The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Misuse with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1969-1989 (15) 1990-1996 (19) 1997-1998 (16) 1999 (16) 2000 (17) 2001 (17) 2002 (25) 2003 (36) 2004 (44) 2005 (74) 2006 (74) 2007 (68) 2008 (76) 2009 (56) 2010 (19) 2011 (23) 2012 (24) 2013-2014 (36) 2015 (19) 2016 (22) 2017 (25) 2018 (30) 2019 (44) 2020 (50) 2021 (34) 2022 (48) 2023 (47) 2024 (9)
Publication types (Num. hits)
article(316) incollection(5) inproceedings(651) phdthesis(10) proceedings(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 605 occurrences of 378 keywords

Results
Found 983 publication records. Showing 983 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
10Prince Mahajan, Ramakrishna Kotla, Catherine C. Marshall, Venugopalan Ramasubramanian, Thomas L. Rodeheffer, Douglas B. Terry, Ted Wobber Effective and efficient compromise recovery for weakly consistent replication. Search on Bibsonomy EuroSys The full citation details ... 2009 DBLP  DOI  BibTeX  RDF compromise recovery, replication
10Kun Bai, Peng Liu 0005 A data damage tracking quarantine and recovery (DTQR) scheme for mission-critical database systems. Search on Bibsonomy EDBT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
10Christopher Ferguson, Qijun Gu, Hongchi Shi Self-healing control flow protection in sensor applications. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF sensor application, access control, self healing, tinyos, control flow
10Xiaodong Lin 0001, Rongxing Lu, Pin-Han Ho, Xuemin Shen, Zhenfu Cao TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Claus Wonnemann RFID - ist Sicherheit in offenen Anwendungen erreichbar? Search on Bibsonomy Wirtschaftsinf. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security, Privacy, access control, RFID, data protection, usage control
10Hakan Erdogmus Measurement Acquiescence. Search on Bibsonomy IEEE Softw. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10David N. Card, Kevin Domzalski, Glyn Davies Making Statistics Part of Decision Making in an Engineering Organization. Search on Bibsonomy IEEE Softw. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Daniel J. Weitzner, Harold Abelson, Tim Berners-Lee, Joan Feigenbaum, James A. Hendler, Gerald J. Sussman Information accountability. Search on Bibsonomy Commun. ACM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Devi Parikh, Tsuhan Chen Data Fusion and Cost Minimization for Intrusion Detection. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Johan Huysmans, Bart Baesens, Jan Vanthienen A Data Miner's Approach to Country Corruption Analysis. Search on Bibsonomy Intelligence and Security Informatics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Alper Koz, Cevahir Cigla, A. Aydin Alatan Watermarking for Image Based Rendering via homography-based virtual camera location estimation. Search on Bibsonomy ICIP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Consolee Mbarushimana, Alireza Shahrabi A TCP Enhancement for QoS-Aware Mobile Ad-Hoc Networks. Search on Bibsonomy NBiS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Spurious, QoS, MANET, TCP, Variant
10Robyn R. Mace Intelligence, Dataveillance, and Information Privacy. Search on Bibsonomy ISIPS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF dataveillance, privacy, surveillance, intelligence, terrorism
10Indrajit Ray, Sudip Chakraborty Facilitating Privacy Related Decisions in Different Privacy Contexts on the Internet by Evaluating Trust in Recipients of Private Data. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Steven Fraser 0001, Djenana Campara, Robert Gleichauf, Harriet Pearson, Peter P. Swire, Laurie A. Williams Privacy and security: what are you doing to keep the community safe? Search on Bibsonomy OOPSLA Companion The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, privacy, policy
10Joshua M. Lewis, Pincelli M. Hull, Kilian Q. Weinberger, Lawrence K. Saul Mapping Uncharted Waters: Exploratory Analysis, Visualization, and Clustering of Oceanographic Data. Search on Bibsonomy ICMLA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10I. V. M. de Lima, Joelson A. Degaspari, João Bosco M. Sobral Intrusion detection through artificial neural networks. Search on Bibsonomy NOMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Muazzam Siddiqui, Morgan C. Wang, Joohan Lee A survey of data mining techniques for malware detection using file features. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF instruction sequences, data mining, machine learning, survey, N-grams, system calls, malware detection
10Martin Feilkas, Daniel Ratiu Ensuring Well-Behaved Usage of APIs through Syntactic Constraints. Search on Bibsonomy ICPC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10L. Prema Rajeswari, Arputharaj Kannan, Ramachandran Baskaran An Escalated Approach to Ant Colony Clustering Algorithm for Intrusion Detection System. Search on Bibsonomy ICDCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Multiple-level decision tree, Ant colony Clustering, Data Mining, Intrusion Detection
10Rui Zhu, Changguo Guo, Huaimin Wang, Hailin Gong A User Trustworthiness Based Lightweight Access Control. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Patrick Düssel, Christian Gehl, Pavel Laskov, Konrad Rieck Incorporation of Application Layer Protocol Syntax into Anomaly Detection. Search on Bibsonomy ICISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Anomaly Detection, Web Security, Protocol Analysis
10Stephan Kubisch, Harald Widiger, Peter Danielis, Jens Schulz, Dirk Timmermann, Thomas Bahls, Daniel Duchow Countering phishing threats with trust-by-wire in packet-switched ip networks - a conceptual framework. Search on Bibsonomy IPDPS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10James Cheney, Morten Dahl Resource bound analysis for database queries. Search on Bibsonomy PLAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF resource bounds, databases, query languages
10Mohamed R. Fouad, Guy Lebanon, Elisa Bertino ARUBA: A Risk-Utility-Based Algorithm for Data Disclosure. Search on Bibsonomy Secure Data Management The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Data Utility, Security, Privacy, Anonymity, Risk Management, Data Sharing
10Johan van Wamelen, Dennis de Kool Web 2.0: a basis for the second society? Search on Bibsonomy ICEGOV The full citation details ... 2008 DBLP  DOI  BibTeX  RDF second society, e-government, web 2.0
10Wolfgang Hommel Using Policy-Based Management for Privacy-Enhancing Data Access and Usage Control in Grid Environments. Search on Bibsonomy CCGRID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Privacy, Grid, XACML, Policy-based Management
10Xuanwu Zhou, Ping Wei 0005 Anonymous Proxy Authorization Signature Scheme with Forward Security. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Bernhard Riedl, Veronika Grascher, Stefan Fenz, Thomas Neubauer Pseudonymization for improving the Privacy in E-Health Applications. Search on Bibsonomy HICSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Na Luo, Fuyu Yuan, Wanli Zuo, Fengling He, Zhiguo Zhou Improved Unsupervised Anomaly Detection Algorithm. Search on Bibsonomy RSKT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Annapurna Agrawal, K. R. Prasanna Kumar, G. Athithan 0001 SIP/RTP session analysis and tracking for VoIP logging. Search on Bibsonomy ICON The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Guanling Chen, Faruq Rahman Analyzing Privacy Designs of Mobile Social Networking Applications. Search on Bibsonomy EUC (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Sojan Markose, Xiaoqing Frank Liu, Bruce M. McMillin A Systematic Framework for Structured Object-Oriented Security Requirements Analysis in Embedded Systems. Search on Bibsonomy EUC (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Georg Fuchsbauer, David Pointcheval Anonymous Proxy Signatures. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Bo Zhu 0001, Kui Ren 0001, Lingyu Wang 0001 Anonymous Misbehavior Detection in Mobile Ad Hoc Networks. Search on Bibsonomy ICDCS Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Cristian Pinzón, Yanira de Paz, Javier Bajo A Multiagent Based Strategy for Detecting Attacks in Databases in a Distributed Mode. Search on Bibsonomy DCAI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security database, Multi-agent, IDS, case-based reasoning, SQL injection
10Yuming Ou, Longbing Cao, Chao Luo, Li Liu 0033 Mining Exceptional Activity Patterns in Microstructure Data. Search on Bibsonomy Web Intelligence The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Fengying Li, Qingshui Xue, Jiping Zhang 0001, Zhenfu Cao A Model of Bilinear-Pairings Based Designated-Verifier Proxy Signatue Scheme. Search on Bibsonomy CollaborateCom The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10William Krebs, Per Kroll, Edward Richard Un-Assessments Reflections by the Team, for the Team. Search on Bibsonomy AGILE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Mansoor Ahmed, Amin Anjomshoaa, A Min Tjoa Context-based privacy management of personal information using semantic desktop: SemanticLIFE case study. Search on Bibsonomy iiWAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF context-based, ontology, web services, privacy, semantic web, SOA
10Ragib Hasan, Marianne Winslett, Richard M. Conlan, Brian Slesinsky, Nandakumar Ramani Please Permit Me: Stateless Delegated Authorization in Mashups. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Michael J. Ocean, Azer Bestavros Wireless and physical security via embedded sensor networks. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF sensor networks, intrusion detection, wireless, physical security
10Stefanos Gritzalis, Athanasios N. Yannacopoulos, Costas Lambrinoudakis, Petros Hatzopoulos, Sokratis K. Katsikas A probabilistic model for optimal insurance contracts against security risks and privacy violation in IT outsourcing environments. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Optimal contract, Privacy protection, IT outsourcing, Insurance
10Yi-Hung Wu, Chia-Ming Chiang, Arbee L. P. Chen Hiding Sensitive Association Rules with Limited Side Effects. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF rule hiding, data mining, Association rules, mining methods and algorithms
10Juan E. Iglesias, Carlos Pecharromán Scaling the h-index for different scientific ISI fields. Search on Bibsonomy Scientometrics The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Kjell Jørgen Hole, Vebjørn Moen, André N. Klingsheim, Knut M. Tande Lessons from the Norwegian ATM System. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10G. Craig Murray, Jaime Teevan Query log analysis: social and technological challenges. Search on Bibsonomy SIGIR Forum The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Chuan Feng, Jianfeng Peng, Haiyan Qiao, Jerzy W. Rozenblit Alert Fusion for a Computer Host Based Intrusion Detection System. Search on Bibsonomy ECBS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Jianfeng Peng, Chuan Feng, Haiyan Qiao, Jerzy W. Rozenblit An Event-Driven Architecture for Fine Grained Intrusion Detection and Attack Aftermath Mitigation. Search on Bibsonomy ECBS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Aybek Mukhamedov, Mark Dermot Ryan Anonymity Protocol with Identity Escrow and Analysis in the Applied n-Calculus. Search on Bibsonomy TGC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Samer Fayssal, Salim Hariri, Youssif B. Al-Nashif, Guangzhi Qu Anomaly-Based Behavior Analysis of Wireless Network Security. Search on Bibsonomy MobiQuitous The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Mark Last, Rafael Carel, Dotan Barak Utilization of Data-Mining Techniques for Evaluation of Patterns of Asthma Drugs Use by Ambulatory Patients in a Large Health Maintenance Organization. Search on Bibsonomy ICDM Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Almut Herzog, Nahid Shahmehri Usability and Security of Personal Firewalls. Search on Bibsonomy SEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Alma Leora Culén, Yonggong Ren Designing Personalized Media Center with Focus on Ethical Issues of Privacy and Security. Search on Bibsonomy HCI (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF privacy, experience, ethics, interactive television, multi-touch interface
10Andre Barroso, Hans-Jürgen Reumerman An Addressing Scheme to Support Untraceability in Mobile Ad Hoc Networks. Search on Bibsonomy VTC Spring The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10John R. Goodall Introduction to Visualization for Computer Security. Search on Bibsonomy VizSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Yanlan Ding, Guiping Su Intrusion detection system for signal based SIP attacks through timed HCPN. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Kilho Shin, Tetsuji Kuboyama Polynomial Summaries of Positive Semidefinite Kernels. Search on Bibsonomy ALT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Ebru Celikel, Murat Kantarcioglu, Bhavani Thuraisingham, Elisa Bertino Managing Risks in RBAC Employed Distributed Environments. Search on Bibsonomy OTM Conferences (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, data mining, access control, RBAC, risk modeling
10Christian Brown, Chris McDonald Visualizing berkeley socket calls in students' programs. Search on Bibsonomy ITiCSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF courseware, internetworking, systems programming
10Rakesh Agrawal 0001, Alexandre V. Evfimievski, Jerry Kiernan, Raja Velu Auditing disclosure by relevance ranking. Search on Bibsonomy SIGMOD Conference The full citation details ... 2007 DBLP  DOI  BibTeX  RDF derivation probability, hippocratic database, information retrieval, privacy, record linkage
10Barbara Gallina, Nicolas Guelfi A Template for Requirement Elicitation of Dependable Product Lines. Search on Bibsonomy REFSQ The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Weider D. Yu, Savitha Murthy PPMLP: A Special Modeling Language Processor for Privacy Policies. Search on Bibsonomy ISCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10David T. Nguyen, John F. Canny Multiview: improving trust in group video conferencing through spatial faithfulness. Search on Bibsonomy CHI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF spatial faithfulness, CSCW, trust, CMC, video conferencing, eye contact, prisoner's dilemma, gaze awareness, social dilemmas
10Samiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens An Integrated Model for Access Control and Information Flow Requirements. Search on Bibsonomy ASIAN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF DTE, RBAC, Security Policy, MLS, OrBAC
10Pablo García Bringas Intensive Use of Bayesian Belief Networks for the Unified, Flexible and Adaptable Analysis of Misuses and Anomalies in Network Intrusion Detection and Prevention Systems. Search on Bibsonomy DEXA Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Wei Chen 0006, Danwei Chen, Guozi Sun, Yingzhou Zhang Defending Against Jamming Attacks in Wireless Local Area Networks. Search on Bibsonomy ATC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Patrick Röder, Omid Tafreschi, Claudia Eckert 0001 On Flexible Modeling of History-Based Access Control Policies for XML Documents. Search on Bibsonomy KES (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Chinese Wall Model, XML, Access Control
10Sylvia B. Encheva, Sharil Tumin Knowledge Assessment Based on Many-Valued Logic. Search on Bibsonomy KES (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Web-based assessment, learning
10Wenyuan Liu, Feng Tong, Yongan Luo, Feng Zhang A proxy blind signature scheme based on elliptic curve with proxy revocation. Search on Bibsonomy SNPD (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Pekka Savolainen, Eila Niemelä, Reijo Savola A Taxonomy of Information Security for Service-Centric Systems. Search on Bibsonomy EUROMICRO-SEAA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Il-Horn Hann, Kai Lung Hui, Sang-Yong Tom Lee, Ivan P. L. Png Analyzing Online Information Privacy Concerns: An Information Processing Theory Approach. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Tran Hoang Hai, Faraz Idris Khan, Eui-nam Huh Hybrid Intrusion Detection System for Wireless Sensor Networks. Search on Bibsonomy ICCSA (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF routing attacks, security, wireless sensor networks, Intrusion detection
10Vee Liem Chee, Wei-Chuen Yau Security Analysis of TORA Routing Protocol. Search on Bibsonomy ICCSA (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF TORA, Ad Hoc Networks, Routing Protocols
10Luís Torgo Resource-Bounded Fraud Detection. Search on Bibsonomy EPIA Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Jayamsakthi Shanmugam, M. Ponnavaikko Risk Mitigation for Cross Site Scripting Attacks Using Signature Based Model on the Server Side. Search on Bibsonomy IMSCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Application-level web Security, cross-site scripting, security vulnerabilities
10Sandra Dominikus, Manfred Josef Aigner mCoupons: An Application for Near Field Communication (NFC). Search on Bibsonomy AINA Workshops (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10B. S. Manoj 0001, Rajesh M. Hegde, Bhaskar D. Rao, Ramesh R. Rao Sentient Networks: A New Dimension in Network Capability. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Nazli Goharian, Alana Platt DOTS: Detection of Off-Topic Search via Result Clustering. Search on Bibsonomy ISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Sang Hyun Oh, Won Suk Lee Anomaly Intrusion Detection Based on Dynamic Cluster Updating. Search on Bibsonomy PAKDD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Data Mining, Clustering, Intrusion Detection, Anomaly Detection
10Marco Fargetta, Vincenzo Nicosia The Agreement Utopia. Search on Bibsonomy WETICE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Geert Jonker, Frank Dignum, John-Jules Ch. Meyer Achieving cooperation among selfish agents in the air traffic management domain using signed money. Search on Bibsonomy AAMAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF signed money, fairness, efficiency, cooperation, exploitation
10Florian Mansmann, Svetlana Vinnik Interactive Exploration of Data Traffic with Hierarchical Network Maps. Search on Bibsonomy IEEE Trans. Vis. Comput. Graph. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF information visualization, network security, visual analytics, Data and knowledge visualization
10Phillip A. Porras Privacy-Enabled Global Threat Monitoring. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Gregory J. Conti Introduction. Search on Bibsonomy Commun. ACM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Vlasti Broucek, Paul Turner Winning the Battles, Losing the War? Rethinking Methodology for Forensic Computing Research. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Phillip A. Laplante It isn't your father's realtime anymore. Search on Bibsonomy ACM Queue The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Alper Koz, Cevahir Cigla, A. Aydin Alatan Free-View Watermarking for Free-View Television. Search on Bibsonomy ICIP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Shai Rubin, Somesh Jha, Barton P. Miller Protomatching network traffic for high throughputnetwork intrusion detection. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF intrusion detection, signatures, protocol analysis
10Dag I. K. Sjøberg Knowledge Acquisition in Software Engineering Requires Sharing of Data and Artifacts. Search on Bibsonomy Empirical Software Engineering Issues The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Lynette Drevin, Hennie A. Kruger, Tjaart Steyn Value-Focused Assessment of Information Communication and Technology Security Awareness in an Academic Environment. Search on Bibsonomy SEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Douglas P. Gregor, Jaakko Järvi, Jeremy G. Siek, Bjarne Stroustrup, Gabriel Dos Reis, Andrew Lumsdaine Concepts: linguistic support for generic programming in C++. Search on Bibsonomy OOPSLA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF constrained generics, generic programming, concepts, parametric polymorphism, C++0x, C++ templates
10Joshua J. Bloch How to design a good API and why it matters. Search on Bibsonomy OOPSLA Companion The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Michael Stier, Emanuel Eick, Eckhart Koerner A Practical Approach to SIP, QoS and AAA Integration. Search on Bibsonomy Networking The full citation details ... 2006 DBLP  DOI  BibTeX  RDF real-time interactive services, bandwidth probing, QoS, SIP, AAA
10A. Murali M. Rao Policy Specification and Enforcement for Detection of Security Violations in a Mail Service. Search on Bibsonomy ICIT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Weidong Shi, Joshua B. Fryman, Guofei Gu, Hsien-Hsin S. Lee, Youtao Zhang, Jun Yang 0002 InfoShield: a security architecture for protecting information usage in memory. Search on Bibsonomy HPCA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Ioannis Broustis, Michalis Faloutsos, Srikanth V. Krishnamurthy Overcoming the challenge of security in a mobile environment. Search on Bibsonomy IPCCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Amlan Kundu 0002, Shamik Sural, Arun K. Majumdar Two-Stage Credit Card Fraud Detection Using Sequence Alignment. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10William M. Fleischman Meta-informatics and ethical issues in computing. Search on Bibsonomy ITiCSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF computing in public education, surveillance, digital divide
10Kunlun Li, Guifa Teng Unsupervised SVM Based on p-kernels for Anomaly Detection. Search on Bibsonomy ICICIC (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #701 - #800 of 983 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license