The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "SIN"( http://dblp.L3S.de/Venues/SIN )

URL (DBLP): http://dblp.uni-trier.de/db/conf/sin

Publication years (Num. hits)
2009 (51) 2010 (41) 2011 (44) 2012 (34) 2013 (90) 2014 (83) 2015 (63) 2016 (34) 2017 (50) 2018 (29) 2019 (29) 2020 (35) 2021 (28) 2022 (39) 2023 (35)
Publication types (Num. hits)
inproceedings(670) proceedings(15)
Venues (Conferences, Journals, ...)
SIN(685)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 146 occurrences of 129 keywords

Results
Found 685 publication records. Showing 685 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Niaz Morshed Chowdhury, Lewis M. Mackenzie Development of a Threat Model for Vehicular Ad-hoc Network based Accident Warning Systems. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Xavier J. A. Bellekens, Christos Tachtatzis, Robert C. Atkinson, Craig Renfrew, Tony Kirkham GLoP: Enabling Massively Parallel Incident Response Through GPU Log Processing. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Soumyadeb Chowdhury, Ron Poet, Lewis Mackenzie Exploring the Guessability of Image Passwords. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Shahid Alam, Ibrahim Sogukpinar, Issa Traoré, Yvonne Coady In-Cloud Malware Analysis and Detection: State of the Art. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Tatiana V. Stepanova, Dmitry P. Zegzhda Applying Large-scale Adaptive Graphs to Modeling Internet of Things Security. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ludmila K. Babenko, Oleg B. Makarevich, Dmitry Bespalov, Roman Chesnokov, Yaroslav Trubnikov Instrumental System for Analysis of Information Systems Using Smart Cards Protection. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hui Lin 0005, Adam J. Slagell, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer Semantic Security Analysis of SCADA Networks to Detect Malicious Control Commands in Power Grids (Poster). Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Valeriy O. Osipyan Mathematical model of the polyalphabetic information security system based on the normal generalized knapsack. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ahmed Saeed 0003, Ali Ahmadinia, Mike Just, Christophe Bobda An ID and Address Protection Unit for NoC based Communication Architectures. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ali Reza Honarvar, Ashkan Sami CBR Clone Based Software Flaw Detection Issues. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Nicolas Mayer, Jocelyn Aubert Sector-Specific Tool for Information Security Risk Management in the Context of Telecommunications Regulation (Tool demo). Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sergey Agafin, Anton Krasnopevtsev Memory access time as entropy source for RNG. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ecir U. Küçüksille, Mehmet Ali Yalçinkaya, Ozan Uçar Physical Dangers in the Cyber Security and Precautions to be Taken. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yogachandran Rahulamathavan, Pramod S. Pawar, Pete Burnap, Muttukrishnan Rajarajan, Omer F. Rana, George Spanoudakis Analysing Security requirements in Cloud-based Service Level Agreements. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Avani Sharma, Rajbir Kaur Non-cryptographic Detection Approach and Countermeasure for JFDV Attack. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Greig Paul, James Irvine 0001 Privacy Implications of Wearable Health Devices. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Naghmeh Moradpoor Sheykhkanloo Employing Neural Networks for the Detection of SQL Injection Attack. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Maria Evangelopoulou, Christopher W. Johnson 0001 Implementation of Safety Techniques in a Cyber Domain. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Maryam Farajzadeh-Zanjani, Seyed Masoud Alavi Abhari, Alexander G. Chefranov Group Key Exchange Protocol Based on Diffie-Hellman Technique in Ad-Hoc Network. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Bob Duncan, Mark Whittington Compliance with standards, assurance and audit: does this equal security? Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Edward Caprin, Yan Zhang 0003 Negotiation Based Framework for Attribute-Based Access Control Policy Evaluation. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ekta Gandotra, Divya Bansal, Sanjeev Sofat Integrated Framework for Classification of Malwares. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dusan Klinec, Vashek Matyás Traversing symmetric NAT with predictable port allocation. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Artem Garkusha, Evgeny Sergeevich Abramov, Oleg B. Makarevich An effectiveness of application of <> competitions concept within higher education (Student contribution). Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Emmanouil Vasilomanolakis, Shankar Karuppayah, Max Mühlhäuser, Mathias Fischer 0001 HosTaGe: a Mobile Honeypot for Collaborative Defense. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jérôme Dossogne, Frédéric Lafitte, Dirk Van Heule Secure and practical threshold RSA. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hosnieh Rafiee, Christoph Meinel Privacy and security in IPv6 networks: challenges and possible solutions. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mohammad Ali Orumiehchiha, Josef Pieprzyk, Elham Shakour, Ron Steinfeld Cryptanalysis of RC4(n, m) stream cipher. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yüksel Arslan, Yildiray Yalman Visual steganalysis of LSB-encoded audio data based on frequency domain characteristics. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Salim Khamadja, Kamel Adi, Luigi Logrippo Designing flexible access control models for the cloud. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mohammed Gharib, Mohsen Minaei, Morteza Golkari, Ali Movaghar 0001 Expert key selection impact on the MANETs' performance using probabilistic key management algorithm. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mudassar Aslam, Christian Gehrmann, Mats Björkman Continuous security evaluation and auditing of remote platforms by combining trusted computing and security automation techniques. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Dmitry Rublev, Vladimir Fedorov, Oleg B. Makarevich Digital camera identification system. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sambit Bakshi, Tugkan Tuglular Security through human-factors and biometrics. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Aurathai Wareesa-ard EndNote vs Zotero in searching library catalog via Z39.50 of academic libraries in Thailand. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Evgeny Sergeevich Abramov, Elena Basan, Oleg B. Makarevich Development of a secure cluster-based wireless sensor network model. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Salim Khamadja, Kamel Adi, Luigi Logrippo An access control framework for hybrid policies. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Muhammad Kazim, Rahat Masood, Muhammad Awais Shibli Securing the virtual machine images in cloud computing. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jérôme Dossogne, Frédéric Lafitte On authentication factors: "what you can" and "how you do it". Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Anil Saini, Manoj Singh Gaur, Vijay Laxmi The darker side of Firefox extension. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Christophe Feltus, Djamel Khadraoui Conviction model for incident reaction architecture monitoring based on automatic sensors alert detection. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Geong Sen Poh, Mohd Amril Nurman Mohd Nazir, Bok-Min Goi, Syh-Yuan Tan, Raphael Chung-Wei Phan, Maryam Safiyah Shamsudin An authentication framework for peer-to-peer cloud. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Naïm Qachri, Frédéric Lafitte, Olivier Markowitch Authenticated key agreement in wireless networks with automated key management. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Frédéric Lafitte, Olivier Markowitch, Dirk Van Heule SAT based analysis of LTE stream cipher ZUC. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yulong Fu, Ousmane Koné A finite transition model for security protocol verification. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Valeriy O. Osipyan Information protection systems based on universal knapsack problem. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Alexander G. Chefranov, SeyedMasoud Alavi Abhari, Hooman Alavizadeh, Maryam Farajzadeh-Zanjani Secure true random number generator in WLAN/LAN. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Orhan Ermis, Serif Bahtiyar, Emin Anarim, M. Ufuk Çaglayan An improved fault-tolerant conference-key agreement protocol with forward secrecy. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Rohan Nanda, P. Venkata Krishna 0001 D0M-WLAN: a traffic analysis based approach for detecting malicious activities on wireless networks. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Bart Preneel The SHA-3 competition: lessons learned. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jérôme Dossogne, Frédéric Lafitte Blinded additively homomorphic encryption schemes for self-tallying voting. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Shahid Alam, R. Nigel Horspool, Issa Traoré MAIL: Malware Analysis Intermediate Language: a step towards automating and optimizing malware detection. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Soumik Mondal, Patrick Bours, Syed Zulkarnain Syed Idrus Complexity measurement of a password for keystroke dynamics: preliminary study. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ahmad AlSa'deh, Christoph Meinel, Florian Westphal, Marian Gawron, Björn Groneberg CGA integration into IPsec/IKEv2 authentication. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Parvez Faruki, Vijay Ganmoor, Vijay Laxmi, Manoj Singh Gaur, Ammar Bharmal AndroSimilar: robust statistical feature signature for Android malware detection. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Somayeh Taheri, Salke Hartung, Dieter Hogrefe Anonymity and privacy in multicast mobile ad hoc networks. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ali Aydin Selçuk Trusting SSL in practice. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Duygu Sinanc, Seref Sagiroglu A review on cloud security. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1R. K. Shyamasundar Security and protection of SCADA: a bigdata algorithmic approach. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Christophe Feltus Industry program panel. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Pablo Lamilla Álvarez, Yoshiaki Takata An HBAC-based approximation for IBAC programs. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Saeid Tizpaz-Niari, Amir Hossein Jahangir Verification of OSPF vulnerabilities by colored Petri net. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Georges Ataya Linking business goals to information security plans and activities. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Arif Sari, Behnam Rahnama Addressing security challenges in WiMAX environment. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ludmila K. Babenko Analysis of GOST 28147-89 security: methods and algorithms. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yulong Fu, Ousmane Koné Using transition systems to model and verify the implementation of security protocol. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Aldjia Boucetta, Kamal Eddine Melkemi Hand shape recognition using Hu and Legendre moments. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Casey Mortensen, Ryan Winkelmaier, Jun Zheng 0003 Exploring attack vectors facilitated by miniaturized computers. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sattar B. Sadkhan, Nidaa A. Abbass Multidisciplinary prospective in cryptology. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Marek Klonowski, Michal Koza, Miroslaw Kutylowski Efficient and robust data aggregation using untrusted infrastructure. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Meriam Jemel, Nadia Ben Azzouna, Khaled Ghédira Towards a dynamic authorisation planning satisfying intra-instance and inter-instance constraints. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Eman Hableel, Young-Ji Byon, Joonsang Baek Public key infrastructure for UAE: a case study. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Behnam Rahnama, Yunus Kiran, Raz Dara Countering AES static s-box attack. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Leonid S. Bershtein, Alexey A. Tselykh A clique-based method for mining fuzzy graph patterns in anti-money laundering systems. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Vijay Laxmi, Deepanshu Mehta, Manoj Singh Gaur, Parvez Faruki, Chhagan Lal Impact analysis of JellyFish attack on TCP-based mobile ad-hoc networks. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Christophe Feltus, Djamel Khadraoui On designing automatic reaction strategy for critical infrastructure SCADA system. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Zahra Khani, Reza Azmi A protocol for simultaneous use of confidentiality and integrity in large-scale storage systems. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Juan Carlos Moreno, V. B. Surya Prasath, Hugo Proença 0001 Robust periocular recognition by fusing local to holistic sparse representations. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Morteza Barati, Karim Faez, Zahra Hakimi A novel threshold-based scan detection method using genetic algorithm. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Cihangir Tezcan Improbable differential cryptanalysis. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ludmila K. Babenko, Alexandr S. Basan, Oleg B. Makarevich Performance analysis of the developed mandatory access control system in the DBMS. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Meriam Jemel, Nadia Ben Azzouna, Khaled Ghédira A novel approach for dynamic authorisation planning in constrained workflow systems. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hussain Nyeem, Wageeh W. Boles, Colin Boyd Counterfeiting attacks on block-wise dependent fragile watermarking schemes. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Atilla Elçi, Manoj Singh Gaur, Mehmet A. Orgun, Oleg B. Makarevich (eds.) The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013 Search on Bibsonomy SIN The full citation details ... 2013 DBLP  BibTeX  RDF
1Artem S. Konoplev, Maxim O. Kalinin Security policy verification in grid systems. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Katharina Krombholz, Heidelinde Hobel, Markus Huber 0001, Edgar R. Weippl Social engineering attacks on the knowledge worker. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Valeriy O. Osipyan, A. S. Zhuck, A. H. Arutyunyan, Y. A. Karpenko Building of mathematical model of flow data processing system based on given selection of elements of the set. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Oleg B. Makarevich, Irina V. Mashkina, Alina Sentsova The method of the information security risk assessment in cloud computing systems. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Abdulaziz Almehmadi, Khalil El-Khatib Authorized! access denied, unauthorized! access granted. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Pyatkov Anton, Vyacheslav Zolotarev About responsibilities distribution for information security. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hosnieh Rafiee, Christoph Mueller, Lukas Niemeier, Jannik Streek, Christoph Sterz, Christoph Meinel A flexible framework for detecting IPv6 vulnerabilities. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hossain Shahriar, Vamshee Krishna Devendran, Hisham Haddad ProClick: a framework for testing clickjacking attacks in web applications. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hossain Shahriar Security vulnerabilities and mitigation techniques of web applications. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Edward Caprin, Yan Zhang 0003, Khaled M. Khan Social access control language (SocACL). Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ksenia Tsyganok, Evgeny Tumoyan, Lyudmila K. Babenko Development the method of detection the malicious pages interconnection in the internet. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Isao Nakanishi, Hironao Fukuda, Shigang Li 0001 Biometric verification using brain waves toward on-demand user management systems: performance differences between divided regions in α - β wave band. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sarmad Ullah Khan, Rafiullah Khan Content-location based key management scheme for content centric networks. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Md. Sadek Ferdous, Ron Poet Analysing attribute aggregation models in federated identity management. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Manoj Singh Gaur, Dhiren R. Patel, Anil Saini Insecurities within browser: issues and challenges. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Wolter Pieters, Julian A. Padget, Francien Dechesne, Virginia Dignum, Huib Aldewereld Obligations to enforce prohibitions: on the adequacy of security policies. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
Displaying result #401 - #500 of 685 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license