The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for assurance with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1960-1978 (19) 1979-1982 (15) 1983-1985 (15) 1986 (17) 1987-1988 (23) 1989-1990 (19) 1991-1992 (25) 1993 (27) 1994 (27) 1995 (26) 1996 (67) 1997 (74) 1998 (71) 1999 (103) 2000 (128) 2001 (150) 2002 (164) 2003 (244) 2004 (279) 2005 (441) 2006 (350) 2007 (486) 2008 (473) 2009 (725) 2010 (339) 2011 (752) 2012 (219) 2013 (199) 2014 (258) 2015 (296) 2016 (286) 2017 (243) 2018 (239) 2019 (263) 2020 (244) 2021 (211) 2022 (241) 2023 (276) 2024 (58)
Publication types (Num. hits)
article(1531) book(16) incollection(476) inproceedings(5893) phdthesis(94) proceedings(82)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 3691 occurrences of 1860 keywords

Results
Found 8092 publication records. Showing 8092 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
27Jeffrey Davis Tokens: Role and Authentication. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Louis B. Fried Object-Oriented Programming. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Franjo Majstor Wireless Local Area Networks (WLANs): Security. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27James S. Tiller Virtual Private Networks (VPNs). Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27John R. Vacca Virtual Private Networks (VPNs): Remote Access. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Joe Kovara, Ray Kaplan Kerberos™. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27David McPhee Information Technology Infrastructure Library (ITIL®). Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Brett Regan Young Risk Management: Trends. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Joe Kovara, Ray Kaplan Kerberos™: Ongoing Development. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Chris Hare Simple Network Management Protocol (SNMP). Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Carl B. Jackson Business Continuity Planning: Enterprise Risk Management Structure. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Ben Rothke Pod Slurping: Concepts. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Michael J. Corby Privacy: Policy Formation. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Bryan D. Fish Artificial Intelligence (AI): Intrusion Analysis. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Joe Kovara, Ray Kaplan Kerberos™: Services and Functions. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Will Ozier Risk Analysis and Assessment: Terms and Definitions. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Felicia M. Nicastro Technology Convergence: People, Process and Technology. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27William Hugh Murray Instant Messaging. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Gilbert Held Spoofing and Denial of Service Attacks. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27George G. McBride Mobile Data Security. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Steve A. Rodgers Packet Sniffers. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Dan M. Bowers Physical Access Control. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27John Dorf, Martin Johnson Business Continuity Planning: Restoration Component. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Sasan Hamidi Steganography: Detection. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Robby Fussell Adaptable Protocol Framework. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27William Hugh Murray System Design Flaws. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Thomas R. Peltier Awareness and Training: Program Elements. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Lynda L. McGhie Security Teams: Effective Methods. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Gilbert Held Wireless Local Area Networks (WLANs): Vulnerabilities. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Scott Erkonen ISO Standards and Certification. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Mark Bell Domain Name Service (DNS) Attacks. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Leighton Johnson III Configuration Management. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Douglas G. Conorich Internet Security. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Joseph T. Hootman Tokens: Evaluation. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Ralph Spencer Poore Cryptography: Transitions. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Donald R. Richards Biometrics: Identification. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Craig A. Schiller Malicious Code: Quasi-Intelligence. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Micah Silverman Proxy Servers. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Ian Lim, Ioana V. Bazavan System Development Security: Methodology. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Christopher A. Pilewski Wireless Penetration Testing. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Mano Paul Format String Vulnerabilities. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Thomas Welch Forensics: Rules of Evidence. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Stephen D. Fried Offshore Development. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Sandy Bacik Tape Backups: Validation. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Stephen D. Fried Penetration Testing: Policies. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Mignona Cote Committee of Sponsoring Organizations (COSO). Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Micki Krause Ethics: Internet. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Stephen D. Fried E-Mail Retention Policy: Legal Requirements. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Thomas Akin Cybercrime: Response, Investigation, and Prosecution. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Kenneth J. Knapp, Thomas E. Marshall Management Support of IT: Survey. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Ben Rothke Cryptography: Quantum. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Donn B. Parker Computer Abuse. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Samuel W. Chun, Leo Kahng Data at Rest. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Phillip Q. Maier Portable Computing Environments. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Kevin Henry 0001 Business Continuity Planning: Collaborative Approach. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Chris Hare Transport Layer Security (TLS). Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Sureerut Inmor, Vatcharaporn Esichaikul, Dencho N. Batanov Systems Development: Object-Oriented Security Model. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Ken Buszta Security Management Team Organization. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Stephen D. Fried Application Service Providers: Secure Relationships. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Susan D. Hansche Awareness and Training. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Marcus Rogers Digital Crime Scene Analysis (DCSA). Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Edward H. Freeman Privacy: Legal Issues. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Christina M. Bird Remote Access: Secure. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Patrick D. Howard Security Policy Lifecycle: Functions and Responsibilities. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Maria Schuett Reduced Sign-On. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Will Ozier Risk Analysis and Assessment: Risk Management Tasks. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Leighton Johnson III Security Incident Response. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Tom Carlson Information Security Management Systems (ISMSs). Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Bruce A. Lobree E-Mail: Security. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27John R. Vacca Data Centers: Security. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Jeffrey H. Fenton, James M. Wolfe Human Resources: Issues. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Steven F. Blanding External Networks: Secured Connections. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27William Stackpole Centralized Authentication Services. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Sanford Sherizen Management Compliance: Confidential Information. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Robert B. Batie Jr. Information Systems Security Engineering Professional (ISSEP). Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Paul A. Henry Firewall Architectures. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Satnam Purewal PeopleSoft Security. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27James Trulove Physical Layer Security: Wired and Wireless Connections. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Ben Rothke Advanced Encryption Standard (AES). Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27George G. McBride Voice Communications: Voice-over-IP (VoIP) Security. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Keith Pasley Virtual Private Networks (VPNs): Deployment and Evaluation Strategy. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Michael Pike Operations Security: Abuses. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Foster J. Henderson, Kellina M. Craig-Henderson Architecture: Models. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Sean M. Price Buffer Overflows: Attacks. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27William C. Boni High-Tech Trade Secrets. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Rebecca Herold Information Protection. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Keith Pasley Hash Algorithms. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Samuel W. Chun Network and Telecommunications: Media. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Edward H. Freeman Personnel: Practices. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Georges J. Jahchan Web Applications: Firewalls. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Jonathan Held Data Sanitization: SQL Injection. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Marcus Rogers Incident Response: Evidence Handling. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Kevin Henry 0001 Personnel: Security Roles. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Franjo Majstor End Node Security and Network Access Management. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Ralph Spencer Poore Information Security Governance: Basic Corporate Organization. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Anton Chuvakin Covert Channels. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Per Thorsheim Firewall Technologies: Comparison. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Matt Nelson Capability Maturity Model. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Chuck Bianco Penetration Testing. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Douglas C. Merrill, Eran Feigenbaum Public Key Infrastructure (PKI): E-Business. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #600 of 8092 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license