systems Against DDoS Attack. Search on Bibsonomy ICCSA (5) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Wongoo Lee, Sijung Kim, Bonghan Kim Response Against Hacking and Malicious Code in P2P. Search on Bibsonomy ICCSA (5) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Dong Hwi Lee, Jeom Goo Kim, Kuinam J. Kim HOIDS-Based Detection Method of Vicious Event in Large Networks. Search on Bibsonomy EUC Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Jianwei Niu, Zhe Chen, Guangwei Zhang Towards A Subjective Trust Model with Uncertainty for Open Network. Search on Bibsonomy GCC Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Patrick C. K. Hung, Miguel Vargas Martin Security Issues in VOIP Applications. Search on Bibsonomy CCECE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Victor R. Basili, Sebastian G. Elbaum Empirically driven SE research: state of the art and required maturity. Search on Bibsonomy ICSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Ping Wang 0007, Kuo-Ming Chao, Chun-Lung Huang, Chi-Chun Lo, Chia-Ling Hu A Fuzzy Decision Model of Risk Assessment Through Fuzzy Preference Relations with Users Confidence-interval. Search on Bibsonomy AINA (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Markus Miettinen, Perttu Halonen Host-Based Intrusion Detection for Advanced Mobile Devices. Search on Bibsonomy AINA (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF mobile devices, security monitoring, host-based intrusion detection
13Mary Baker, Mehul A. Shah, David S. H. Rosenthal, Mema Roussopoulos, Petros Maniatis, Thomas J. Giuli, Prashanth P. Bungale A fresh look at the reliability of long-term digital storage. Search on Bibsonomy EuroSys The full citation details ... 2006 DBLP  DOI  BibTeX  RDF storage systems, digital preservation
13Dixie B. Baker Privacy and Security in Public Health: Maintaining the Delicate Balance between Personal Privacy and Population Safety. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Baruch Awerbuch, Christian Scheideler Towards a scalable and robust DHT. Search on Bibsonomy SPAA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF robustness, overlay networks, peer-to-peer systems
13Praveen Paruchuri, Milind Tambe, Fernando Ordóñez, Sarit Kraus Security in multiagent systems by policy randomization. Search on Bibsonomy AAMAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF decentralized POMDP, safety and security in agent systems, teamwork, POMDP, MDP
13Dariusz Wawrzyniak Information Security Risk Assessment Model for Risk Management. Search on Bibsonomy TrustBus The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13René Neumerkel, Stephan Groß A Sophisticated Solution for Revealing Attacks on Wireless LAN. Search on Bibsonomy TrustBus The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Warren Harrison The Saboteur Within. Search on Bibsonomy IEEE Softw. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Wynne W. Chin, Dorothy E. Leidner From the editors. Search on Bibsonomy Data Base The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Zang Li, Wade Trappe, Yanyong Zhang, Badri Nath Robust statistical methods for securing wireless localization in sensor networks. Search on Bibsonomy IPSN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Hideki Koike, Kazuhiro Ohno, Kanba Koizumi Visualizing Cyber Attacks using IP Matrix. Search on Bibsonomy VizSEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF virus visualization, worm visualization, Internet forecasting, information visualization, intrusion detection, information security, Internet worm, computer virus
13Kazuhiro Ohno, Hideki Koike, Kanba Koizumi IPMatrix: An Effective Visualization Framework for Cyber Threat Monitoring. Search on Bibsonomy IV The full citation details ... 2005 DBLP  DOI  BibTeX  RDF information visualization, intrusion detection, information security, Internet worm, computer virus
13Tianlei Hu, Gang Chen 0001, Ke Chen 0005, Jinxiang Dong GARWM: Towards a Generalized and Adaptive Watermark Scheme for Relational Data. Search on Bibsonomy WAIM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Joseph M. Murphy The water is wide: network security at Kenyon College, 1995-2005. Search on Bibsonomy SIGUCCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF student computing, resNet, antivirus
13Thomas A. Gerace, Huseyin Cavusoglu The critical elements of patch management. Search on Bibsonomy SIGUCCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, operating system, update, windows, patch, Microsoft, patch management, automatic update
13Kevin M. Taaffe, Rachel Kohl, Delbert L. Kimbler Hospital evacuation: issues and complexities. Search on Bibsonomy WSC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Boris Dragovic, Calicrates Policroniades Information SeeSaw: Availability vs. Security Management in the UbiComp World. Search on Bibsonomy Secure Data Management The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Haeryong Park, Kilsoo Chun, Seungho Ahn The Security Requirement for off-line E-cash system based on IC Card. Search on Bibsonomy ICPADS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF E-cash system, off-line E-cash system based on IC Card, E-cash protocol, Payment system
13Changzheng Zhu, Zhaolin Yin, Aijuan Zhang Mobile Code Security on Destination Platform. Search on Bibsonomy ICCNMC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Beatriz Grafulla-González, Christopher D. Haworth, Andrew R. Harvey, Katia Lebart, Yvan R. Petillot, Yves de Saint-Pern, Mathilde Tomsin, Emanuele Trucco Millimetre-Wave Personnel Scanners for Automated Weapon Detection. Search on Bibsonomy ICAPR (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Pooya Jaferian, Golnaz Elahi, Mohammad Reza Ayatollahzadeh Shirazi, Babak Sadeghian RUPSec : Extending Business Modeling and Requirements Disciplines of RUP for Developing Secure Systems. Search on Bibsonomy EUROMICRO-SEAA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Young-Gab Kim, Taek Lee, Hoh Peter In, Yoon Jung Chung, In-Jung Kim, Doo-Kwon Baik A Probabilistic Approach to Estimate the Damage Propagation of Cyber Attacks. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Zhaoyu Liu, Dichao Peng, Yuliang Zheng 0001, Jeffrey Liu Communication Protection in IP-based Video Surveillance Systems. Search on Bibsonomy ISM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF real-time video stream, randomly adjustable encryption, security, stream cipher, encryption, video surveillance, pseudo random number generator
13Bugra Gedik, Ling Liu 0001 Location Privacy in Mobile Systems: A Personalized Anonymization Model. Search on Bibsonomy ICDCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Stephan Riebach, Erwin P. Rathgeb, Birger Tödtmann Risk Assessment of Production Networks Using Honeynets - Some Practical Experience. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13In-Jung Kim, Yoon Jung Chung, YoungGyo Lee, Dongho Won A Time-Variant Risk Analysis and Damage Estimation for Large-Scale Network Systems. Search on Bibsonomy ICCSA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13SangCheol Hwang, Namhoon Lee, Kouichi Sakurai, Joong Gil Park, Jaecheol Ryou 0001 The Improved Risk Analysis Mechanism in the Practical Risk Analysis System. Search on Bibsonomy ICOIN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF praha, risk management, risk analysis
13Eun Young Choi, Su-Mi Lee, Dong Hoon Lee 0001 Efficient RFID Authentication Protocol for Ubiquitous Computing Environment. Search on Bibsonomy EUC Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Fernando Flores The future of media, blogs and innovation: new IR challenges? Search on Bibsonomy SIGIR The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Rui Costa Cardoso, Mário M. Freire Towards Autonomic Minimization of Security Vulnerabilities Exploitation in Hybrid Network Environments. Search on Bibsonomy ICAS/ICNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Ragib Hasan, Suvda Myagmar, Adam J. Lee, William Yurcik Toward a threat model for storage systems. Search on Bibsonomy StorageSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, storage system, threat model
13Yasushi Yamazaki, Akane Nakashima, Kazunobu Tasaka, Naohisa Komatsu A Study on Vulnerability in On-line Writer Verification System. Search on Bibsonomy ICDAR The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Li Xiong 0001, Ling Liu 0001 PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security, Peer-to-peer, trust, data management, reputation mechanisms
13K. Mani Chandy Event Servers for Crisis Management. Search on Bibsonomy HiPC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
13Tuomas Aura Privacy, Control and Internet Mobility (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
13Andreas Pashalidis, Chris J. Mitchell Limits to Anonymity When Using Credentials. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2004 DBLP  DOI  BibTeX  RDF pseudonym systems, privacy, timing attacks, unlinkability, anonymous credential systems
13Christian Hauser Mobility management meets privacy: the failure of existing proposals and a new, future-proof approach. Search on Bibsonomy Mobility Management & Wireless Access Protocols The full citation details ... 2004 DBLP  DOI  BibTeX  RDF multiple identities, privacy, mobility management, mobile IP
13Michiaki Tatsubori, Takeshi Imamura, Yuichi Nakamura 0003 Best-Practice Patterns and Tool Support for Configuring Secure Web Services Messaging. Search on Bibsonomy ICWS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
13Dan Jong Kim 0001, Charles Steinfield, Ying-ju Lai Revisiting the role of web assurance seals in consumer trust. Search on Bibsonomy ICEC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF assurance seal service, awareness of assurance seal service, online privacy, online security, information quality
13Myeong-Wuk Jang, Amr Abdel Momen, Gul Agha ATSpace: A Middle Agent to Support Application Oriented Matchmaking and Brokering Services. Search on Bibsonomy IAT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
13Ramon Martí, Jaime Delgado, Xavier Perramon Security Specification and Implementation for Mobile e-Health Services. Search on Bibsonomy EEE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
13Yang Yu, Tzi-cker Chiueh Display-only file server: a solution against information theft due to insider attack. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2004 DBLP  DOI  BibTeX  RDF information theft, access, digital rights management, insider attack
13Sun-Sik Roh, Su-Hyun Kim, Gwang-Hyun Kim Design of Authentication and Key Exchange Protocol in Ethernet Passive Optical Networks. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
13Ramon Martí, Jaime Delgado, Xavier Perramon Network and Application Security in Mobile e-Health Applications. Search on Bibsonomy ICOIN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
13Tadayoshi Kohno, Adam Stubblefield, Aviel D. Rubin, Dan S. Wallach Analysis of an Electronic Voting System. Search on Bibsonomy S&P The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
13Srivaths Ravi 0001, Anand Raghunathan, Srimat T. Chakradhar Tamper Resistance Mechanisms for Secure, Embedded Systems. Search on Bibsonomy VLSI Design The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
13Boris Dragovic, Jon Crowcroft Information exposure control through data manipulation for ubiquitous computing. Search on Bibsonomy NSPW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
13Lance Spitzner The Honeynet Project: Trapping the Hackers. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Honeynet Project, early warning and prediction, distributed honeynets, Honeypots, information gathering, honeynets
13Vassilios Morellas, Ioannis T. Pavlidis, Panagiotis Tsiamyrtzis DETER: Detection of events for threat evaluation and recognition. Search on Bibsonomy Mach. Vis. Appl. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Multicamera calibration, Threat assessment, Object tracking, Surveillance system, Security system
13Uwe Aickelin, Peter J. Bentley, Steve Cayzer, Jungwon Kim, Julie McLeod Danger Theory: The Link between AIS and IDS? Search on Bibsonomy ICARIS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
13Fariborz Farahmand, Shamkant B. Navathe, Philip H. Enslow Jr., Gunter P. Sharp Managing vulnerabilities of information systems to security incidents. Search on Bibsonomy ICEC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
13Li Xiong 0001, Ling Liu 0001 A reputation-based trust model for peer-to-peer ecommerce communities. Search on Bibsonomy EC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF peer-to-peer, trust, reputation, electronic communities
13Pierrick Plamondon, Brahim Chaib-draa, Patrick Beaumont, Dale E. Blodgett A Frigate Movement Survival Agent-Based Approach. Search on Bibsonomy KES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
13Vu A. Ha, David J. Musliner Balancing Safety Against Performance: Tradeoffs in Internet Security. Search on Bibsonomy HICSS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
13Jiyoung Lim, Ok-kyeung Kim, Yeo-Jin Kim, Ga-Jin Na, Hyunjung Na, Kijoon Chae, Young-Soo Kim, Jung-Chan Na Design of Security Enforcement Engine for Active Nodes in Active Networks. Search on Bibsonomy ICOIN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
13Xiaobin Li, Aijuan Zhang, Jinfei Sun, Zhaolin Yin The Research of Mobile Agent Security. Search on Bibsonomy GCC (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
13Aameek Singh, Ling Liu 0001 TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems. Search on Bibsonomy Peer-to-Peer Computing The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
13Gustavo A. Santana Torrellas A Security Architectural Approach for Risk Assessment Using Multi-agent Systems Engineering. Search on Bibsonomy DAIS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
13Li Xiong 0001, Ling Liu 0001 A Reputation-Based Trust Model for Peer-to-Peer eCommerce Communities. Search on Bibsonomy CEC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
13William La Cholter, Priya Narasimhan, Daniel F. Sterne, Ravindra Balupari, Kelly Djahandari, Arvind Mani, Sandra L. Murphy IBAN: Intrusion Blocker Based on Active Networks. Search on Bibsonomy DANCE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
13John R. Douceur The Sybil Attack. Search on Bibsonomy IPTPS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #400 of 4562 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license