The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase B-rep (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1974-1991 (17) 1992-1996 (46) 1997 (39) 1998 (55) 1999 (37) 2000 (34) 2001 (45) 2002 (29) 2003 (44) 2004 (37) 2005 (43) 2006 (44) 2007 (49) 2008 (49) 2009 (42) 2010 (35) 2011 (37) 2012 (21) 2013 (34) 2014 (20) 2015 (22) 2016 (23) 2017 (30) 2018 (31) 2019 (39) 2020-2021 (23) 2022 (20) 2023 (27) 2024 (5)
Publication types (Num. hits)
article(791) incollection(3) inproceedings(181) phdthesis(1) proceedings(1)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 166 occurrences of 132 keywords

Results
Found 979 publication records. Showing 977 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
16Allan Tomlinson Developments in mobile communications security. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Adrian Leung A mobile device management framework for secure service delivery. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Francesca Saglietti, Norbert Oster, Florin Pinte White and grey-box verification and validation approaches for safety- and security-critical software systems. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Dieter Gollmann Securing Web applications. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Patricia A. H. Williams In a 'trusting' environment, everyone is responsible for information security. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Marit Hansen, Andreas Pfitzmann, Sandra Steinbrecher Identity management throughout one's whole life. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Christoph Krauß, Markus Schneider 0002, Claudia Eckert 0001 On handling insider attacks in wireless sensor networks. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16John Steer, Ashish Popli Building secure business applications at Microsoft. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16André van Cleeff Future consumer mobile phone security: A case study using the data-centric security model. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16John P. McDermott, James Kirby, Bruce E. Montrose, Travis Johnson, Myong H. Kang Re-engineering Xen internals for higher-assurance security. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Debi Ashenden Information Security management: A human challenge? Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Richard E. Overill ISMS insider intrusion prevention and detection. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Keith Mayes, Konstantinos Markantonakis Mobile communication security controllers an evaluation paper. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Jan Arild Audestad Internet as a multiple graph structure: The role of the transport layer. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Kalle Burbeck, Simin Nadjm-Tehrani Adaptive real-time anomaly detection with incremental clustering. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Raj Samani When networks collide. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Erol Gelenbe Dealing with software viruses: A biological paradigm. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Rodrigo Roman, Cristina Alcaraz, Javier López 0001 The role of Wireless Sensor Networks in the area of Critical Information Infrastructure Protection. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Stephen D. Wolthusen ISTR special issue on critical infrastructure protection. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Zia Hayat, Jeff Reeve, Chris Boutle Ubiquitous security for ubiquitous computing. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Andrew P. Martin, Po-Wah Yau Grid security: Next steps. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Uwe Aickelin, Julie Greensmith Sensing danger: Innate immunology for intrusion detection. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Michael J. Ganley Introduction to this issue (12/4). Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Richard H. Paine Secure Mobile Architecture (SMA) - A way to fix the broken Internet. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Walter Schmitz Simulation and test: Instruments for Critical Infrastructure Protection (CIP). Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Javier López 0001, Isaac Agudo, José A. Montenegro On the deployment of a real scalable delegation service. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Kamran Shafi, Hussein A. Abbass Biologically-inspired Complex Adaptive Systems approaches to Network Intrusion Detection. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Adrian Leung, Yingli Sheng, Haitham S. Cruickshank The security challenges for mobile ubiquitous services. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Anil Somayaji Immunology, diversity, and homeostasis: The past and future of biologically inspired computer defenses. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Nils Kalstad Svendsen, Stephen D. Wolthusen Connectivity models of interdependency in mixed-type critical infrastructure networks. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Jianying Zhou 0001, Wee-Yung Chin, Rodrigo Roman, Javier López 0001 An effective multi-layered defense framework against spam. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Christof Paar, André Weimerskirch Embedded security in a pervasive world. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16E. Eugene Schultz Risks due to convergence of physical security systems and information technology environments. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Dipankar Dasgupta Immuno-inspired autonomic system for cyber defense. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Richard E. Overill Computational immunology and anomaly detection. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Allan Tomlinson Editorial. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16David W. Chadwick Coordinated decision making in distributed applications. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Robert Ghanea-Hercock Survival in cyberspace. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Khaled Elgoarany, Mohamed Eltoweissy Security in Mobile IPv6: A survey. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Haibo Chen 0001, Jieyun Chen, Wenbo Mao, Fei Yan Daonity - Grid security from two levels of virtualization. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Andrew Jones 0002 Convergence. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Paul King In the new converged world are we secure enough? Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Mark Burgess Biology, immunology and information security. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Richard Clayton Can CLI be trusted? Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Chris Sundt Information security and the law. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Ian Walden Communication service providers: Forensic source and investigatory tool. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Kenneth G. Paterson A cryptographic tour of the IPsec standards. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Stephen D. Wolthusen Windows device interface security. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Gary Hardy Using IT governance and COBIT to deliver value with IT and respond to legal, regulatory and compliance challenges. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Brian Berger Security standards: An end-user perspective. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Tim Wright Security considerations for broadcast systems. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Jens Rüdinger The complexity of DPA type side channel attacks and their dependency on the algorithm design. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Mike Bond, Jolyon Clulow Integrity of intention (a theory of types for security APIs). Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Keith Mayes, Konstantinos Markantonakis On the potential of high density smart cards. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Matthew J. B. Robshaw An overview of RFID tags and new cryptographic developments. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Scarlet Schwiderski-Grosche Security: An end user perspective. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Stefek Zaba Digital signature legislation: The first 10 years. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Richard Walton Cryptography and trust. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16A. A. Abimbola, J. M. Munoz, William J. Buchanan NetHost-sensor: Monitoring a target host's application via system calls. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Geraint Price Editorial for v.11 n.4 of the Information Security Technical Report: "Windows Security Revisited". Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16J. Stuart Broderick ISMS, security standards and security regulations. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16David Lacey A new institute for a new millennium. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Michael Ward EMV card payments - An update. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Chez Ciechanowicz Editorial. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Brian A. LaMacchia, John Manferdelli New Vistas in elliptic curve cryptography. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Katrin Borcea-Pfitzmann, Marit Hansen, Katja Liesebach, Andreas Pfitzmann, Sandra Steinbrecher What user-controlled identity management should learn from communities. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Otto Bernecker Biometrics: security: An end user perspective. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Richard Walton The Computer Misuse Act. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Paul England, John Manferdelli Virtual machines for enterprise desktop security. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Carlos Cid Recent developments in cryptographic hash functions: Security implications and future directions. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Phil Pinder Preparing Information Security for legal and regulatory compliance (Sarbanes-Oxley and Basel II). Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16I. Phillips Windows Vista security: First impressions. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Michael J. Ganley Introduction - Cryptography. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Andrew Charlesworth The future of UK data protection regulation. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Geraint Price Editorial: "The security perimeter". Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16G. Edward Suh, Charles W. O'Donnell, Srinivas Devadas AEGIS: A single-chip secure processor. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16David Lacey Inventing the future - The vision of the Jericho Forum. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Ahmad-Reza Sadeghi, Christian Stüble Towards multilaterally secure computing platforms - with open source and trusted computing. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Mark Curphey Web services: Developers dream or hackers heaven? Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Gerhard Eschelbeck The Laws of Vulnerabilities: Which security vulnerabilities really matter? Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Michael J. Ganley Introduction - Intrusion detection and prevention. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Grit Denker, Lalana Kagal, Tim Finin Security in the Semantic Web using OWL. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Tadeusz Pietraszek, Axel Tanner Data mining and machine learning - Towards reducing false positives in intrusion detection. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Konstantin Beznosov, Donald J. Flinn, Shirley Kawamoto, Bret Hartman Introduction to Web services and their security. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Paul Kearney Message level security for web services. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Maria Papadaki, Steven M. Furnell Informing the decision process in an automated intrusion response system. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Geoffrey Strongin Trusted computing using AMD "Pacifica" and "Presidio" secure virtual machine technology. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16David Safford, Mimi Zohar Trusted computing and open source. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Brian Hernacki, Jeremy Bennett, James A. Hoagland An overview of network evasion methods. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Phil Cracknell Why 'Phish' when you can Trawl? Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Jason Crampton Introduction to February 2005 issue of ISTR. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Seth D. Schoen Compatibility, competition, and control in trusted computing environments. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16David W. Chadwick Authorisation in Grid computing. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Christian Geuer-Pollmann, Joris Claessens Web services and web service security standards. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Allan MacPhee, Mark O'Neill Notes from the field: Implementing a security solution for Web Services. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16 Next-generation intrusion prevention: Accounting for the attack timeline. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Brian Berger Trusted computing group history. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Graham Palmer De-Perimeterisation: Benefits and limitations. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Andreas Fuchsberger Intrusion Detection Systems and Intrusion Prevention Systems. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Carlin R. Covey, Mark D. Redman, Thomas E. Tkacik An Advanced Trusted Platform for mobile phone devices. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #600 of 977 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license