The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for hacking with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1963-1998 (16) 1999-2001 (15) 2002-2003 (29) 2004 (23) 2005 (28) 2006 (23) 2007 (25) 2008 (21) 2009 (24) 2010 (17) 2011-2012 (27) 2013 (38) 2014 (46) 2015 (45) 2016 (73) 2017 (63) 2018 (58) 2019 (64) 2020 (61) 2021 (56) 2022 (66) 2023 (83) 2024 (42)
Publication types (Num. hits)
article(613) book(7) data(1) incollection(5) inproceedings(311) phdthesis(6)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 184 occurrences of 135 keywords

Results
Found 951 publication records. Showing 943 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
14Dongwook Shin, Jinyoung Ahn, Choon Shim Progressive multi gray-leveling: a voice spam protection algorithm. Search on Bibsonomy IEEE Netw. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Gregory J. Conti Introduction. Search on Bibsonomy Commun. ACM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Yoonsun Lim, Myung Kim, Kwang Hee Seo, Ho-Kun Moon, Jin Gi Choe, Yu Kang An Enterprise Security Management System as a Web-Based Application Service for Small/Medium Businesses. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Carole Bassil, Ahmed Serhrouchni, Nicolas Rouhana Towards a new Security Architecture for Telephony. Search on Bibsonomy ICN/ICONS/MCL The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Jun-Cheol Jeon, Eun-Yeung Choi, Kee-Young Yoo Agent-Based Real Time Intrusion Detection System Against Malformed Packet Attacks. Search on Bibsonomy PRIMA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Yoon-Ho Choi, Jong-Ho Park, Sang-Kon Kim, Seung-Woo Seo, Yu Kang, Jin Gi Choe, Ho-Kun Moon, Myung-Soo Rhee An Efficient Forensic Evidence Collection Scheme of Host Infringement at the Occurrence Time. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Jeremy Lee, Mohammad Tehranipoor, Jim Plusquellic A Low-Cost Solution for Protecting IPs Against Scan-Based Side-Channel Attacks. Search on Bibsonomy VTS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Amanda M. Holland-Minkley Cyberattacks: a lab-based introduction to computer security. Search on Bibsonomy SIGITE Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF laboratory coursework, computer security, IT education
14Kevin Curran, Colman Morrissey, Colm Fagan, Colm Murphy, Brian O'Donnell, Gerry Fitzpatrick, Stephen Condit Monitoring hacker activity with a Honeynet. Search on Bibsonomy Int. J. Netw. Manag. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Bruce Schneier Attack trends: 2004 and 2005. Search on Bibsonomy ACM Queue The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Jengnan Tzeng, Wen-Liang Hwang, I-Liang Chern An asymmetric watermarking method for copyright protection utilizing dual bases. Search on Bibsonomy ICIP (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Benoit des Ligneris Virtualization of Linux Based Computers: The Linux-VServer Project. Search on Bibsonomy HPCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Hiroyuki Yoshino, Naohiro Hayashibara, Tomoya Enokido, Makoto Takizawa 0001 Byzantine Agreement Protocol using Hierarchical Groups. Search on Bibsonomy ICPADS (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Woochun Jun, Sung-Keun Cho A Web-Based Information Communication Ethics Education System for the Gifted Elementary School Students in Computer. Search on Bibsonomy KES (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Rodrigo Kassick, Caciano Machado, Everton Hermann, Rafael Bohrer Ávila, Philippe Olivier Alexandre Navaux, Yves Denneulin Evaluating the performance of the dNFSP file system. Search on Bibsonomy CCGRID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14ByungRae Cha, Kyung-Woo Park, JaeHyun Seo Neural Network Techniques for Host Anomaly Intrusion Detection Using Fixed Pattern Transformation. Search on Bibsonomy ICCSA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Yongping Tang, Thomas E. Daniels A Simple Framework for Distributed Forensics. Search on Bibsonomy ICDCS Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Distributed Forensics System, Attack Attribution Graph, Agent, Proxy
14Unna Huh IT Development in the 21st Century and Its Implications. Search on Bibsonomy PAKDD The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Slim Rekhis, Noureddine Boudriga A Temporal Logic-Based Model for Forensic Investigation in Networked System Security. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Mike Andrews, James A. Whittaker Computer Security. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF defense in depth, computer security, attackers, firewalls, vulnerability
14Sanguk Noh, Cheolho Lee, Keywon Ryu, Kyunghee Choi, Gihyun Jung Detecting Worm Propagation Using Traffic Concentration Analysis and Inductive Learning. Search on Bibsonomy IDEAL The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Alan R. Peslak Improving software quality: an ethics based approach. Search on Bibsonomy CPR The full citation details ... 2004 DBLP  DOI  BibTeX  RDF business ethics, code of conduct, software ethics, software quality, code of ethics
14Jörg Denzinger, Tim Williams Using Evolutionary Learning of Behavior to Find Weaknesses in Operating Systems. Search on Bibsonomy PRICAI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Sibabrata Ray, Kevin A. Kwiat, Danyang Zhang Energy-efficient placement/activation algorithms for authorization servers in sensor network. Search on Bibsonomy ISCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Kwangsun Ko, Eun-kyung Cho, Taekeun Lee, Yong-hyeog Kang, Young Ik Eom The Abnormal Traffic Control Framework Based on QoS Mechanisms. Search on Bibsonomy ISCIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Xing-Yun He, Kwok-Yan Lam, Siu Leung Chung, Chi-Hung Chi, Jia-Guang Sun 0001 Real-Time Emulation of Intrusion Victim in HoneyFarm. Search on Bibsonomy AWCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF interception proxy, reverse firewall, Honeypot, intrusion
14Do-Hoon Lee, Jung-Taek Seo, Jae-Cheol Ryou 0001 Alerts Correlation System to Enhance the Performance of the Network-Based Intrusion Detection System. Search on Bibsonomy GCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Gregory L. Orgill, Gordon W. Romney, Michael G. Bailey, Paul M. Orgill The urgency for effective user privacy-education to counter social engineering attacks on secure computer systems. Search on Bibsonomy SIGITE Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF user education, access control, social engineering, physical security
14Florent Masseglia, Doru Tanasa, Brigitte Trousse Web Usage Mining: Sequential Pattern Extraction with a Very Low Support. Search on Bibsonomy APWeb The full citation details ... 2004 DBLP  DOI  BibTeX  RDF patterns summary, clustering, neural networks, Web usage mining, sequential patterns
14Jihyun Park, Jeong-Hyun Kim, Kisong Yoon Protecting ASF Movie on VOD. Search on Bibsonomy TrustBus The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Boris Aronov, Hervé Brönnimann, Allen Y. Chang, Yi-Jen Chiang Cost-driven octree construction schemes: an experimental study. Search on Bibsonomy SCG The full citation details ... 2003 DBLP  DOI  BibTeX  RDF average performance, space decomposition, cost model, octree, ray shooting, cost prediction
14Hongxia Jin, Jeffery Lotspiech Proactive Software Tampering Detection. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
14David P. Biros, Gregory Fields, Gregg H. Gunsch The Effect of External Safeguards on Human-Information System Trust in an Information Warfare Environment. Search on Bibsonomy HICSS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
14Crispin Cowan, Seth Arnold, Steve Beattie, Chris Wright 0003, John Viega Defcon Capture the Flag: Defending Vulnerable Code from Intense Attack. Search on Bibsonomy DISCEX (1) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
14Michael Buro ORTS: A Hack-Free RTS Game Environment. Search on Bibsonomy Computers and Games The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
14Heejin Jang, Sangwook Kim Real-Time Intruder Tracing through Self-Replication. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
14Thomas Toth, Christopher Krügel Accurate Buffer Overflow Detection via Abstract Payload Execution. Search on Bibsonomy RAID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Intrusion Detecion, Buffer Overflow Exploit, Network Security
14Austin Godber, Partha Dasgupta Secure wireless gateway. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2002 DBLP  DOI  BibTeX  RDF wireless LAN, IPSec, 802.11b
14Jérémie Allard, Paul Gonin, Minoo Singh, Golden G. Richard III A User Level Framework for Ad Hoc Routing. Search on Bibsonomy LCN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
14Julio César Hernández Castro, José María Sierra, Arturo Ribagorda, Benjamín Ramos Search Engines as a Security Threat. Search on Bibsonomy Computer The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
14Premkumar T. Devanbu, Michael Gertz 0001, April Kwong, Charles U. Martel, Glen Nuckolls, Stuart G. Stubblebine Flexible authentication of XML documents. Search on Bibsonomy CCS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF XML
14Wenli Wang, Zoltán Hidvégi, Andrew D. Bailey Jr., Andrew B. Whinston E-Process Design and Assurance Using Model Checking. Search on Bibsonomy Computer The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
14Steve McConnell, Leonard L. Tripp Guest Editors' Introduction: Professional Software Engineering-Fact or Fiction? Search on Bibsonomy IEEE Softw. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
Displaying result #901 - #943 of 943 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license