The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ARES"( http://dblp.L3S.de/Venues/ARES )

URL (DBLP): http://dblp.uni-trier.de/db/conf/IEEEares

Publication years (Num. hits)
2006 (141) 2007 (155) 2008 (203) 2009 (159) 2010 (109) 2011 (145) 2012 (83) 2013 (110) 2014 (79) 2015 (97) 2016 (108) 2017 (101) 2018 (130) 2019 (108) 2020 (117) 2021 (161) 2022 (159) 2023 (156)
Publication types (Num. hits)
inproceedings(2302) proceedings(19)
Venues (Conferences, Journals, ...)
ARES(2321)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 888 occurrences of 577 keywords

Results
Found 2321 publication records. Showing 2321 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Daniel Zelle, Markus Springer, Maria Zhdanova, Christoph Krauß Anonymous Charging and Billing of Electric Vehicles. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Vaibhavi Kalgutkar, Natalia Stakhanova, Paul Cook, Alina Matyukhina Android authorship attribution through string analysis. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Krzysztof Cabaj, Wojciech Mazurczyk, Piotr Nowakowski, Piotr Zórawski Towards Distributed Network Covert Channels Detection Using Data Mining-based Approach. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Masoomeh Sepehri, Alberto Trombetta, Maryam Sepehri, Ernesto Damiani An Efficient Cryptography-Based Access Control Using Inner-Product Proxy Re-Encryption Scheme. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Chibuike Ugwuoke, Zekeriya Erkin, Reginald L. Lagendijk Secure Fixed-point Division for Homomorphically Encrypted Operands. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yi-Ching Liao Investigating the Use of Online Open Source Information as Evidence in European Courts. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Martin Gilje Jaatun Software Security Activities that Support Incident Management in Secure DevOps. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Pawel Rajba Challenges and mitigation approaches for getting secured applications in an enterprise company. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Daniel Geisler, Wojciech Mazurczyk, Jörg Keller 0001 Towards Utilization of Covert Channels as a Green Networking Technique. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Elena Doynikova, Andrey Fedorchenko, Igor V. Kotenko Determination of Security Threat Classes on the basis of Vulnerability Analysis for Automated Countermeasure Selection. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Majid Nateghizad, Thijs Veugen, Zekeriya Erkin, Reginald L. Lagendijk Secure Equality Testing Protocols in the Two-Party Setting. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Arnold Sykosch, Marc Ohm, Michael Meier 0001 Hunting Observable Objects for Indication of Compromise. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Olusola Akinrolabu, Ioannis Agrafiotis, Arnau Erola The challenge of detecting sophisticated attacks: Insights from SOC Analysts. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Heng Zhang 0009, Jesus Luna, Neeraj Suri, Rubén Trapero Flashlight: A Novel Monitoring Path Identification Schema for Securing Cloud Services. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Antonio Pastor 0001, Alberto Mozo, Diego R. López, Jesús Folgueira, Angeliki Kapodistria The Mouseworld, a security traffic analysis lab based on NFV/SDN. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Anatoli Kalysch, Oskar Milisterfer, Mykolai Protsenko, Tilo Müller Tackling Androids Native Library Malware with Robust, Efficient and Accurate Similarity Measures. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Brett Benyo, Shane S. Clark, Aaron Paulos, Partha P. Pal HYDRA: Hypothesis Driven Repair Automation. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Julian Rauchberger, Sebastian Schrittwieser, Tobias Dam, Robert Luh, Damjan Buhov, Gerhard Pötzelsberger, Hyoungshick Kim The Other Side of the Coin: A Framework for Detecting and Analyzing Web-based Cryptocurrency Mining Campaigns. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Marek Pawlicki, Michal Choras, Rafal Kozik Recent Granular Computing Implementations and its Feasibility in Cybersecurity Domain. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Alessandro Bacci, Alberto Bartoli, Fabio Martinelli, Eric Medvet, Francesco Mercaldo Detection of Obfuscation Techniques in Android Applications. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Arseny Kurnikov, Andrew Paverd, Mohammad Mannan, N. Asokan Keys in the Clouds: Auditable Multi-device Access to Cryptographic Credentials. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Václav Jirovský, Andrej Pastorek, Max Mühlhäuser, Andrea Tundis Cybercrime and Organized Crime. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Huy H. Nguyen, Ngoc-Dung T. Tieu, Hoang-Quoc Nguyen-Son, Vincent Nozick, Junichi Yamagishi, Isao Echizen Modular Convolutional Neural Network for Discriminating between Computer-Generated Images and Photographic Images. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mark Daniels, John R. Rose, Csilla Farkas Protecting Patients' Data: An Efficient Method for Health Data Privacy. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Håkan Jonsson 0002, Carl Magnus Olsson User privacy attitudes regarding proximity sensing. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Patrício Domingues, Miguel Frade Digitally Signed and Permission Restricted PDF Files: a Case Study on Digital Forensics. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Omid Mir, René Mayrhofer, Michael Hölzl, Thanh-Binh Nguyen Recovery of Encrypted Mobile Device Backups from Partially Trusted Cloud Servers. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1I. Adam, J. Ping Framework for Security Event Management in 5G. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Bruno Malveira Peixoto, Sandra Avila, Zanoni Dias, Anderson Rocha 0001 Breaking down violence: A deep-learning strategy to model and classify violence in videos. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Christos M. Mathas, Olga E. Segou, Georgios Xilouris, Dimitris Christinakis, Michail-Alexandros Kourtis, Costas Vassilakis, Anastasios Kourtis Evaluation of Apache Spot's machine learning capabilities in an SDN/NFV enabled environment. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jonas Walter, Bettina Abendroth, Thilo Von Pape, Christian Plappert, Daniel Zelle, Christoph Krauß, G. Gagzow, Hendrik Decke The user-centered privacy-aware control system PRICON: An interdisciplinary evaluation. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Tanveer A. Zia, Peng Liu 0005, Weili Han Application-Specific Digital Forensics Investigative Model in Internet of Things (IoT). Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone Malware and Formal Methods: Rigorous Approaches for detecting Malicious Behaviour. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Martin Gilje Jaatun, Daniela S. Cruzes, Jesus Luna DevOps for Better Software Security in the Cloud Invited Paper. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Elike Hodo, Xavier J. A. Bellekens, Ephraim Iorkyase, Andrew W. Hamilton, Christos Tachtatzis, Robert C. Atkinson Machine Learning Approach for Detection of nonTor Traffic. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Tom Arjannikov, Simon Diemert, Sudhakar Ganti, Chloe Lampman, Edward C. Wiebe Using Markov Chains to Model Sensor Network Reliability. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Olga Kieselmann, Arno Wacker, Gregor Schiele k-rAC: a Fine-Grained k-Resilient Access Control Scheme for Distributed Hash Tables. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Robert P. Lee, Konstantinos Markantonakis, Raja Naeem Akram Provisioning Software with Hardware-Software Binding. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Tomás Komárek, Petr Somol End-node Fingerprinting for Malware Detection on HTTPS Data. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Kalle Rindell, Sami Hyrynsalmi, Ville Leppänen Busting a Myth: Review of Agile Security Engineering Methods. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Nikolaos P. Karvelas, Marius Senftleben, Stefan Katzenbeisser 0001 Microblogging in a Privacy-Preserving way. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jasper Abbink, Christian Doerr Popularity-based Detection of Domain Generation Algorithms. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Felix Schuckert, Basel Katt, Hanno Langweg Source Code Patterns of SQL Injection Vulnerabilities. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Andrea Tundis, Rolf Egert, Max Mühlhäuser Attack Scenario Modeling for Smart Grids Assessment through Simulation. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Daniel Zelle, Christoph Krauß, Hubert Strauß, Karsten Schmidt 0003 On Using TLS to Secure In-Vehicle Networks. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Thomas Gougeon, Morgan Barbier, Patrick Lacharme, Gildas Avoine, Christophe Rosenberger Memory carving can finally unveil your embedded personal data. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Orhan Ermis, Serif Bahtiyar, Emin Anarim, M. Ufuk Çaglayan A Comparative Study on the Scalability of Dynamic Group Key Agreement Protocols. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Tetsuji Takada Authentication Shutter: Alternative Countermeasure against Password Reuse Attack by Availability Control. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Francesco Buccafurri, Gianluca Lax, Serena Nicolazzo, Antonino Nocera Overcoming Limits of Blockchain for IoT Applications. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Luca Allodi, Fabio Massacci Attack Potential in Impact and Complexity. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Michael Rossberg, Markus Theil Secure Enrollment of Certificates Using Short PINs. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Paul Grace, Mike Surridge Towards a Model of User-centered Privacy Preservation. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yousra Javed, Mohamed Shehab, Emmanuel Bello-Ogunu Investigating User Comprehension and Risk Perception of Apple's Touch ID Technology. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Avinash Srinivasan, Hunter Dong, Angelos Stavrou FROST: Anti-Forensics Digital-Dead-DROp Information Hiding RobuST to Detection & Data Loss with Fault tolerance. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Kevin Kirchner, Stefan Rosenthaler bin2llvm: Analysis of Binary Programs Using LLVM Intermediate Representation. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Erkuden Rios, Eider Iturbe, Maria Carmen Palacios Self-healing Multi-Cloud Application Modelling. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Enrico Frumento, Federica Freschi, Davide Andreoletti, Angelo Consoli Victim Communication Stack (VCS): A flexible model to select the Human Attack Vector. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Christian Frøystad, Karin Bernsmed, Per Håkon Meland Protecting Future Maritime Communication. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sam Procter, Eugene Y. Vasserman, John Hatcliff SAFE and Secure: Deeply Integrating Security in a New Hazard Analysis. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Abdulrahman Alruban, Nathan L. Clarke, Fudong Li 0001, Steven Furnell Insider Misuse Attribution using Biometrics. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sebastian Thomas Schork, Antonia Schwichtenberg, Spiros Alexakis, George Moldovan Application of the holistic Data Privacy and Security Framework PaaSword: A focus on the integration in industrial Pilots. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Markus Wurzenberger, Florian Skopik, Max Landauer, Philipp Greitbauer, Roman Fiedler, Wolfgang Kastner Incremental Clustering for Semi-Supervised Anomaly Detection applied on Log Data. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Iakovos Gurulian, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes Artificial Ambient Environments for Proximity Critical Applications. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Kubilay Demir 0001, Neeraj Suri Towards DDoS Attack Resilient Wide Area Monitoring Systems. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Christof Fetzer, Giovanni Mazzeo, John Oliver, Luigi Romano, Martijn Verburg Integrating Reactive Cloud Applications in SERECA. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Joseph DiVita, Roger A. Hallman An Approach to Botnet Malware Detection Using Nonparametric Bayesian Methods. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Norbert Blenn, Vincent Ghiëtte, Christian Doerr Quantifying the Spectrum of Denial-of-Service Attacks through Internet Backscatter. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Khanh-Huu-The Dam, Tayssir Touili Learning Android Malware. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Felix Mayer, Martin Steinebach Forensic Image Inspection Assisted by Deep Learning. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Harry Halpin NEXTLEAP: Decentralizing Identity with Privacy for Secure Messaging. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Marco Rasori, Pericle Perazzo, Gianluca Dini A Low-Cost UAV-Based Secure Location Verification Method. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Olivier Blazy, Emmanuel Conchon, Paul Germouty, Amandine Jambert Efficient ID-based Designated Verifier Signature. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Moataz AbdelKhalek, Ahmed F. Shosha JSDES: An Automated De-Obfuscation System for Malicious JavaScript. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Andreas Happe, Florian Wohner, Thomas Lorünser The Archistar Secret-Sharing Backup Proxy. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1 Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017 Search on Bibsonomy ARES The full citation details ... 2017 DBLP  BibTeX  RDF
1Abeer Al Jarrah, Mohamed Shehab The Demon is in the Configuration: Revisiting Hybrid Mobile Apps Configuration Model. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Xavier Bultel, Radu Ciucanu, Matthieu Giraud, Pascal Lafourcade 0001 Secure Matrix Multiplication with MapReduce. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Merylin Monaro, Riccardo Spolaor, QianQian Li, Mauro Conti, Luciano Gamberini, Giuseppe Sartori Type Me the Truth!: Detecting Deceitful Users via Keystroke Dynamics. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Lukas Jäger, Richard Petri 0001, Andreas Fuchs 0002 Rolling DICE: Lightweight Remote Attestation for COTS IoT Hardware. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Andrew Slaughter, Mark Yampolskiy, Manyalibo Matthews, Wayne E. King, Gabe Guss, Yuval Elovici How to Ensure Bad Quality in Metal Additive Manufacturing: In-Situ Infrared Thermography from the Security Perspective. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Masoomeh Sepehri, Alberto Trombetta Secure and Efficient Data Sharing with Atribute-based Proxy Re-encryption Scheme. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sebastian Neuner, Artemios G. Voyiatzis, Martin Schmiedecker, Edgar R. Weippl Timestamp hiccups: Detecting manipulated filesystem timestamps on NTFS. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Alfredo De Santis, Manuela Flores, Barbara Masucci One-Message Unilateral Entity Authentication Schemes. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Spyros Boukoros, Stefan Katzenbeisser 0001 Measuring privacy in high dimensional microdata collections. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Enrico Schiavone, Andrea Ceccarelli, Andrea Bondavalli Continuous Biometric Verification for Non-Repudiation of Remote Services. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ayman Youssef, Ahmed F. Shosha Quantitave Dynamic Taint Analysis of Privacy Leakage in Android Arabic Apps. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Václav Stupka, Martin Horák, Martin Husák Protection of personal data in security alert sharing platforms. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Muhammad Ajmal Azad, Samiran Bag, Feng Hao 0001 M2M-REP: Reputation of Machines in the Internet of Things. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Reda Yaich, Nora Cuppens, Frédéric Cuppens Enabling Trust Assessment In Clouds-of-Clouds: A Similarity-Based Approach. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Konstantinos Angelopoulos, Vasiliki Diamantopoulou, Haralambos Mouratidis, Michalis Pavlidis, Mattia Salnitri, Paolo Giorgini, José Fran. Ruiz A Holistic Approach for Privacy Protection in E-Government. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Nils Löken Searchable Encryption with Access Control. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Brian Pfretzschner, Lotfi Ben Othmane Identification of Dependency-based Attacks on Node.js. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Christopher Meffert, Devon Clark, Ibrahim M. Baggili, Frank Breitinger Forensic State Acquisition from Internet of Things (FSAIoT): A general framework and practical approach for IoT forensics through IoT device state acquisition. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Shankar Karuppayah, Leon Böck, Tim Grube, Selvakumar Manickam, Max Mühlhäuser, Mathias Fischer 0001 SensorBuster: On Identifying Sensor Nodes in P2P Botnets. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hasan Yasar Implementing Secure DevOps assessment for highly regulated environments. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Alexandros Kostopoulos, Evangelos Sfakianakis, Ioannis P. Chochliouros, John Sören Pettersson, Stephan Krenn, Welderufael Tesfay, Andrea Migliavacca, Felix Hörandner Towards the Adoption of Secure Cloud Identity Services. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Andrea Tundis, Alfredo Garro, Teresa Gallo, Domenico Saccà, Simona Citrigno, Sabrina Graziano, Max Mühlhäuser Systemic Risk Modeling and Evaluation through Simulation and Bayesian Networks. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Natalija Vlajic, Xue Ying Shi, Hamzeh Roumani, Pooria Madani Resource Hints in HTML5: A New Pandora's Box of Security Nightmares. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jordi Soria-Comas, Josep Domingo-Ferrer A Non-Parametric Model for Accurate and Provably Private Synthetic Data Sets. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Félix Iglesias, Tanja Zseby Are Network Covert Timing Channels Statistical Anomalies? Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
Displaying result #801 - #900 of 2321 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license