The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Safety with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1955-1977 (15) 1978-1981 (17) 1982-1983 (15) 1984-1985 (17) 1986 (16) 1987 (17) 1988 (27) 1989 (34) 1990 (43) 1991 (38) 1992 (41) 1993 (108) 1994 (86) 1995 (147) 1996 (184) 1997 (164) 1998 (242) 1999 (271) 2000 (320) 2001 (351) 2002 (406) 2003 (477) 2004 (664) 2005 (758) 2006 (899) 2007 (1113) 2008 (1175) 2009 (1057) 2010 (752) 2011 (722) 2012 (1030) 2013 (1105) 2014 (1342) 2015 (1498) 2016 (1222) 2017 (1549) 2018 (1745) 2019 (2210) 2020 (1847) 2021 (2260) 2022 (2124) 2023 (2529) 2024 (471)
Publication types (Num. hits)
article(8800) book(39) data(8) incollection(191) inproceedings(21439) phdthesis(417) proceedings(214)
Venues (Conferences, Journals, ...)
CoRR(1787) SAFECOMP(928) SSS(827) SSRR(609) HPCC/CSS/ICESS(513) ICVES(513) Reliab. Eng. Syst. Saf.(477) ICSRS(471) SAFECOMP Workshops(411) CAA SAFEPROCESS(353) IEEE Access(310) Sensors(274) SAFEPROCESS(254) ITSC(246) HCI (17)(244) CSS(221) More (+10 of total 4154)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 8688 occurrences of 3331 keywords

Results
Found 31108 publication records. Showing 31108 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
19Xianmang He, Yuan Hong, Yindong Chen Exploring the Privacy Bound for Differential Privacy: From Theory to Practice. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Chonghua Wang, Libo Yin, Jun Li, Xuehong Chen, Rongchao Yin, Xiaochun Yun, Yang Jiao, Zhiyu Hao HProve: A Hypervisor Level Provenance System to Reconstruct Attack Story Caused by Kernel Malware. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Yi Li 0023, Kaiqi Xiong, Xiangyang Li Applying Machine Learning Techniques to Understand User Behaviors When Phishing Attacks Occur. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Md Ali Reza Al Amin, Sachin Shetty, Laurent Njilla, Deepak K. Tosh, Charles Kamouha Attacker Capability based Dynamic Deception Model for Large-Scale Networks. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19V. Kamalakannan, S. Tamilselvan FPGA Implementation of Elliptic Curve Cryptoprocessor for Perceptual Layer of the Internet of Things. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Wenyu Qu, Wei Huo, Lingyu Wang 0001 Opportunistic Diversity-Based Detection of Injection Attacks in Web Applications. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Chu Huang, Sencun Zhu, Yi Yang 0002 An Evaluation Framework for Moving Target Defense Based on Analytic Hierarchy Process. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Ebrima N. Ceesay, K. Myers, Paul A. Watters Human-centered strategies for cyber-physical systems security. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Mohammad Karami, An Wang 0002, Songqing Chen Attribution of Economic Denial of Sustainability Attacks in Public Clouds. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Lei Xu 0012, Lin Chen 0009, Zhimin Gao, Shouhuai Xu, Weidong Shi Efficient Public Blockchain Client for Lightweight Users. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Aziz Mohaisen, Omar Alrawi, Jeman Park 0001, Joongheon Kim, DaeHun Nyang, Manar Mohaisen Network-based Analysis and Classification of Malware using Behavioral Artifacts Ordering. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Xiaoyan Sun 0003, Jun Dai, Anoop Singhal, Peng Liu 0005 Probabilistic Inference of the Stealthy Bridges between Enterprise Networks in Cloud. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Maryem Ait El Hadj, Ahmed Khoumsi, Yahya Benkaouz, Mohammed Erradi Formal Approach to Detect and Resolve Anomalies while Clustering ABAC Policies. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Kaiqi Xiong The performance analysis of public key cryptography-based authentication. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Neila Rjaibi, Latifa Ben Arfa Rabai How Stakeholders Perceived Security Risks? A New Predictive Functional Level Model and its Application to E-Learning. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Tiago Antônio Rizzetti, Bolívar Menezes da Silva, Alexandre Silva Rodrigues, Rafael Gressler Milbradt, Luciane Neves Canha A secure and lightweight multicast communication system for Smart Grids. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Zheng Wang 0034, Shui Yu, Scott Rose An On-Demand Defense Scheme Against DNS Cache Poisoning Attacks. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Leandros A. Maglaras, Mohamed Amine Ferrag, Abdelouahid Derhab, Mithun Mukherjee 0001, Helge Janicke, Stylianos Rallis Threats, Countermeasures and Attribution of Cyber Attacks on Critical Infrastructures. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Le Guan, Sadegh Farhang, Yu Pu, Pinyao Guo, Jens Grossklags, Peng Liu 0005 VaultIME: Regaining User Control for Password Managers through Auto-correction. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Fanhao Meng, Rongheng Lin, Zhuoran Wang, Hua Zou, Shiqi Zhou A Multi-connection Encryption Algorithm Applied in Secure Channel Service System. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Tim Niklas Witte Mouse Underlaying: Global Key and Mouse Listener Based on an Almost Invisible Window with Local Listeners and Sophisticated Focus. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Leandros A. Maglaras, George Drivas, Kleanthis Noou, Stylianos Rallis NIS directive: The case of Greece. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Sencun Zhu, Kevin I. Jones, Leandros A. Maglaras Defence Mechanisms for Public Systems. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Tommy Chin, Kaiqi Xiong, Mohamed Rahouti Kernel-Space Intrusion Detection Using Software-Defined Networking. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Nicolae Paladi, Christian Gehrmann Bootstrapping trust in software defined networks. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Sencun Zhu, Kevin I. Jones, Leandros A. Maglaras Vulnerability Analysis, Intrusion Detection and Privacy Preservation of Modern Communication Systems. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Subramaniyam Kannan, Paul Wood, Somali Chaterji, Saurabh Bagchi, Larry Deatrick, Patricia Beane MAAT: Multi-Stage Attack Attribution in Enterprise Systems using Software Defined Networks. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Leixiao Cheng, Quanshui Wu, Yunlei Zhao Compact lossy and all-but-one trapdoor functions from lattice. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Quamar Niyaz, Weiqing Sun, Ahmad Y. Javaid A Deep Learning Based DDoS Detection System in Software-Defined Networking (SDN). Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Yongfeng Li, Jinbin Ouyang, Bing Mao, Kai Ma, Shanqing Guo Data Flow Analysis on Android Platform with Fragment Lifecycle Modeling and Callbacks. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Cristian Liviu Leca Overview of Romania 802.11Wireless Security & Statistics. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Qi Dong, Zekun Yang, Yu Chen 0002, Xiaohua Li, Kai Zeng 0001 Exploration of Singular Spectrum Analysis for Online Anomaly Detection in CRNs. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Nicolas Van Balen, Christopher T. Ball, Haining Wang Analysis of Targeted Mouse Movements for Gender Classification. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Zheng Tan, Cheng Wang 0001, Xiaoling Fu, Jipeng Cui, Changjun Jiang, Weili Han Re-identification of Vehicular Location-Based Metadata. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Hang Zhang 0002, Parisa Memarmoshrefi, Fatemeh Ashrafi, Dieter Hogrefe Investigating the Learning Phase of an Autonomous Authentication in Mobile Ad-hoc Networks. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Ahmad Y. Javaid, Quamar Niyaz, Weiqing Sun, Mansoor Alam A Deep Learning Approach for Network Intrusion Detection System. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Helge Janicke, Kevin I. Jones, Leandros A. Maglaras Security, Privacy and Trust in Cyber Physical Systems. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Jianing Zhao, Peter Kemper Protecting Encryption Keys in Mobile Systems Against Memory Errors. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Ken Keefe, William H. Sanders Reliability Analysis with Dynamic Reliability Block Diagrams in the Möbius Modeling Tool. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Umut Mert Dur, Robert Hammond, Thayer Morrill The Secure Boston Mechanism. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Wataru Noguchi, Hiroyuki Iizuka, Masahito Yamamoto Proposing Multimodal Integration Model Using LSTM and Autoencoder. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Neil C. Rowe Identifying forensically uninteresting files in a large corpus. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Gian-Luca Dei Rossi, Mauro Iacono, Andrea Marin Evaluating the impact of eDoS attacks to cloud facilities. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Najlaa Almajed, Leandros A. Maglaras, François Siewe, Helge Janicke, Pooneh Bagheri Zadeh Prevention of crime in B2C E-Commerce: How E-Retailers/Banks protect themselves from Criminal Sctivities. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Apala Ray, Johan Åkerberg, Mats Björkman, Mikael Gidlund Assessing Security, Capacity and Reachability of a Heterogeneous Industrial Network during Planning Phase. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Paul Curzon, Ann Blandford, Harold Thimbleby, Anna Louise Cox Safer Interactive Medical Device Design: Insights from the CHI+MED Project. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Kalikinkar Mandal, Guang Gong Filtering Nonlinear Feedback Shift Registers using Welch-Gong Transformations for Securing RFID Applications. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Alexia Chatzikonstantinou, Christoforos Ntantogian, Georgios Karopoulos, Christos Xenakis Evaluation of Cryptography Usage in Android Applications. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19William Casey, Parisa Memarmoshrefi, Ansgar Kellner, Jose Andre Morales, Bud Mishra Identity Deception and Game Deterrence via Signaling Games. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Xiqing Zhang, Yuan Feng 0003, Feng Hong 0001, Zhongwen Guo Redundancy Elimination in DTN via ACK Mechanism. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Zhaoyuan Wang, Huanlai Xing, Tianrui Li 0001, Yan Yang 0001, Rong Qu An Improved MOEA/D for QoS Oriented Multimedia Multicasting with Network Coding. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Qingzhong Liu, Andrew H. Sung, Lei Chen 0029, Ming Yang 0019, Zhongxue Chen, Yanxin Liu, Jing Zhang 0038 A Method to Detect AAC Audio Forgery. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Minghui Zhu, Peng Liu 0005 Reviewing the book "Principles of Cyber-physical Systems" from a security perspective. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Marshall Brinn, Nicholas Bastin, Andy C. Bavier, Mark Berman 0001, Jeffrey S. Chase, Robert Ricci Trust as the Foundation of Resource Exchange in GENI. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Christian T. Zenger, Jan Zimmer, Christof Paar Security Analysis of Quantization Schemes for Channel-based Key Extraction. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Jing Zhang 0038, Meili Zhi, Yuting Su 0001, Qingzhong Liu Mobile Watermarking against Geometrical Distortions. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Kai Chen, Jun Shao Preface to special issue on miscellaneous emerging security problems. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Christopher Kugler, Tilo Müller Separated Control and Data Stacks to Mitigate Buffer Overflow Exploits. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Chung-Yen Su, Jeng-Ji Huang, Che-Yang Shih, Yu-Tang Chen Reversible and Embedded Watermarking of Medical Images for Telemedicine. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Pieter Burghouwt, Marcel E. M. Spruit, Henk J. Sips Detection of Botnet Command and Control Traffic by the Multistage Trust Evaluation of Destination Identifiers. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Fangwei Li, Xinyu Zhang, Jiang Zhu 0001, Wang Yan A improved Network Security Situation Awareness Model. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Fangwei Li, Qing Huang, Jiang Zhu 0001, Zhuxun Peng Network Security Risk Assessment Based on Item Response Theory. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Fangwei Li, Wang Yan, Jiang Zhu 0001, Zhang Xinyue A Hierarchical of Security Situation Element Acquisition Mechanism in Wireless Sensor Network. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Daouda Ahmat, Damien Magoni, Tegawendé F. Bissyandé End-to-End Key Exchange through Disjoint Paths in P2P Networks. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Xinxin Fan, Kalikinkar Mandal, Guang Gong WG-8: A Lightweight Stream Cipher for Resource-Constrained Smart Devices. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Leandros A. Maglaras, Jianmin Jiang A novel intrusion detection method based on OCSVM and K-means recursive clustering. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Fahad Alarifi, Maribel Fernández Towards Privacy-Preserving Web Metering Via User-Centric Hardware. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Yazhe Wang, Mingming Hu, Chen Li UAuth: A Strong Authentication Method from Personal Devices to Multi-accounts. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Raoul Strackx, Pieter Agten, Niels Avonds, Frank Piessens Salus: Kernel Support for Secure Process Compartments. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Ibrahim F. Elashry, Yi Mu 0001, Willy Susilo Mediated Encryption: Analysis and Design. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Jim Nixon, Barry McGuinness Framing the Human Dimension in Cybersecurity. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
19Michael Tyworth, Nicklaus A. Giacobe, Vincent F. Mancuso, Michael D. McNeese, David L. Hall A human-in-the-loop approach to understanding situation awareness in cyber defence analysis. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
19Nancy J. Cooke, Michael Champion, Prashanth Rajivan, Shree Jariwala Cyber situation awareness and teamwork. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
19Nancy J. Cooke, Michael D. McNeese Preface to special issue on the cognitive science of cyber defence analysis. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
19Michael W. Haas, Leanne M. Hirshfield, P. V. Ponangi, Phani Kidambi, D. Rao, Narasimha Edala, E. Armbrust, Mary Fendley, Sundaram Narayanan Decision-making and emotions in the contested information environment. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
19Dee H. Andrews, Jared Freeman, Terence S. Andre, John Feeney, Alan Carlin, Cali M. Fidopiastis, Patricia Fitzgerald Training organizational supervisors to detect and prevent cyber insider threats: two approaches. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
19Sara Motahari, Julia M. Mayer, Quentin Jones How did you know that about me? Protecting users against unwanted inferences. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
19Heng Xu, Chuan-Hoo Tan Introduction to special issue on information privacy and trust in social media. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
19Maryam Najafian Razavi, Denis Gillet A framework for usable end-user privacy control in social software systems. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
19Heng Xu, Tamara Dinev, Han Li 0001 Trust in social computing. The case of peer-to-peer file sharing networks. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
19Peng Liu Welcome message from the Editor-in-Chief. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
19Vinh-Thong Ta A safety risk assessment framework for children's online safety based on a novel safety weakness assessment approach. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Terje Aven A risk science perspective on the discussion concerning Safety I, Safety II and Safety III. Search on Bibsonomy Reliab. Eng. Syst. Saf. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Minghui Sun, Cody H. Fleming A new safety-guided design methodology to complement model-based safety analysis for safety assurance. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Rafian Rachmad, Armand Omar Moeis, Komarudin Komarudin The Role of Safety Leadership, Safety Objective, and Working Conditions in Safety Performance in Pharmaceutical Industries: A Conceptual Model. Search on Bibsonomy APCoRISE The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Abdulrahman Basahel Examining the Effect of Safety Attitudes, Safety Culture, and Safety Behavior on Driving Performance Using Structural Equation Modeling. Search on Bibsonomy AHFE (12) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Yuri Gil Dantas, Antoaneta Kondeva, Vivek Nigam Less Manual Work for Safety Engineers: Towards an Automated Safety Reasoning with Safety Patterns. Search on Bibsonomy ICLP Technical Communications The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Chen Chai, Xianming Zeng, Xiangbin Wu, Xuesong Wang Safety Evaluation of Responsibility-Sensitive Safety (RSS) on Autonomous Car-Following Maneuvers Based on Surrogate Safety Measurements. Search on Bibsonomy ITSC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Eduardo B. Fernández, Brahim Hamid Two safety patterns: Safety Assertion and Safety Assertion Enforcer. Search on Bibsonomy EuroPLoP The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Frédéric Vanderhaegen Erik Hollnagel: Safety-I and Safety-II, the past and future of safety management. Search on Bibsonomy Cogn. Technol. Work. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Mária Franeková Mathematical Apparatus for Safety Evaluation of Cryptography and Safety Codes Used in Safety - Related Communication System. Search on Bibsonomy TST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
19Gang Yu, Zhongwei Xu, Junwei Du An Approach for Automated Safety Testing of Safety-Critical Software System Based on Safety Requirements. Search on Bibsonomy IFITA (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Donald Firesmith Engineering Safety Requirements, Safety Constraints, and Safety-Critical Requirements. Search on Bibsonomy J. Object Technol. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Iwo Kurzidem, Simon Burton 0001, Philipp Schleiss AI for Safety: How to use Explainable Machine Learning Approaches for Safety Analyses. Search on Bibsonomy AISafety/SafeRL@IJCAI The full citation details ... 2023 DBLP  BibTeX  RDF
19Peter Munk, Markus Schweizer DevOps and Safety? SafeOps! Towards Ensuring Safety in Feature-Driven Development with Frequent Releases. Search on Bibsonomy SAFECOMP Workshops The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Veit Wiese, Rashed Al Amin, Roman Obermaisser Functional Safety of a System-on-Chip Based Safety-Critical Structural Health Monitoring System. Search on Bibsonomy ICSRS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Sari Tappura, Aki Jääskeläinen, Julius Pirhonen Performance Implications of Safety Training. Search on Bibsonomy AHFE (4) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Susanna Mattila, Ismo Kinnari, Sari Tappura, Mervi Lehto Promoting Occupational Safety, Health, and Well-Being in Emergency Medical Services. Search on Bibsonomy AHFE (4) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Ana Colim, André Cardoso, Sílvia Martins, Jorge Mano, Paula Carneiro, Pedro M. Arezes Safety Culture and Risk Perception in a Furniture Manufacturing Company - A Case Study. Search on Bibsonomy AHFE (4) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Cengiz Akyildiz, Ismail Ekmekci An AHP Method Study on the Migrant and Refugee Employees Occupational Health and Safety Issues in Turkey. Search on Bibsonomy AHFE (4) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
Displaying result #801 - #900 of 31108 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license