|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 150 occurrences of 130 keywords
|
|
|
Results
Found 632 publication records. Showing 632 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Venu Govindaraju |
Biometrics and Security. |
ICISS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Ping Chen 0003, Hai Xiao, Xiaobin Shen 0001, Xinchun Yin, Bing Mao, Li Xie 0001 |
DROP: Detecting Return-Oriented Programming Malicious Code. |
ICISS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Atul Prakash 0001, Indranil Gupta (eds.) |
Information Systems Security, 5th International Conference, ICISS 2009, Kolkata, India, December 14-18, 2009, Proceedings |
ICISS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Angelos D. Keromytis |
A Survey of Voice over IP Security Research. |
ICISS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Massimiliano Masi, Rosario Pugliese, Francesco Tiezzi 0001 |
On Secure Implementation of an IHE XUA-Based Protocol for Authenticating Healthcare Professionals. |
ICISS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Nataraj Nagaratnam |
Security for a Smarter Planet. |
ICISS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Jeff Zarnett, Patrick Lam 0001, Mahesh V. Tripunitara |
Method-Specific Java Access Control via RMI Proxy Objects Using Annotations. |
ICISS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan White, Brajendra Panda |
Automatic Identification of Critical Data Items in a Database to Mitigate the Effects of Malicious Insiders. |
ICISS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Ge Fu, Hong Zhu 0003, Yingjiu Li |
A Robust Damage Assessment Model for Corrupted Database Systems. |
ICISS |
2009 |
DBLP DOI BibTeX RDF |
Data integrity, database recovery, damage assessment |
1 | Padmalochan Bera, Soumya Kanti Ghosh 0001, Pallab Dasgupta |
Formal Verification of Security Policy Implementations in Enterprise Networks. |
ICISS |
2009 |
DBLP DOI BibTeX RDF |
Access control list (ACL), Formal Verification, Network security, Security Policy |
1 | Zhiyao Liang, Rakesh M. Verma |
Correcting and Improving the NP Proof for Cryptographic Protocol Insecurity. |
ICISS |
2009 |
DBLP DOI BibTeX RDF |
insecurity, Cryptographic protocols, secrecy, NP |
1 | Zhen Zhang, K. H. (Kane) Kim, Myeong-Ho Kang, Tianran Zhou, Byung-Ho Chung, Shin-Hyo Kim, Seok-Joon Lee |
An E-Cash Based Implementation Model for Facilitating Anonymous Purchasing of Information Products. |
ICISS |
2009 |
DBLP DOI BibTeX RDF |
payment gateway, Anonymous, encryption, mix, purchasing, e-cash, information product |
1 | Michael Adjedj, Julien Bringer, Hervé Chabanne, Bruno Kindarji |
Biometric Identification over Encrypted Data Made Feasible. |
ICISS |
2009 |
DBLP DOI BibTeX RDF |
Biometrics, Identification, Searchable Encryption |
1 | Michael K. Reiter, Vyas Sekar, Chad Spensky, Zhenghao Zhang |
Making Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzles. |
ICISS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Lorenzo Martignoni, Roberto Paleari, Danilo Bruschi |
A Framework for Behavior-Based Malware Analysis in the Cloud. |
ICISS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Bing Liang, Yingjiu Li, Changshe Ma, Tieyan Li, Robert H. Deng |
On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup. |
ICISS |
2009 |
DBLP DOI BibTeX RDF |
Privacy, Authentication, RFID, Anonymous |
1 | Duc-Phong Le, Alexis Bonnecaze, Alban Gabillon |
A Secure Round-Based Timestamping Scheme with Absolute Timestamps (Short Paper). |
ICISS |
2008 |
DBLP DOI BibTeX RDF |
Timestamping scheme, Chameleon hash function, Absolute timestamp, Merkle tree |
1 | Luca Foschini 0002, Ashish V. Thapliyal, Lorenzo Cavallaro, Christopher Kruegel, Giovanni Vigna |
A Parallel Architecture for Stateful, High-Speed Intrusion Detection. |
ICISS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Frédéric Cuppens, Nora Cuppens-Boulahia, Julien A. Thomas |
A Robust Reputation Scheme for Decentralized Group Management Systems. |
ICISS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Ludwig Fuchs, Günther Pernul |
HyDRo - Hybrid Development of Roles. |
ICISS |
2008 |
DBLP DOI BibTeX RDF |
Role Development Methodology, Information security, Identity Management, Role Engineering, Role Mining |
1 | Lukasz Nitschke |
Secure Internet Voting Based on Paper Ballots. |
ICISS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Patrick Düssel, Christian Gehl, Pavel Laskov, Konrad Rieck |
Incorporation of Application Layer Protocol Syntax into Anomaly Detection. |
ICISS |
2008 |
DBLP DOI BibTeX RDF |
Anomaly Detection, Web Security, Protocol Analysis |
1 | Enkh-Amgalan Baatarjav, Ram Dantu, Santi Phithakkitnukoon |
Privacy Management for Facebook. |
ICISS |
2008 |
DBLP DOI BibTeX RDF |
Privacy, Social network, Facebook, Privacy management |
1 | Gianni Tedesco, Uwe Aickelin |
Real-Time Alert Correlation with Type Graphs. |
ICISS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Dave King 0002, Boniface Hicks, Michael Hicks 0001, Trent Jaeger |
Implicit Flows: Can't Live with 'Em, Can't Live without 'Em. |
ICISS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Umarani Jayaraman, Surya Prakash 0001, Phalguni Gupta |
Indexing Multimodal Biometric Databases Using Kd-Tree with Feature Level Fusion. |
ICISS |
2008 |
DBLP DOI BibTeX RDF |
feature level fusion, multi-dimensional data structure, indexing, Kd-tree |
1 | Neelam Verma, Prasanna R. Mishra, Gireesh Pandey |
Identification of Cryptographically Strong and Weak Pseudorandom Bit Generators. |
ICISS |
2008 |
DBLP DOI BibTeX RDF |
PRBG, BBS generator, Geffe generator, Confidence Interval Estimation, Feature extraction, Multidimensional Scaling |
1 | Devesh C. Jinwala, Dhiren R. Patel, Kankar S. Dasgupta |
Optimizing the Block Cipher and Modes of Operations Overhead at the Link Layer Security Framework in the Wireless Sensor Networks. |
ICISS |
2008 |
DBLP DOI BibTeX RDF |
Wireless Sensor Networks, Authentication, Encryption, Block Ciphers, Link Layer Security |
1 | R. Sekar 0001, Arun K. Pujari (eds.) |
Information Systems Security, 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings |
ICISS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Manik Lal Das, Ravi Mukkamala |
Revisiting Bluetooth Security (Short Paper). |
ICISS |
2008 |
DBLP DOI BibTeX RDF |
Bluetooth security, Privacy, Authentication, Wireless communications, Bluetooth technology |
1 | Craig S. Wright, Dave Kleiman, Shyaam Sundhar R. S. |
Overwriting Hard Drive Data: The Great Wiping Controversy. |
ICISS |
2008 |
DBLP DOI BibTeX RDF |
Data Wipe, Secure Wipe, Digital Forensics, Format |
1 | N. R. Sunitha, B. B. Amberker |
Proxy Re-signature Schemes. |
ICISS |
2008 |
DBLP DOI BibTeX RDF |
Signature conversion, Proxy re-signature, Proxy revocation, Proxy key, Proxy Signature |
1 | Vivekananda Bhat K., Indranil Sengupta 0001, Abhijit Das 0004 |
Audio Watermarking Based on Quantization in Wavelet Domain. |
ICISS |
2008 |
DBLP DOI BibTeX RDF |
discrete wavelet transform (DWT), quantization, Audio watermarking |
1 | Dawn Xiaodong Song, David Brumley, Heng Yin 0001, Juan Caballero, Ivan Jager, Min Gyung Kang, Zhenkai Liang, James Newsome, Pongsin Poosankam, Prateek Saxena |
BitBlaze: A New Approach to Computer Security via Binary Analysis. |
ICISS |
2008 |
DBLP DOI BibTeX RDF |
malware analysis and defense, vulnerability analysis and defense, reverse engineering, Binary analysis |
1 | Sasikanth Avancha |
A Framework for Trustworthy Service-Oriented Computing (Short Paper). |
ICISS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Zhiyao Liang, Rakesh M. Verma |
Complexity of Checking Freshness of Cryptographic Protocols. |
ICISS |
2008 |
DBLP DOI BibTeX RDF |
Athena, NP-completeness, Cryptographic protocols, undecidability, replay attack, model checker, freshness, challenge response |
1 | Randy Smith, Cristian Estan, Somesh Jha, Ida Sri Rejeki Siahaan |
Fast Signature Matching Using Extended Finite Automaton (XFA). |
ICISS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Amit Sahai |
Computing on Encrypted Data. |
ICISS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Deepak D'Souza, Raveendra Holla, Janardhan Kulkarni, Raghavendra K. Ramesh, Barbara Sprick |
On the Decidability of Model-Checking Information Flow Properties. |
ICISS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Basant Rajan |
The Enlightened Era of Enterprise Security (Invited Talk). |
ICISS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Yliès Falcone, Jean-Claude Fernandez, Laurent Mounier |
Synthesizing Enforcement Monitors wrt. the Safety-Progress Classification of Properties. |
ICISS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Samrat Mondal, Shamik Sural |
A Verification Framework for Temporal RBAC with Role Hierarchy (Short Paper). |
ICISS |
2008 |
DBLP DOI BibTeX RDF |
Temporal RBAC, Model Checking, Verification, Timed Automata, CTL |
1 | Anjali Sardana, Ramesh Chandra Joshi |
Simulation of Dynamic Honeypot Based Redirection to Counter Service Level DDoS Attacks. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Sabrina De Capitani di Vimercati, Pierangela Samarati |
Data Privacy - Problems and Solutions. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Jun Li 0001, Dejing Dou, Shiwoong Kim, Han Qin, Yibo Wang |
On Knowledge-Based Classification of Abnormal BGP Events. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | G. K. Patra, V. Anil Kumar, R. P. Thangavelu |
Secure Chaotic Synchronization Using Negative Feedback of Super-Positioned Signals. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
Chaotic Synchronization, Chaotic cryptosystems, Super-positioned signal, Stream ciphers |
1 | Gaurav Gupta, R. Sultania, Sounak Mondal, Sanjoy Kumar Saha 0001, Bhabatosh Chanda |
A Structured Approach to Detect Scanner-Printer Used in Generating Fake Document. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
fake document, printer detection, scanner detection, digital forensic |
1 | Ashish Kumar Singh, Priya Chandran |
A Secure and Efficient Multi-authority Proactive Election Scheme. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Rakeshbabu Bobba, Himanshu Khurana |
DLPKH - Distributed Logical Public-Key Hierarchy. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
decentralized key distribution, logical key hierarchy, public-key trees, key agreement, Group key management |
1 | Atul Prakash 0001 |
Security in Practice - Security-Usability Chasm. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Debojyoti Bhattacharya, Nitin Bansal, Amitava Banerjee, Dipanwita Roy Chowdhury |
A Near Optimal S-Box Design. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
Cellular Automata, Algebraic Attack, S-box, Power Attack |
1 | Navdeep Kaur, Rajwinder Singh, Manoj Misra, Anil Kumar Sarje |
Secure Transaction Management Protocols for MLS/DDBMS. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
concurrency control, covert channel, Multilevel security, distributed database system, commit protocol |
1 | K. B. Raja, Kiran Kumar K., Satish Kumar N., M. S. Lakshmi, H. Preeti, K. R. Venugopal 0001, Lalit M. Patnaik |
Genetic Algorithm Based Steganography Using Wavelets. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Patrick D. McDaniel, Shyam K. Gupta 0001 (eds.) |
Information Systems Security, Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007, Proceedings |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Zhiyong Shan, Qiuyue Wang, Xiaofeng Meng 0001 |
An OS Security Protection Model for Defeating Attacks from Network. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
Access Control, information flow |
1 | Meng-Hui Lim, Sanggon Lee, Sang-Jae Moon |
Cryptanalysis of Tso et al.'s ID-Based Tripartite Authenticated Key Agreement Protocol. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Anshuman Saxena, Marc Lacoste, Tahar Jarboui, Ulf Lücking, Bernd Steinke |
A Software Framework for Autonomic Security in Pervasive Environments. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Kotagiri Ramamohanarao, Kapil Kumar Gupta, Tao Peng 0002, Christopher Leckie |
The Curse of Ease of Access to the Internet. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Ramanarayana Kandikattu, Lillykutty Jacob |
A Secure Intra-domain Routing Protocol for Wireless Mesh Networks. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Mohsen Sharifi, Alireza Saberi, Mojtaba Vahidi, Mohammad Zoroufi |
A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Subrat Kumar Dash, Sanjay Rawat 0001, Arun K. Pujari |
Use of Dimensionality Reduction for Intrusion Detection. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
Host Based IDS, Data Mining, Dimensionality Reduction, System Calls, Locally Linear Embedding |
1 | Daniel A. Ray, Charles B. Ward, Bogdan Munteanu, Jonathan Blackwell, Xiaoyan Hong, Jun Li 0001 |
Investigating the Impact of Real-World Factors on Internet Worm Propagation. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Dhananjay Bapat, Kevin R. B. Butler, Patrick D. McDaniel |
Towards Automated Privilege Separation. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Debasis Giri, Parmeshwary Dayal Srivastava |
Cryptanalysis and the Improvement of Kim et al.'s Password Authentication Schemes. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
Authentication, Smart card, Attack, Timestamp, Nonce |
1 | Joachim Biskup, Dominique Marc Burgard, Torben Weibert, Lena Wiese |
Inference Control in Logic Databases as a Constraint Satisfaction Problem. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
confidentiality, constraint satisfaction problems, Inference control, constraint hierarchies, logic databases |
1 | Hidema Tanaka |
Information Leakage Via Electromagnetic Emanations and Evaluation of Tempest Countermeasures. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
Electromagnetic emanation, EMC, Side-channel attack, Eavesdropping, Tempest |
1 | Christophe Clavier |
An Improved SCARE Cryptanalysis Against a Secret A3/A8 GSM Algorithm. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
GSM Authentication, A3/A8, Substitution Table, Reverse Engineering, Side Channel Analysis |
1 | Shimon K. Modi, Stephen J. Elliott, Hakil Kim |
Performance Analysis for Multi Sensor Fingerprint Recognition System. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | K. Sivakumar, K. Garg |
Constructing a "Common Cross Site Scripting Vulnerabilities Enumeration (CXE)" Using CWE and CVE. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
Secure code, PHP Vulnerabilities, CWE, CVE, Web Security, XSS |
1 | G. K. Patra, V. Anil Kumar, R. P. Thangavelu |
A New Concept of Key Agreement Using Chaos-Synchronization Based Parameter Estimation. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
Key Agreement Algorithms, Chaotic Synchronization, Parameter Estimation |
1 | Hossein Ghodosi |
An Efficient Public Key Cryptosystem Secure Against Chosen Ciphertext Attack. |
ICISS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Indrakshi Ray, Mahendra Kumar, Lijun Yu |
LRBAC: A Location-Aware Role-Based Access Control Model. |
ICISS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Vartika Singh, D. R. Lakshminarasimhaiah, Yogesh Mishra, Chitra Viswanathan, G. Athithan 0001 |
An Implementation and Evaluation of Online Disk Encryption for Windows Systems. |
ICISS |
2006 |
DBLP DOI BibTeX RDF |
Disk encryption, Initialization vector, Storage data encryption/decryption and Sector-level encryption, Storage security |
1 | Shyam K. Gupta 0001, Vikram Goyal, Bholi Patra, Sankalp Dubey, Anand Gupta |
Design and Development of Malafide Intension Based Privacy Violation Detection System (An Ongoing Research Report). |
ICISS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | L. Chaithanya, M. P. Singh, M. M. Gore |
Secure Data Management in Reactive Sensor Networks. |
ICISS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Shyam K. Gupta 0001, Vikram Goyal, Anand Gupta |
Malafide Intension Based Detection of Privacy Violation in Information System. |
ICISS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Praveen Kumar Vadnala, Anish Mathuria |
An Efficient Key Assignment Scheme for Access Control in a Hierarchy. |
ICISS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Rajwinder Singh, Navdeep Kaur, Anil Kumar Sarje |
Secure Itineraries Framework for Mobile Agent Systems. |
ICISS |
2006 |
DBLP DOI BibTeX RDF |
serial itinerary, parallel itinerary, mobile agent security, Itineraries |
1 | Kevin R. B. Butler, William Enck, Jennifer Plasterr, Patrick Traynor, Patrick D. McDaniel |
Privacy Preserving Web-Based Email. |
ICISS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Purificación Sáiz, Jon Matías, Eduardo Jacob, Javier Bustamante, Armando Astarloa |
Adaptation of IEEE 802.1X for Secure Session Establishment Between Ethernet Peers. |
ICISS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Frédéric Cuppens, Nora Cuppens-Boulahia, Céline Coma |
O2O: Virtual Private Organizations to Manage Security Policy Interoperability. |
ICISS |
2006 |
DBLP DOI BibTeX RDF |
Virtual Private Organization (VPO), Role Single Sign On (RSSO), Authority spheres, Access Control, Interoperability, Virtual Organization (VO), OrBAC |
1 | Anirban Majumdar 0001, Clark D. Thomborson, Stephen Drape |
A Survey of Control-Flow Obfuscations. |
ICISS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Luke St. Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick D. McDaniel, Trent Jaeger |
Password Exhaustion: Predicting the End of Password Usefulness. |
ICISS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Haibing Lu, Yingjiu Li, Xintao Wu |
Disclosure Risk in Dynamic Two-Dimensional Contingency Tables (Extended Abstract). |
ICISS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Mounita Saha, Dipanwita Roy Chowdhury |
Design of Key Establishment Protocol Using One-Way Functions to Avert insider-replay Attack. |
ICISS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Anirban Sengupta, Mridul Sankar Barik |
Towards a Formal Specification Method for Enterprise Information System Security. |
ICISS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Weiwei Yuan, Donghai Guan, Sungyoung Lee, Young-Koo Lee, Heejo Lee |
Filtering Out Unfair Recommendations for Trust Model in Ubiquitous Environments. |
ICISS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | N. V. Narendra Kumar, R. K. Shyamasundar |
Specification and Realization of Access Control in SPKI/SDSI. |
ICISS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Vipin Swarup, Len Seligman, Arnon Rosenthal |
A Data Sharing Agreement Framework. |
ICISS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Krishna Sandeep Reddy Dubba, Subrat Kumar Dash, Arun K. Pujari |
New Malicious Code Detection Using Variable Length n-grams. |
ICISS |
2006 |
DBLP DOI BibTeX RDF |
Episodes, Data Mining, n-grams, Malicious code detection |
1 | Hyeran Lee, Kyung Hyune Rhee |
High Capacity Lossless Data Hiding. |
ICISS |
2006 |
DBLP DOI BibTeX RDF |
Re- storation, Authentication, Watermarking, Lossless Data Hiding, High Capacity |
1 | Y. V. Subba Rao, Abhijit Mitra, S. R. Mahadeva Prasanna |
A Partial Image Encryption Method with Pseudo Random Sequences. |
ICISS |
2006 |
DBLP DOI BibTeX RDF |
Partial encryption, Residual intelligence, Pseudo random sequence |
1 | Wanyu Zang, Meng Yu 0001 |
A Dead-Lock Free Self-healing Algorithm for Distributed Transactional Processes. |
ICISS |
2006 |
DBLP DOI BibTeX RDF |
Attack recovery, distributed systems, transactional processes, self-healing |
1 | Andreas Ekelhart, Stefan Fenz, Markus D. Klemen, Edgar R. Weippl |
Security Ontology: Simulating Threats to Corporate Assets. |
ICISS |
2006 |
DBLP DOI BibTeX RDF |
risk analysis, threat modeling, security ontology |
1 | Amirreza Masoumzadeh 0001, Morteza Amini, Rasool Jalili |
Context-Aware Provisional Access Control. |
ICISS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Alex Gurevich, Ehud Gudes |
Recent Research on Privacy Preserving Data Mining. |
ICISS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Amlan Kundu 0002, Shamik Sural, Arun K. Majumdar |
Two-Stage Credit Card Fraud Detection Using Sequence Alignment. |
ICISS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Aditya Bagchi, Vijayalakshmi Atluri (eds.) |
Information Systems Security, Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings |
ICISS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Sabrina De Capitani di Vimercati, Pierangela Samarati |
Privacy in the Electronic Society. |
ICISS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Joachim Biskup, Joerg Parthe |
Optimistic Anonymous Participation in Inter-organizational Workflow Instances. |
ICISS |
2006 |
DBLP DOI BibTeX RDF |
|
Displaying result #501 - #600 of 632 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ >>] |
|