The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "NSS"( http://dblp.L3S.de/Venues/NSS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/nss

Publication years (Num. hits)
2009 (90) 2010 (91) 2011 (58) 2012 (40) 2013 (72) 2014 (48) 2015 (42) 2016 (36) 2017 (60) 2018 (37) 2019 (48) 2020 (27) 2021 (25) 2022 (42) 2023 (22)
Publication types (Num. hits)
inproceedings(723) proceedings(15)
Venues (Conferences, Journals, ...)
NSS(738)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 215 occurrences of 177 keywords

Results
Found 738 publication records. Showing 738 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Thomas H. Clausen, Ulrich Herberg Router and Link Admittance Control in the Optimized Link State Routing Protocol Version 2 (OLSRv2). Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jinchao Xu, Guosun Zeng A Software Watermarking Algorithm Based on Stack-State Transition Graph. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yonglong Luo, Lei Shi, Caiyun Zhang, Ji Zhang 0001 Privacy-Preserving Protocols for String Matching. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Abdul Hafeez-Baig, Raj Gururajan, Heng-Sheng Tsai, Prema Sankaran Exploratory Study to Explore the Role of ICT in the Process of Knowledge Management in an Indian Business Environment. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ronald G. Addie, Alan W. Colman Five Criteria for Web-Services Security Architecture. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Oscar Moreno, Andrew Z. Tirkel, Ron G. van Schyndel, Parampalli Udaya New Families of 2D & 3D Arrays for Sub-image Watermarking. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Md. Enamul Kabir, Hua Wang 0002 Systematic Clustering-Based Microaggregation for Statistical Disclosure Control. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Sebastian Roschke, Feng Cheng 0002, Christoph Meinel A Flexible and Efficient Alert Correlation Platform for Distributed IDS. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Thaneswaran Velauthapillai, Aaron Harwood, Shanika Karunasekera Global Detection of Flooding-Based DDoS Attacks Using a Cooperative Overlay Network. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Andrew White, Alan Tickle, Andrew J. Clark Overcoming Reputation and Proof-of-Work Systems in Botnets. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Heng-Sheng Tsai, Raj Gururajan The Enablers and Implementation Model for Mobile KMS in Australian Healthcare. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Patryk Szewczyk, Craig Valli Ignorant Experts: Computer and Network Security Support from Internet Service Providers. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Xun Yi Security Analysis of Yang et al.'s Practical Password-Based Two-Server Authentication and Key Exchange System. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Li Lin, Christopher Leckie, Chenfeng Vincent Zhou Comparative Analysis of HTTP Anomaly Detection Algorithms: DFA vs N-Grams. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ping Li 0019, Wanlei Zhou 0001, Yini Wang Getting the Real-Time Precise Round-Trip Time for Stepping Stone Detection. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Anya Apavatjrut, Wassim Znaidi, Antoine Fraboulet, Claire Goursaud, Cédric Lauradoux, Marine Minier Energy Friendly Integrity for Network Coding in Wireless Sensor Networks. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1S. Sharmila Deva Selvi, S. Sree Vivek, Chandrasekaran Pandu Rangan, S. Priti On the Security of Identity Based Threshold Unsigncryption Schemes. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yi Zhuang 0001 The PU-Tree: A Partition-Based Uncertain High-Dimensional Indexing Algorithm. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Raihana Ferdous, Vallipuram Muthukkumarasamy, Abdul Sattar 0001 A Node-based Trust Management Scheme for Mobile Ad-Hoc Networks. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Xiaoxun Sun, Hua Wang 0002 Towards Identify Anonymization in Large Survey Rating Data. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Suriadi Suriadi, Andrew J. Clark, Desmond Allan Schmidt Validating Denial of Service Vulnerabilities in Web Services. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Robert Koch 0002, Gabi Dreo Rodosek Command Evaluation in Encrypted Remote Sessions. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Eun-Jun Yoon, Kee-Young Yoo A Three-Factor Authenticated Key Agreement Scheme for SIP on Elliptic Curves. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Hua Wang 0002, Lili Sun Trust-Involved Access Control in Collaborative Open Social Networks. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Aashish Sharma, Zbigniew Kalbarczyk, Ravishankar K. Iyer, James Barlow Analysis of Credential Stealing Attacks in an Open Networked Environment. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Mohammed Al Zomai, Audun Jøsang The Mobile Phone as a Multi OTP Device Using Trusted Computing. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Bing-Yuan Pu, Ting-Zhu Huang, Chun Wen An Improved PageRank Algorithm: Immune to Spam. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Sheng Wen, Weijia Jia 0001, Wei Zhou, Wanlei Zhou 0001, Chuan Xu CALD: Surviving Various Application-Layer DDoS Attacks That Mimic Flash Crowd. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Sheila Becker, Humberto J. Abdelnur, Jorge Lucángeli Obes, Radu State, Olivier Festor Improving Fuzz Testing Using Game Theory. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Alessandro Artale, Bruno Crispo, Fausto Giunchiglia, Fatih Turkmen, Rui Zhang Reasoning about Relation Based Access Control. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Lifang Zi, John Yearwood, Xin Wen Wu Adaptive Clustering with Feature Ranking for DDoS Attacks Detection. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Raylin Tso, Xun Yi Certificateless Proxy Signature and Its Extension to Blind Signature. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1S. Sharmila Deva Selvi, S. Sree Vivek, S. Gopi Nath, C. Pandu Rangan Identity Based Self Delegated Signature - Self Proxy Signatures. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Wael Kanoun, Nora Cuppens-Boulahia, Frédéric Cuppens, Samuel Dubus Risk-Aware Framework for Activating and Deactivating Policy-Based Response. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Richard O. Sinnott, Sardar Hussain Security-Oriented Workflows for the Social Sciences. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Md. Shamsul Huda, John Yearwood, Andrew Stranieri Hybrid Wrapper-Filter Approaches for Input Feature Selection Using Maximum Relevance and Artificial Neural Network Input Gain Measurement Approximation (ANNIGMA). Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Xu Huang 0001, Pritam Gajkumar Shah, Dharmendra Sharma 0001 Protecting from Attacking the Man-in-Middle in Wireless Sensor Networks with Elliptic Curve Cryptography Key Exchange. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Md. Shamsul Huda, John Yearwood, Ron Borland Cluster Based Rule Discovery Model for Enhancement of Government's Tobacco Control Strategy. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yinghua Guo, Matthew Simon Network Forensics in MANET: Traffic Analysis of Source Spoofed DoS Attacks. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1D. Marks, Elias Ioup, John Sample, Mahdi Abdelguerfi, Fady Qaddoura Spatio-temporal Knowledge Discovery in Very Large METOC Data Sets. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Peter Danner, Daniel M. Hein, Stefan Kraxberger Securing Emergency Response Operations Using Distributed Trust Decisions. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Kobra Khanmohammadi, Siv Hilde Houmb Business Process-Based Information Security Risk Assessment. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Mohamed Nassar 0001, Radu State, Olivier Festor A Framework for Monitoring SIP Enterprise Networks. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Wanli Ma, John Campbell 0001, Dat Tran 0001, Dale Kleeman Password Entropy and Password Quality. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1McKay D. Williams, Sheldon A. Munns, Michael A. Temple, Michael J. Mendenhall RF-DNA Fingerprinting for Airport WiMax Communications Security. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yang Xiang 0001, Pierangela Samarati, Jiankun Hu, Wanlei Zhou 0001, Ahmad-Reza Sadeghi (eds.) Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010 Search on Bibsonomy NSS The full citation details ... 2010 DBLP  BibTeX  RDF
1Qiang Liu 0004, Jianping Yin, Zhiping Cai, Ming Zhu A Novel Threat Assessment Method for DDoS Early Warning Using Network Vulnerability Analysis. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Kaleb Lee A Two-Step Mutual Authentication Protocol Based on Randomized Hash-Lock for Small RFID Networks. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Sumayah Al-Rwais, Jalal Al-Muhtadi A Context-Aware Access Control Model for Pervasive Environments. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF prevasive environments, Access control, context-Aware, Threshold Cryptography
1Raphael C.-W. Phan, Wei-Chuen Yau, Bok-Min Goi Analysis of Two Pairing-Based Three-Party Password Authenticated Key Exchange Protocols. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF three-party, cryptanalysis, provable security, attacks, Weil pairing, Password-authenticated key exchange, key compromise impersonation
1Giovanni Russello, Naranker Dulay xDUCON: Coordinating Usage Control Policies in Distributed Domains. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Cross domain policy enforcement, Usage control policies, Shared Data Space
1Sami Harari FSS2-Id/A Fast Safe Identity-Based Multi Signature Scheme. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Dakila Reyes II, Cedric Angelo M. Festin, Susan Pancho-Festin Incentive-Based Self-Organized Public Key Management for Mobile Ad Hoc Networks. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF public key management, mobile ad hoc network
1Kalvinder Singh, Vallipuram Muthukkumarasamy Implementation and Analysis of Sensor Security Protocols in a Home Health Care System. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security, intelligent sensors
1Mohd Fadzli Marhusin, Chris Lokan, Henry Larkin, David Cornforth A Data Mining Approach for Detection of Self-Propagating Worms. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF self-propagating worm, worm detector, signature based detector, anomaly detector
1Yang Zhang Effective Attacks in the Tor Authentication Protocol. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Tor Authentication Protocol, Onion Routing Protocol, Authenticator, Tor, Universally Composable Security
1Olivier Flauzac, Florent Nolot, Cyril Rabat, Luiz Angelo Steffenel Grid of Security: A New Approach of the Network Security. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF grid design, distributed communication, security architecture
1Bruno Lage Srur, Vallipuram Muthukkumarasamy Enhancing Trust on e-Government: A Decision Fusion Module. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF privacy, user interface, trust, e-Government
1Robert Steele, Kyongho Min Flexible Wireless Trust Through Ontology-Based Mapping and Its Attendant Semantic Limitations. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ontology, mobile computing, wireless network, trustworthy computing
1Sheeraz Memon, Margaret Lech, Namunu Chinthaka Maddage Speaker Verification Based on Different Vector Quantization Techniques with Gaussian Mixture Models. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jan Muhammad, Richard O. Sinnott Policy-Driven Patch Management for Distributed Environments. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Grids, Configuration Management, Virtual Organizations, Patch Management
1Piyi Yang, Zhenfu Cao, Xiaolei Dong Certificateless Threshold Signature for Data Report Authentication in Mobile Ad Hoc Network. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF data report authentication, certificateless threshold signature, mobile ad-hoc network
1Fábio Fabris, Leticia Rosetti Margoto, Flávio Miguel Varejão Novel Approaches for Detecting Frauds in Energy Consumption. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Carlos Queiroz, Abdun Naser Mahmood, Jiankun Hu, Zahir Tari, Xinghuo Yu 0001 Building a SCADA Security Testbed. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Security, Testbed, DDoS, SCADA
1W. Y. Chin, Evangelos P. Markatos, Spyros Antonatos, Sotiris Ioannidis HoneyLab: Large-Scale Honeypot Deployment and Resource Sharing. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF honeypot infrastructures, security, honeypot
1Wei Peng, Qingmai Wang, Bin Wang, Xinghuo Yu 0001 Putting Simple Hierarchy into Ant Foraging: Cluster-Based Soft-Bots. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cluster-based agents, swarm intelligence, Stigmergy
1Boyeon Song, Chris J. Mitchell Scalable RFID Pseudonym Protocol. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF scalability, authentication, RFID, pseudonym
1Ke Li, Wanlei Zhou 0001, Ping Li 0019, Jing Hai, Jianwen Liu Distinguishing DDoS Attacks from Flash Crowds Using Probability Metrics. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Probability metrics, DDoS, Flash crowd
1Robert Koch 0002 Changing Network Behavior. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF sFlow, NBA, Fast Learning ANN, IDS, Modular Neural Networks, NetFlow
1Jemal H. Abawajy Enhancing RFID Tag Resistance against Cloning Attack. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF tag cloning, Security, authentication, RFID
1Jinwei Hu, Ruixuan Li 0001, Zhengding Lu On Role Mappings for RBAC-Based Secure Interoperation. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF RBAC, administration, secure interoperation, role mappings
1Wei Chen, Li Zhu, Xiaomei Cao, Yang Geng A Novel Fuzzy Identity-Based Signature with Dynamic Threshold. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF fuzzy identity-based signature, MS-DDHE assumption, bilinear maps, dynamic threshold
1Yining Liu 0002, Keqiu Li, Yong Zhang 0030, Wenyu Qu A Novel Reputation Computation Model Based on Subjective Logic for Mobile Ad Hoc Networks. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF MANET, trust, uncertainty, reputation, subjective logic
1Huiqiang Wang, Hongwu Lv, Guangsheng Feng A Self-Reflection Model for Autonomic Computing Systems Based on p-Calculus. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF p-Calculus, context-awareness, autonomic computing, self-awareness, self-reflection
1Yong Jian Chin, Thian Song Ong, Michael Goh Kah Ong, Bee Yan Hiew Integrating Palmprint and Fingerprint for Identity Verification. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF biometrics, multimodal, fingerprint, fusion, palm
1Omessaad Hamdi, Ammar Bouallegue, Sami Harari Weakness on Cryptographic Schemes Based on Chained Codes. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Complexity, Cryptography, Attack, Chained Codes
1Zhongwen Li, Xiaochen Xu, Liang Shi, Jian Liu, Chen Liang Authentication in Peer-to-Peer Network: Survey and Research Directions. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF authentication, key agreement, key generation, certificateless public key cryptography
1Van-Hau Pham, Marc Dacier Honeypot Traces Forensics: The Observation Viewpoint Matters. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF attack trace analysis, botnet detection, honeypot
1Muhammad Awais Shibli, Sead Muftic, Alessandro Giambruno, Antonio Lioy MagicNET: Security System for Development, Validation and Adoption of Mobile Agents. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Mobile agents deployment, Mobile agents Adoption, Trusted Mobile Agents
1Markus Hinkelmann, Andreas Jakoby, Nina Moebius, Tiark Rompf, Peer Stechert A Cryptographically t-Private Auction System. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multiparty private computation, garbled circuits, private auctions
1Neila Krichene, Noureddine Boudriga Securing Roaming and Vertical Handover in Fourth Generation Networks. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF authentication, handover, 4G
1Andre L. Alexander, Alexander L. Wijesinha, Ramesh K. Karne An Evaluation of Secure Real-Time Transport Protocol (SRTP) Performance for VoIP. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Softphone, Security, Performance, VoIP, SRTP
1Leslie Huin, Danielle Boulanger, Eric Disson ACSIS: Agents for Cooperative Secured Information Systems. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Access Security, Multi-agent systems, Interoperability, Cooperative Information Systems
1James Cannady Distributed Detection of Attacks in Mobile Ad Hoc Networks Using Learning Vector Quantization. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF intrusion detection, self-organizing maps, Mobile networks
1Marco Ramilli, Marco Prandini A Messaging-Based System for Remote Server Administration. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF instant messaging, botnets, system administration
1Hua Guo, Xiyong Zhang, Yi Mu 0001, Zhoujun Li 0001 An Efficient Certificateless Encryption Scheme in the Standard Model. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Self-Generated-Certificate Encryption, Standard Model, Certificateless Encryption
1Sai-Ho Ling, Hung T. Nguyen 0001, Kit Yan Chan A New Particle Swarm Optimization Algorithm for Neural Network Optimization. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF neural network, Particle Swarm Optimization
1Nabil M. K. Mirza, Ziad Osman, Rached N. Zantout, Mohamed El-Sayed 0005 Error Correction of Noisy Block Cipher Using Cipher and Plaintext Characteristics. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Block Cipher, AES, Error Correction
1Ahmed Belkhirat, Abdelghani Bouras, Abdelkader Belkhir A New Similarity Measure for the Anomaly Intrusion Detection. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF weighted bipartite graph, anomaly detection, similarity measure
1Tilman Wolf, Russell Tessier Design of a Secure Router System for Next-Generation Networks. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF processor monitor, network security, embedded processor, router design
1Spyros Antonatos, Quang Hieu Vu Harnessing the Power of P2P Systems for Fast Attack Signature Validation. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF signature validation, P2P defenses, indexing
1John Clark 0002, Sylvain P. Leblanc, Scott Knight Hardware Trojan Horse Device Based on Unintended USB Channels. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Hardware Trojan Horse Device, Unintended USB Channel
1Mohamed A. El-Kady, Essam A. Al-Ammar Framework for Identification of Power System Operating Security Regions. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Power system operation, Security regions, Operating constraints, System stability
1Yang Xiang 0001, Javier López 0001, Haining Wang, Wanlei Zhou 0001 (eds.) Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009 Search on Bibsonomy NSS The full citation details ... 2009 DBLP  BibTeX  RDF
1Shaomin Zhang, Yue Zou, Baoyi Wang A Novel Grid Trust Model Based on Fuzzy Theory. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF grid, trust model, fuzzy theory, fuzzy comprehensive evaluation, fuzzy cluster analysis
1Tohari Ahmad, Jiankun Hu, Song Han 0006 An Efficient Mobile Voting System Security Scheme Based on Elliptic Curve Cryptography. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF mobile voting, security, cryptography, ECC
1Lily D. Li, Xinghuo Yu 0001, Xiaodong Li 0001, William W. Guo A Modified PSO Algorithm for Constrained Multi-objective Optimization. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Optimization, Constraint, Multi-objective, PSO algorithm
1Farah Barika Ktata, Nabil El-Kadhi, Khaled Ghédira Distributed Agent Architecture for Intrusion Detection Based on New Metrics. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF metrics, agent architecture, Anomaly, Network Intrusion Detection System
1Qi Zhang, Yi Mu 0001, Minjie Zhang, Robert Huijie Deng Secure Mobile Agents with Designated Hosts. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF authentication, mobile agent security
1Dimitris Geneiatakis, Costas Lambrinoudakis, Stefanos Gritzalis A Hierarchical Model for Cross-Domain Communication of Health Care Units. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
Displaying result #601 - #700 of 738 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license