|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 8688 occurrences of 3331 keywords
|
|
|
Results
Found 31108 publication records. Showing 31108 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
19 | Xianmang He, Yuan Hong, Yindong Chen |
Exploring the Privacy Bound for Differential Privacy: From Theory to Practice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 5(18), pp. e2, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Chonghua Wang, Libo Yin, Jun Li, Xuehong Chen, Rongchao Yin, Xiaochun Yun, Yang Jiao, Zhiyu Hao |
HProve: A Hypervisor Level Provenance System to Reconstruct Attack Story Caused by Kernel Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 5(18), pp. e5, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Yi Li 0023, Kaiqi Xiong, Xiangyang Li |
Applying Machine Learning Techniques to Understand User Behaviors When Phishing Attacks Occur. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 6(21), pp. e3, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Md Ali Reza Al Amin, Sachin Shetty, Laurent Njilla, Deepak K. Tosh, Charles Kamouha |
Attacker Capability based Dynamic Deception Model for Large-Scale Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 6(21), pp. e2, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | V. Kamalakannan, S. Tamilselvan |
FPGA Implementation of Elliptic Curve Cryptoprocessor for Perceptual Layer of the Internet of Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 5(15), pp. e4, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Wenyu Qu, Wei Huo, Lingyu Wang 0001 |
Opportunistic Diversity-Based Detection of Injection Attacks in Web Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 5(16), pp. e5, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Chu Huang, Sencun Zhu, Yi Yang 0002 |
An Evaluation Framework for Moving Target Defense Based on Analytic Hierarchy Process. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 4(13), pp. e4, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Ebrima N. Ceesay, K. Myers, Paul A. Watters |
Human-centered strategies for cyber-physical systems security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 4(14), pp. e5, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Mohammad Karami, An Wang 0002, Songqing Chen |
Attribution of Economic Denial of Sustainability Attacks in Public Clouds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 4(13), pp. e2, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Lei Xu 0012, Lin Chen 0009, Zhimin Gao, Shouhuai Xu, Weidong Shi |
Efficient Public Blockchain Client for Lightweight Users. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 4(13), pp. e5, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Aziz Mohaisen, Omar Alrawi, Jeman Park 0001, Joongheon Kim, DaeHun Nyang, Manar Mohaisen |
Network-based Analysis and Classification of Malware using Behavioral Artifacts Ordering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 5(16), pp. e2, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Xiaoyan Sun 0003, Jun Dai, Anoop Singhal, Peng Liu 0005 |
Probabilistic Inference of the Stealthy Bridges between Enterprise Networks in Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 4(13), pp. e3, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Maryem Ait El Hadj, Ahmed Khoumsi, Yahya Benkaouz, Mohammed Erradi |
Formal Approach to Detect and Resolve Anomalies while Clustering ABAC Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 5(16), pp. e3, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Kaiqi Xiong |
The performance analysis of public key cryptography-based authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 4(14), pp. e2, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Neila Rjaibi, Latifa Ben Arfa Rabai |
How Stakeholders Perceived Security Risks? A New Predictive Functional Level Model and its Application to E-Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 5(15), pp. e3, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Tiago Antônio Rizzetti, Bolívar Menezes da Silva, Alexandre Silva Rodrigues, Rafael Gressler Milbradt, Luciane Neves Canha |
A secure and lightweight multicast communication system for Smart Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 5(16), pp. e4, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Zheng Wang 0034, Shui Yu, Scott Rose |
An On-Demand Defense Scheme Against DNS Cache Poisoning Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 4(14), pp. e3, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Leandros A. Maglaras, Mohamed Amine Ferrag, Abdelouahid Derhab, Mithun Mukherjee 0001, Helge Janicke, Stylianos Rallis |
Threats, Countermeasures and Attribution of Cyber Attacks on Critical Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 5(16), pp. e1, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Le Guan, Sadegh Farhang, Yu Pu, Pinyao Guo, Jens Grossklags, Peng Liu 0005 |
VaultIME: Regaining User Control for Password Managers through Auto-correction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 4(14), pp. e4, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Fanhao Meng, Rongheng Lin, Zhuoran Wang, Hua Zou, Shiqi Zhou |
A Multi-connection Encryption Algorithm Applied in Secure Channel Service System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 5(15), pp. e1, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Tim Niklas Witte |
Mouse Underlaying: Global Key and Mouse Listener Based on an Almost Invisible Window with Local Listeners and Sophisticated Focus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 5(15), pp. e5, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Leandros A. Maglaras, George Drivas, Kleanthis Noou, Stylianos Rallis |
NIS directive: The case of Greece. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 4(14), pp. e1, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Sencun Zhu, Kevin I. Jones, Leandros A. Maglaras |
Defence Mechanisms for Public Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 4(13), pp. e1, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Tommy Chin, Kaiqi Xiong, Mohamed Rahouti |
Kernel-Space Intrusion Detection Using Software-Defined Networking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 5(15), pp. e2, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Nicolae Paladi, Christian Gehrmann |
Bootstrapping trust in software defined networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 4(11), pp. e5, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Sencun Zhu, Kevin I. Jones, Leandros A. Maglaras |
Vulnerability Analysis, Intrusion Detection and Privacy Preservation of Modern Communication Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 4(12), pp. e1, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Subramaniyam Kannan, Paul Wood, Somali Chaterji, Saurabh Bagchi, Larry Deatrick, Patricia Beane |
MAAT: Multi-Stage Attack Attribution in Enterprise Systems using Software Defined Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 4(11), pp. e4, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Leixiao Cheng, Quanshui Wu, Yunlei Zhao |
Compact lossy and all-but-one trapdoor functions from lattice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 4(12), pp. e4, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Quamar Niyaz, Weiqing Sun, Ahmad Y. Javaid |
A Deep Learning Based DDoS Detection System in Software-Defined Networking (SDN). ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 4(12), pp. e2, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Yongfeng Li, Jinbin Ouyang, Bing Mao, Kai Ma, Shanqing Guo |
Data Flow Analysis on Android Platform with Fragment Lifecycle Modeling and Callbacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 4(11), pp. e2, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Cristian Liviu Leca |
Overview of Romania 802.11Wireless Security & Statistics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 4(12), pp. e5, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Qi Dong, Zekun Yang, Yu Chen 0002, Xiaohua Li, Kai Zeng 0001 |
Exploration of Singular Spectrum Analysis for Online Anomaly Detection in CRNs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 4(12), pp. e3, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Nicolas Van Balen, Christopher T. Ball, Haining Wang |
Analysis of Targeted Mouse Movements for Gender Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 4(11), pp. e3, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Zheng Tan, Cheng Wang 0001, Xiaoling Fu, Jipeng Cui, Changjun Jiang, Weili Han |
Re-identification of Vehicular Location-Based Metadata. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 4(11), pp. e1, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Hang Zhang 0002, Parisa Memarmoshrefi, Fatemeh Ashrafi, Dieter Hogrefe |
Investigating the Learning Phase of an Autonomous Authentication in Mobile Ad-hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 3(9), pp. e5, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Ahmad Y. Javaid, Quamar Niyaz, Weiqing Sun, Mansoor Alam |
A Deep Learning Approach for Network Intrusion Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 3(9), pp. e2, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Helge Janicke, Kevin I. Jones, Leandros A. Maglaras |
Security, Privacy and Trust in Cyber Physical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 3(7), pp. e1, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Jianing Zhao, Peter Kemper |
Protecting Encryption Keys in Mobile Systems Against Memory Errors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 3(10), pp. e4, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Ken Keefe, William H. Sanders |
Reliability Analysis with Dynamic Reliability Block Diagrams in the Möbius Modeling Tool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 3(10), pp. e3, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Umut Mert Dur, Robert Hammond, Thayer Morrill |
The Secure Boston Mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 3(10), pp. e5, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Wataru Noguchi, Hiroyuki Iizuka, Masahito Yamamoto |
Proposing Multimodal Integration Model Using LSTM and Autoencoder. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 3(10), pp. e1, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Neil C. Rowe |
Identifying forensically uninteresting files in a large corpus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 3(7), pp. e2, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Gian-Luca Dei Rossi, Mauro Iacono, Andrea Marin |
Evaluating the impact of eDoS attacks to cloud facilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 3(10), pp. e2, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Najlaa Almajed, Leandros A. Maglaras, François Siewe, Helge Janicke, Pooneh Bagheri Zadeh |
Prevention of crime in B2C E-Commerce: How E-Retailers/Banks protect themselves from Criminal Sctivities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 3(7), pp. e4, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Apala Ray, Johan Åkerberg, Mats Björkman, Mikael Gidlund |
Assessing Security, Capacity and Reachability of a Heterogeneous Industrial Network during Planning Phase. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 3(7), pp. e5, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Paul Curzon, Ann Blandford, Harold Thimbleby, Anna Louise Cox |
Safer Interactive Medical Device Design: Insights from the CHI+MED Project. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 3(9), pp. e1, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Kalikinkar Mandal, Guang Gong |
Filtering Nonlinear Feedback Shift Registers using Welch-Gong Transformations for Securing RFID Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 3(7), pp. e3, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Alexia Chatzikonstantinou, Christoforos Ntantogian, Georgios Karopoulos, Christos Xenakis |
Evaluation of Cryptography Usage in Android Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 3(9), pp. e4, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
19 | William Casey, Parisa Memarmoshrefi, Ansgar Kellner, Jose Andre Morales, Bud Mishra |
Identity Deception and Game Deterrence via Signaling Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 3(9), pp. e3, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Xiqing Zhang, Yuan Feng 0003, Feng Hong 0001, Zhongwen Guo |
Redundancy Elimination in DTN via ACK Mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 2(6), pp. e3, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Zhaoyuan Wang, Huanlai Xing, Tianrui Li 0001, Yan Yang 0001, Rong Qu |
An Improved MOEA/D for QoS Oriented Multimedia Multicasting with Network Coding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 2(5), pp. e3, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Qingzhong Liu, Andrew H. Sung, Lei Chen 0029, Ming Yang 0019, Zhongxue Chen, Yanxin Liu, Jing Zhang 0038 |
A Method to Detect AAC Audio Forgery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 2(6), pp. e1, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Minghui Zhu, Peng Liu 0005 |
Reviewing the book "Principles of Cyber-physical Systems" from a security perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 2(4), pp. e6, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Marshall Brinn, Nicholas Bastin, Andy C. Bavier, Mark Berman 0001, Jeffrey S. Chase, Robert Ricci |
Trust as the Foundation of Resource Exchange in GENI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 2(5), pp. e1, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Christian T. Zenger, Jan Zimmer, Christof Paar |
Security Analysis of Quantization Schemes for Channel-based Key Extraction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 2(6), pp. e5, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Jing Zhang 0038, Meili Zhi, Yuting Su 0001, Qingzhong Liu |
Mobile Watermarking against Geometrical Distortions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 2(5), pp. e2, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Kai Chen, Jun Shao |
Preface to special issue on miscellaneous emerging security problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 2(4), pp. e1, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Christopher Kugler, Tilo Müller |
Separated Control and Data Stacks to Mitigate Buffer Overflow Exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 2(4), pp. e3, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Chung-Yen Su, Jeng-Ji Huang, Che-Yang Shih, Yu-Tang Chen |
Reversible and Embedded Watermarking of Medical Images for Telemedicine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 2(6), pp. e4, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Pieter Burghouwt, Marcel E. M. Spruit, Henk J. Sips |
Detection of Botnet Command and Control Traffic by the Multistage Trust Evaluation of Destination Identifiers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 2(4), pp. e2, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Fangwei Li, Xinyu Zhang, Jiang Zhu 0001, Wang Yan |
A improved Network Security Situation Awareness Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 2(5), pp. e4, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Fangwei Li, Qing Huang, Jiang Zhu 0001, Zhuxun Peng |
Network Security Risk Assessment Based on Item Response Theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 2(5), pp. e5, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Fangwei Li, Wang Yan, Jiang Zhu 0001, Zhang Xinyue |
A Hierarchical of Security Situation Element Acquisition Mechanism in Wireless Sensor Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 2(6), pp. e2, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Daouda Ahmat, Damien Magoni, Tegawendé F. Bissyandé |
End-to-End Key Exchange through Disjoint Paths in P2P Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 2(3), pp. e3, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Xinxin Fan, Kalikinkar Mandal, Guang Gong |
WG-8: A Lightweight Stream Cipher for Resource-Constrained Smart Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 2(3), pp. e4, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Leandros A. Maglaras, Jianmin Jiang |
A novel intrusion detection method based on OCSVM and K-means recursive clustering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 2(3), pp. e5, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Fahad Alarifi, Maribel Fernández |
Towards Privacy-Preserving Web Metering Via User-Centric Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 2(4), pp. e4, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Yazhe Wang, Mingming Hu, Chen Li |
UAuth: A Strong Authentication Method from Personal Devices to Multi-accounts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 2(4), pp. e5, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Raoul Strackx, Pieter Agten, Niels Avonds, Frank Piessens |
Salus: Kernel Support for Secure Process Compartments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 2(3), pp. e1, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Ibrahim F. Elashry, Yi Mu 0001, Willy Susilo |
Mediated Encryption: Analysis and Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 2(3), pp. e2, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Jim Nixon, Barry McGuinness |
Framing the Human Dimension in Cybersecurity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 1(2), pp. e2, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
19 | Michael Tyworth, Nicklaus A. Giacobe, Vincent F. Mancuso, Michael D. McNeese, David L. Hall |
A human-in-the-loop approach to understanding situation awareness in cyber defence analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 1(2), pp. e6, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
19 | Nancy J. Cooke, Michael Champion, Prashanth Rajivan, Shree Jariwala |
Cyber situation awareness and teamwork. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 1(2), pp. e5, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
19 | Nancy J. Cooke, Michael D. McNeese |
Preface to special issue on the cognitive science of cyber defence analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 1(2), pp. e1, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
19 | Michael W. Haas, Leanne M. Hirshfield, P. V. Ponangi, Phani Kidambi, D. Rao, Narasimha Edala, E. Armbrust, Mary Fendley, Sundaram Narayanan |
Decision-making and emotions in the contested information environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 1(2), pp. e3, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
19 | Dee H. Andrews, Jared Freeman, Terence S. Andre, John Feeney, Alan Carlin, Cali M. Fidopiastis, Patricia Fitzgerald |
Training organizational supervisors to detect and prevent cyber insider threats: two approaches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 1(2), pp. e4, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
19 | Sara Motahari, Julia M. Mayer, Quentin Jones |
How did you know that about me? Protecting users against unwanted inferences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 1(1), pp. e3, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
19 | Heng Xu, Chuan-Hoo Tan |
Introduction to special issue on information privacy and trust in social media. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 1(1), pp. e2, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
19 | Maryam Najafian Razavi, Denis Gillet |
A framework for usable end-user privacy control in social software systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 1(1), pp. e4, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
19 | Heng Xu, Tamara Dinev, Han Li 0001 |
Trust in social computing. The case of peer-to-peer file sharing networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 1(1), pp. e5, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
19 | Peng Liu |
Welcome message from the Editor-in-Chief. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 1(1), pp. e1, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
19 | Vinh-Thong Ta |
A safety risk assessment framework for children's online safety based on a novel safety weakness assessment approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.14713, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Terje Aven |
A risk science perspective on the discussion concerning Safety I, Safety II and Safety III. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Reliab. Eng. Syst. Saf. ![In: Reliab. Eng. Syst. Saf. 217, pp. 108077, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Minghui Sun, Cody H. Fleming |
A new safety-guided design methodology to complement model-based safety analysis for safety assurance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2205.00152, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Rafian Rachmad, Armand Omar Moeis, Komarudin Komarudin |
The Role of Safety Leadership, Safety Objective, and Working Conditions in Safety Performance in Pharmaceutical Industries: A Conceptual Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APCoRISE ![In: 4th Asia Pacific Conference on Research in Industrial and Systems Engineering 2021, APCoRISE 2021, Depok, Indonesia, 25 May 2021, pp. 611-616, 2021, ACM, 978-1-4503-9038-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Abdulrahman Basahel |
Examining the Effect of Safety Attitudes, Safety Culture, and Safety Behavior on Driving Performance Using Structural Equation Modeling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AHFE (12) ![In: Advances in Human Aspects of Transportation - Proceedings of the AHFE 2021 Virtual Conference on Human Aspects of Transportation, July 25-29, 2021, USA, pp. 94-100, 2021, Springer, 978-3-030-80011-6. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Yuri Gil Dantas, Antoaneta Kondeva, Vivek Nigam |
Less Manual Work for Safety Engineers: Towards an Automated Safety Reasoning with Safety Patterns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICLP Technical Communications ![In: Proceedings 36th International Conference on Logic Programming (Technical Communications), ICLP Technical Communications 2020, (Technical Communications) UNICAL, Rende (CS), Italy, 18-24th September 2020., pp. 244-257, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Chen Chai, Xianming Zeng, Xiangbin Wu, Xuesong Wang |
Safety Evaluation of Responsibility-Sensitive Safety (RSS) on Autonomous Car-Following Maneuvers Based on Surrogate Safety Measurements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITSC ![In: 2019 IEEE Intelligent Transportation Systems Conference, ITSC 2019, Auckland, New Zealand, October 27-30, 2019, pp. 175-180, 2019, IEEE, 978-1-5386-7024-8. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Eduardo B. Fernández, Brahim Hamid |
Two safety patterns: Safety Assertion and Safety Assertion Enforcer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPLoP ![In: Proceedings of the 22nd European Conference on Pattern Languages of Programs, EuroPLoP 2017, Irsee, Germany, July 12-16, 2017, pp. 30:1-30:9, 2017, ACM, 978-1-4503-4848-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Frédéric Vanderhaegen |
Erik Hollnagel: Safety-I and Safety-II, the past and future of safety management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cogn. Technol. Work. ![In: Cogn. Technol. Work. 17(3), pp. 461-464, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Mária Franeková |
Mathematical Apparatus for Safety Evaluation of Cryptography and Safety Codes Used in Safety - Related Communication System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TST ![In: Modern Transport Telematics - 11th International Conference on Transport Systems Telematics, TST 2011, Katowice-Ustroń, Poland, October 19-22, 2011. Selected Papers, pp. 126-135, 2011, Springer, 978-3-642-24659-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
19 | Gang Yu, Zhongwei Xu, Junwei Du |
An Approach for Automated Safety Testing of Safety-Critical Software System Based on Safety Requirements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFITA (3) ![In: International Forum on Information Technology and Applications, IFITA 2009, Chengdu, China, 15-17 May 2009, pp. 166-169, 2009, IEEE Computer Society, 978-0-7695-3600-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Donald Firesmith |
Engineering Safety Requirements, Safety Constraints, and Safety-Critical Requirements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Object Technol. ![In: J. Object Technol. 3(3), pp. 27-42, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Iwo Kurzidem, Simon Burton 0001, Philipp Schleiss |
AI for Safety: How to use Explainable Machine Learning Approaches for Safety Analyses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISafety/SafeRL@IJCAI ![In: Proceedings of the IJCAI-23 Joint Workshop on Artificial Intelligence Safety and Safe Reinforcement Learning (AISafety-SafeRL 2023) co-located with the 32nd International Joint Conference on Artificial Intelligence(IJCAI2023), Macau, China, August 21-22, 2023., 2023, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
19 | Peter Munk, Markus Schweizer |
DevOps and Safety? SafeOps! Towards Ensuring Safety in Feature-Driven Development with Frequent Releases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAFECOMP Workshops ![In: Computer Safety, Reliability, and Security. SAFECOMP 2022 Workshops - DECSoS, DepDevOps, SASSUR, SENSEI, USDAI, and WAISE, Munich, Germany, September 6-9, 2022, Proceedings, pp. 145-157, 2022, Springer, 978-3-031-14861-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Veit Wiese, Rashed Al Amin, Roman Obermaisser |
Functional Safety of a System-on-Chip Based Safety-Critical Structural Health Monitoring System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSRS ![In: 6th International Conference on System Reliability and Safety, ICSRS 2022, Venice, Italy, November 23-25, 2022, pp. 539-547, 2022, IEEE, 978-1-6654-7092-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Sari Tappura, Aki Jääskeläinen, Julius Pirhonen |
Performance Implications of Safety Training. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AHFE (4) ![In: Advances in Safety Management and Human Performance - Proceedings of the AHFE 2021 Virtual Conferences on Safety Management and Human Factors, and Human Error, Reliability, Resilience, and Performance, July 25-29, 2021, USA, pp. 295-301, 2021, Springer, 978-3-030-80287-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Susanna Mattila, Ismo Kinnari, Sari Tappura, Mervi Lehto |
Promoting Occupational Safety, Health, and Well-Being in Emergency Medical Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AHFE (4) ![In: Advances in Safety Management and Human Performance - Proceedings of the AHFE 2021 Virtual Conferences on Safety Management and Human Factors, and Human Error, Reliability, Resilience, and Performance, July 25-29, 2021, USA, pp. 324-330, 2021, Springer, 978-3-030-80287-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Ana Colim, André Cardoso, Sílvia Martins, Jorge Mano, Paula Carneiro, Pedro M. Arezes |
Safety Culture and Risk Perception in a Furniture Manufacturing Company - A Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AHFE (4) ![In: Advances in Safety Management and Human Performance - Proceedings of the AHFE 2021 Virtual Conferences on Safety Management and Human Factors, and Human Error, Reliability, Resilience, and Performance, July 25-29, 2021, USA, pp. 311-318, 2021, Springer, 978-3-030-80287-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Cengiz Akyildiz, Ismail Ekmekci |
An AHP Method Study on the Migrant and Refugee Employees Occupational Health and Safety Issues in Turkey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AHFE (4) ![In: Advances in Safety Management and Human Performance - Proceedings of the AHFE 2021 Virtual Conferences on Safety Management and Human Factors, and Human Error, Reliability, Resilience, and Performance, July 25-29, 2021, USA, pp. 331-340, 2021, Springer, 978-3-030-80287-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
|
|