The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Safety with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1955-1977 (15) 1978-1981 (17) 1982-1983 (15) 1984-1985 (17) 1986 (16) 1987 (17) 1988 (27) 1989 (34) 1990 (43) 1991 (38) 1992 (41) 1993 (108) 1994 (86) 1995 (147) 1996 (184) 1997 (164) 1998 (242) 1999 (271) 2000 (320) 2001 (351) 2002 (406) 2003 (477) 2004 (664) 2005 (758) 2006 (899) 2007 (1113) 2008 (1175) 2009 (1057) 2010 (752) 2011 (722) 2012 (1030) 2013 (1105) 2014 (1342) 2015 (1498) 2016 (1222) 2017 (1549) 2018 (1745) 2019 (2210) 2020 (1847) 2021 (2260) 2022 (2124) 2023 (2529) 2024 (471)
Publication types (Num. hits)
article(8800) book(39) data(8) incollection(191) inproceedings(21439) phdthesis(417) proceedings(214)
Venues (Conferences, Journals, ...)
CoRR(1787) SAFECOMP(928) SSS(827) SSRR(609) HPCC/CSS/ICESS(513) ICVES(513) Reliab. Eng. Syst. Saf.(477) ICSRS(471) SAFECOMP Workshops(411) CAA SAFEPROCESS(353) IEEE Access(310) Sensors(274) SAFEPROCESS(254) ITSC(246) HCI (17)(244) CSS(221) More (+10 of total 4154)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 8688 occurrences of 3331 keywords

Results
Found 31108 publication records. Showing 31108 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
20Hua Liu 0005, Bhaskar Krishnamachari, Murali Annavaram Game theoretic approach to location sharing with privacy in a community-based mobile safety application. Search on Bibsonomy MSWiM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF community based social networking, location sharing, mobile safety application, pricacy, game theory
20Tor Stålhane, Guttorm Sindre Safety Hazard Identification by Misuse Cases: Experimental Comparison of Text and Diagrams. Search on Bibsonomy MoDELS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF safety hazards, experiment, Use cases, misuse cases
20Lukasz Cyra, Janusz Górski Expert Assessment of Arguments: A Method and Its Experimental Evaluation. Search on Bibsonomy SAFECOMP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Argument assessment, Dempster-Shafer model, Safety Case, Trust Case, Assurance Case, Argument structures
20Dawid Trawczynski, Janusz Sosnowski, Piotr Gawkowski Analyzing Fault Susceptibility of ABS Microcontroller. Search on Bibsonomy SAFECOMP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF safety evaluation, fault tolerance, Fault injection, real-time embedded systems, automotive systems
20Yasser Sedaghat, Seyed Ghassem Miremadi Investigation and Reduction of Fault Sensitivity in the FlexRay Communication Controller Registers. Search on Bibsonomy SAFECOMP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Flex- Ray protocol, Fault injection, Distributed embedded systems, Safety-critical applications
20Klaus Peter Wegge, Dirk Zimmermann Accessibility, Usability, Safety, Ergonomics: Concepts, Models, and Differences. Search on Bibsonomy HCI (5) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Differences between Accessibility & Usability, Usability, Accessibility, Safety, Ergonomics
20Joan Cahill, Nick McDonald, Pernilla Ulfvengren, Franklyn Young, Yeray Ramos, Gabriel Losa HILAS Flight Operations Research: Development of Risk/Safety Management, Process Improvement and Task Support Tools. Search on Bibsonomy HCI (13) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Flight Operations, Safety, Risk Management, Information Flow, Process Improvement, Performance Monitoring, Human Performance, Task Support
20Tor Stålhane, Guttorm Sindre A Comparison of Two Approaches to Safety Analysis Based on Use Cases. Search on Bibsonomy ER The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Safety engineering, experiment, misuse cases, FMEA
20Matteo Fiorani Safety margins perceptions integration in the driver: an explorative study on required deceleration and headway in car-following tasks. Search on Bibsonomy ECCE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF car-following, headway, safety margins, perception
20Piotr S. Szczepaniak, Ryszard A. Walentynski Safety of Recreational Water Slides: Numerical Estimation of the Trajectory, Velocities and Accelerations of Motion of the Users. Search on Bibsonomy International Conference on Computational Science (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF water slide, water park, modeling, safety, dynamics, motion, numerical integration, finite difference, Mathematica
20Tina Mattes, Jörg Pfahler, Frank Schiller, Thomas Honold Analysis of Combinations of CRC in Industrial Communication. Search on Bibsonomy SAFECOMP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Cyclic Redundancy Check, Residual Error Probability, Safety-critical Communication
20Martin Walker, Leonardo Bottaci, Yiannis Papadopoulos Compositional Temporal Fault Tree Analysis. Search on Bibsonomy SAFECOMP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF temporal fault trees, formal FTA, automated FTA, fault tree synthesis, formal safety analysis
20Anne Sneddon, Kathryn Mearns, Rhona Flin Situation awareness and safety in offshore drill crews. Search on Bibsonomy Cogn. Technol. Work. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Offshore oil and gas, Safety, Situation awareness, Drilling
20Jane Fedorowicz, M. Lynne Markus, Steve Sawyer, Michael Tyworth, Christine B. Williams Design principles for public safety response mobilization. Search on Bibsonomy DG.O The full citation details ... 2006 DBLP  DOI  BibTeX  RDF criminal justice, design features, first responder support, public safety response, collaboration, interorganizational systems
20Tom Kontogiannis Integration of task networks and cognitive user models using coloured Petri nets and its application to job design for safety and productivity. Search on Bibsonomy Cogn. Technol. Work. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Task networks, Human reliability, Job design, Safety, Cognitive modelling, Coloured Petri nets
20Weihang Wu, Tim Kelly Failure modelling in software architecture design for safety. Search on Bibsonomy ACM SIGSOFT Softw. Eng. Notes The full citation details ... 2005 DBLP  DOI  BibTeX  RDF software architectures, CSP, safety analysis, failure modelling
20Richard Bubel, Reiner Hähnle Integration of informal and formal development of object-oriented safety-critical software. Search on Bibsonomy Int. J. Softw. Tools Technol. Transf. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF UML, Formal specification, Design patterns, OCL, Safety-critical software
20Jean-François Couchot, Alain Giorgetti, Nikolai Kosmatov A uniform deductive approach for parameterized protocol safety. Search on Bibsonomy ASE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF generalized substitutions, safety, assertion, symbolic model checking, reachability
20Klaus Havelund, Grigore Rosu Efficient monitoring of safety properties. Search on Bibsonomy Int. J. Softw. Tools Technol. Transf. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Monitoring, Temporal logics, Safety
20Jijun Yin, Tamer A. ElBatt, Gavin Yeung, Bo Ryu, Stephen Habermas, Hariharan Krishnan, Timothy Talty Performance evaluation of safety applications over DSRC vehicular ad hoc networks. Search on Bibsonomy Vehicular Ad Hoc Networks The full citation details ... 2004 DBLP  DOI  BibTeX  RDF intervehicle communications, safety applications, simulation, MANETs, throughput, latency, OFDM, bit error rate, DSRC
20Prasad Naldurg, Roy H. Campbell Dynamic access control: preserving safety and trust for network defense operations. Search on Bibsonomy SACMAT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF access lists, capability lists, trust, safety, comparison, dynamic access control
20Bruno Blanchet, Patrick Cousot, Radhia Cousot, Jérôme Feret, Laurent Mauborgne, Antoine Miné, David Monniaux, Xavier Rival A static analyzer for large safety-critical software. Search on Bibsonomy PLDI The full citation details ... 2003 DBLP  DOI  BibTeX  RDF verification, real-time, static analysis, embedded, abstract interpretation, floating point, safety-critical software, reactive, abstract domains
20Fernando M. Gonçalves, Marcelino B. Santos, Isabel C. Teixeira, João Paulo Teixeira 0001 Design and Test of a Certifiable ASIC for a Safety-Critical Gas Burner Control System. Search on Bibsonomy J. Electron. Test. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF fault simulation, safety-critical, self-checking
20Wayne G. Lutters, Mark S. Ackerman Achieving safety: a field study of boundary objects in aircraft technical support. Search on Bibsonomy CSCW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF high reliability organizations, hotlines, safety, collaborative work, organizational memory, service engineering, boundary objects, technical support, information reuse
20Marvin V. Zelkowitz, Ioana Rus The Role of Independent Verification and Validation in Maintaining a Safety Critical Evolutionary Software in a Complex Environment: The NASA Space Shuttle Program. Search on Bibsonomy ICSM The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Evolutionary software, Life and mission critical software, Process characterization, Space Shuttle program, Software independent verification and validation, Software safety and reliability, Metrics, Maintenance
20Paul Ammann, Wei Ding 0003, Daling Xu Using a Model Checker to Test Safety Properties. Search on Bibsonomy ICECCS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Model checking, Software testing, Safety, Mutation analysis
20Mariagrazia Graziano, Marco Delaurenti, Guido Masera, Gianluca Piccinini, Maurizio Zamboni Noise Safety Design Methodologies. Search on Bibsonomy ISQED The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Electromigration Safety, Deep-submicron Design Reliability, Noise, Noise Tolerance, Noise Models
20Colin O'Halloran Issues for the Automatic Generation of Safety Critical Software. Search on Bibsonomy ASE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Automatic code generation, safety critical
20Shing-Chi Cheung, Jeff Kramer Checking Safety Properties Using Compositional Reachability Analysis. Search on Bibsonomy ACM Trans. Softw. Eng. Methodol. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF compositional reachability analysis, distributed systems, model checking, static analysis, safety properties
20Jeffrey M. Thompson, Mats Per Erik Heimdahl An Integrated Development Environment for Prototyping Safety Critical Systems. Search on Bibsonomy IEEE International Workshop on Rapid System Prototyping The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Specification-based Prototyping, Software Engineering, Embedded Systems, Safety-critical Systems, RSML
20Beth Plale, Karsten Schwan Run-time Detection in Parallel and Distributed Systems: Application to Safety-Critical Systems. Search on Bibsonomy ICDCS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF run-time detection, distributed and parallel computing, safety-critical systems, temporal queries, on-line monitoring
20Mehmet Sahinoglu, Edward Chow Empirical-Bayesian Availability Indices of Safety & Time Critical Software Systems with Corrective Maintenance. Search on Bibsonomy PRDC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Empirical Bayesian, Time-Critical, Availability, Safety, mle, Corrective Maintenance
20Tim M. Bull Comprehension of Safety-Critical Systems Using Domain-Specific Languages. Search on Bibsonomy WPC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Program Transformations, Domain-Specific Languages, Safety-Critical Systems
20Matthew J. Morley Safety in Railway Signalling Data: A Behavioural Analysis. Search on Bibsonomy HUG The full citation details ... 1993 DBLP  DOI  BibTeX  RDF application specific languages, Safety-critical systems, higher-order logic, railway signalling
19Adeel A. Malik, Deepak K. Tosh Dynamic Risk Assessment and Analysis Framework for Large-Scale Cyber-Physical Systems. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Yang Lu, Shujun Li, Alex Alves Freitas, Athina Ioannou How data-sharing nudges influence people's privacy preferences: A machine learning-based analysis. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Zhen Huang 0002, Gang Tan, Xiaowei Yu Mitigating Vulnerabilities in Closed Source Software. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Anne Wagner, Anna Bakas, Shelia Kennison, Eric Chan-Tin Comparing Online Surveys for Cybersecurity: SONA and MTurk. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Muhammad Shoaib Akhtar, Tao Feng 0007 A Systemic Security and Privacy Review: Attacks and Prevention Mechanisms over IOT Layers. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Zhengping Luo 0001, Tao Hou, Xiangrong Zhou, Hui Zeng, Zhuo Lu Binary Code Similarity Detection through LSTM and Siamese Neural Network. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Hong Liu, Eugene Y. Vasserman Side-channel Programming for Software Integrity Checking. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Philip Dale Huff, Qinghua Li Towards Automating the Assessment of Software Vulnerability Risk. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Prabesh Pathak, Prabesh Poudel, Sankardas Roy, Doina Caragea Leveraging attention-based deep neural networks for security vetting of Android applications. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Anna Bakas, Anne Wagner, Spencer Johnston, Shelia Kennison, Eric Chan-Tin Impact of Personality Types and Matching Messaging on Password Strength. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Guanxiong Ha, Hang Chen, Ruiqi Li, Wei Shao, Chunfu Jia A Rekeying Scheme for Encrypted Deduplication Storage based on NTRU. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Tomasz Kosinski, Riccardo Scandariato, Morten Fjeld SyntIoT: Privacy and security experimentation in consumer-oriented IoT ecosystems. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Deeraj Nagothu, Yu Chen 0002, Alexander J. Aved, Erik Blasch Authenticating Video Feeds using Electric Network Frequency Estimation at the Edge. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Zezhang Yang, Jian Li 0008, Ping Yang 0002 FedADMP: A Joint Anomaly Detection and Mobility Prediction Framework via Federated Learning. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Tianrou Xia, Yuanyi Sun, Sencun Zhu, Zeeshan Rasheed, Khurram Shafique Toward A Network-Assisted Approach for Effective Ransomware Detection. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Kamrul Hasan, Sachin Shetty, Sharif Ullah, Amin Hassanzadeh, Tariqul Islam 0001 Criticality based Optimal Cyber Defense Remediation in Energy Delivery Systems. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Najmudin Saqib, Vasileios Germanos, Wen Zeng, Leandros A. Maglaras Mapping of the Security Requirements of GDPR and NISD. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Hela Mliki, Abir Hadj Kaceam, Lamia Chaari A Comprehensive Survey on Intrusion Detection based Machine Learning for IoT Networks. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Zheyuan Liu 0007, Rui Zhang Privacy Preserving Collaborative Machine Learning. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Qiuqing Jin, Liming Wang Zero-Trust Based Distributed Collaborative Dynamic Access Control Scheme with Deep Multi-Agent Reinforcement Learning. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Joshua Bassey, Xiangfang Li, Lijun Qian Device Authentication Codes based on RF Fingerprinting using Deep Learning. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Mazen Al-Wadi, Amro Awad Caching Techniques for Security Metadata in Integrity-Protected Fabric-Attached Memories. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Mohammad Ashiqur Rahman, Amarjit Datta, Ehab Al-Shaer Automated Configuration Synthesis for Resilient Smart Metering Infrastructure. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Wanping Liu, Zhoulan Zhang, Cheng Huang 0003, Yong Fang 0002 CLETer: A Character-level Evasion Technique Against Deep Learning DGA Classifiers. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Shiying Pan, Can Yang, Runmin Li GIP3: Make Privacy Preserving be Easier on Cloud. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Friday Ehi Ikuero, Vasileios Germanos, Laurence Brooks, Wen Zeng Is E-voting Systems based on Blockchain Technology Efficient in Nigeria General Elections? Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Agbotiname Lucky Imoize, Boluwatife Samuel Ben-Adeola, John Adetunji Adebisi Development of a Multifactor-Security-Protocol System Using Ambient Noise Synthesis. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Alem Fitwi, Meng Yuan, Seyed Yahya Nikouei, Yu Chen 0002 Minor Privacy Protection by Real-time Children Identification and Face Scrambling at the Edge. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Lanhang Li, Yuling Luo, Shubin Tang, Lvchen Cao, Xue Ouyang Image encryption algorithm using chaotic maps and cellular automata. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Li Wang Shoal: A Network Level Moving Target Defense Engine with Software Defined Networking. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19M. A. Hannan Bin Azhar, Robert Vause Whitehead A study of user experiences and network analysis on anonymity and traceability of bitcoin transactions. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Yixin Li, Liming Wang, Jing Yang 0032, Zhen Xu 0009, Xi Luo deMSF: a Method for Detecting Malicious Server Flocks for Same Campaign. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Mingxin Sun, Wenjie Wang, Hantao Feng, Hongu Sun, Yuqing Zhang 0001 Identify Vulnerability Fix Commits Automatically Using Hierarchical Attention Network. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Yuxuan Chen, Xuejing Yuan, Aohui Wang, Kai Chen 0012, Shengzhi Zhang, Heqing Huang Manipulating Users' Trust on Amazon Echo: Compromising Smart Home from Outside. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19David Mohaisen, Sencun Zhu Editorial. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Yuan He, Wengjie Wang, Hongyu Sun, Yuqing Zhang 0001 Vul-Mirror: A Few-Shot Learning Method for Discovering Vulnerable Code Clone. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Yifan Tian, Jiawei Yuan, Yantian Hou CPAR: Cloud-Assisted Privacy-preserving Image Annotation with Randomized k-d Forest. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Van Trieu-Do, Richard Garcia-Lebron, Maochao Xu, Shouhuai Xu, Yusheng Feng Characterizing and Leveraging Granger Causality in Cybersecurity: Framework and Case Study. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Jing Zhang, Yu Wen Malware Detection Based on Opcode Dynamic Analysis. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Qais Tasali, Christine Sublett, Eugene Y. Vasserman Controlled BTG: Toward Flexible Emergency Override in Interoperable Medical Systems. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Yan Liu User Identity Linkage Method Based on User Online Habit. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Chunling Han, Rui Xue 0001 Aggregation for Privately Trained Different Types of Local Models. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Reem Bashir, Helge Janicke, Wen Zeng Evaluating the Impact of Sandbox Applications on Live Digital Forensics Investigation. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19SooHyun Park, Yeongeun Kang, Jeman Park 0001, Joongheon Kim Self-Controllable Super-Resolution Deep Learning Framework for Surveillance Drones in Security Applications. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Afsah Anwar, Aminollah Khormali, Jinchun Choi, Hisham Alasmary, Saeed Salem, DaeHun Nyang, David Mohaisen Measuring the Cost of Software Vulnerabilities. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Yuzhe Richard Tang, Kai Li 0017, Katchaguy Areekijseree, Shuigeng Zhou, Liting Hu Privacy-Preserving Multi-Party Directory Services. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Yue Li 0002, Haining Wang, Kun Sun 0001 BluePass: A Mobile Device Assisted Password Manager. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Naiwei Liu, Wanyu Zang, Songqing Chen, Meng Yu 0001, Ravi S. Sandhu Adaptive Noise Injection against Side-Channel Attacks on ARM Platform. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Ivan Homoliak, Martin Teknos, Martín Ochoa, Dominik Breitenbacher, Saeid Hosseini, Petr Hanácek Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Nawaf Alhebaishi, Lingyu Wang 0001, Anoop Singhal Threat Modeling for Cloud Infrastructures. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Mina Khalili, Mengyuan Zhang 0001, Daniel Borbor, Lingyu Wang 0001, Nicandro Scarabeo, Michel-Ange Zamor Monitoring and Improving Managed Security Services inside a Security Operation Center. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Li Wang, Dinghao Wu Bridging the Gap Between Security Tools and SDN Controllers. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Vinay Sachidananda, Suhas Bhairav, Yuval Elovici Spill the Beans: Extrospection of Internet of Things by Exploiting Denial of Service. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Anyi Liu, Selena Haidar, Yuan Cheng 0002, Yingjiu Li Confidential State Verification for the Delegated Cloud Jobs with Confidential Audit Log. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Qiumao Ma, Wensheng Zhang 0001 Octopus ORAM: An Oblivious RAM with Communication and Server Storage Efficiency. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Debasis Gountia Towards Scalability Trade-off and Security Issues in State-of-the-art Blockchain. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Hongfa Xue, Yurong Chen 0005, Guru Venkataramani, Tian Lan AMASS: Automated Software Mass Customization via Feature Identification and Tailoring. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Saeed Ibrahim Alqahtani, Shujun Li, Haiyue Yuan, Patrice Rusconi Human-Generated and Machine-Generated Ratings of Password Strength: What Do Users Trust More? Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Andrew Meyer, Sankardas Roy Do Metadata-based Deleted-File-Recovery (DFR) Tools Meet NIST Guidelines? Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Weiqi Cui, Jiangmin Yu, Yanmin Gong 0001, Eric Chan-Tin Efficient, Effective, and Realistic Website Fingerprinting Mitigation. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Muhammad Jafer, M. Arif Khan, Sabih ur Rehman, Tanveer A. Zia Secure Communication in VANET Broadcasting. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Rocio Lopez Perez, Florian Adamsky, Ridha Soua, Thomas Engel 0001 Forget the Myth of the Air Gap: Machine Learning for Reliable Intrusion Detection in SCADA Systems. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Yang Song, Chen Wu, Sencun Zhu, Haining Wang A Machine Learning Based Approach for Mobile App Rating Manipulation Detection. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Vasileios Anastopoulos, Sokratis K. Katsikas A Methodology for the Dynamic Design of Adaptive Log Management Infrastructures. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Wei Zhang 0122, Jingwen Zhao, Fengqiong Wei, Yunfang Chen Differentially Private High-Dimensional Data Publication via Markov Network. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Zhengping Luo 0001, Zhe Qu, Tung Thanh Nguyen, Hui Zeng, Zhuo Lu Security of HPC Systems: From a Log-analyzing Perspective. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
Displaying result #701 - #800 of 31108 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license