The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase network security (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1976-1989 (29) 1990-1992 (18) 1993-1995 (15) 1996-1997 (30) 1998-1999 (24) 2000 (34) 2001 (82) 2002 (66) 2003 (170) 2004 (165) 2005 (336) 2006 (384) 2007 (385) 2008 (422) 2009 (361) 2010 (404) 2011 (269) 2012 (252) 2013 (324) 2014 (330) 2015 (419) 2016 (441) 2017 (483) 2018 (427) 2019 (85)
Publication types (Num. hits)
article(2188) book(23) incollection(28) inproceedings(3639) phdthesis(21) proceedings(56)
Venues (Conferences, Journals, ...)
I. J. Network Security(1116) CNS(577) Network Security(549) ACNS(547) CANS(381) MMM-ACNS(204) WISEC(102) CNSA(64) iNetSeC(54) CoRR(44) ASIAN(29) VizSEC(29) ACSW(27) ICCNS(22) IEEE Security & Privacy(20) ACM Conference on Computer and...(19) More (+10 of total 935)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 3449 occurrences of 1340 keywords

Results
Found 5955 publication records. Showing 5955 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
118Dieter Gollmann, Catherine A. Meadows, Eiji Okamoto Editorial. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
61Sharon Mason, Daryl Johnson, Luther Troell Network and systems security, a collaborative approach. Search on Bibsonomy SIGITE Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security, network security, information assurance, systems security
54Danai Patiyoot Migration / Evolution of security towards wireless ATM. Search on Bibsonomy Operating Systems Review The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
47Jae Seung Lee, Sang-Choon Kim, Seung Won Sohn A Design of the Security Evaluation System for Decision Support in the Enterprise Network Security Management. Search on Bibsonomy ICISC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
46Yang-ming Ma, Zhitang Li, Jie Lei, Li Wang 0015, Dong Li An Intelligent Agent-Oriented System for Integrating Network Security Devices and Handling Large Amount of Security Events. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security event, agent, network security, intelligence
46Jibao Lai, Huiqiang Wang, Xiaowu Liu, Ying Liang, Ruijuan Zheng, Guo-sheng Zhao WNN-Based Network Security Situation Quantitative Prediction Method and Its Optimization. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF situation prediction, genetic algorithm, neural network, network security, wavelet analysis
44Jae Seung Lee, Sang-Choon Kim Design of the Decision Support System for Network Security Management to Secure Enterprise Network. Search on Bibsonomy ISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
42Jiejun Kong, Xiaoyan Hong, Mario Gerla Modeling Ad-hoc rushing attack in a negligibility-based security framework. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF asymptotic invariant, neg-ligibility, randomized network algorithms, randomized turing machine, sub-polynomial, scalability
42Sourour Meharouech, Adel Bouhoula, Tarek Abbes Ensuring security in depth based on heterogeneous network security technologies. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Management of interaction, Devices’ collaboration, Network security, Security technologies
41Mohammad Salim Ahmed, Ehab Al-Shaer, Latifur Khan A Novel Quantitative Approach For Measuring Network Security. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
41Shervin Erfani Tutorial 4: Wireless and Wireline Security Management. Search on Bibsonomy ISCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
40Chenghua Tang, Shunzheng Yu Assessment of Network Security Policy Based on Security Capability. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Igor V. Kotenko, Mikhail Stepashkin Attack Graph Based Evaluation of Network Security. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Network security, Risk Assessment, Security Metrics, Vulnerability Assessment, Network attacks
36Xianxian Li, Lijun Liu A Multi-agent Cooperative Model and System for Integrated Security Monitoring. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Knowledge Management, Network security, Security monitoring, Multi-agent cooperation
35Rainer Bye, Stephan Schmidt 0001, Katja Luther, Sahin Albayrak Application-level simulation for network security. Search on Bibsonomy SimuTools The full citation details ... 2008 DBLP  DOI  BibTeX  RDF network security, network simulation
34Vijay Varadharajan Network Security Policy Models. Search on Bibsonomy AUSCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
34Robert N. Smith, Sourav Bhattacharya Firewall placement in a large network topology. Search on Bibsonomy FTDCS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF firewall placement heuristics, large network topology, multi-user distributed information environment, firewall cascade, potential attack point, comprehensive security protection, end-to-end security protection, simulation, performance, network security, completeness, authorisation, operations research, cost optimization, delay minimization, sensitive data, confidence degree
34David P. Gilliam, John D. Powell Integrating a Flexible Modeling Framework (FMF) with the Network Security Assessment Instrument to Reduce Software Security Risk. Search on Bibsonomy WETICE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
33Joseph Pamula, Sushil Jajodia, Paul Ammann, Vipin Swarup A weakest-adversary security metric for network configuration security analysis. Search on Bibsonomy QoP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF network security, vulnerability, security metric, attack graphs, exploit, quantitative measure
33Roland Rieke Modelling and Analysing Network Security Policies in a Given Vulnerability Setting. Search on Bibsonomy CRITIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF attack simulation, network security policies, security modelling and simulation, risk assessment, threats analysis, critical infrastructure protection
32Dirk Cordel, Christoph Meinel, Stephan Repp, Christian Willems Explorative Learning of Wireless Network Security with Tele-Lab IT-Security. Search on Bibsonomy ICHL The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Explorative Learning, Awareness Creation, Virtual Remote Laboratory, Computer Science Education, IT Security
32Vicky G. Papadopoulou, Andreas Gregoriades Network Security Validation Using Game Theory. Search on Bibsonomy OTM Workshops The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Game Theory, Network Security, Non-functional requirements
32Huiqiang Wang, Jibao Lai, Xiaowu Liu A Quantitative Forecast Method of Network Security Situation Basedon BP Neural Network with Genetic Algorithm. Search on Bibsonomy IMSCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
31Won Young Lee, Hee Suk Seo, Tae Ho Cho Modeling of Policy-Based Network with SVDB. Search on Bibsonomy AIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF PBNM (Policy-based Network Management), simulation, Data Mining, network security, Security Policy, DEVS formalism
30Stamatios V. Kartalopoulos Differentiating Data Security and Network Security. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
30Hong-shan Kong, Ming-qing Zhang, Jun Tang, Chang-yuan Luo The Research of Simulation for Network Security Based on System Dynamics. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
30Ching-hang Fong, Gerard Parr, Philip J. Morrow A Comparison of Mobile Agent and SNMP Message Passing for Network Security Management Using Event Cases. Search on Bibsonomy IPOM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Security Attack Event Case, Mobile Agent, Network Management, Security Architecture
30Jiang Tao, Liu Ji-ren, Qin Yang The Research on Dynamic Self-Adaptive Network Security Model Based on Mobile Agent. Search on Bibsonomy TOOLS (36) The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Java, mobile agent, policy manage, security framework
29F. C. Smith Ethical Responsibilities and Legal Liabilities of Network Security Professionals. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF ethical responsibilities, legal liabilities, network security professionals, tort litigation, unregulated economic environment, public law enforcement, criminal abuses, technical solutions, civil wrongs, individual liberty, group liberty, criminal law, civil law, computer literate lawyers, computer security failures, millennium bug, legal liability, social redress, computer networks, computer networking, morality, network vulnerabilities, Year 2000 problem
29Linda Morales, Melissa Dark Information Security Education and Foundational Research. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Mingchu Li, Yongrui Cui, Yuan Tian, Dong Wang, Songyuan Yan A New Architecture of Grid Security System Construction. Search on Bibsonomy ICPP Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security rule definition, grid, framework, security system
29Glenn S. Dardick, Linda K. Lau Interdisciplinary minor in digital forensics, security and law. Search on Bibsonomy SIGITE Conference The full citation details ... 2005 DBLP  DOI  BibTeX  RDF cyberlaw, electronic evidence, curriculum, digital forensics, computer forensics, digital evidence
29Youssef Hanna, Hridesh Rajan, Wensheng Zhang 0001 Slede: a domain-specific verification framework for sensor network security protocol implementations. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF intruder generation, sensor networks, model checking, security protocols
29Lianying Zhou, Fengyu Liu, Jie Wu Research on co-operative computer network security technologies. Search on Bibsonomy SMC (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
29Yong Tang, Hua-Ping Hu, Xicheng Lu BSCM: Proposed Security Collaboration Model Based on Blackboard. Search on Bibsonomy GCC Workshops The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Security collaboration model, Network security, Blackboard
29Mixia Liu, Qiuyu Zhang, Zhao Hong, Dongmei Yu Network Security Situation Assessment Based on Data Fusion. Search on Bibsonomy WKDD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Zhitang Li, Jie Lei, Li Wang 0015, Dong Li, Yang-ming Ma Towards Identifying True Threat from Network Security Data. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Joshua D. Guttman, Amy L. Herzog Rigorous automated network security management. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Filtering routers, IP security protocols, Formal methods, Network security, Security management
28Tao Zhang, Chong Wu Network Security Analysis Based on Security Status Space. Search on Bibsonomy WAIM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Marco Cremonini, Sabrina De Capitani di Vimercati, Ernesto Damiani, Pierangela Samarati An XML-based approach to combine firewalls and web services security specifications. Search on Bibsonomy XML Security The full citation details ... 2003 DBLP  DOI  BibTeX  RDF service security, Web services, network security, firewall, SOAP
28Gustavo A. Santana Torrellas A Security Architectural Approach for Risk Assessment Using Multi-agent Systems Engineering. Search on Bibsonomy DAIS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28Romain Laborde, Michel Kamel, François Barrère, Abdelmalek Benzekri Implementation of a Formal Security Policy Refinement Process in WBEM Architecture. Search on Bibsonomy J. Network Syst. Manage. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF WBEM (web-based enterprise management), network security, Security policy, security management
28Romain Laborde, François Barrère, Abdelmalek Benzekri A Security Management Information Model Derivation Framework: From Goals to Configurations. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Joaquín García-Alfaro, Nora Boulahia-Cuppens, Frédéric Cuppens Complete analysis of configuration rules to guarantee reliable network security policies. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Policy anomalies, Network security, Intrusion Detection systems, Firewalls
27Feng Chen 0015, Jinshu Su A Flexible Approach to Measuring Network Security Using Attack Graphs. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF measure, network security, attack graph
27Yimin Cui, Tao Zou, Lufeng Zhang, Jinjing Zhao Network security simulation and evaluation. Search on Bibsonomy CSTST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF attack impacts, cyber attack modeling, cyber attack simulation, network security evaluation, network modeling
27Luigi Catuogno, Alfredo De Santis An internet role-game for the laboratory of network security course. Search on Bibsonomy ITiCSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF network security lab experiences
27Sourour Meharouech, Adel Bouhoula, Tarek Abbes Collaboration between Security Devices toward improving Network Defense. Search on Bibsonomy ACIS-ICIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Collaboration between Security Devices, vulnerability scanner, Network Security, Firewall, Honeypot, IPS
27Cynthia E. Irvine, Timothy E. Levin Toward Quality of Security Service in a Resource Management System Benefit Function. Search on Bibsonomy Heterogeneous Computing Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF network security policy, quality of security service, benefit function, quality of service, resource management system
27Jin-Bum Hwang, Jong Wook Han A Security Model for Home Networks with Authority Delegation. Search on Bibsonomy ICCSA (4) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Zhi Fu, He Huang, Tsung-Li Wu, Shyhtsun Felix Wu, Fengmin Gong, Chong Xu, Ilia Baldine ISCP: design and implementation of an inter-domain security management agent (SMA) coordination protocol. Search on Bibsonomy NOMS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
27Youssef Hanna SLEDE: lightweight verification of sensor network security protocol implementations. Search on Bibsonomy ESEC/SIGSOFT FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF slede, sensor networks, model checking, security protocols
27Youssef Hanna SLEDE: lightweight verification of sensor network security protocol implementations. Search on Bibsonomy ESEC/SIGSOFT FSE (Companion) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Slede, sensor networks, model checking, security protocols
27Tao Song, Calvin Ko, Chinyang Henry Tseng, Poornima Balasubramanyam, Anant Chaudhary, Karl N. Levitt Formal Reasoning About a Specification-Based Intrusion Detection for Dynamic Auto-configuration Protocols in Ad Hoc Networks. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Ad hoc network, Intrusion Detection, Network Security, Formal reasoning
27Bo-Chao Cheng, Huan Chen 0002, Ryh-Yuh Tseng A Theoretical Security Model for Access Control and Security Assurance. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Gustavo A. Santana Torrellas, Luis A. Villa Vargas Modelling a flexible network security systems using multi-agents systems: security assessment considerations. Search on Bibsonomy ISICT The full citation details ... 2003 DBLP  BibTeX  RDF
26Gaeil An, Joon S. Park Packet Marking Based Cooperative Attack Response Service for Effectively Handling Suspicious Traffic. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Attack Response, Quality of Service, Network Security, Packet Marking, Denial of Service Attack
26P. Rolin, Laurent Toutain, Sylvain Gombault Network Security Probe. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 1994 DBLP  DOI  BibTeX  RDF Network Security Probe, security, access control, audit, intrusion
26Masato Masuya, Takashi Yamanoue, Shinichiro Kubota An experience of monitoring university network security using a commercial service and DIY monitoring. Search on Bibsonomy SIGUCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF fire wall, security, network, monitor, policy, IDS, audit
25Xiaobin Tan, Qin Guihong, Zhang Yong, Liang Ping Network Security Situation Awareness Using Exponential and Logarithmic Analysis. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
25Jason Pearlman, Penny Rheingans Visualizing Network Security Events Using Compound Glyphs from a Service-Oriented Perspective. Search on Bibsonomy VizSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Xuejiao Liu, Debao Xiao, Nian Ma, Jie Yu A Scalable, Vulnerability Modeling and Correlating Method for Network Security. Search on Bibsonomy Infoscale The full citation details ... 2009 DBLP  DOI  BibTeX  RDF vulnerability correlation, modeling, scalable, Network security
25Jad Naous, Ryan Stutsman, David Mazières, Nick McKeown, Nickolai Zeldovich Delegating network security with more information. Search on Bibsonomy WREN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF network policy, network security, network management, firewall, ident
24Carrie Gates A case study in testing a network security algorithm. Search on Bibsonomy TRIDENTCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF testing, network security
24Huiqiang Wang, Jian Wang, Guo-sheng Zhao A New Bio-inspired Model for Network Security and Its Application. Search on Bibsonomy APWeb Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Romain Laborde, François Barrère, Abdelmalek Benzekri A formal framework (Expression + Analysis) for network security. Search on Bibsonomy NCA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia Towards Filtering and Alerting Rule Rewriting on Single-Component Policies. Search on Bibsonomy SAFECOMP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF NIDSs, Policy Anomalies, Network Security, Firewalls
24Cynthia E. Irvine, Timothy E. Levin Toward a Taxonomy and Costing Method for Security Services. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF security cost, quality of security service, network security service, security taxonomy, resource management system
24Donald Beaver Network Security and Storage Security: Symmetries and Symmetry-Breaking. Search on Bibsonomy IEEE Security in Storage Workshop The full citation details ... 2002 DBLP  DOI  BibTeX  RDF network security, storage security
24Ashraf Matrawy, Paul C. van Oorschot, Anil Somayaji Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF network denial of service, flash worms, network security, diversity, traffic shaping
24Chi-Shih Chao A Visualized Internet Firewall Rule Validation System. Search on Bibsonomy APNOMS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Firewall security consistency, Rule anomalies, Policy-based network security management, System visualization
24Huiqiang Wang, Xiaowu Liu, Jibao Lai, Ying Liang Network Security Situation Awareness Based on Heterogeneous Multi-sensor Data Fusion and Neural Network. Search on Bibsonomy IMSCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Johan Åkerberg, Mats Björkman Exploring Network Security in PROFIsafe. Search on Bibsonomy SAFECOMP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Balaji Rajendran, Dnyanesh Pawar An intelligent contextual support system for intrusion detection tasks. Search on Bibsonomy CHIMIT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF contextual support system, intelligent contextual support systems, network security engineer, network security system, intrusion detection, intrusion detection system
23Kiyoshi Yanagimoto, Takaaki Hasegawa, Makoto Takano A New Encoding Approach Realizing High Security and High Performance Based on Double Common Encryption Using Static Keys and Dynamic Keys. Search on Bibsonomy APNOMS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Common key encryption, Security, Network security, Database security
23Bart De Decker, Frank Piessens, Jan Smits, Els Van Herreweghen (eds.) Advances in Network and Distributed Systems Security, IFIP TC11 WG11.4 First Annual Working Conference on Network Security, November 26-27, 2001, Leuven, Belgium Search on Bibsonomy Network Security The full citation details ... 2001 DBLP  BibTeX  RDF
23Joris Claessens, Bart Preneel, Joos Vandewalle Combining World Wide Web and Wireless Security. Search on Bibsonomy Network Security The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
23Sebastiaan H. von Solms, M. V. Kisimov Information Security: Mutual Authentication in E-Commerce. Search on Bibsonomy Network Security The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
23Hideki Sakurada, Yasuyuki Tsukada A Role-Based Specification of the SET Payment Transaction Protocol. Search on Bibsonomy Network Security The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
23Nikos Alexandris, Emmanouil Magkos, Vassilios Chrissikopoulos Software-Based Receipt-Freeness in On-Line Elections. Search on Bibsonomy Network Security The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
23Vincent Naessens, Bart Vanhaute, Bart De Decker Securing RMI Communication. Search on Bibsonomy Network Security The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
23Chih-Yin Lin, Tzong-Chen Wu, Jing-Jang Hwang ID-Based Structured Mulitsignature Schemes. Search on Bibsonomy Network Security The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
23Niklas Borselius, Chris J. Mitchell, Aaron Wilson On Mobile Agent Based Transactions in Moderately Hostile Environments. Search on Bibsonomy Network Security The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
23Bart De Win, Bart Vanhaute, Bart De Decker Security Through Aspect-Oriented Programming. Search on Bibsonomy Network Security The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
23Pieter van Dijken Shell's Trust Domain Infrastructure Security Certification - Linking security management to business objectives. Search on Bibsonomy Network Security The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
23Aurélien Bonnet, Marc Lobelle Extending a Campus Network with Remote Bubbles Using IPsec. Search on Bibsonomy Network Security The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
23Christopher Krügel, Thomas Toth, Engin Kirda SPARTA, a Mobile Agent Based Instrusion Detection System. Search on Bibsonomy Network Security The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
23Nathalie Foster, Jeremy Jacob Hazard Analysis for Security Protocol Requirements. Search on Bibsonomy Network Security The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
23Jan Jürjens Secure Java Development with UML. Search on Bibsonomy Network Security The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
23Marina Pudovkina Probabilistic Relations for the Solitaire Keystream Generator. Search on Bibsonomy Network Security The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
23Andreas Hess, Sudipta Sengupta, Vijay P. Kumar Joint Traffic Routing and Distribution of Security Services in High Speed Networks. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan An OVAL-based active vulnerability assessment system for enterprise computer networks. Search on Bibsonomy Information Systems Frontiers The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Open vulnerability assessment language, Attack path, Network security, Relational database management system, Predicate logic, Security vulnerability
23Yuqing Zhang, Dehua Zhang Authentication and Access Control in P2P Network. Search on Bibsonomy GCC (1) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF authentication, access control, network security, P2P Network
23Aref Meddeb, Enis Elgueder, Issam Harrathi, Habib Youssef Benefits of a pure layer 2 security approach in Metro Ethernet. Search on Bibsonomy ISCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Vincent Toubiana, Houda Labiod Towards a flexible security management solution for dynamic MANETs. Search on Bibsonomy NOMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Mayuresh Ektare, Yanxia Yang The Balancing Act Between Computer Security and Convenience. Search on Bibsonomy HCI (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF convenience, user experience, Computer security, user behavior, Spyware, Viruses
23Anshuman Saxena, Marc Lacoste, Tahar Jarboui, Ulf Lücking, Bernd Steinke A Software Framework for Autonomic Security in Pervasive Environments. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Feng Cheng 0002, Michael Menzel 0001, Christoph Meinel A Secure Web Services Providing Framework Based on Lock-Keeper. Search on Bibsonomy APNOMS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Hui He, Mingzeng Hu, Weizhe Zhang, Hongli Zhang 0001, Zhi Yang Topology-Based Macroscopical Response and Control Technology for Network Security Event. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Yun-kyung Lee, Deok-Gyu Lee, Jong Wook Han, Kyo-Il Chung Home Network Device Authentication: Device Authentication Framework and Device Certificate Profile. Search on Bibsonomy APWeb/WAIM Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF home network security, home device authentication, home device certificate
Displaying result #1 - #100 of 5955 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license