The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "CSE (3)"( http://dblp.L3S.de/Venues/CSE_(3) )

URL (DBLP): http://dblp.uni-trier.de/db/conf/cse

Publication years (Num. hits)
2009 (75)
Publication types (Num. hits)
inproceedings(75)
Venues (Conferences, Journals, ...)
CSE (3)(75)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 75 publication records. Showing 75 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Wael Kanoun, Nora Cuppens-Boulahia, Frédéric Cuppens, Samuel Dubus, Antony Martin Success Likelihood of Ongoing Attacks for Intrusion Detection and Response Systems. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Yeni Yuqin Li Helgesson Managing Risks on Critical IT Systems in Public Service Organizations. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Thomas Léauté, Boi Faltings Privacy-Preserving Multi-agent Constraint Satisfaction. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1I-Cheng Wang, Chih-Hao Shen, Kung Chen, Tsan-sheng Hsu, Churn-Jung Liau, Da-Wei Wang An Empirical Study on Privacy and Secure Multi-party Computation Using Exponentiation. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Mohammed Hussain, David B. Skillicorn Guarantee-Based Access Control. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Pavel Minarík, Jan Vykopal, Vojtech Krmicek Improving Host Profiling with Bidirectional Flows. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Craig A. Shue, Andrew J. Kalafut, Minaxi Gupta A Unified Approach to Intra-domain Security. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Sara Motahari, Sotirios G. Ziavras, Mor Naaman, Mohamed Ismail, Quentin Jones Social Inference Risk Modeling in Mobile and Social Applications. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Xiaoli Lin, Pavol Zavarsky, Ron Ruhl, Dale Lindskog Threat Modeling for CSRF Attacks. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Richard Seymour, Gilbert L. Peterson A Trust-Based Multiagent System. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Dimitris Zisiadis, Spyros Kopsidas, Leandros Tassiulas ViDPSec Visual Device Pairing Security Protocol. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Martin Neubauer Modelling of Pseudonymity under Probabilistic Linkability Attacks. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Mark Hoogendoorn, S. Waqar Jaffry The Influence of Personalities Upon the Dynamics of Trust and Reputation. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Safaa Zaman, Fakhri Karray Lightweight IDS Based on Features Selection and IDS Classification Scheme. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Eugen Staab, Thomas Engel 0001 Tuning Evidence-Based Trust Models. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1John Aycock, Juan M. Gutiérrez Cárdenas, Daniel Medeiros Nunes de Castro Code Obfuscation Using Pseudo-random Number Generators. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Nicolas Liampotis, Ioanna Roussaki, Elizabeth Papadopoulou, Yussuf Abu-Shaaban, M. Howard Williams, Nicholas K. Taylor, Sarah McBurney, Kajetan Dolinar A Privacy Framework for Personal Self-Improving Smart Spaces. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Franco Frattolillo, Federica Landolfi, Fiammetta Marulli A Novel Approach to DRM Systems. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1André van Cleeff, Wolter Pieters, Roel J. Wieringa Security Implications of Virtualization: A Literature Study. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Benjamin Kellermann, Rainer Böhme Privacy-Enhanced Event Scheduling. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Mandeep Saran, Pavol Zavarsky A Study of the Methods for Improving Internet Usage Policy Compliance. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ruilin Liu, Wendy Hui Wang Integrity Verification of Outsourced XML Databases. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Wenjia Li, Anupam Joshi, Tim Finin Policy-Based Malicious Peer Detection in Ad Hoc Networks. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Florian Kerschbaum Adapting Privacy-Preserving Computation to the Service Provider Model. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Dimitri do B. DeFigueiredo, Earl T. Barr, Shyhtsun Felix Wu Trust Is in the Eye of the Beholder. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Benjamin Wasser, Justin Zhan Practical Values for Privacy. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Mark Rounds, Norman Pendegraft Diversity in Network Attacker Motivation: A Literature Review. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Danesh Irani, Steve Webb, Kang Li 0001, Calton Pu Large Online Social Footprints - An Emerging Threat. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Girma Nigusse, Bart De Decker, Vincent Naessens Specification of Fair Data Practice Principles Using Privacy Policy Languages. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ning Hu, Peidong Zhu, Huayang Cao, Kan Chen Routing Policy Conflict Detection without Violating ISP's Privacy. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Michele Barletta, Silvio Ranise, Luca Viganò 0001 Verifying the Interplay of Authorization Policies and Workflow in Service-Oriented Architectures. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1John Lyle, Andrew P. Martin On the Feasibility of Remote Attestation for Web Services. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jason Crampton, Hemanth Khambhammettu A Framework for Enforcing Constrained RBAC Policies. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ram Krishnan, Ravi S. Sandhu A Hybrid Enforcement Model for Group-centric Secure Information Sharing. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Burcu Bulgurcu, Hasan Cavusoglu, Izak Benbasat Effects of Individual and Organization Based Beliefs and the Moderating Role of Work Experience on Insiders' Good Security Behaviors. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Samuel Oladapo, Pavol Zavarsky, Ron Ruhl, Dale Lindskog, Andy Igonor Managing Risk of IT Security Outsourcing in the Decision-Making Stage. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Markus Huber 0001, Stewart Kowalski, Marcus Nohlberg, Simon Tjoa Towards Automating Social Engineering Using Social Networking Sites. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Yun Yang, Juhua Chen A Dynamic Trust Evaluation Model on C2C Marketplaces. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Riham Hassan, Mohamed Eltoweissy, Shawn A. Bohner, Sherif El-Kassas Goal-Oriented Software Security Engineering: The Electronic Smart Card Case Study. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Valentina Casola, Anna Rita Fasolino, Nicola Mazzocca, Porfirio Tramontana An AHP-Based Framework for Quality and Security Evaluation. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Shi-Cho Cha, Li-Ting Liu, Bo-Chen Yu Process-Oriented Approach for Validating Asset Value for Evaluating Information Security Risk. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Harold van Heerde, Maarten M. Fokkinga, Nicolas Anciaux A Framework to Balance Privacy and Data Usability Using Data Degradation. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Shaozhi Ye, Shyhtsun Felix Wu, Raju Pandey, Hao Chen 0003 Noise Injection for Search Privacy Protection. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ayonote Clement, Pavol Zavarsky, Dale Lindskog Analysis of the GMPLS Control Plane Security. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Chih-Hung Chang A Low-Cost Green IT Design and Application of VHSP Based on Virtualization Technology. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Hendrik J. G. Oberholzer, Martin S. Olivier Emergency Privacy Measures. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Florian Schaub, Zhendong Ma, Frank Kargl Privacy Requirements in Vehicular Communication Systems. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Peter Schartner, Stefan Rass How to overcome the 'Trusted Node Model' in Quantum Cryptography. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Victor Manuel García-Barrios User-centric Privacy Framework: Integrating Legal, Technological and Human Aspects into User-Adapting Systems. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ghassan Jabbour, Daniel A. Menascé The Insider Threat Security Architecture: A Framework for an Integrated, Inseparable, and Uninterrupted Self-Protection Mechanism. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Kambiz Ghazinour, Maryam Majedi, Ken Barker A Lattice-Based Privacy Aware Access Control Model. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Mary-Anne Williams Privacy Management, the Law & Business Strategies: A Case for Privacy Driven Design. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Seiji Shibaguchi, Yuki Nakayama, Ken-ichi Okada Worm Path Identification Using Visualization System. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Alaa Aref El Masri, João Pedro Sousa Limiting Private Data Exposure in Online Transactions: A User-Based Online Privacy Assurance Model. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Wei Jiang, Mummoorthy Murugesan, Chris Clifton, Luo Si t-Plausibility: Semantic Preserving Text Sanitization. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Qussai Yaseen, Brajendra Panda Knowledge Acquisition and Insider Threat Prediction in Relational Database Systems. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Behzad Malek, Ali Miri Combining Attribute-Based and Access Systems. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Claudio Agostino Ardagna, Massimo Banzi, Ernesto Damiani, Fulvio Frati Assurance Process for Large Open Source Code Bases. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Saeed Samet, Ali Miri Privacy-Preserving Bayesian Network for Horizontally Partitioned Data. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Wanying Luo, Qi Xie, Urs Hengartner FaceCloak: An Architecture for User Privacy on Social Networking Sites. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Gelareh Taban, Virgil D. Gligor Privacy-Preserving Integrity-Assured Data Aggregation in Sensor Networks. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Xusen Cheng, Linda A. Macaulay, Alex Zarifis A Case Study of Individual Trust Development in Computer Mediated Collaboration Teams. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Muhammad Umair Ahmed Khan, Mohammad Zulkernine Activity and Artifact Views of a Secure Software Development Process. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Takao Okubo, Kenji Taguchi 0001, Nobukazu Yoshioka Misuse Cases + Assets + Security Goals. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Zhitao Huang, Pavol Zavarsky, Ron Ruhl An Efficient Framework for IT Controls of Bill 198 (Canada Sarbanes-Oxley) Compliance by Aligning COBIT 4.1, ITIL v3 and ISO/IEC 27002. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Shashwat Raizada, Goutam Paul 0001, Vineet Pandey Nearby-Friend Discovery Protocol for Multiple Users. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Daniel Trivellato, Fred Spiessens, Nicola Zannone, Sandro Etalle Reputation-Based Ontology Alignment for Autonomy and Interoperability in Distributed Access Control. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Anthony Stell, Richard O. Sinnott, Oluwafemi O. Ajayi, Jipu Jiang Designing Privacy for Scalable Electronic Healthcare Linkage. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Hicham Tout, William Hafner Phishpin: An Identity-Based Anti-phishing Approach. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Yasuyuki Tsukada, Ken Mano, Hideki Sakurada, Yoshinobu Kawabe Anonymity, Privacy, Onymity, and Identity: A Modal Logic Approach. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Mathias Kohler, Achim D. Brucker, Andreas Schaad ProActive Caching: Generating Caching Heuristics for Business Process Environments. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jean Everson Martina, Túlio Cicero Salvaro de Souza, Ricardo Felipe Custódio Ceremonies Formal Analysis in PKI's Context. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Fariborz Farahmand, Melissa Dark, Sydney Liles, Brandon Sorge Risk Perceptions of Information Security: A Measurement Study. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Norman Pendegraft, Mark Rounds A Simulation of Various Variable Hacker Populations. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1David Evans 0002, Robert H. Warren Anonymity Properties of Stored or Transmitted Data Taken from Bluetooth Scans. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #75 of 75 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license