The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for assurance with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1960-1978 (19) 1979-1982 (15) 1983-1985 (15) 1986 (17) 1987-1988 (23) 1989-1990 (19) 1991-1992 (25) 1993 (27) 1994 (27) 1995 (26) 1996 (67) 1997 (74) 1998 (71) 1999 (103) 2000 (128) 2001 (150) 2002 (164) 2003 (244) 2004 (279) 2005 (441) 2006 (350) 2007 (486) 2008 (473) 2009 (725) 2010 (339) 2011 (752) 2012 (219) 2013 (199) 2014 (258) 2015 (296) 2016 (286) 2017 (243) 2018 (239) 2019 (263) 2020 (244) 2021 (211) 2022 (241) 2023 (276) 2024 (58)
Publication types (Num. hits)
article(1531) book(16) incollection(476) inproceedings(5893) phdthesis(94) proceedings(82)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 3691 occurrences of 1860 keywords

Results
Found 8092 publication records. Showing 8092 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
27Michael Losavio, Adel Elmaghraby, Deborah W. Keeling International Issues. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Javek Ikbal Cryptography. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Brian T. Geffert Health Insurance Portability and Accountability Act (HIPAA): Security Requirements. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Sean Scanlon Application Security: World Wide Web. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Glenn Cater Event Management. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Jeffrey Davis Corporate Security: IT Organization. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Kate Borten Privacy: Healthcare Industry. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Bonnie A. Goins Pilewski Critical Business Functions. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Daniel D. Houser Passwords and Policy Threat Analysis. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Robby Fussell Next-Generation Security Application Development. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Lynda L. McGhie Web Services. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Ed Skoudis Open Source. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Mostafa Sedighizadeh, Alireza Rezazadeh Adaptive Self-Tuning Wavelet Neural Network Controller for a Proton Exchange Membrane Fuel Cell. Search on Bibsonomy Applications of Neural Networks in High Assurance Systems The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
27Anuradha M. Annaswamy, Jinho Jang, Eugene Lavretsky Robust Adaptive Control Revisited: Semi-global Boundedness and Margins. Search on Bibsonomy Applications of Neural Networks in High Assurance Systems The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
27Ali Reza Mehrabian, Mohammad Bagher Menhaj Stick-Slip Friction Compensation Using a General Purpose Neuro-Adaptive Controller with Guaranteed Stability. Search on Bibsonomy Applications of Neural Networks in High Assurance Systems The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
27Nhan T. Nguyen, Stephen A. Jacklin Stability, Convergence, and Verification and Validation Challenges of Neural Net Adaptive Flight Control. Search on Bibsonomy Applications of Neural Networks in High Assurance Systems The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
27Y. D. Song, Liguo Weng, Medorian D. Gheorghiu Pitch-Depth Control of Submarine Operating in Shallow Water via Neuro-adaptive Approach. Search on Bibsonomy Applications of Neural Networks in High Assurance Systems The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
27Sampath Yerramalla, Edgar Fuller, Bojan Cukic Dynamic Allocation in Neural Networks for Adaptive Controllers. Search on Bibsonomy Applications of Neural Networks in High Assurance Systems The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
27Helen Yu Network Complexity Analysis of Multilayer Feedforward Artificial Neural Networks. Search on Bibsonomy Applications of Neural Networks in High Assurance Systems The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
27Tim Smith, Jim Barhorst, James M. Urnes Design and Flight Test of an Intelligent Flight Control System. Search on Bibsonomy Applications of Neural Networks in High Assurance Systems The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
27Xiaoou Li, Wen Yu 0001 Modeling of Crude Oil Blending via Discrete-Time Neural Networks. Search on Bibsonomy Applications of Neural Networks in High Assurance Systems The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
27Dragan Djurdjanovic, Jianbo Liu, Kenneth A. Marko, Jun Ni 0002 Immune Systems Inspired Approach to Anomaly Detection, Fault Localization and Diagnosis in Automotive Engines. Search on Bibsonomy Applications of Neural Networks in High Assurance Systems The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
27David M. Russinoff A Mechanically Verified Commercial SRT Divider. Search on Bibsonomy Design and Verification of Microprocessor Systems for High-Assurance Applications The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
27Anthony C. J. Fox, Michael J. C. Gordon, Magnus O. Myreen Specification and Verification of ARM Hardware and Software. Search on Bibsonomy Design and Verification of Microprocessor Systems for High-Assurance Applications The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
27Konrad Slind, Guodong Li, Scott Owens Compiling Higher Order Logic by Proof. Search on Bibsonomy Design and Verification of Microprocessor Systems for High-Assurance Applications The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
27Michael W. Whalen, David A. Greve, Lucas G. Wagner Model Checking Information Flow. Search on Bibsonomy Design and Verification of Microprocessor Systems for High-Assurance Applications The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
27Warren A. Hunt Jr., Sol Swords, Jared Davis, Anna Slobodová Use of Formal Verification at Centaur Technology. Search on Bibsonomy Design and Verification of Microprocessor Systems for High-Assurance Applications The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
27Raymond J. Richards Modeling and Security Analysis of a Commercial Real-Time Operating System Kernel. Search on Bibsonomy Design and Verification of Microprocessor Systems for High-Assurance Applications The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
27Torben Amtoft, John Hatcliff, Edwin Rodríguez, Robby, Jonathan Hoag, David A. Greve Specification and Checking of Software Contracts for Conditional Information Flow. Search on Bibsonomy Design and Verification of Microprocessor Systems for High-Assurance Applications The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
27Sally Browning, Philip Weaver Designing Tunable, Verifiable Cryptographic Hardware Using Cryptol. Search on Bibsonomy Design and Verification of Microprocessor Systems for High-Assurance Applications The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
27Matthew Wilding, David A. Greve, Raymond J. Richards, David S. Hardin Formal Verification of Partition Management for the AAMP7G Microprocessor. Search on Bibsonomy Design and Verification of Microprocessor Systems for High-Assurance Applications The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
27David A. Greve Information Security Modeling and Analysis. Search on Bibsonomy Design and Verification of Microprocessor Systems for High-Assurance Applications The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
27Gerwin Klein, Thomas Sewell, Simon Winwood Refinement in the Formal Verification of the seL4 Microkernel. Search on Bibsonomy Design and Verification of Microprocessor Systems for High-Assurance Applications The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
27Panagiotis Manolios, Sudarshan K. Srinivasan Verifying Pipelines with BAT. Search on Bibsonomy Design and Verification of Microprocessor Systems for High-Assurance Applications The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
27Matt Kaufmann, J Strother Moore ACL2 and Its Applications to Digital System Verification. Search on Bibsonomy Design and Verification of Microprocessor Systems for High-Assurance Applications The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
27Samuel L. Braunstein, Hoi-Kwong Lo, Kenny Paterson, Peter Y. A. Ryan (eds.) Classical and Quantum Information Assurance Foundations and Practice, 26.07. - 31.07.2009 Search on Bibsonomy Classical and Quantum Information Assurance Foundations and Practice The full citation details ... 2009 DBLP  BibTeX  RDF
27Belur V. Dasarathy (eds.) Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 13 April 2009, Orlando, Florida, USA Search on Bibsonomy Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security The full citation details ... 2009 DBLP  BibTeX  RDF
27Dusko Pavlovic Geometry of abstraction in quantum computation. Search on Bibsonomy Classical and Quantum Information Assurance Foundations and Practice The full citation details ... 2009 DBLP  BibTeX  RDF
27Romain Alléaume, Norbert Lütkenhaus, Renato Renner, Philippe Grangier, Thierry Debuisschert, Gregoire Ribordy, Nicolas Gisin, Philippe Painchault, Thomas Pornin, Louis Salvail, Michel Riguidel, Andrew J. Shields, Thomas Länger, Momtchil Peev, Mehrdad Dianati, Anthony Leverrier, Andreas Poppe, Jan Bouda, Cyril Branciard, Mark Godfrey, John G. Rarity, Harald Weinfurter, Anton Zeilinger, Christian Monyk Quantum key distribution and cryptography: a survey. Search on Bibsonomy Classical and Quantum Information Assurance Foundations and Practice The full citation details ... 2009 DBLP  BibTeX  RDF
27Attila Ondi, Katherine Hoffman, Carlos Perez, Richard Ford, Marco M. Carvalho, William H. Allen Security in MANETs using reputation-adjusted routing. Search on Bibsonomy Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Richard J. Hummel, Errin W. Fulp High-speed packet filtering utilizing stream processors. Search on Bibsonomy Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Jieyan Fan, Dapeng Wu 0001, Antonio Nucci, Ram Keralapura, Lixin Gao 0001 Identifying hidden voice and video streams. Search on Bibsonomy Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Hidenao Abe, Shusaku Tsumoto A method to characterize dataset based on objective rule evaluation indices. Search on Bibsonomy Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Lijuan Zhou, Min Xu, Zhang Zhang, Luping Duan Classification data mining method based on dynamic RBF neural networks. Search on Bibsonomy Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Alejandra López-Caloca, Elvia Martínez-Viveros, José Ignacio Chapela-Castañares Application of a clustering-remote sensing method in analyzing security patterns. Search on Bibsonomy Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Munesh Kumar, Shoaib Siddique, Humera Noor Feature-based alert correlation in security systems using self organizing maps. Search on Bibsonomy Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Wei Wang 0084, Hong Man Exploring social relations for the intrusion detection in ad hoc networks. Search on Bibsonomy Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Vimalathithan Subramanian, Sithu D. Sudarsan, Remzi Seker, Rathinasamy B. Lenin, Srinivasan Ramaswamy Secure data aggregation in heterogeneous and disparate networks using stand off server architecture. Search on Bibsonomy Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Jean Lancrenon, Roland Gillard, Thierry Fournel Remote object authentication: confidence model, cryptosystem and protocol. Search on Bibsonomy Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Shu-qing Peng, Huining Duan, Deyun Chen Design and implementation of workflow engine for service-oriented architecture. Search on Bibsonomy Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Shusaku Tsumoto, Shoji Hirano Temporal data mining for hospital management. Search on Bibsonomy Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Lijuan Zhou, Minhua Wu, Shuang Li Design of data warehouse in teaching state based on OLAP and data mining. Search on Bibsonomy Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Vahid R. Riasati Adaptation of the projection-slice theorem for stock valuation estimation using random Markov fields. Search on Bibsonomy Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Robert S. Lynch Jr., Peter K. Willett Estimating the threshold for maximizing expected gain in supervised discrete Bayesian classification. Search on Bibsonomy Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Holger Jaenisch, James W. Handley, Nathaniel Albritton, David Whitener, Randel Burnett, Robert Caspers, Stephen Moren, Thomas Alexander, William Maddox III, William Albritton Jr. Autonomous journaling response using data model LUTS. Search on Bibsonomy Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Peter Schallauer, Werner Bailer, Albert Hofmann, Roland Mörzinger SAM: an interoperable metadata model for multimodal surveillance applications. Search on Bibsonomy Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Sajid Hussain, Md. Shafayat Rahman Using received signal strength indicator to detect node replacement and replication attacks in wireless sensor networks. Search on Bibsonomy Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27André Ricardo Abed Grégio, Isabela L. Oliveira, Rafael D. C. Santos, Adriano M. Cansian, Paulo L. de Geus Malware distributed collection and pre-classification system using honeypot technology. Search on Bibsonomy Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Martin R. Stytz, Sheila B. Banks Considerations and foundations for Botnet simulation. Search on Bibsonomy Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Alan Harris, Mouhamad K. Al Akkoumi, James J. Sluss Jr. A comparison of passive optical network security. Search on Bibsonomy Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Belur V. Dasarathy (eds.) Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, Orlando, FL, USA, March 17-18, 2008 Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2008 DBLP  BibTeX  RDF
27Shusaku Tsumoto, Kimiko Matsuoka, Shigeki Yokoyama Application of data mining to medical risk management. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Doracelly Hincapié Palacio, Juan Ospina, Rubén Darío Gómez Arias The epidemic threshold theorem with social and contact heterogeneity. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Martin R. Stytz, Sheila B. Banks Addressing security issues related to virtual institute distributed activities. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Lili Tang, Shengjie Niu, Shuxian Fan, Xiaofeng Xu, Saihua Jin, Jie Xu Observational study of content of Hg in fog water relative to air pollution in suburbs of Nanjing. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Vahid R. Riasati Adaptive Markov feature estimation and categorization using the projection-slice theorem. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Gilbert Hendry, Shanchieh Jay Yang Intrusion signature creation via clustering anomalies. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Sajid Hussain, Richard Peters, Daniel L. Silver Using received signal strength variation for surveillance in residential areas. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Jie Su, Yahui Liu Distributed intrusion detection system based on grid security model. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Jim Brander, Alex Lupu Is mining of knowledge possible? Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Thomas G. L. Allen An innovative middle tier design for protecting federal privacy act data. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Peili Qiao, Tong Wang, Jie Su An improved clone selection immune algorithm. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Marco Carvalho 0001, Richard Ford, William H. Allen, Gerald A. Marin Securing MANETs with BITSI: danger theory and mission continuity. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Peili Qiao, Tong Wang, Jie Su An immunity-based model for dynamic distributed intrusion detection. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Ciza Thomas, Vishwas Sharma, N. Balakrishnan 0001 Usefulness of DARPA dataset for intrusion detection system evaluation. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Dan Patterson, David A. Turner, Arturo I. Concepcion, Robert S. Lynch Jr. Performance comparison of the automatic data reduction system (ADRS). Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Ciza Thomas, N. Balakrishnan 0001 Improvement in minority attack detection with skewness in network traffic. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Bahareh Haji-Saeed, Jed Khoury, Charles L. Woods, John Kierstead Two-beam coupling correlation synthetic aperture radar image recognition with power-law scattering centers pre-enhancement. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Brian Argauer, Shanchieh Jay Yang VTAC: virtual terrain assisted impact assessment for cyber attacks. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Bahareh Haji-Saeed, Jed Khoury, Charles L. Woods, John Kierstead Power-law radon-transformed superimposed inverse filter synthetic discriminant correlator for facial recognition. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Jared Holsopple, Shanchieh Jay Yang, Brian Argauer Virtual terrain: a security-based representation of a computer network. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Nasrullah Memon, David L. Hicks, Nicholas Harkiolakis A data mining approach to intelligence operations. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Lijuan Zhou, Bai Qin, Yu Wang, Zhongxiao Hao Research on parallel algorithm for sequential pattern mining. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Sheela V. Belur, Jonathan Gloster Mathematical model for security effectiveness figure of merit and its optimization. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27George Hsieh, Gregory Patrick, Keith Foster, Gerald Emamali, Lisa M. Marvel Integrated mandatory access control for digital data. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Tao Qian, Genshe Chen, Erik Blasch, Robert S. Lynch Jr., Yongwei Qi A new approach to chemical agent detection, classification, and estimation. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Belur V. Dasarathy (eds.) Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2007, Orlando, Florida, USA, April 10, 2007 Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2007 DBLP  BibTeX  RDF
27Luc Longpré, Vladik Kreinovich How to Efficiently Process Uncertainty within a Cyberinfrastructure without Sacrificing Privacy and Confidentiality. Search on Bibsonomy Computational Intelligence in Information Assurance and Security The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Elena C. Laskari, Gerasimos C. Meletiou, Yannis C. Stamatiou, Michael N. Vrahatis Cryptography and Cryptanalysis Through Computational Intelligence. Search on Bibsonomy Computational Intelligence in Information Assurance and Security The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Ki-Won Yeom Immune-inspired Algorithm for Anomaly Detection. Search on Bibsonomy Computational Intelligence in Information Assurance and Security The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Chengfeng Wang, Yuan Luo, Marina L. Gavrilova, Jon G. Rokne Fingerprint Recognition Using a Hierarchical Approach. Search on Bibsonomy Computational Intelligence in Information Assurance and Security The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Sangkyun Kim Governance of Information Security: New Paradigm of Security Management. Search on Bibsonomy Computational Intelligence in Information Assurance and Security The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Paolo Mercorelli, Alexander Frick Industrial Applications Using Wavelet Packets for Gross Error Detection. Search on Bibsonomy Computational Intelligence in Information Assurance and Security The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Constantinos Markantonakis, Keith Mayes, Michael Tunstall, Damien Sauveron, Fred Piper Smart Card Security. Search on Bibsonomy Computational Intelligence in Information Assurance and Security The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Shiguo Lian Multimedia Content Protection Based on Chaotic Neural Networks. Search on Bibsonomy Computational Intelligence in Information Assurance and Security The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Nadia Nedjah, Luiza de Macedo Mourelle Evolutionary Regular Substitution Boxes. Search on Bibsonomy Computational Intelligence in Information Assurance and Security The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Sheila B. Banks, Martin R. Stytz Bot armies as threats to network security. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Shoji Hirano, Shusaku Tsumoto Discovery of exacerbating cases in chronic hepatitis based on cluster analysis of time-series platelet count data. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Kirk A. Dunkelberger Semantic search via concept annealing. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Hongda Chen 0001, Genshe Chen, Erik Blasch, Martin Kruger, Irma Sityar Analysis and visualization of large complex attack graphs for networks security. Search on Bibsonomy Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
Displaying result #601 - #700 of 8092 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license