The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for threaten with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1979-2000 (18) 2001-2003 (19) 2004 (18) 2005-2006 (37) 2007 (27) 2008 (18) 2009-2010 (15) 2011-2018 (15) 2019-2023 (14)
Publication types (Num. hits)
article(50) incollection(2) inproceedings(128) phdthesis(1)
Venues (Conferences, Journals, ...)
HICSS(5) Commun. ACM(4) Computer(4) IEEE Softw.(4) ARES(3) ICSE(3) IEEE Secur. Priv.(3) SIGCOMM(3) AAMAS(2) DAC(2) DATE(2) DSN(2) FSE(2) ICEC(2) ITC(2) PAISI(2) More (+10 of total 148)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 173 occurrences of 150 keywords

Results
Found 181 publication records. Showing 181 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
53Subramanian Appavu, Ramasamy Rajaram Learning to Classify Threaten E-mail. Search on Bibsonomy Asia International Conference on Modelling and Simulation The full citation details ... 2008 DBLP  DOI  BibTeX  RDF NB, Data mining, Classification, SVM, DT
40Tim Button Hyperloops Do Not Threaten the Notion of an Effective Procedure. Search on Bibsonomy CiE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
39David Alan Hanson Data security. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 1979 DBLP  DOI  BibTeX  RDF
36Yuan Tian 0003, Biao Song, Eui-nam Huh A threat-based privacy preservation system in untrusted environment. Search on Bibsonomy ICHIT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF threaten, privacy, purpose
27Shi Dong 0001, Huadong Su, Yuanjun Xia, Fei Zhu, Xinrong Hu, Bangchao Wang A Comprehensive Survey on Authentication and Attack Detection Schemes That Threaten It in Vehicular Ad-Hoc Networks. Search on Bibsonomy IEEE Trans. Intell. Transp. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
27Maria Pawelec Deepfakes and Democracy (Theory): How Synthetic Audio-Visual Media for Disinformation and Hate Speech Threaten Core Democratic Functions. Search on Bibsonomy Digit. Soc. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
27Claudia Romagnoli, Alessandro Bosman, Daniele Casalbore, Marco Anzidei, Fawzi Doumaz, Fabiana Bonaventura, Matteo Meli, Carmelo Verdirame Coastal Erosion and Flooding Threaten Low-Lying Coastal Tracts at Lipari (Aeolian Islands, Italy). Search on Bibsonomy Remote. Sens. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
27Zeguo Wang, Shijie Wei, Gui-Lu Long 0001, Lajos Hanzo Variational quantum attacks threaten advanced encryption standard based symmetric cryptography. Search on Bibsonomy Sci. China Inf. Sci. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
27Laura Carolina Martínez Esmeral, Andreas Uhl Low-Effort Re-identification Techniques Based on Medical Imagery Threaten Patient Privacy. Search on Bibsonomy MIUA The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
27John Dorsch Hijacking Epistemic Agency: How Emerging Technologies Threaten our Wellbeing as Knowers. Search on Bibsonomy AIES The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
27Emmanuelle Vaast, Alain Pinsonneault When Digital Technologies Enable and Threaten Occupational Identity: The Delicate Balancing Act of Data Scientists. Search on Bibsonomy MIS Q. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
27Michael L. Littman Collusion rings threaten the integrity of computer science research. Search on Bibsonomy Commun. ACM The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
27Muhammad Zudhy Irawan, Prawira Fajarindra Belgiawan, Tri Basuki Joewono, Nurvita I. M. Simanjuntak Do motorcycle-based ride-hailing apps threaten bus ridership? A hybrid choice modeling approach with latent variables. Search on Bibsonomy Public Transp. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
27Sushma Venkatesh, Haoyu Zhang, Raghavendra Ramachandra, Kiran B. Raja, Naser Damer, Christoph Busch 0001 Can GAN Generated Morphs Threaten Face Recognition Systems Equally as Landmark Based Morphs? - Vulnerability and Detection. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
27David Knichel, Thorben Moos, Amir Moradi 0001 The Risk of Outsourcing: Hidden SCA Trojans in Third-Party IP-Cores Threaten Cryptographic ICs. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
27David Knichel, Thorben Moos, Amir Moradi 0001 The Risk of Outsourcing: Hidden SCA Trojans in Third-Party IP-Cores Threaten Cryptographic ICs. Search on Bibsonomy ETS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
27Sushma Venkatesh, Haoyu Zhang, Raghavendra Ramachandra, Kiran B. Raja, Naser Damer, Christoph Busch 0001 Can GAN Generated Morphs Threaten Face Recognition Systems Equally as Landmark Based Morphs? - Vulnerability and Detection. Search on Bibsonomy IWBF The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
27Sofiane Takarabt, Alexander Schaub 0001, Adrien Facon, Sylvain Guilley, Laurent Sauvage, Youssef Souissi, Yves Mathieu Cache-Timing Attacks Still Threaten IoT Devices. Search on Bibsonomy C2SI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
27Robert M. Davison, Monideepa Tarafdar Shifting baselines in information systems research threaten our future relevance. Search on Bibsonomy Inf. Syst. J. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
27Irene P. Kan, Anna Drummey Do imposters threaten data quality? An examination of worker misrepresentation and downstream consequences in Amazon's Mechanical Turk workforce. Search on Bibsonomy Comput. Hum. Behav. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
27Bob Duncan Attackers Constantly Threaten the Survival of Organisations, but there is a New Shark in the Water: Carcharodon Carcharias Moderator Europa Universalis. Search on Bibsonomy Cyber Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
27Yvonne Höller, Andreas Uhl Do EEG-Biometric Templates Threaten User Privacy? Search on Bibsonomy IH&MMSec The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
27Tibor Bosse, Tilo Hartmann, Romy A. M. Blankendaal, Nienke Dokter, Marco Otte, Linford Goedschalk Virtually Bad: A Study on Virtual Agents that Physically Threaten Human Beings. Search on Bibsonomy AAMAS The full citation details ... 2018 DBLP  BibTeX  RDF
27Varada S. Shevade, Peter V. Potapov, Nancy L. Harris, Tatiana V. Loboda Expansion of Industrial Plantations Continues to Threaten Malayan Tiger Habitat. Search on Bibsonomy Remote. Sens. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
27Jakub Zlotowski, Kumar Yogeeswaran, Christoph Bartneck Can we control it? Autonomous robots threaten human identity, uniqueness, safety, and resources. Search on Bibsonomy Int. J. Hum. Comput. Stud. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
27A. David Wunsch Reality Check: How Science Deniers Threaten Our Future [Book Reviews]. Search on Bibsonomy IEEE Technol. Soc. Mag. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
27Yongjing Chao, Yingmei Wei, Xiaolei Du, Fang Yuan Alarm thresholds of threaten regions based on triangle mesh voxelization. Search on Bibsonomy FSKD The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
27Marko Jusup, Tadasu Matsuo, Yoh Iwasa Barriers to Cooperation Aid Ideological Rigidity and Threaten Societal Collapse. Search on Bibsonomy PLoS Comput. Biol. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
27Sebastian Labitzke, Florian Werling, Jens Mittag, Hannes Hartenstein Do online social network friends still threaten my privacy? Search on Bibsonomy CODASPY The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
27Max Steiner, Peter Liggesmeyer Combination of Safety and Security Analysis - Finding Security Problems That Threaten The Safety of a System. Search on Bibsonomy DECS@SAFECOMP The full citation details ... 2013 DBLP  BibTeX  RDF
27Gang Li, Qingzhong Wang The Research of Modeling Method about Underwater Vehicle Penetration Threaten Viewsheds Space. Search on Bibsonomy BIFE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
27Jeff Chester Cookie Wars: How New Data Profiling and Targeting Techniques Threaten Citizens and Consumers in the "Big Data" Era. Search on Bibsonomy European Data Protection The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
27Paul Alexander Bernal Do deficiencies in data privacy threaten our autonomy and if so, can informational privacy rights meet this threat? Search on Bibsonomy 2011   RDF
27Bastiaan van Loenen, Jaap Zevenbergen Privacy (Regimes) Do Not Threaten Location Technology Development. Search on Bibsonomy MDM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Erwin Louis Carrow Puppetnets and botnets: information technology vulnerability exploits that threaten basic internet use. Search on Bibsonomy InfoSecCD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27David Geer Malicious Bots Threaten Network Security. Search on Bibsonomy Computer The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Jeff Grove Legal and technological efforts to lock up content threaten innovation. Search on Bibsonomy Commun. ACM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
27Sharon Eisner Gillett, William H. Lehr, John Wroclawski, David D. Clark Do appliances threaten Internet innovation? Search on Bibsonomy IEEE Commun. Mag. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
27Jeffrey M. Voas Quality Time - Does Untested Software Threaten Infrastructures? Search on Bibsonomy IEEE Softw. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
27Joseph P. McMenamin Does products liability litigation threaten picture archiving and communication systems and/or telemedicine? Search on Bibsonomy J. Digit. Imaging The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
27 Do Expert Systems Threaten Democracy? Search on Bibsonomy IEEE Expert The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
13Tianyin Xu, Yang Chen 0001, Xiaoming Fu 0001, Pan Hui 0001 Twittering by cuckoo: decentralized and socio-aware online microblogging services. Search on Bibsonomy SIGCOMM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF microblogging services, peer-to-peer systems, online social networking
13Qijun Gu Efficient code diversification for network reprogramming in sensor networks. Search on Bibsonomy WISEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF code diversity, code security, deluge, tinyos, network reprogramming
13Ebrahim Bagheri, Ali A. Ghorbani 0001 Astrolabe: A Collaborative Multiperspective Goal-Oriented Risk Analysis Methodology. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Part A The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Reouven Elbaz, David Champagne, Catherine H. Gebotys, Ruby B. Lee, Nachiketh R. Potlapally, Lionel Torres Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines. Search on Bibsonomy Trans. Comput. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Memory Authentication, Integrity Trees, Board level attacks, Security, Trusted Computing, Active attacks
13Sadaf Mustafiz, Jörg Kienzle DREP: A Requirements Engineering Process for Dependable Reactive Systems. Search on Bibsonomy Methods, Models and Tools for Fault Tolerance The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Kohei Tatara, Kouichi Sakurai A Signature Scheme Associated with Universal Re-signcryption. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Mehran Ahsant, Jim Basney Workflows in Dynamic and Restricted Delegation. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Benjamin Edelman Running Out of Numbers: Scarcity of IP Addresses and What to Do about It. Search on Bibsonomy AMMA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Internet, network, Market design, IP addresses
13Noman Mohammed, Benjamin C. M. Fung, Patrick C. K. Hung, Cheuk-kwong Lee Anonymizing healthcare data: a case study on the blood transfusion service. Search on Bibsonomy KDD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF classification, privacy, anonymity, healthcare
13Mahvish Khurum, Tony Gorschek, Lefteris Angelis, Robert Feldt A Controlled Experiment of a Method for Early Requirements Triage Utilizing Product Strategies. Search on Bibsonomy REFSQ The full citation details ... 2009 DBLP  DOI  BibTeX  RDF requirements triage, product strategies, MERTS, effectiveness and efficiency, experiment, Market driven requirements engineering
13Shay Gueron Intel's New AES Instructions for Enhanced Performance and Security. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF new instructions set, computer architecture, Advanced Encryption Standard
13Jin Sung Choi Tom n Jerry. Search on Bibsonomy SIGGRAPH ASIA Animations The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Ray A. Perlner, David A. Cooper Quantum resistant public key cryptography: a survey. Search on Bibsonomy IDtrust The full citation details ... 2009 DBLP  DOI  BibTeX  RDF quantum computers, public key cryptography
13Markus Jakobsson, Peter Finn, Nathaniel A. Johnson Why and How to Perform Fraud Experiments. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Li Li 0008, Guosun Zeng, Bo Chen Trusted Transmission Protocol for Content Security. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Changhee Han, Chan-Hyun Youn, Woo Ram Jung Web-Based System for Advanced Heart Disease Identification Using Grid Computing Technology. Search on Bibsonomy CBMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Gerardo Canfora, Corrado Aaron Visaggio A System to Prevent Multi-users and Multi-sessions Attack to Breach Privacy Policies in a Trust-End Filter. Search on Bibsonomy COMPSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF front end trust filter, data privacy
13Jivika Govil, Navkeerat Kaur, Harkeerat Kaur, Jivesh Govil Data/Information Lifecycle Management: A Solution for Taming Data Beast. Search on Bibsonomy ITNG The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ILM, Application, Discipline
13Hakem Beitollahi, Geert Deconinck An overlay protection layer against Denial-of-Service attacks. Search on Bibsonomy IPDPS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Irina Shklovski, Robert E. Kraut, Jonathon N. Cummings Keeping in touch by technology: maintaining friendships after a residential move. Search on Bibsonomy CHI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF communication, mobility, social relationships, friendship, cmc
13Diane K. Davies, Hein F. Vosloo, Suresh K. Santhana Vannan, Philip E. Frost Near real-time fire alert system in South Africa: from desktop to mobile service. Search on Bibsonomy Conference on Designing Interactive Systems The full citation details ... 2008 DBLP  DOI  BibTeX  RDF fire alerts, GIS, remote sensing, mobile technology, satellite, electricity, South Africa, web mapping services
13Joseph Chabarek, Joel Sommers, Paul Barford, Cristian Estan, David Tsiang, Stephen J. Wright 0001 Power Awareness in Network Design and Routing. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Somitra Kumar Sanadhya, Palash Sarkar 0001 New Collision Attacks against Up to 24-Step SHA-2. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF SHA-2 hash family, reduced round attacks, Cryptanalysis
13Dong Hee Shin, Murali Venkatesh Analysis of the Development of Kutztown Community Network. Search on Bibsonomy HICSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Hao Tu, Zhitang Li, Bin Liu 0013 Mining Network Traffic for Worm Signature Extraction. Search on Bibsonomy FSKD (4) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Andreas Holzinger, Klaus Schaupp, Walter Eder-Halbedl An Investigation on Acceptance of Ubiquitous Devices for the Elderly in a Geriatric Hospital Environment: Using the Example of Person Tracking. Search on Bibsonomy ICCHP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Person localization, Human-Computer Interaction, Usability, Ubiquitous Computing, Older Adults, Acceptance, Hospital
13Wei Wang 0062, Dongyao Ji Using SPIN to Detect Vulnerabilities in the AACS Drive-Host Authentication Protocol. Search on Bibsonomy FORTE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AACS, Authenticity, SPIN, LTL, Collusion Attack, Model Checker
13Michael L. Brodie The End of the Computing Era: Hephaestus Meets the Olympians. Search on Bibsonomy TOOLS (46) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Xianfeng Zhao, Bingbing Xia, Yi Deng 0002 Strengthening QIM-Based Watermarking by Non-uniform Discrete Cosine Transform. Search on Bibsonomy Information Hiding The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Henry Cook, Kevin Skadron Predictive design space exploration using genetically programmed response surfaces. Search on Bibsonomy DAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF genetic programming, design space exploration, predictive modeling
13Yonghong Yang, Zhenyu (Peter) Gu, Changyun Zhu, Robert P. Dick, Li Shang ISAC: Integrated Space-and-Time-Adaptive Chip-Package Thermal Analysis. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Mo Liu 0005, Craig S. Lent Reliability and Defect Tolerance in Metallic Quantum-dot Cellular Automata. Search on Bibsonomy J. Electron. Test. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF single electronics, nanoelectronics, QCA, quantum-dot cellular automata, molecular electronics
13Christos K. Dimitriadis Improving Mobile Core Network Security with Honeynets. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Tina R. Knutson Building Privacy into Software Products and Services. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Mi Kyung Han, Brian Overstreet, Lili Qiu Greedy Receivers in IEEE 802.11 Hotspots. Search on Bibsonomy DSN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Greedy receiver, wireless LAN
13Vasileios Pappas, Daniel Massey, Lixia Zhang 0001 Enhancing DNS Resilience against Denial of Service Attacks. Search on Bibsonomy DSN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF caching, resilience, DDoS, DNS
13Jose Romero-Mariona, Hadar Ziv, Debra J. Richardson CCARCH: Architecting Common Criteria Security Requirements. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Rebeca Roe Dunn-Krahn, Yvonne Coady The elephant in the room: who will take care of the code? Search on Bibsonomy OOPSLA Companion The full citation details ... 2007 DBLP  DOI  BibTeX  RDF children and computer science, future of the computer industry, women in computer science
13Bipin Bihari Jayasingh, Manas Ranjan Patra Rule Based Evidence Mining for Network Attack. Search on Bibsonomy ICIT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Jörn Müller-Quade, Dominique Unruh Long-Term Security and Universal Composability. Search on Bibsonomy TCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF long-term security, commitment, zero-knowledge, Universal Composability
13Mahvish Khurum, Khurum Aslam, Tony Gorschek A Method for Early Requirements Triage and Selection Utilizing Product Strategies. Search on Bibsonomy APSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Ettore Merlo, Dominic Letarte, Giuliano Antoniol Automated Protection of PHP Applications Against SQL-injection Attacks. Search on Bibsonomy CSMR The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13James L. Hilton Sunrise or perfect storm: technology, education, and the knowledge economy. Search on Bibsonomy SIGUCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Chong (Alex) Wang, Xiaoquan (Michael) Zhang Sampling of information goods. Search on Bibsonomy ICEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF consumer search, free sample, information technology, advertising, economic model, information goods
13Michael D. Bailey, Jon Oberheide, Jon Andersen, Zhuoqing Morley Mao, Farnam Jahanian, Jose Nazario Automated Classification and Analysis of Internet Malware. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Jugash Chandarlapati, Mainak Chaudhuri LEMap: Controlling leakage in large chip-multiprocessor caches via profile-guided virtual address translation. Search on Bibsonomy ICCD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Sean Zdenek Frozen ecstasy: visualizing hearing in marketing materials for cochlear implants. Search on Bibsonomy SIGDOC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF deaf studies, discourse studies, technical marketing communication, visual rhetoric, cochlear implants
13Wm. Arthur Conklin, Glenn B. Dietrich Secure Software Engineering: A New Paradigm. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Ching-Hsue Cheng 0001, Jr-Shian Chen Reinforced Rough Set Theory Based on Modified MEPA in Classifying Cardiovascular Disease. Search on Bibsonomy FSKD (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Andra Leurdijk Will Broadcasters Survive in the Online and Digital Domain? Search on Bibsonomy EuroITV The full citation details ... 2007 DBLP  DOI  BibTeX  RDF audiovisual archives, internet, broadcaster, business model, user generated content, digital television
13Hyun-A Park, Dong Hoon Lee 0001, Jongin Lim 0001, Sang Hyun Cho PPIDS: Privacy Preserving Intrusion Detection System. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Host-based IDS, Privacy, Intrusion Detection System, Audit log, Privacy Homomorphism
13Christopher C. Yang, Tobun D. Ng, Jau-Hwang Wang, Chih-Ping Wei, Hsinchun Chen Analyzing and Visualizing Gray Web Forum Structure. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Gray Web forum, security informatics, information visualization, information extraction, social network analysis
13Aggelos Kiayias, Serdar Pehlivanoglu Pirate Evolution: How to Make the Most of Your Traitor Keys. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13David Whyte, Paul C. van Oorschot, Evangelos Kranakis Tracking Darkports for Network Defense. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Mariusz Jacyno, Seth Bullock, Terry R. Payne, Michael Luck Understanding decentralised control of resource allocation in a minimal multi-agent system. Search on Bibsonomy AAMAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Bridget Kane, Saturnino Luz Multidisciplinary Medical Team Meetings: An Analysis of Collaborative Working with Special Attention to Timing and Teleconferencing. Search on Bibsonomy Comput. Support. Cooperative Work. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF multidisciplinary medical team meetings, ethnography, healthcare, interaction analysis, teleconference
13Carman Neustaedter, Saul Greenberg, Michael Boyle Blur filtration fails to preserve privacy for home-based video conferencing. Search on Bibsonomy ACM Trans. Comput. Hum. Interact. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF awareness, video conferencing, Telecommuting
13David Geer Security of Critical Control Systems Sparks Concern. Search on Bibsonomy Computer The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Security, Safety-critical systems
13Christos Xenakis Malicious actions against the GPRS technology. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 181 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license