The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "SEC"( http://dblp.L3S.de/Venues/SEC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/edge

Publication years (Num. hits)
1992 (38) 1993 (33) 1996 (49) 1997 (38) 1998-2000 (54) 2001 (33) 2002 (46) 2003 (52) 2004 (36) 2005 (41) 2006 (46) 2007 (47) 2008 (54) 2009 (39) 2010 (28) 2011 (27) 2012 (54) 2013 (32) 2014 (42) 2015 (43) 2016 (66) 2017 (75) 2018 (82) 2019 (92) 2020 (93) 2021 (81) 2022 (106) 2023 (79) 2024 (1)
Publication types (Num. hits)
inproceedings(1470) proceedings(37)
Venues (Conferences, Journals, ...)
SEC(1507)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 28 occurrences of 27 keywords

Results
Found 1507 publication records. Showing 1507 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Lena Yuryna Connolly, Michael Lang 0001, J. Doug Tygar Investigation of Employee Security Behaviour: A Grounded Theory Approach. Search on Bibsonomy SEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Zhijiao Zhang, Ya-Shuai Lü, Yu Chen 0004, Yongqiang Lu 0001, Yuanchun Shi Mitigating Code-Reuse Attacks on CISC Architectures in a Hardware Approach. Search on Bibsonomy SEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Hannes Federrath, Dieter Gollmann (eds.) ICT Systems Security and Privacy Protection - 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings Search on Bibsonomy SEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Nicolai Kuntze, Andreas Fuchs 0002, Carsten Rudolph On the Secure Distribution of Vendor-Specific Keys in Deployment Scenarios. Search on Bibsonomy SEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mohammed H. Almeshekah, Mikhail J. Atallah, Eugene H. Spafford Enhancing Passwords Security Using Deceptive Covert Communication. Search on Bibsonomy SEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Amrit Kumar 0001, Cédric Lauradoux A Survey of Alerting Websites: Risks and Solutions. Search on Bibsonomy SEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Maria B. Line, Nils Brede Moe Understanding Collaborative Challenges in IT Security Preparedness Exercises. Search on Bibsonomy SEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Asahiko Yamada A Generalization of ISO/IEC 24761 to Enhance Remote Authentication with Trusted Product at Claimant. Search on Bibsonomy SEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1David Lorenzi, Emre Uzun, Jaideep Vaidya, Shamik Sural, Vijayalakshmi Atluri Enhancing the Security of Image CAPTCHAs Through Noise Addition. Search on Bibsonomy SEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Nizar Kheir, Gregory Blanc, Hervé Debar, Joaquín García-Alfaro, Dingqi Yang Automated Classification of C&C Connections Through Malware URL Clustering. Search on Bibsonomy SEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jaspreet Kaur, Jernej Tonejc, Steffen Wendzel, Michael Meier 0001 Securing BACnet's Pitfalls. Search on Bibsonomy SEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Anna Vapen, Niklas Carlsson, Anirban Mahanti, Nahid Shahmehri Information Sharing and User Privacy in the Third-Party Identity Management Landscape. Search on Bibsonomy SEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Dang Vinh Pham, Dogan Kesdogan Towards Relations Between the Hitting-Set Attack and the Statistical Disclosure Attack. Search on Bibsonomy SEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Konstantin Knorr, David Aspinall 0001, Maria Wolters On the Privacy, Security and Safety of Blood Pressure and Diabetes Apps. Search on Bibsonomy SEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Wouter Lueks, Gergely Alpár, Jaap-Henk Hoepman, Pim Vullers Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers. Search on Bibsonomy SEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Quoc Huy Do 0002, Richard Bubel, Reiner Hähnle Exploit Generation for Information Flow Leaks in Object-Oriented Programs. Search on Bibsonomy SEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Wojciech Jamroga, Masoud Tabatabaei Strategic Noninterference. Search on Bibsonomy SEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Giampaolo Bella, Rosario Giustolisi, Gabriele Lenzini, Peter Y. A. Ryan A Secure Exam Protocol Without Trusted Parties. Search on Bibsonomy SEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mikhail Strizhov, Indrajit Ray Multi-keyword Similarity Search over Encrypted Cloud Data. Search on Bibsonomy SEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Kevin Atighehchi, Alexis Bonnecaze, Traian Muntean Authenticated Dictionary Based on Frequency. Search on Bibsonomy SEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Thomas Bauereiss, Dieter Hutter Compatibility of Safety Properties and Possibilistic Information Flow Security in MAKS. Search on Bibsonomy SEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Michele Carminati, Roberto Caron, Federico Maggi, Ilenia Epifani, Stefano Zanero BankSealer: An Online Banking Fraud Analysis and Decision Support System. Search on Bibsonomy SEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Gökhan Bal, Kai Rannenberg, Jason I. Hong Styx: Design and Evaluation of a New Privacy Risk Communication Method for Smartphones. Search on Bibsonomy SEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jaap-Henk Hoepman Privacy Design Strategies - (Extended Abstract). Search on Bibsonomy SEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Theodoros Spyridopoulos, Ioanna-Aikaterini Topa, Theo Tryfonas, Maria Karyda 0001 A Holistic Approach for Cyber Assurance of Critical Infrastructure with the Viable System Model. Search on Bibsonomy SEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dominik Herrmann, Max Maaß, Hannes Federrath Evaluating the Security of a DNS Query Obfuscation Scheme for Private Web Surfing. Search on Bibsonomy SEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Lena Yuryna Connolly, Michael Lang 0001, J. Doug Tygar Managing Employee Security Behaviour in Organisations: The Role of Cultural Factors and Individual Values. Search on Bibsonomy SEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Nashad Ahmed Safa, Reihaneh Safavi-Naini, Siamak Fayyaz Shahandashti Privacy-Preserving Implicit Authentication. Search on Bibsonomy SEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Bastian Braun, Caspar Gries, Benedikt Petschkuhn, Joachim Posegga Ghostrail: Ad Hoc Control-Flow Integrity for Web Applications. Search on Bibsonomy SEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Marco Rocchetto, Martín Ochoa, Mohammad Torabi Dashti Model-Based Detection of CSRF. Search on Bibsonomy SEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Fatbardh Veseli, Tsvetoslava Vateva-Gurova, Ioannis Krontiris, Kai Rannenberg, Neeraj Suri Towards a Framework for Benchmarking Privacy-ABC Technologies. Search on Bibsonomy SEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Nizar Kheir, Frédéric Tran, Pierre Caron, Nicolas Deschamps Mentor: Positive DNS Reputation to Skim-Off Benign Domains in Botnet C&C Blacklists. Search on Bibsonomy SEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Daniela Pöhn, Stefan Metzger, Wolfgang Hommel Géant-TrustBroker: Dynamic, Scalable Management of SAML-Based Inter-federation Authentication and Authorization Infrastructures. Search on Bibsonomy SEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Khalid Nasr, Anas Abou El Kalam A Novel Metric for the Evaluation of IDSs Effectiveness. Search on Bibsonomy SEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yair Diaz-Tellez, Eliane L. Bodanese, Theo Dimitrakos, Michael Turner Context-Aware Multifactor Authentication Based on Dynamic Pin. Search on Bibsonomy SEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Gabriela Varona Cervantes, Stefan Fenz How to Assess Confidentiality Requirements of Corporate Assets? Search on Bibsonomy SEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mee-Loong Yang, Adnan Al-Anbuky, William Liu Security of the Multiple-Key Blom's Key Agreement Scheme for Sensor Networks. Search on Bibsonomy SEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Miaomiao Tian 0001, Liusheng Huang Efficient Identity-Based Signature from Lattices. Search on Bibsonomy SEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Qasim Mahmood Rajpoot, Christian Damsgaard Jensen Security and Privacy in Video Surveillance: Requirements and Challenges. Search on Bibsonomy SEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Nora Cuppens-Boulahia, Frédéric Cuppens, Sushil Jajodia, Anas Abou El Kalam, Thierry Sans (eds.) ICT Systems Security and Privacy Protection - 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings Search on Bibsonomy SEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Thomas Bourgeat, Julien Bringer, Hervé Chabanne, Robin Champenois, Jérémie Clément, Houda Ferradi, Marc Heinrich, Paul Melotti, David Naccache, Antoine Voizard New Algorithmic Approaches to Point Constellation Recognition. Search on Bibsonomy SEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Bastian Braun, Johannes Köstler, Joachim Posegga, Martin Johns A Trusted UI for the Mobile Web. Search on Bibsonomy SEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Andrea Kolberger, Ingrid Schaumüller-Bichl, Verena Brunner, Martin Deutschmann Protection Profile for PUF-Based Devices. Search on Bibsonomy SEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Gurpreet Dhillon, Romilla Chowdhuri, Cristiane Pedron Organizational Transformation and Information Security Culture: A Telecom Case Study. Search on Bibsonomy SEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Abdallah Ghourabi, Tarek Abbes, Adel Bouhoula Behavior Analysis of Web Service Attacks. Search on Bibsonomy SEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Serif Bahtiyar, Gürkan Gür, Levent Altay Security Assessment of Payment Systems under PCI DSS Incompatibilities. Search on Bibsonomy SEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Zacharias Tzermias, Vassilis Prevelakis, Sotiris Ioannidis Privacy Risks from Public Data Sources. Search on Bibsonomy SEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Guojun Qin, Constantinos Patsakis, Mélanie Bouroche Playing Hide and Seek with Mobile Dating Applications. Search on Bibsonomy SEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Andrew Fielder, Emmanouil A. Panaousis, Pasquale Malacaria, Chris Hankin, Fabrizio Smeraldi Game Theory Meets Information Security Management. Search on Bibsonomy SEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Xin Sun, Yibing Zhongyang, Zhi Xin, Bing Mao, Li Xie 0001 Detecting Code Reuse in Android Applications Using Component-Based Control Flow Graph. Search on Bibsonomy SEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jan Vossaert, Jorn Lapon, Bart De Decker, Vincent Naessens Trusted Computing to Increase Security and Privacy in eID Authentication. Search on Bibsonomy SEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ibnu Mubarok, Kiryong Lee, Sihyung Lee, Heejo Lee Lightweight Resource Management for DDoS Traffic Isolation in a Cloud Environment. Search on Bibsonomy SEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Andreas Put, Italo Dacosta, Milica Milutinovic, Bart De Decker PriMan: Facilitating the Development of Secure and Privacy-Preserving Applications. Search on Bibsonomy SEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Min Yang 0007, Kam-Pui Chow Authorship Attribution for Forensic Investigation with Thousands of Authors. Search on Bibsonomy SEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Christoph Bier, Jonas Prior Detection and Labeling of Personal Identifiable Information in E-mails. Search on Bibsonomy SEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hataichanok Saevanee, Nathan L. Clarke, Steven Furnell, Valerio Biscione Text-Based Active Authentication for Mobile Devices. Search on Bibsonomy SEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Suhaila Ismail, Elena Sitnikova, Jill Slay Towards Developing SCADA Systems Security Measures for Critical Infrastructures against Cyber-Terrorist Attacks. Search on Bibsonomy SEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Alberto Blanco-Justicia, Josep Domingo-Ferrer, Oriol Farràs, David Sánchez 0001 Distance Computation between Two Private Preference Functions. Search on Bibsonomy SEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1José Fragoso Santos, Tamara Rezk An Information Flow Monitor-Inlining Compiler for Securing a Core of JavaScript. Search on Bibsonomy SEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Nor Athiyah Abdullah, Dai Nishioka, Yuko Tanaka, Yuko Murayama A Preliminary Study on User's Decision Making towards Retweet Messages. Search on Bibsonomy SEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Teodor Sommestad, Jonas Hallberg A Review of the Theory of Planned Behaviour in the Context of Information Security Policy Compliance. Search on Bibsonomy SEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Chris B. Simmons, Sajjan G. Shiva, Harkeerat Singh Bedi, Vivek Shandilya ADAPT: A Game Inspired Attack-Defense and Performance Metric Taxonomy. Search on Bibsonomy SEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ezzat Alqurashi, Gary B. Wills, Lester Gilbert A Viable System Model for Information Security Governance: Establishing a Baseline of the Current Information Security Operations System. Search on Bibsonomy SEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Theodoros Spyridopoulos, George C. Oikonomou, Theo Tryfonas, Mengmeng Ge Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention. Search on Bibsonomy SEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Thang Hoang, Deokjai Choi 0001, Quang Viet Vo, Huy Anh Nguyen, Thuc Dinh Nguyen A Lightweight Gait Authentication on Mobile Phone Regardless of Installation Error. Search on Bibsonomy SEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sabrina Kirrane, Alessandra Mileo, Stefan Decker Applying DAC Principles to the RDF Graph Data Model. Search on Bibsonomy SEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mounir Assaf, Julien Signoles, Frédéric Tronel, Eric Totel Program Transformation for Non-interference Verification on Programs with Pointers. Search on Bibsonomy SEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sascha Wessel, Frederic Stumpf, Ilja Herdt, Claudia Eckert 0001 Improving Mobile Device Security with Operating System-Level Virtualization. Search on Bibsonomy SEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Bernd Zwattendorfer, Daniel Slamanig On Privacy-Preserving Ways to Porting the Austrian eID System to the Public Cloud. Search on Bibsonomy SEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yuxin Meng 0001, Wenjuan Li 0001, Lam-for Kwok Enhancing Click-Draw Based Graphical Passwords Using Multi-Touch on Mobile Phones. Search on Bibsonomy SEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Md. Rafiqul Islam 0001, Irfan Altas, Md. Saiful Islam 0003 Exploring Timeline-Based Malware Classification. Search on Bibsonomy SEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Chuah Chai Wen, Ed Dawson, Leonie Simpson Key Derivation Function: The SCKDF Scheme. Search on Bibsonomy SEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Heidelinde Hobel, Johannes Heurix, Amin Anjomshoaa, Edgar R. Weippl Towards Security-Enhanced and Privacy-Preserving Mashup Compositions. Search on Bibsonomy SEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Alessandro Armando, Alessio Merlo, Luca Verderame An Empirical Evaluation of the Android Security Framework. Search on Bibsonomy SEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Gurpreet Dhillon, Romilla Chowdhuri, Filipe de Sá-Soares Secure Outsourcing: An Investigation of the Fit between Clients and Providers. Search on Bibsonomy SEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Markus Gruber, Phillip Wieser, Stefan Nachtnebel, Christian Schanes, Thomas Grechenig Extraction of ABNF Rules from RFCs to Enable Automated Test Data Generation. Search on Bibsonomy SEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Kathryn Parsons, Agata McCormac, Malcolm Robert Pattinson, Marcus A. Butavicius, Cate Jerram Phishing for the Truth: A Scenario-Based Experiment of Users' Behavioural Response to Emails. Search on Bibsonomy SEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Lech J. Janczewski, Henry B. Wolfe, Sujeet Shenoi (eds.) Security and Privacy Protection in Information Processing Systems - 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013. Proceedings Search on Bibsonomy SEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Suyeon Lee, Jehyun Lee, Heejo Lee Screening Smartphone Applications Using Behavioral Signatures. Search on Bibsonomy SEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Vrizlynn L. L. Thing, Zheng Leong Chua Smartphone Volatile Memory Acquisition for Security Analysis and Forensics Investigation. Search on Bibsonomy SEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Thomas Laurenson Performance Analysis of File Carving Tools. Search on Bibsonomy SEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Lotfi Ben Othmane, Harold Weffers, Rohit Ranchal, Pelin Angin, Bharat K. Bhargava, Mohd Murtadha Mohamad A Case for Societal Digital Security Culture. Search on Bibsonomy SEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Lisa Rajbhandari, Einar Snekkenes Using the Conflicting Incentives Risk Analysis Method. Search on Bibsonomy SEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sarah Abughazalah, Konstantinos Markantonakis, Keith Mayes A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags. Search on Bibsonomy SEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1William J. Caelli, Lam-for Kwok, Dennis Longley Evolving a Secure Internet. Search on Bibsonomy SEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Peter Teufl, Thomas Zefferer, Christof Stromberger Mobile Device Encryption Systems. Search on Bibsonomy SEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Huafei Zhu, Wee Siong Ng, See-Kiong Ng Sustainable Pseudo-random Number Generator. Search on Bibsonomy SEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Karl-Peter Fuchs, Dominik Herrmann, Hannes Federrath Generating Realistic Application Workloads for Mix-Based Systems for Controllable, Repeatable and Usable Experimentation. Search on Bibsonomy SEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jin B. Hong, Dong Seong Kim 0001 Performance Analysis of Scalable Attack Representation Models. Search on Bibsonomy SEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Padmanabhan Krishnan, Kostyantyn Vorobyov Enforcement of Privacy Requirements. Search on Bibsonomy SEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hartmut Hintze, Benjamin Wiegraefe, Ralf God A Security Engineering Process Approach for the Future Development of Complex Aircraft Cabin Systems. Search on Bibsonomy SEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Wayne D. Kearney, Hennie A. Kruger Phishing and Organisational Learning. Search on Bibsonomy SEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hataichanok Saevanee, Nathan L. Clarke, Steven M. Furnell Multi-modal Behavioural Biometric Authentication for Mobile Devices. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yongdong Wu, Zhigang Zhao Enhancing the Security of On-line Transactions with CAPTCHA Keyboard. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1David Zhao, Issa Traoré, Ali A. Ghorbani 0001, Bassam Sayed, Sherif Saad, Wei Lu 0018 Peer to Peer Botnet Detection Based on Flow Intervals. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Han Jiao, Jixue Liu, Jiuyong Li, Chengfei Liu Give Rookies A Chance: A Trust-Based Institutional Online Supplier Recommendation Framework. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Amir Herzberg, Ronen Margulies My Authentication Album: Adaptive Images-Based Login Mechanism. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Maria Christofi, Aline Gouget Formal Verification of the mERA-Based eServices with Trusted Third Party Protocol. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1John C. John, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya Role Mining under Role-Usage Cardinality Constraint. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Marco Prandini, Marco Ramilli A Browser-Based Distributed System for the Detection of HTTPS Stripping Attacks against Web Pages. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
Displaying result #701 - #800 of 1507 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license