The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ARES"( http://dblp.L3S.de/Venues/ARES )

URL (DBLP): http://dblp.uni-trier.de/db/conf/IEEEares

Publication years (Num. hits)
2006 (141) 2007 (155) 2008 (203) 2009 (159) 2010 (109) 2011 (145) 2012 (83) 2013 (110) 2014 (79) 2015 (97) 2016 (108) 2017 (101) 2018 (130) 2019 (108) 2020 (117) 2021 (161) 2022 (159) 2023 (156)
Publication types (Num. hits)
inproceedings(2302) proceedings(19)
Venues (Conferences, Journals, ...)
ARES(2321)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 888 occurrences of 577 keywords

Results
Found 2321 publication records. Showing 2321 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Adrian Dabrowski, Heidelinde Hobel, Johanna Ullrich, Katharina Krombholz, Edgar R. Weippl Towards a Hardware Trojan Detection Cycle. Search on Bibsonomy ARES The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Haruno Kataoka, Yohei Ogawa, Isao Echizen, Tetsuji Kuboyama, Hiroshi Yoshiura Effects of External Information on Anonymity and Role of Transparency with Example of Social Network De-anonymisation. Search on Bibsonomy ARES The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Emad Elabd, Mohand-Said Hacid Concurrent Queries in Location Based Services. Search on Bibsonomy ARES The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hoang-Quoc Nguyen-Son, Minh-Triet Tran, Hiroshi Yoshiura, Noboru Sonehara, Isao Echizen A System for Anonymizing Temporal Phrases of Message Posted in Online Social Networks and for Detecting Disclosure. Search on Bibsonomy ARES The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Karin Bernsmed, Daniela S. Cruzes, Martin Gilje Jaatun, Børge Haugset, Erlend Andreas Gjære Healthcare Services in the Cloud - Obstacles to Adoption, and a Way Forward. Search on Bibsonomy ARES The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Henk Birkholz, Ingo Sieverdingbeck Supporting Security Automation for Multi-chassis Link Aggregation Groups via the Interconnected-Asset Ontology. Search on Bibsonomy ARES The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Christian Sillaber, Ruth Breu Quality Matters: Systematizing Quality Deficiencies in the Documentation of Business Security Requirements. Search on Bibsonomy ARES The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Martin Jauernig, Matthias Neugschwandtner, Christian Platzer, Paolo Milani Comparetti Lobotomy: An Architecture for JIT Spraying Mitigation. Search on Bibsonomy ARES The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Benjamin Aziz A Formal Model and Analysis of the MQ Telemetry Transport Protocol. Search on Bibsonomy ARES The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Martin Husák, Jakub Cegan PhiGARo: Automatic Phishing Detection and Incident Response Framework. Search on Bibsonomy ARES The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jun Pang 0001, Yang Zhang 0016 A New Access Control Scheme for Facebook-Style Social Networks. Search on Bibsonomy ARES The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Igor V. Kotenko, Evgenia Novikova Visualization of Security Metrics for Cyber Situation Awareness. Search on Bibsonomy ARES The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Athanasios C. Rakitzis, Petros E. Maravelakis, Philippe Castagliola A Comparative Study of Control Charts for Zero-Inflated Binomial Processes. Search on Bibsonomy ARES The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yu Ichifuji, Noboru Sonehara Visualization of Recovery Situation in Disaster Area by Using Web Reservation Data. Search on Bibsonomy ARES The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1François Lesueur, Sabina Surdu, Romuald Thion, Yann Gripay, Meriam Ben-Ghorbel-Talbi Palpable Privacy through Declarative Information Flows Tracking for Smart Buildings. Search on Bibsonomy ARES The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Maciej Piec, Andreas Rauber Real-Time Screen Watermarking Using Overlaying Layer. Search on Bibsonomy ARES The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Aswami Ariffin, Christian D'Orazio, Kim-Kwang Raymond Choo, Jill Slay iOS Forensics: How Can We Recover Deleted Image Files with Timestamp in a Forensically Sound Manner? Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Denisse Muñante, Laurent Gallon, Philippe Aniorté An Approach Based on Model-Driven Engineering to Define Security Policies Using OrBAC. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jurlind Budurushi, Stephan Neumann, Maina M. Olembo, Melanie Volkamer Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Seiji Munetoh, Nobukazu Yoshioka Model-Assisted Access Control Implementation for Code-centric Ruby-on-Rails Web Application Development. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hiroshi Maruyama, Kiyoshi Watanabe, Sachiko Yoshihama, Naohiko Uramoto, Yoichiro Takehora, Kazuhiro Minami ICHIGAN Security - A Security Architecture That Enables Situation-Based Policy Switching. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Iryna Windhorst, Ali Sunyaev Dynamic Certification of Cloud Services. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Christian Raspotnig, Vikash Katta, Péter Kárpáti, Andreas L. Opdahl Enhancing CHASSIS: A Method for Combining Safety and Security. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Moussa Ouedraogo, Manel Khodja, Djamel Khadraoui Towards a Risk Based Assessment of QoS Degradation for Critical Infrastructure. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Debmalya Biswas, Imad Aad, Gian Paolo Perrucci Privacy Panel: Usable and Quantifiable Mobile Privacy. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mirko Haustein, Herbert Sighart, Dennis Titze, Peter Schoo Collaboratively Exchanging Warning Messages between Peers While under Attack. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Vikash Katta, Christian Raspotnig, Péter Kárpáti, Tor Stålhane Requirements Management in a Combined Process for Safety and Security Assessments. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Gunnar Schomaker, Andreas Herrholz, Guillaume Duc, Renaud Pacalet, Salvatore Raho, Miltos D. Grammatikakis, Marcello Coppola, Ignacio Garcia Vega TRESCCA - Trustworthy Embedded Systems for Secure Cloud Computing. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Beatriz Gallego-Nicasio Crespo User Interface Harmonization for IT Security Management: User-Centered Design in the PoSecCo Project. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1David A. Mundie, David M. McIntire An Ontology for Malware Analysis. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Woohyun Shim, Fabio Massacci, Martina de Gramatica, Alessandra Tedeschi, Alessandro Pollini Evaluation of Airport Security Training Programs: Perspectives and Issues. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Christian Richthammer, Michael Netter, Moritz Riesner, Günther Pernul Taxonomy for Social Network Data Types from the Viewpoint of Privacy and User Control. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Federica Paci, M. Carmen Fernández Gago, Francisco Moyano Detecting Insider Threats: A Trust-Aware Framework. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Eric Chan-Tin, Jiyoung Shin, Jiangmin Yu Revisiting Circuit Clogging Attacks on Tor. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Martin Hawley, Paul Howard, Rainer Koelle, Peter Saxton Collaborative Security Management: Developing Ideas in Security Management for Air Traffic Control. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Henk Birkholz, Ingo Sieverdingbeck, Nicolai Kuntze, Carsten Rudolph Enhancing Security Testing via Automated Replication of IT-Asset Topologies. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Gianluca Dini, Fabio Martinelli, Andrea Saracino, Daniele Sgandurra Probabilistic Contract Compliance for Mobile Applications. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Kristian Beckers, Maritta Heisel, Isabelle Côté, Ludger Goeke, Selim Güler Structured Pattern-Based Security Requirements Elicitation for Clouds. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jostein Jensen, Åsmund Ahlmann Nyre Federated Identity Management and Usage Control - Obstacles to Industry Adoption. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jean-François Lalande, Steffen Wendzel Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Rainer Koelle, Walter Strijland, Stefan Roels Towards Harmonising the Legislative, Regulatory, and Standards-Based Framework for ATM Security: Developing a Software Support Tool. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hongzhe Li, Taebeom Kim, Munkhbayar Bat-Erdene, Heejo Lee Software Vulnerability Detection Using Backward Trace Analysis and Symbolic Execution. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ge Zhang 0001, Simone Fischer-Hübner Counteract DNS Attacks on SIP Proxies Using Bloom Filters. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jakub Breier, Ladislav Hudec On Selecting Critical Security Controls. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Martin Gilje Jaatun, Tor Erlend Fægri Sink or SWIM: Information Security Requirements in the Sky. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Eckehard Hermann, Rüdiger Grimm The Common Limes Security Model for Asset Flow Control in Decentralized, Insecure Systems. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Zisis Tsiatsikas, Dimitris Geneiatakis, Georgios Kambourakis, Angelos D. Keromytis A Privacy-Preserving Entropy-Driven Framework for Tracing DoS Attacks in VoIP. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Kahina Lazri, Sylvie Laniepce, Jalel Ben-Othman Reconsidering Intrusion Monitoring Requirements in Shared Cloud Platforms. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Enrico Sorio, Alberto Bartoli, Eric Medvet Detection of Hidden Fraudulent URLs within Trusted Sites Using Lexical Features. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Dan Fleck, Arnur G. Tokhtabayev, Alex Alarif, Angelos Stavrou, Tomas Nykodym PyTrigger: A System to Trigger & Extract User-Activated Malware Behavior. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Igor V. Kotenko, Olga Polubelova, Igor Saenko 0001, Elena Doynikova The Ontology of Metrics for Security Evaluation and Decision Support in SIEM Systems. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Amir Herzberg, Haya Schulmann DNSSEC: Interoperability Challenges and Transition Mechanisms. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Kristian Beckers, Maritta Heisel A Usability Evaluation of the NESSoS Common Body of Knowledge. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Gerardo Canfora, Francesco Mercaldo, Corrado Aaron Visaggio A Classifier of Malicious Android Applications. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jason L. Wright, Jason W. Larsen, Miles McQueen Estimating Software Vulnerabilities: A Case Study Based on the Misclassification of Bugs in MySQL Server. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jaemin Park, Kiyoung Baek, Cheoloh Kang Secure Profile Provisioning Architecture for Embedded UICC. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Christos Koukouvinos, Christina Parpoula, Dimitris E. Simos Genetic Algorithm and Data Mining Techniques for Design Selection in Databases. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1York Yannikos, Christian Winter 0001 Model-Based Generation of Synthetic Disk Images for Digital Forensic Tool Testing. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Fabrizio Baiardi, Fabio Corò, Federico Tonelli, Luca Guidi GVScan: Scanning Networks for Global Vulnerabilities. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Memiko Otsuki, Noboru Sonehara Estimating the Value of Personal Information with SNS Utility. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Andreas Makrides, Alex Karagrigoriou Statistical Inference for Multi-state Systems: The Weibull Case. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Nada Essaouini, Frédéric Cuppens, Nora Cuppens-Boulahia, Anas Abou El Kalam Conflict Management in Obligation with Deadline Policies. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Thanh-Trung Pham, Xavier Défago Reliability Prediction for Component-Based Software Systems with Architectural-Level Fault Tolerance Mechanisms. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Stefan Asanger, Andrew Hutchison Experiences and Challenges in Enhancing Security Information and Event Management Capability Using Unsupervised Anomaly Detection. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Koichiro Hayashi Social Issues of Big Data and Cloud: Privacy, Confidentiality, and Public Utility. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Daniel Palomares, Daniel Migault, Wolfgang Velasquez, Maryline Laurent High Availability for IPsec VPN Platforms: ClusterIP Evaluation. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Kelly Y. Itakura, Noboru Sonehara Using Twitter's Mentions for Efficient Emergency Message Propagation. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Franco Bergomi, Stéphane Paul, Bjørnar Solhaug, Raphaël Vignon-Davillier Beyond Traceability: Compared Approaches to Consistent Security Risk Assessments. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Michael Gruhn, Tilo Müller On the Practicability of Cold Boot Attacks. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Marko Niemimaa, Jonna Järveläinen IT Service Continuity: Achieving Embeddedness through Planning. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Valerio Vianello, Vincenzo Gulisano, Ricardo Jiménez-Peris, Marta Patiño-Martínez, Rubén Torres, Rodrigo Diaz, Elsa Prieto A Scalable SIEM Correlation Engine and Its Application to the Olympic Games IT Infrastructure. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Aleksandar Hudic, Elise Revell, Dimitris E. Simos A Generation Method of Cryptographic Keys for Enterprise Communication Systems. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Roberta Cardinali, Enrico Anniballi, Carlo Bongioanni, Antonio Macera, Fabiola Colone, Pierfrancesco Lombardo ARGUS 3D: Security Enhancements through Innovative Radar Technologies. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Thomas Unger, Martin Mulazzani, Dominik Fruhwirt, Markus Huber 0001, Sebastian Schrittwieser, Edgar R. Weippl SHPF: Enhancing HTTP(S) Session Security with Browser Fingerprinting. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Andrea Micheloni, Karl-Peter Fuchs, Dominik Herrmann, Hannes Federrath Laribus: Privacy-Preserving Detection of Fake SSL Certificates with a Social P2P Notary Network. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Lukasz Olejnik, Claude Castelluccia Towards Web-Based Biometric Systems Using Personal Browsing Interests. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mai H. El-Sherief, Marianne A. Azer A Novel Proximity Based Trust Model for Opportunistic Networks. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Antonio Marotta, Gabriella Carrozza, Luigi Battaglia, Patrizia Montefusco, Vittorio Manetti Applying the SecRAM Methodology in a CLOUD-Based ATM Environment. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Vincenzo Ciancia, Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi, José Antonio Martín, Ernesto Pimentel 0001 Automated Synthesis and Ranking of Secure BPMN Orchestrators. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Elias Bou-Harb, Mourad Debbabi, Chadi Assi A Statistical Approach for Fingerprinting Probing Activities. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Roland Rieke, Maria Zhdanova, Jürgen Repp, Romain Giot, Chrystel Gaber Fraud Detection in Mobile Payments Utilizing Process Behavior Analysis. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Gansen Zhao, Haiyu Wang, Chunming Rong, Yong Tang 0001 Resource Pool Oriented Trust Management for Cloud Infrastructure. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1David W. Chadwick, George Inman The Trusted Attribute Aggregation Service (TAAS) - Providing an Attribute Aggregation Layer for Federated Identity Management. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Suliman A. Alsuhibany, Aad P. A. van Moorsel Modelling and Analysis of Release Order of Security Algorithms Using Stochastic Petri Nets. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1I. Goriac Measuring Anonymity with Plausibilistic Entropy. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Paolo Rocchi, Gurami Tsitsiashvili Some General Properties of Multi-state Physical Models. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Aaron Paulos, Partha P. Pal, Richard E. Schantz, Brett Benyo, David Johnson 0004, Mike Hibler, Eric Eide Isolation of Malicious External Inputs in a Security Focused Adaptive Execution Environment. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Raphael Wigoutschnigg, Peter Schartner, Stefan Rass Shared Crowds: A Token-Ring Approach to Hide the Receiver. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Benjamin Aziz, Geoff W. Hamilton Reputation-Controlled Business Process Workflows. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1 2013 International Conference on Availability, Reliability and Security, ARES 2013, Regensburg, Germany, September 2-6, 2013 Search on Bibsonomy ARES The full citation details ... 2013 DBLP  BibTeX  RDF
1Ilia Frenkel, Lev Khvatskin, Svetlana Daichman, Anatoly Lisnianski Assessing Water Cooling System Performance: Lz-Transform Method. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Rainer Poisel, Simon Tjoa A Comprehensive Literature Review of File Carving. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hermann de Meer, Henrich Christopher Pöhls, Joachim Posegga, Kai Samelin Scope of Security Properties of Sanitizable Signatures Revisited. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Cesario Di Sarno, Valerio Formicola, Mario Sicuranza, Giovanni Paragliola Addressing Security Issues of Electronic Health Record Systems through Enhanced SIEM Technology. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Kristian Beckers, Denis Hatebur, Maritta Heisel A Problem-Based Threat Analysis in Compliance with Common Criteria. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Tomoya Muraki, Shintaro Oishi, Masatsugu Ichino, Isao Echizen, Hiroshi Yoshiura Anonymizing Face Images by Using Similarity-Based Metric. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jonathan Blangenois, Guy Guemkam, Christophe Feltus, Djamel Khadraoui Organizational Security Architecture for Critical Infrastructure. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Johannes Götzfried, Tilo Müller ARMORED: CPU-Bound Encryption for Android-Driven ARM Devices. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yulia Cherdantseva, Jeremy Hilton A Reference Model of Information Assurance & Security. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mark Scanlon, M. Tahar Kechadi Universal Peer-to-Peer Network Investigation Framework. Search on Bibsonomy ARES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
Displaying result #1201 - #1300 of 2321 (100 per page; Change: )
Pages: [<<][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19]
[20][21][22][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license