The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "SIN"( http://dblp.L3S.de/Venues/SIN )

URL (DBLP): http://dblp.uni-trier.de/db/conf/sin

Publication years (Num. hits)
2009 (51) 2010 (41) 2011 (44) 2012 (34) 2013 (90) 2014 (83) 2015 (63) 2016 (34) 2017 (50) 2018 (29) 2019 (29) 2020 (35) 2021 (28) 2022 (39) 2023 (35)
Publication types (Num. hits)
inproceedings(670) proceedings(15)
Venues (Conferences, Journals, ...)
SIN(685)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 146 occurrences of 129 keywords

Results
Found 685 publication records. Showing 685 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Steffen Bartsch A calculus for the qualitative risk assessment of policy override authorization. Search on Bibsonomy SIN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Dmitry M. Golubchikov, Konstantin E. Rumiantsev Estimation of influence of error correction and privacy amplification on keys generation rate in QKD systems. Search on Bibsonomy SIN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Irina V. Mashkina, Timur Kh. Tukhvatshin, Murat B. Guzairov The development of information security operational management system based on the intelligent technologies. Search on Bibsonomy SIN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Josef Pieprzyk Evolution of cryptographic hashing. Search on Bibsonomy SIN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Dmitry Rublev, Vladimir Fedorov, Oleg B. Makarevich Digital camera identification based on rotated images. Search on Bibsonomy SIN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Mohammad Reza Azadmanesh, Mohsen Sharifi Towards a system-wide and transparent security mechanism using language-level information flow control. Search on Bibsonomy SIN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Maxim O. Kalinin Permanent protection of information systems with method of automated security and integrity control. Search on Bibsonomy SIN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Alexander G. Chefranov, Ahmed Y. Mahmoud Elgamal public key cryptosystem and signature scheme in GU(m, p, n). Search on Bibsonomy SIN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ilker Korkmaz, Mehmet Emin Dalkiliç The weak and the strong password preferences: a case study on turkish users. Search on Bibsonomy SIN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Carsten Schmoll, Nikolaos Chatzis, Christian Henke Protecting user privacy with multi-field anonymisation of ip addresses. Search on Bibsonomy SIN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Lyudmila K. Babenko, Evgeniya Ishchukova Differential analysis of GOST encryption algorithm. Search on Bibsonomy SIN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Abdulkadir Akin, Aydin Aysu, Onur Can Ulusel, Erkay Savas Efficient hardware implementations of high throughput SHA-3 candidates keccak, luffa and blue midnight wish for single- and multi-message hashing. Search on Bibsonomy SIN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Poonam Gera, Kumkum Garg, Manoj Misra Trust based multi-path routing for end to end secure data delivery in manets. Search on Bibsonomy SIN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Vadim D. Kotov, Vladimir I. Vasilyev Immune model based approach for network intrusion detection. Search on Bibsonomy SIN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Tatiana V. Stepanova, Maxim O. Kalinin, Peter Baranov, Dmitry P. Zegzhda Homogeneity analysis of power consumption for information security purposes. Search on Bibsonomy SIN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1M. Asif Khan, Mureed Hussain Cyber security quantification model. Search on Bibsonomy SIN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Alexander V. Lyubimov Integral engineering technique for information security methodologies. Search on Bibsonomy SIN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Alexander Sergeevich Mosolov, Olga Viktorovna Grafova Review of european patents for methods of security system design. Search on Bibsonomy SIN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Shunan Ma, Jingsha He, Feng Gao, Yuqiang Zhang A trust quantification method based on grey fuzzy theory. Search on Bibsonomy SIN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Slava Kisilevich, Florian Mansmann Analysis of privacy in online social networks of runet. Search on Bibsonomy SIN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Alessandro Barenghi, Gerardo Pelosi, Yannick Teglia Improving first order differential power attacks through digital signal processing. Search on Bibsonomy SIN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Suleyman Kondakci, Gökhan Yilmaz Implementation and performance evaluation of the RSEP protocol on ARM and intel platforms. Search on Bibsonomy SIN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Evgeny Sergeevich Abramov, Denis Valerievich Mordvin, Oleg B. Makarevich Automated method for constructing of network traffic filtering rules. Search on Bibsonomy SIN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Dmitry V. Cheremushkin, Alexander V. Lyubimov An application of integral engineering technique to information security standards analysis and refinement. Search on Bibsonomy SIN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Behnam Rahnama, Atilla Elçi, Selcuk Celik Securing RFID-based authentication systems using ParseKey+. Search on Bibsonomy SIN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Alexander Tereshkin Evil maid goes after PGP whole disk encryption. Search on Bibsonomy SIN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1P. Lalith Suresh, Rajbir Kaur, Manoj Singh Gaur, Vijay Laxmi A collusion attack detection method for OLSR-based MANETS employing scruple packets. Search on Bibsonomy SIN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Taner Tuncer, Yetkin Tatar FPGA based programmable embedded intrusion detection system. Search on Bibsonomy SIN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Iryna Borysivna Tregubenko Reinforcement learning intellectual agent of protection for adapting to surrounding environment. Search on Bibsonomy SIN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Vladimir I. Vorobiev, Ludmila N. Fedorchenko, Vadim P. Zabolotsky, Alexander V. Lyubimov Ontology-based analysis of information security standards and capabilities for their harmonization. Search on Bibsonomy SIN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Alexis Velarde Pantola, Susan Pancho-Festin, Florante Salvador Rating the raters: a reputation system for wiki-like domains. Search on Bibsonomy SIN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Oleg B. Makarevich, Atilla Elçi, Mehmet A. Orgun, Sorin A. Huss, Ludmila K. Babenko, Alexander G. Chefranov, Vijay Varadharajan (eds.) Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010 Search on Bibsonomy SIN The full citation details ... 2010 DBLP  BibTeX  RDF
1Said Gharout, Abdelmadjid Bouabdallah, Mounir Kellil, Yacine Challal Key management with host mobility in dynamic groups. Search on Bibsonomy SIN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Vinod P. Nair, Harshit Jain, Yashwant K. Golecha, Manoj Singh Gaur, Vijay Laxmi MEDUSA: MEtamorphic malware dynamic analysis usingsignature from API. Search on Bibsonomy SIN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Kazim Yumbul, Erkay Savas Efficient, secure, and isolated execution of cryptographic algorithms on a cryptographic unit. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security, computer architecture, public key cryptography, instruction set extensions, cryptographic algorithms, aes
1Vijay Varadharajan Evolution and challenges in trust and security in information system infrastructures. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF trust enhanced security, trust management, trust models
1Alexandr S. Basan, Lyudmila K. Babenko, Oleg B. Makarevich A model of mandatory access for current database management systems. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF dbms security, mandatory access model, model, information security
1Haider Abbas, Louise Yngström, Ahmed Hemani Adaptability infrastructure for bridging IT security evaluation and options theory. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF it product evaluation, it security evaluation, options theory
1Vinod P. Nair, Vijay Laxmi, Manoj Singh Gaur, G. V. S. S. Phani Kumar, Yadvendra S. Chundawat Static CFG analyzer for metamorphic Malware code. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF metamorphic malware, normalization, obfuscation, control flow graph, longest common subsequence
1Simon Edward Parkin, Aad P. A. van Moorsel, Robert Coles An information security ontology incorporating human-behavioural implications. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF human behavioural implications, information security ontology, password policy
1Vijay Laxmi, Mudassar N. Khan, Sarath S. Kumar, Manoj Singh Gaur Buyer seller watermarking protocol for digital rights management. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF buyer-seller protocol, unbinding., watermark, digital rights management, certificate authority, piracy
1Sari Haj Hussein The hush cryptosystem. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF base64, grammatical substitution, randomness degree, redundant data percentage, sentence substitution, word substitution, hidden markov models, statistical tests
1Sumi M., Ebrahim A. Soujeri, Rahim Rajan, Harikrishnan A. I. Design of a zigbee-based RFID network for industry applications. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF rfid and zigbee, wns, wireless networks
1Tomi O. Kelo, Jukka A. Koskinen Modeling network security competence for certification. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF network security, certification, competence
1Somanath Tripathy Effective pair-wise key establishment scheme for wireless sensor networks. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF wireless sensor networks, cellular automata, key distribution, key establishment
1Vadim D. Kotov, Vladimir I. Vasilyev Artificial immune system based intrusion detection system. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF negative selection algorithms, artificial immune system, intrusion detection system, system calls
1Francesco Buccafurri, Gianluca Caminiti, Gianluca Lax Fortifying the dalì attack on digital signature. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF E-signature, digital signature, vulnerability analysis
1Sanjay Rawat 0001, Ashutosh Saxena Danger theory based SYN flood attack detection in autonomic network. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF syn flood attack, intrusion detection, artificial immune system, adaptive threshold, autonomic networks, danger theory
1Feodor Kulishov DFA-based and SIMD NFA-based regular expression matching on cell BE for fast network traffic filtering. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF network security, SIMD, regular expressions, cell broadband engine, DFA, NFA
1Erdal Cayirci Deployed sensor networks and their security challenges in practice. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF sensor, actuator, secure routing
1Mahdi Dashtbozorgi, Mohammad Abdollahi Azgomi A scalable multi-core aware software architecture for high-performance network monitoring. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF high-performance network monitoring, multi-core aware architecture, scalable architecture
1Lie Liu, Chun Yuan Trace and revoke systems with short ciphertexts. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF revoke, trace, broadcast encryption, ciphertext
1Sazia Parvin, Shohrab Ali, Song Han 0004, Tharam S. Dillon Security against DOS attack in mobile IP communication. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF care-of-address (coa), correspondent node (cn), denial-of-service (dos), distributed denial-of-service (ddos), foreign agent (fa), home agent (ha), mobile host (mh), mobile node (mn)
1Vladimir Mikhailovich Shishkin, Sergey Vitalievich Savkov The method of interval estimation in risk-analysis system. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF dispersion of estimation, inaccuracy, uncertainty, probabilistic model, interval analysis, risk estimation
1Andrey P. Kurilo, Natalia G. Miloslavskaya, Svetlana Tolstaya Ensuring information security controls for the Russian banking organizations. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF banking organizations, security controls, information security, russia
1Kuldeep Singh, Audun Jøsang, Md. Sadek Ferdous, Ravishankar Borgaonkar Spam filter optimality based on signal detection theory. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF signal detection theory (sdt)., optimality, filters, spam, e-mail, tradeoffs
1Mücahit Mutlugün, Oktay Adalier Turkish national electronic identity card. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF national identity card, biometrics, smart card, pki
1Anand Singh, David J. Lilja Improving risk assessment methodology: a statistical design of experiments approach. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Plackett-Burman., control, risk assessment, design of experiments
1Xianghan Zheng, Vladimir A. Oleshchuk A secure architecture for P2PSIP-based communication systems. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF chord secure proxy, DHT (distributed hash table), session initiation protocol (SIP), peer-to-peer (P2P), chord, P2PSIP
1Ahmed Y. Mahmoud, Alexander G. Chefranov Hill cipher modification based on eigenvalues HCM-EE. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF dynamic key, eiqenvalue, hill cipher, exponentiation, matrix, image encryption, pseudorandom number
1Jorge L. Hernandez-Ardieta, Ana Isabel González-Tablas Ferreres, Benjamín Ramos, Arturo Ribagorda Extended electronic signature policies. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF extended business model, signature policy, e-commerce, public key infrastructure, electronic signature, ASN.1
1Dmitry Rublev, Vladimir Fedorov, Oleg B. Makarevich, Anatolij Chumachenko Digital sound card identification based on recording path imperfections. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF audio recording device identification, automated identification, stationary components
1Riccardo Bresciani, Andrew Butterfield Weakening the Dolev-Yao model through probability. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF protocol verification
1Kemal Bicakci Pushing the limits of one-time signatures. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF digital signatures
1Atilla Elçi, Oleg B. Makarevich, Mehmet A. Orgun, Alexander G. Chefranov, Josef Pieprzyk, Yuri Anatolievich Bryukhomitsky, Siddika Berna Örs (eds.) Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009 Search on Bibsonomy SIN The full citation details ... 2009 DBLP  BibTeX  RDF
1Sorin Alexander Huss Embedded systems for IT security applications: properties and design considerations. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF fpga, embedded systems, cryptography, system-on-chip
1Gökhan Dalkiliç, Devrim Sipahi, Mehmet Hilal Özcanhan A simple yet effective spam blocking method. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SPF, spam blocking, spam
1Samrat Mondal, Shamik Sural XML-based policy specification framework for spatiotemporal access control. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF estarbac, permission extent, role extent, spatiotemporal policy specification, xml
1Khaled Salah 0001, Karim Sattar, Zubair A. Baig, Mohammed H. Sqalli, Prasad Calyam Resiliency of open-source firewalls against remote discovery of last-matching rules. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF dos attacks, nework security, firewalls
1Anna Kostina, Natalia G. Miloslavskaya, Alexander I. Tolstoy Information security incident management process. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF information security incidents, security, management
1Oleg B. Makarevich, Lyudmila K. Babenko Research and Education Activities of the Department of Security of Information Technologies of Taganrog Institute of Technology of the Southern Federal University in the Field of Information Security. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security, education, research
1Iftikhar Ahmad 0002, Azween B. Abdullah, Abdullah Sharaf Alghamdi Application of artificial neural network in detection of DOS attacks. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF internet control message protocol, multiple layered perceptron, resilient backpropagation, neural network, artificial neural network, false positive, dataset, false negative, detection rate, denial of service attack
1Vladimir Kotenko, Alexey Evseev, Stas Kotenko, Konstantin E. Rumyantsev New approach to evaluate the effectiveness of the audio information protection for determining the identity of virtual speech images. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF effectiveness of the audio information protection, virtual adaptive scrambling, virtual scrambling, redundancy, information security, legibility, scrambling
1R. Suriya, K. Saravanan, Arunkumar Thangavelu An integrated approach to detect phishing mail attacks: a case study. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF code script checker, domain name checker, linkguard, phishing
1Elisa Bertino Assured information sharing: concepts and issues. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF information lifecycle, policy management systems, security policies, information sharing
1Naveen Kumar 0001, Shrikant Ojha, Kritika Jain, Sangeeta Lal BEAN: a lightweight stream cipher. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF S-box, cipher, lightweight cryptography, grain
1Erdal Cayirci, Son Thanh Nguyen, Chunming Rong Secure many to many routing for wireless sensor and actuator networks. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF sensor, actuator, secure routing
1Çagdas Cirit, Feza Buzluca A UML profile for role-based access control. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF tagged value, role-based access control, model driven architecture, object constraint language, unified modeling language profile, model validation, stereotype, security engineering
1Ashutosh Saxena An efficient and secure protocol for DTV broadcasts. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF authenticaion, settop box, bilinear pairing
1Serif Bahtiyar, Murat Cihan, Mehmet Ufuk Çaglayan An architectural approach for assessing system trust based on security policy specifications and security mechanisms. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF trust, assessment
1Jukka A. Koskinen, Tomi O. Kelo Pure e-learning course in information security. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF education, e-learning, awareness, information security, course
1Christian Schridde, Matthew Smith 0001, Bernd Freisleben TrueIP: prevention of IP spoofing attacks using identity-based cryptography. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF network security, denial-of-service, signatures, identity-based cryptography, IP spoofing
1Jayashree Padmanabhan, K. S. Easwarakumar, Gokul B., Harishankar S. Trust based traffic monitoring approach for preventing denial of service attacks. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF clustering, networks, trust, denial of service, centroid, dos
1Atilla Elçi, Behnam Rahnama AWGN based seed for random noise generator in ParseKey+. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF imperfect use of timestamp, parsekey+, side channel attack, awgn
1Moussa Amir Ehsan, Morteza Amini, Rasool Jalili A semantic-based access control mechanism using semantic technologies. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF MA(DL)2, semantic-based access control, semantic technologies, security mechanisms
Displaying result #601 - #685 of 685 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license