The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ARES"( http://dblp.L3S.de/Venues/ARES )

URL (DBLP): http://dblp.uni-trier.de/db/conf/IEEEares

Publication years (Num. hits)
2006 (141) 2007 (155) 2008 (203) 2009 (159) 2010 (109) 2011 (145) 2012 (83) 2013 (110) 2014 (79) 2015 (97) 2016 (108) 2017 (101) 2018 (129)
Publication types (Num. hits)
inproceedings(1605) proceedings(14)
Venues (Conferences, Journals, ...)
ARES(1619)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 888 occurrences of 577 keywords

Results
Found 1619 publication records. Showing 1619 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Mohamed A. Abo-Soliman, Marianne A. Azer Enterprise WLAN Security Flaws: Current Attacks and relative Mitigations. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mathias Gschwandtner, Lukas Demetz, Matthias Gander, Ronald Maier Integrating Threat Intelligence to Enhance an Organization's Information Security Management. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sarita Paudel, Paul Smith, Tanja Zseby Stealthy Attacks on Smart Grid PMU State Estimation. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Martin Pirker, Patrick Kochberger, Stefan Schwandter Behavioural Comparison of Systems for Anomaly Detection. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Florian Wendland, Christian Banse Enhancing NFV Orchestration with Security Policies. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Martin Serror, Martin Henze, Sacha Hack, Marko Schuba, Klaus Wehrle Towards In-Network Security for Smart Homes. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Thomas Grafenauer, Sandra König, Stefan Rass, Stefan Schauer A Simulation Tool for Cascading Effects in Interdependent Critical Infrastructures. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Elena Doynikova, Andrey Fedorchenko, Igor V. Kotenko Determination of Security Threat Classes on the basis of Vulnerability Analysis for Automated Countermeasure Selection. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Steffen Wendzel Get Me Cited, Scotty!: Analysis of Citations in Covert Channel/Steganography Research. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Anika Behrens What are Security Patterns?: A Formal Model for Security and Design of Software. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Nafiseh Kahani, Mehran S. Fallah A Reactive Defense Against Bandwidth Attacks Using Learning Automata. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum, Mohsen Toorani Definitions for Plaintext-Existence Hiding in Cloud Storage. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Asanka Sayakkara, Nhien-An Le-Khac, Mark Scanlon Accuracy Enhancement of Electromagnetic Side-Channel Attacks on Computer Monitors. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Adham Albakri, Eerke A. Boiten, Rogério de Lemos Risks of Sharing Cyber Incident Information. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Vaibhavi Kalgutkar, Natalia Stakhanova, Paul Cook, Alina Matyukhina Android authorship attribution through string analysis. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Otto Hellwig, Gerald Quirchmayr, Walter Hötzendorfer, Christof Tschohl, Edith Huber, Franz Vock, Florian Nentwich, Bettina Pospisil, Matthias Gusenbauer, Gregor Langner A GDPR compliance module for supporting the exchange of information between CERTs. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Arseny Kurnikov, Andrew Paverd, Mohammad Mannan, N. Asokan Keys in the Clouds: Auditable Multi-device Access to Cryptographic Credentials. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1François Bouchaud, Gilles Grimaud, Thomas Vantroys IoT Forensic: identification and classification of evidence in criminal investigations. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Johannes Blömer, Nils Löken Cloud Architectures for Searchable Encryption. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Marius Musch, Martin Härterich, Martin Johns Towards an Automatic Generation of Low-Interaction Web Application Honeypots. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Diana Silvestru, Karin Rainer, Mario Springnagel The AWID prevention approach: The generation of a holistic good practice model for prevention of radicalization in youth work. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Madiha H. Syed, Eduardo B. Fernández A reference architecture for the container ecosystem. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Antonio Pastor, Alberto Mozo, Diego R. López, Jesús Folgueira, Angeliki Kapodistria The Mouseworld, a security traffic analysis lab based on NFV/SDN. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Matteo E. Bonfanti Enhancing Cybersecurity by Safeguarding Information Privacy: The European Union and the Implementation of the "Data Protection by Design" Approach. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Alan J. Michaels Improved RNS-based PRNGs. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1ElMouatez Billah Karbab, Mourad Debbabi ToGather: Automatic Investigation of Android Malware Cyber-Infrastructures. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Tanja Hanauer, Wolfgang Hommel, Stefan Metzger, Daniela Pöhn A Process Framework for Stakeholder-specific Visualization of Security Metrics. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ons Chikhaoui, Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi Towards a Privacy Preserving and Flexible Scheme for Assessing the Credibility and the Accuracy of Safety Messages Exchanged in VANETs. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Krzysztof Cabaj, Wojciech Mazurczyk, Piotr Nowakowski, Piotr Zórawski Towards Distributed Network Covert Channels Detection Using Data Mining-based Approach. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jorrit Kronjee, Arjen Hommersom, Harald P. E. Vranken Discovering software vulnerabilities using data-flow analysis and machine learning. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Routa Moussaileb, Benjamin Bouget, Aurélien Palisse, Hélène Le Bouder, Nora Cuppens, Jean-Louis Lanet Ransomware's Early Mitigation Mechanisms. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Nina Gerber, Verena Zimmermann, Birgit Henhapl, Sinem Emeröz, Melanie Volkamer Finally Johnny Can Encrypt: But Does This Make Him Feel More Secure? Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jamal Toutouh, Antonio Muñoz, Sergio Nesmachnow Evolution Oriented Monitoring oriented to Security Properties for Cloud Applications. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Olivier Blazy, Céline Chevalier Non-Interactive Key Exchange from Identity-Based Encryption. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Gregory Blanc, Nizar Kheir, Dhouha Ayed, Vincent Lefebvre, Edgardo Montes de Oca, Pascal Bisson Towards a 5G Security Architecture: Articulating Software-Defined Security and Security as a Service. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Omid Mir, René Mayrhofer, Michael Hölzl, Thanh-Binh Nguyen Recovery of Encrypted Mobile Device Backups from Partially Trusted Cloud Servers. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Tomás Jánský, Tomás Cejka, Martin Zádník, Václav Bartos Augmented DDoS Mitigation with Reputation Scores. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Olusola Akinrolabu, Ioannis Agrafiotis, Arnau Erola The challenge of detecting sophisticated attacks: Insights from SOC Analysts. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yi-Ching Liao Investigating the Use of Online Open Source Information as Evidence in European Courts. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1I. Adam, J. Ping Framework for Security Event Management in 5G. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Martin Gilje Jaatun Software Security Activities that Support Incident Management in Secure DevOps. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Olivier Blazy, Céline Chevalier Spreading Alerts Quietly: New Insights from Theory and Practice. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Musa G. Samaila, João B. F. Sequeiros, Mário M. Freire, Pedro R. M. Inácio Security Threats and Possible Countermeasures in IoT Applications Covering Different Industry Domains. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Martin Salfer, Claudia Eckert 0001 Attack Graph-Based Assessment of Exploitability Risks in Automotive On-Board Networks. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Gokila Dorai, Shiva Houshmand, Ibrahim M. Baggili I Know What You Did Last Summer: Your Smart Home Internet of Things and Your iPhone Forensically Ratting You Out. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Bruno Malveira Peixoto, Sandra Avila, Zanoni Dias, Anderson Rocha Breaking down violence: A deep-learning strategy to model and classify violence in videos. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ulf Kargen, Nahid Shahmehri Speeding Up Bug Finding using Focused Fuzzing. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Anatoli Kalysch, Oskar Milisterfer, Mykolai Protsenko, Tilo Müller Tackling Androids Native Library Malware with Robust, Efficient and Accurate Similarity Measures. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Tianxiang Huang, Jianying Zhou 0001, Andrei Bytes ATG: An Attack Traffic Generation Tool for Security Testing of In-vehicle CAN Bus. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hussam Jasim Mohammed, Nathan L. Clarke, Fudong Li Evidence Identification in Heterogeneous Data Using Clustering. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Laoise Luciano, Ibrahim M. Baggili, Mateusz Topor, Peter Casey, Frank Breitinger Digital Forensics in the Next Five Years. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Daniel Zelle, Markus Springer, Maria Zhdanova, Christoph Krauß Anonymous Charging and Billing of Electric Vehicles. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Vincent Lefebvre, Gianni Santinelli, Tilo Müller, Johannes Götzfried Universal Trusted Execution Environments for Securing SDN/NFV Operations. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Aapo Kalliola, Shankar Lal, Kimmo Ahola, Ian Oliver, Yoan Miche, Tuomas Aura Security Wrapper Orchestration in Cloud. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Syed Naqvi Challenges of Cryptocurrencies Forensics: A Case Study of Investigating, Evidencing and Prosecuting Organised Cybercriminals. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Krzysztof Cabaj, Marcin Gregorczyk, Wojciech Mazurczyk, Piotr Nowakowski, Piotr Zórawski SDN-based Mitigation of Scanning Attacks for the 5G Internet of Radio Light System. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1York Yannikos, Annika Schäfer, Martin Steinebach Monitoring Product Sales in Darknet Shops. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Eduardo B. Fernández, Nobukazu Yoshioka, Hironori Washizaki Evaluating the degree of security of a system built using security patterns. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sebanjila Kevin Bukasa, Ronan Lashermes, Jean-Louis Lanet, Axel Legay Let's shock our IoT's heart: ARMv7-M under (fault) attacks. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Alexander Aigner FALKE-MC: A Neural Network Based Approach to Locate Cryptographic Functions in Machine Code. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Arnold Sykosch, Marc Ohm, Michael Meier 0001 Hunting Observable Objects for Indication of Compromise. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Václav Jirovský, Andrej Pastorek, Max Mühlhäuser, Andrea Tundis Cybercrime and Organized Crime. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1F. R. L. Silva, P. Jacob Mission-Centric Risk Assessment to Improve Cyber Situational Awareness. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sebastian Doerr, Mathias Fischer 0001, Sebastian Schrittwieser, Dominik Herrmann (eds.) Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, Hamburg, Germany, August 27-30, 2018 Search on Bibsonomy ARES The full citation details ... 2018 DBLP  BibTeX  RDF
1Martin Steinebach, Andre Ester, Huajian Liu Channel Steganalysis. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Farzaneh Karegar, John Sören Pettersson, Simone Fischer-Hübner Fingerprint Recognition on Mobile Devices: Widely Deployed, Rarely Understood. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jonas Plum, Andreas Dewald Forensic APFS File Recovery. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jorge Maestre Vidal, Marco Antonio Sotelo Monge, Luis Javier García-Villalba Detecting Workload-based and Instantiation-based Economic Denial of Sustainability on 5G environments. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mohit Sewak, Sanjay K. Sahay, Hemant Rathore An investigation of a deep learning based malware detection system. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1William Klieber, Lori Flynn, Will Snavely, Michael Zheng Practical Precise Taint-flow Static Analysis for Android App Sets. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Vida Ahmadi Mehri, Dragos Ilie, Kurt Tutschku Privacy and DRM Requirements for Collaborative Development of AI Applications. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Eef van Es, Harald P. E. Vranken, Arjen Hommersom Denial-of-Service Attacks on LoRaWAN. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Julian Rauchberger, Sebastian Schrittwieser, Tobias Dam, Robert Luh, Damjan Buhov, Gerhard Pötzelsberger, Hyoungshick Kim The Other Side of the Coin: A Framework for Detecting and Analyzing Web-based Cryptocurrency Mining Campaigns. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Owen Lo, William J. Buchanan, Douglas Carson Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Christian Kraetzer, Jana Dittmann Steganography by synthesis: Can commonplace image manipulations like face morphing create plausible steganographic channels? Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Kai Bemmann, Johannes Blömer, Jan Bobolz, Henrik Bröcher, Denis Diemert, Fabian Eidens, Lukas Eilers, Jan Haltermann, Jakob Juhnke, Burhan Otour, Laurens Porzenheim, Simon Pukrop, Erik Schilling, Michael Schlichtig, Marcel Stienemeier Fully-Featured Anonymous Credentials with Reputation System. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Nurefsan Sertbas, Samet Aytaç, Orhan Ermis, Fatih Alagöz, Gürkan Gür Attribute Based Content Security and Caching in Information Centric IoT. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Alberto Bartoli, Eric Medvet, Andrea De Lorenzo, Fabiano Tarlao (In)Secure Configuration Practices of WPA2 Enterprise Supplicants. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Marco Antonio Sotelo Monge, Jorge Maestre Vidal, Luis Javier García-Villalba A novel Self-Organizing Network solution towards Crypto-ransomware Mitigation. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Alessandro Bacci, Alberto Bartoli, Fabio Martinelli, Eric Medvet, Francesco Mercaldo Detection of Obfuscation Techniques in Android Applications. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Venu Babu Thati, Jens Vankeirsbilck, Niels Penneman, Davy Pissoort, Jeroen Boydens CDFEDT: Comparison of Data Flow Error Detection Techniques in Embedded Systems: an Empirical Study. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Alberto Giaretta, Michele De Donno, Nicola Dragoni Adding Salt to Pepper: A Structured Security Assessment over a Humanoid Robot. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Andrea Tundis, Wojciech Mazurczyk, Max Mühlhäuser A review of network vulnerabilities scanning tools: types, capabilities and functioning. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jonas Walter, Bettina Abendroth, Thilo Von Pape, Christian Plappert, Daniel Zelle, Christoph Krauß, G. Gagzow, Hendrik Decke The user-centered privacy-aware control system PRICON: An interdisciplinary evaluation. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ghada Elbez, Hubert B. Keller, Veit Hagenmeyer A New Classification of Attacks against the Cyber-Physical Security of Smart Grids. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Radek Fujdiak, Petr Blazek, Konstantin Mikhaylov, Lukas Malina, Petr Mlynek, Jiri Misurec, Vojtech Blazek On Track of Sigfox Confidentiality with End-to-End Encryption. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Daniel Geisler, Wojciech Mazurczyk, Jörg Keller 0001 Towards Utilization of Covert Channels as a Green Networking Technique. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Heng Zhang, Jesus Luna, Neeraj Suri, Rubén Trapero Flashlight: A Novel Monitoring Path Identification Schema for Securing Cloud Services. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Khanh-Huu-The Dam, Tayssir Touili Learning Malware Using Generalized Graph Kernels. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Brett Benyo, Shane S. Clark, Aaron Paulos, Partha P. Pal HYDRA: Hypothesis Driven Repair Automation. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Martin Husák, Nataliia Neshenko, Morteza Safaei Pour, Elias Bou-Harb, Pavel Celeda Assessing Internet-wide Cyber Situational Awareness of Critical Sectors. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Nikolaos Tsinganos, Georgios Sakellariou, Panagiotis E. Fouliras, Ioannis Mavridis Towards an Automated Recognition System for Chat-based Social Engineering Attacks in Enterprise Environments. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Gerardo Canfora, Andrea Di Sorbo, Enrico Emanuele, Sara Forootani, Corrado Aaron Visaggio A Nlp-based Solution to Prevent from Privacy Leaks in Social Network Posts. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Marek Pawlicki, Michal Choras, Rafal Kozik Recent Granular Computing Implementations and its Feasibility in Cybersecurity Domain. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Pawel Rajba Challenges and mitigation approaches for getting secured applications in an enterprise company. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Majid Nateghizad, Thijs Veugen, Zekeriya Erkin, Reginald L. Lagendijk Secure Equality Testing Protocols in the Two-Party Setting. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Patrício Domingues, Miguel Frade Digitally Signed and Permission Restricted PDF Files: a Case Study on Digital Forensics. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Henri Ruotsalainen, Stepan Grebeniuk Towards Wireless Secret key Agreement with LoRa Physical Layer. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Gustavo Gonzalez Granadillo, Jose Rubio-Hernan, Joaquín García-Alfaro A Pyramidal-based Model to Compute the Impact of Cyber Security Events. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Thomas Lorünser, Henrich C. Pöhls, Leon Sell, Thomas Laenger CryptSDLC: Embedding Cryptographic Engineering into Secure Software Development Lifecycle. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 1619 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license