|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 8688 occurrences of 3331 keywords
|
|
|
Results
Found 31108 publication records. Showing 31108 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
20 | Hua Liu 0005, Bhaskar Krishnamachari, Murali Annavaram |
Game theoretic approach to location sharing with privacy in a community-based mobile safety application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSWiM ![In: Proceedings of the 11th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, MSWiM 2008, Vancouver, British Columbia, Canada, October 27-31, 2008, pp. 229-238, 2008, ACM, 978-1-60558-235-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
community based social networking, location sharing, mobile safety application, pricacy, game theory |
20 | Tor Stålhane, Guttorm Sindre |
Safety Hazard Identification by Misuse Cases: Experimental Comparison of Text and Diagrams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MoDELS ![In: Model Driven Engineering Languages and Systems, 11th International Conference, MoDELS 2008, Toulouse, France, September 28 - October 3, 2008. Proceedings, pp. 721-735, 2008, Springer, 978-3-540-87874-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
safety hazards, experiment, Use cases, misuse cases |
20 | Lukasz Cyra, Janusz Górski |
Expert Assessment of Arguments: A Method and Its Experimental Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAFECOMP ![In: Computer Safety, Reliability, and Security, 27th International Conference, SAFECOMP 2008, Newcastle upon Tyne, UK, September 22-25, 2008, Proceedings, pp. 291-304, 2008, Springer, 978-3-540-87697-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Argument assessment, Dempster-Shafer model, Safety Case, Trust Case, Assurance Case, Argument structures |
20 | Dawid Trawczynski, Janusz Sosnowski, Piotr Gawkowski |
Analyzing Fault Susceptibility of ABS Microcontroller. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAFECOMP ![In: Computer Safety, Reliability, and Security, 27th International Conference, SAFECOMP 2008, Newcastle upon Tyne, UK, September 22-25, 2008, Proceedings, pp. 360-372, 2008, Springer, 978-3-540-87697-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
safety evaluation, fault tolerance, Fault injection, real-time embedded systems, automotive systems |
20 | Yasser Sedaghat, Seyed Ghassem Miremadi |
Investigation and Reduction of Fault Sensitivity in the FlexRay Communication Controller Registers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAFECOMP ![In: Computer Safety, Reliability, and Security, 27th International Conference, SAFECOMP 2008, Newcastle upon Tyne, UK, September 22-25, 2008, Proceedings, pp. 153-166, 2008, Springer, 978-3-540-87697-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Flex- Ray protocol, Fault injection, Distributed embedded systems, Safety-critical applications |
20 | Klaus Peter Wegge, Dirk Zimmermann |
Accessibility, Usability, Safety, Ergonomics: Concepts, Models, and Differences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (5) ![In: Universal Access in Human Computer Interaction. Coping with Diversity, 4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007, Held as Part of HCI International 2007, Beijing, China, July 22-27, 2007, Proceedings, Part I, pp. 294-301, 2007, Springer, 978-3-540-73278-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Differences between Accessibility & Usability, Usability, Accessibility, Safety, Ergonomics |
20 | Joan Cahill, Nick McDonald, Pernilla Ulfvengren, Franklyn Young, Yeray Ramos, Gabriel Losa |
HILAS Flight Operations Research: Development of Risk/Safety Management, Process Improvement and Task Support Tools. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (13) ![In: Engineering Psychology and Cognitive Ergonomics, 7th International Conference, EPCE 2007, Held as Part of HCI International 2007, Beijing, China, July 22-27, 2007, Proceedings, pp. 648-657, 2007, Springer, 978-3-540-73330-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Flight Operations, Safety, Risk Management, Information Flow, Process Improvement, Performance Monitoring, Human Performance, Task Support |
20 | Tor Stålhane, Guttorm Sindre |
A Comparison of Two Approaches to Safety Analysis Based on Use Cases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ER ![In: Conceptual Modeling - ER 2007, 26th International Conference on Conceptual Modeling, Auckland, New Zealand, November 5-9, 2007, Proceedings, pp. 423-437, 2007, Springer, 978-3-540-75562-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Safety engineering, experiment, misuse cases, FMEA |
20 | Matteo Fiorani |
Safety margins perceptions integration in the driver: an explorative study on required deceleration and headway in car-following tasks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECCE ![In: Proceedings of the 14th European Conference on Cognitive Ergonomics: invent! explore!, ECCE 2007, London, UK, August 28-31, 2007, pp. 273-276, 2007, ACM, 978-1-84799-849-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
car-following, headway, safety margins, perception |
20 | Piotr S. Szczepaniak, Ryszard A. Walentynski |
Safety of Recreational Water Slides: Numerical Estimation of the Trajectory, Velocities and Accelerations of Motion of the Users. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (2) ![In: Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27 - 30, 2007, Proceedings, Part II, pp. 219-226, 2007, Springer, 978-3-540-72585-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
water slide, water park, modeling, safety, dynamics, motion, numerical integration, finite difference, Mathematica |
20 | Tina Mattes, Jörg Pfahler, Frank Schiller, Thomas Honold |
Analysis of Combinations of CRC in Industrial Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAFECOMP ![In: Computer Safety, Reliability, and Security, 26th International Conference, SAFECOMP 2007, Nuremberg, Germany, September 18-21, 2007., pp. 329-341, 2007, Springer, 978-3-540-75100-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Cyclic Redundancy Check, Residual Error Probability, Safety-critical Communication |
20 | Martin Walker, Leonardo Bottaci, Yiannis Papadopoulos |
Compositional Temporal Fault Tree Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAFECOMP ![In: Computer Safety, Reliability, and Security, 26th International Conference, SAFECOMP 2007, Nuremberg, Germany, September 18-21, 2007., pp. 106-119, 2007, Springer, 978-3-540-75100-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
temporal fault trees, formal FTA, automated FTA, fault tree synthesis, formal safety analysis |
20 | Anne Sneddon, Kathryn Mearns, Rhona Flin |
Situation awareness and safety in offshore drill crews. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cogn. Technol. Work. ![In: Cogn. Technol. Work. 8(4), pp. 255-267, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Offshore oil and gas, Safety, Situation awareness, Drilling |
20 | Jane Fedorowicz, M. Lynne Markus, Steve Sawyer, Michael Tyworth, Christine B. Williams |
Design principles for public safety response mobilization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DG.O ![In: Proceedings of the 7th Annual International Conference on Digital Government Research, DG.O 2006, San Diego, California, USA, May 21-24, 2006, pp. 466-467, 2006, Digital Government Research Center. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
criminal justice, design features, first responder support, public safety response, collaboration, interorganizational systems |
20 | Tom Kontogiannis |
Integration of task networks and cognitive user models using coloured Petri nets and its application to job design for safety and productivity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cogn. Technol. Work. ![In: Cogn. Technol. Work. 7(4), pp. 241-261, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Task networks, Human reliability, Job design, Safety, Cognitive modelling, Coloured Petri nets |
20 | Weihang Wu, Tim Kelly |
Failure modelling in software architecture design for safety. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGSOFT Softw. Eng. Notes ![In: ACM SIGSOFT Softw. Eng. Notes 30(4), pp. 1-7, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
software architectures, CSP, safety analysis, failure modelling |
20 | Richard Bubel, Reiner Hähnle |
Integration of informal and formal development of object-oriented safety-critical software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Softw. Tools Technol. Transf. ![In: Int. J. Softw. Tools Technol. Transf. 7(3), pp. 197-211, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
UML, Formal specification, Design patterns, OCL, Safety-critical software |
20 | Jean-François Couchot, Alain Giorgetti, Nikolai Kosmatov |
A uniform deductive approach for parameterized protocol safety. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASE ![In: 20th IEEE/ACM International Conference on Automated Software Engineering (ASE 2005), November 7-11, 2005, Long Beach, CA, USA, pp. 364-367, 2005, ACM, 1-58113-993-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
generalized substitutions, safety, assertion, symbolic model checking, reachability |
20 | Klaus Havelund, Grigore Rosu |
Efficient monitoring of safety properties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Softw. Tools Technol. Transf. ![In: Int. J. Softw. Tools Technol. Transf. 6(2), pp. 158-173, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Monitoring, Temporal logics, Safety |
20 | Jijun Yin, Tamer A. ElBatt, Gavin Yeung, Bo Ryu, Stephen Habermas, Hariharan Krishnan, Timothy Talty |
Performance evaluation of safety applications over DSRC vehicular ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Vehicular Ad Hoc Networks ![In: Proceedings of the First International Workshop on Vehicular Ad Hoc Networks, 2004, Philadelphia, PA, USA, October 1, 2004, pp. 1-9, 2004, ACM, 1-58113-922-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
intervehicle communications, safety applications, simulation, MANETs, throughput, latency, OFDM, bit error rate, DSRC |
20 | Prasad Naldurg, Roy H. Campbell |
Dynamic access control: preserving safety and trust for network defense operations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 8th ACM Symposium on Access Control Models and Technologies, SACMAT 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings, pp. 231-237, 2003, ACM, 1-58113-681-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
access lists, capability lists, trust, safety, comparison, dynamic access control |
20 | Bruno Blanchet, Patrick Cousot, Radhia Cousot, Jérôme Feret, Laurent Mauborgne, Antoine Miné, David Monniaux, Xavier Rival |
A static analyzer for large safety-critical software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLDI ![In: Proceedings of the ACM SIGPLAN 2003 Conference on Programming Language Design and Implementation 2003, San Diego, California, USA, June 9-11, 2003, pp. 196-207, 2003, ACM, 1-58113-662-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
verification, real-time, static analysis, embedded, abstract interpretation, floating point, safety-critical software, reactive, abstract domains |
20 | Fernando M. Gonçalves, Marcelino B. Santos, Isabel C. Teixeira, João Paulo Teixeira 0001 |
Design and Test of a Certifiable ASIC for a Safety-Critical Gas Burner Control System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Electron. Test. ![In: J. Electron. Test. 18(3), pp. 285-294, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
fault simulation, safety-critical, self-checking |
20 | Wayne G. Lutters, Mark S. Ackerman |
Achieving safety: a field study of boundary objects in aircraft technical support. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCW ![In: CSCW 2002, Proceeding on the ACM 2002 Conference on Computer Supported Cooperative Work, New Orleans, Louisiana, USA, November 16-20, 2002, pp. 266-275, 2002, ACM, 1-58113-560-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
high reliability organizations, hotlines, safety, collaborative work, organizational memory, service engineering, boundary objects, technical support, information reuse |
20 | Marvin V. Zelkowitz, Ioana Rus |
The Role of Independent Verification and Validation in Maintaining a Safety Critical Evolutionary Software in a Complex Environment: The NASA Space Shuttle Program. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSM ![In: 2001 International Conference on Software Maintenance, ICSM 2001, Florence, Italy, November 6-10, 2001, pp. 118-126, 2001, IEEE Computer Society, 0-7695-1189-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Evolutionary software, Life and mission critical software, Process characterization, Space Shuttle program, Software independent verification and validation, Software safety and reliability, Metrics, Maintenance |
20 | Paul Ammann, Wei Ding 0003, Daling Xu |
Using a Model Checker to Test Safety Properties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICECCS ![In: 7th International Conference on Engineering of Complex Computer Systems (ICECCS 2001), 11-13 June 2001, Skövde, Sweden, pp. 212-221, 2001, IEEE Computer Society, 0-7695-1159-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Model checking, Software testing, Safety, Mutation analysis |
20 | Mariagrazia Graziano, Marco Delaurenti, Guido Masera, Gianluca Piccinini, Maurizio Zamboni |
Noise Safety Design Methodologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISQED ![In: 1st International Symposium on Quality of Electronic Design (ISQED 2000), 20-22 March 2000, San Jose, CA, USA, pp. 157-, 2000, IEEE Computer Society, 0-7695-0525-2. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Electromigration Safety, Deep-submicron Design Reliability, Noise, Noise Tolerance, Noise Models |
20 | Colin O'Halloran |
Issues for the Automatic Generation of Safety Critical Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASE ![In: The Fifteenth IEEE International Conference on Automated Software Engineering, ASE 2000, Grenoble, France, September 11-15, 2000, pp. 277-280, 2000, IEEE Computer Society, 0-7695-0710-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Automatic code generation, safety critical |
20 | Shing-Chi Cheung, Jeff Kramer |
Checking Safety Properties Using Compositional Reachability Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Softw. Eng. Methodol. ![In: ACM Trans. Softw. Eng. Methodol. 8(1), pp. 49-78, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
compositional reachability analysis, distributed systems, model checking, static analysis, safety properties |
20 | Jeffrey M. Thompson, Mats Per Erik Heimdahl |
An Integrated Development Environment for Prototyping Safety Critical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE International Workshop on Rapid System Prototyping ![In: Proceedings of the Tenth IEEE International Workshop on Rapid System Prototyping (RSP 1999), Clearwater, Florida, USA, June 16-18, 1999, pp. 172-177, 1999, IEEE Computer Society, 0-7695-0246-6. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Specification-based Prototyping, Software Engineering, Embedded Systems, Safety-critical Systems, RSML |
20 | Beth Plale, Karsten Schwan |
Run-time Detection in Parallel and Distributed Systems: Application to Safety-Critical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: Proceedings of the 19th International Conference on Distributed Computing Systems, Austin, TX, USA, May 31 - June 4, 1999, pp. 163-170, 1999, IEEE Computer Society, 0-7695-0222-9. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
run-time detection, distributed and parallel computing, safety-critical systems, temporal queries, on-line monitoring |
20 | Mehmet Sahinoglu, Edward Chow |
Empirical-Bayesian Availability Indices of Safety & Time Critical Software Systems with Corrective Maintenance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRDC ![In: 1999 Pacific Rim International Symposium on Dependable Computing (PRDC 1999), 16-17 December 1999, Hong Kong, pp. 84-, 1999, IEEE Computer Society, 0-7695-0371-3. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Empirical Bayesian, Time-Critical, Availability, Safety, mle, Corrective Maintenance |
20 | Tim M. Bull |
Comprehension of Safety-Critical Systems Using Domain-Specific Languages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPC ![In: 4th International Workshop on Program Comprehension (WPC '96), March 29-31, 1996, Berlin, Germany, pp. 108-122, 1996, IEEE Computer Society, 0-8186-7283-8. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
Program Transformations, Domain-Specific Languages, Safety-Critical Systems |
20 | Matthew J. Morley |
Safety in Railway Signalling Data: A Behavioural Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HUG ![In: Higher Order Logic Theorem Proving and its Applications, 6th International Workshop, HUG '93, Vancouver, BC, Canada, August 11-13, 1993, Proceedings, pp. 464-474, 1993, Springer, 3-540-57826-9. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
application specific languages, Safety-critical systems, higher-order logic, railway signalling |
19 | Adeel A. Malik, Deepak K. Tosh |
Dynamic Risk Assessment and Analysis Framework for Large-Scale Cyber-Physical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 8(30), pp. 1, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Yang Lu, Shujun Li, Alex Alves Freitas, Athina Ioannou |
How data-sharing nudges influence people's privacy preferences: A machine learning-based analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 8(30), pp. 3, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Zhen Huang 0002, Gang Tan, Xiaowei Yu |
Mitigating Vulnerabilities in Closed Source Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 8(30), pp. 4, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Anne Wagner, Anna Bakas, Shelia Kennison, Eric Chan-Tin |
Comparing Online Surveys for Cybersecurity: SONA and MTurk. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 8(30), pp. 2, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Muhammad Shoaib Akhtar, Tao Feng 0007 |
A Systemic Security and Privacy Review: Attacks and Prevention Mechanisms over IOT Layers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 8(30), pp. 5, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Zhengping Luo 0001, Tao Hou, Xiangrong Zhou, Hui Zeng, Zhuo Lu |
Binary Code Similarity Detection through LSTM and Siamese Neural Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 8(29), pp. e1, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Hong Liu, Eugene Y. Vasserman |
Side-channel Programming for Software Integrity Checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 8(28), pp. e2, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Philip Dale Huff, Qinghua Li |
Towards Automating the Assessment of Software Vulnerability Risk. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 8(27), pp. e3, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Prabesh Pathak, Prabesh Poudel, Sankardas Roy, Doina Caragea |
Leveraging attention-based deep neural networks for security vetting of Android applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 8(29), pp. e2, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Anna Bakas, Anne Wagner, Spencer Johnston, Shelia Kennison, Eric Chan-Tin |
Impact of Personality Types and Matching Messaging on Password Strength. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 8(28), pp. e1, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Guanxiong Ha, Hang Chen, Ruiqi Li, Wei Shao, Chunfu Jia |
A Rekeying Scheme for Encrypted Deduplication Storage based on NTRU. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 8(27), pp. e4, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Tomasz Kosinski, Riccardo Scandariato, Morten Fjeld |
SyntIoT: Privacy and security experimentation in consumer-oriented IoT ecosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 8(27), pp. e1, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Deeraj Nagothu, Yu Chen 0002, Alexander J. Aved, Erik Blasch |
Authenticating Video Feeds using Electric Network Frequency Estimation at the Edge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 7(24), pp. e4, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Zezhang Yang, Jian Li 0008, Ping Yang 0002 |
FedADMP: A Joint Anomaly Detection and Mobility Prediction Framework via Federated Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 8(29), pp. e4, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Tianrou Xia, Yuanyi Sun, Sencun Zhu, Zeeshan Rasheed, Khurram Shafique |
Toward A Network-Assisted Approach for Effective Ransomware Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 7(24), pp. e3, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Kamrul Hasan, Sachin Shetty, Sharif Ullah, Amin Hassanzadeh, Tariqul Islam 0001 |
Criticality based Optimal Cyber Defense Remediation in Energy Delivery Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 8(28), pp. e5, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Najmudin Saqib, Vasileios Germanos, Wen Zeng, Leandros A. Maglaras |
Mapping of the Security Requirements of GDPR and NISD. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 7(24), pp. e2, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Hela Mliki, Abir Hadj Kaceam, Lamia Chaari |
A Comprehensive Survey on Intrusion Detection based Machine Learning for IoT Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 8(29), pp. e3, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Zheyuan Liu 0007, Rui Zhang |
Privacy Preserving Collaborative Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 8(28), pp. e3, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Qiuqing Jin, Liming Wang |
Zero-Trust Based Distributed Collaborative Dynamic Access Control Scheme with Deep Multi-Agent Reinforcement Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 8(27), pp. e2, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Joshua Bassey, Xiangfang Li, Lijun Qian |
Device Authentication Codes based on RF Fingerprinting using Deep Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 8(29), pp. e5, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Mazen Al-Wadi, Amro Awad |
Caching Techniques for Security Metadata in Integrity-Protected Fabric-Attached Memories. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 7(24), pp. e1, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Mohammad Ashiqur Rahman, Amarjit Datta, Ehab Al-Shaer |
Automated Configuration Synthesis for Resilient Smart Metering Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 8(28), pp. e4, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Wanping Liu, Zhoulan Zhang, Cheng Huang 0003, Yong Fang 0002 |
CLETer: A Character-level Evasion Technique Against Deep Learning DGA Classifiers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 7(24), pp. e5, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Shiying Pan, Can Yang, Runmin Li |
GIP3: Make Privacy Preserving be Easier on Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 8(27), pp. e5, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Friday Ehi Ikuero, Vasileios Germanos, Laurence Brooks, Wen Zeng |
Is E-voting Systems based on Blockchain Technology Efficient in Nigeria General Elections? ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 7(25), pp. e1, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Agbotiname Lucky Imoize, Boluwatife Samuel Ben-Adeola, John Adetunji Adebisi |
Development of a Multifactor-Security-Protocol System Using Ambient Noise Synthesis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 6(22), pp. e4, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Alem Fitwi, Meng Yuan, Seyed Yahya Nikouei, Yu Chen 0002 |
Minor Privacy Protection by Real-time Children Identification and Face Scrambling at the Edge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 7(23), pp. e3, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Lanhang Li, Yuling Luo, Shubin Tang, Lvchen Cao, Xue Ouyang |
Image encryption algorithm using chaotic maps and cellular automata. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 7(26), pp. e3, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Li Wang |
Shoal: A Network Level Moving Target Defense Engine with Software Defined Networking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 7(25), pp. e5, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
19 | M. A. Hannan Bin Azhar, Robert Vause Whitehead |
A study of user experiences and network analysis on anonymity and traceability of bitcoin transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 7(25), pp. e3, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Yixin Li, Liming Wang, Jing Yang 0032, Zhen Xu 0009, Xi Luo |
deMSF: a Method for Detecting Malicious Server Flocks for Same Campaign. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 7(26), pp. e1, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Mingxin Sun, Wenjie Wang, Hantao Feng, Hongu Sun, Yuqing Zhang 0001 |
Identify Vulnerability Fix Commits Automatically Using Hierarchical Attention Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 7(23), pp. e2, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Yuxuan Chen, Xuejing Yuan, Aohui Wang, Kai Chen 0012, Shengzhi Zhang, Heqing Huang |
Manipulating Users' Trust on Amazon Echo: Compromising Smart Home from Outside. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 6(22), pp. e3, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
19 | David Mohaisen, Sencun Zhu |
Editorial. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 6(22), pp. e1, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Yuan He, Wengjie Wang, Hongyu Sun, Yuqing Zhang 0001 |
Vul-Mirror: A Few-Shot Learning Method for Discovering Vulnerable Code Clone. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 7(23), pp. e4, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Yifan Tian, Jiawei Yuan, Yantian Hou |
CPAR: Cloud-Assisted Privacy-preserving Image Annotation with Randomized k-d Forest. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 6(22), pp. e5, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Van Trieu-Do, Richard Garcia-Lebron, Maochao Xu, Shouhuai Xu, Yusheng Feng |
Characterizing and Leveraging Granger Causality in Cybersecurity: Framework and Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 7(25), pp. e4, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Jing Zhang, Yu Wen |
Malware Detection Based on Opcode Dynamic Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 7(26), pp. e4, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Qais Tasali, Christine Sublett, Eugene Y. Vasserman |
Controlled BTG: Toward Flexible Emergency Override in Interoperable Medical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 6(22), pp. e2, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Yan Liu |
User Identity Linkage Method Based on User Online Habit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 7(26), pp. e5, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Chunling Han, Rui Xue 0001 |
Aggregation for Privately Trained Different Types of Local Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 7(26), pp. e2, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Reem Bashir, Helge Janicke, Wen Zeng |
Evaluating the Impact of Sandbox Applications on Live Digital Forensics Investigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 7(25), pp. e2, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
19 | SooHyun Park, Yeongeun Kang, Jeman Park 0001, Joongheon Kim |
Self-Controllable Super-Resolution Deep Learning Framework for Surveillance Drones in Security Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 7(23), pp. e5, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Afsah Anwar, Aminollah Khormali, Jinchun Choi, Hisham Alasmary, Saeed Salem, DaeHun Nyang, David Mohaisen |
Measuring the Cost of Software Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 7(23), pp. e1, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Yuzhe Richard Tang, Kai Li 0017, Katchaguy Areekijseree, Shuigeng Zhou, Liting Hu |
Privacy-Preserving Multi-Party Directory Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 6(19), pp. e5, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Yue Li 0002, Haining Wang, Kun Sun 0001 |
BluePass: A Mobile Device Assisted Password Manager. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 5(17), pp. e3, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Naiwei Liu, Wanyu Zang, Songqing Chen, Meng Yu 0001, Ravi S. Sandhu |
Adaptive Noise Injection against Side-Channel Attacks on ARM Platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 6(19), pp. e1, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Ivan Homoliak, Martin Teknos, Martín Ochoa, Dominik Breitenbacher, Saeid Hosseini, Petr Hanácek |
Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 5(17), pp. e4, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Nawaf Alhebaishi, Lingyu Wang 0001, Anoop Singhal |
Threat Modeling for Cloud Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 5(17), pp. e5, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Mina Khalili, Mengyuan Zhang 0001, Daniel Borbor, Lingyu Wang 0001, Nicandro Scarabeo, Michel-Ange Zamor |
Monitoring and Improving Managed Security Services inside a Security Operation Center. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 5(18), pp. e1, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Li Wang, Dinghao Wu |
Bridging the Gap Between Security Tools and SDN Controllers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 5(17), pp. e1, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Vinay Sachidananda, Suhas Bhairav, Yuval Elovici |
Spill the Beans: Extrospection of Internet of Things by Exploiting Denial of Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 6(20), pp. e1, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Anyi Liu, Selena Haidar, Yuan Cheng 0002, Yingjiu Li |
Confidential State Verification for the Delegated Cloud Jobs with Confidential Audit Log. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 6(20), pp. e3, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Qiumao Ma, Wensheng Zhang 0001 |
Octopus ORAM: An Oblivious RAM with Communication and Server Storage Efficiency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 6(20), pp. e5, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Debasis Gountia |
Towards Scalability Trade-off and Security Issues in State-of-the-art Blockchain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 5(18), pp. e4, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Hongfa Xue, Yurong Chen 0005, Guru Venkataramani, Tian Lan |
AMASS: Automated Software Mass Customization via Feature Identification and Tailoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 6(20), pp. e4, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Saeed Ibrahim Alqahtani, Shujun Li, Haiyue Yuan, Patrice Rusconi |
Human-Generated and Machine-Generated Ratings of Password Strength: What Do Users Trust More? ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 6(21), pp. e1, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Andrew Meyer, Sankardas Roy |
Do Metadata-based Deleted-File-Recovery (DFR) Tools Meet NIST Guidelines? ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 6(21), pp. e4, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Weiqi Cui, Jiangmin Yu, Yanmin Gong 0001, Eric Chan-Tin |
Efficient, Effective, and Realistic Website Fingerprinting Mitigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 6(20), pp. e2, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Muhammad Jafer, M. Arif Khan, Sabih ur Rehman, Tanveer A. Zia |
Secure Communication in VANET Broadcasting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 5(17), pp. e2, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Rocio Lopez Perez, Florian Adamsky, Ridha Soua, Thomas Engel 0001 |
Forget the Myth of the Air Gap: Machine Learning for Reliable Intrusion Detection in SCADA Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 6(19), pp. e3, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Yang Song, Chen Wu, Sencun Zhu, Haining Wang |
A Machine Learning Based Approach for Mobile App Rating Manipulation Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 5(18), pp. e3, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Vasileios Anastopoulos, Sokratis K. Katsikas |
A Methodology for the Dynamic Design of Adaptive Log Management Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 6(19), pp. e2, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Wei Zhang 0122, Jingwen Zhao, Fengqiong Wei, Yunfang Chen |
Differentially Private High-Dimensional Data Publication via Markov Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 6(19), pp. e4, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Zhengping Luo 0001, Zhe Qu, Tung Thanh Nguyen, Hui Zeng, Zhuo Lu |
Security of HPC Systems: From a Log-analyzing Perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 6(21), pp. e5, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
|
|