Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
53 | Subramanian Appavu, Ramasamy Rajaram |
Learning to Classify Threaten E-mail. |
Asia International Conference on Modelling and Simulation |
2008 |
DBLP DOI BibTeX RDF |
NB, Data mining, Classification, SVM, DT |
40 | Tim Button |
Hyperloops Do Not Threaten the Notion of an Effective Procedure. |
CiE |
2009 |
DBLP DOI BibTeX RDF |
|
39 | David Alan Hanson |
Data security. |
ACM Southeast Regional Conference |
1979 |
DBLP DOI BibTeX RDF |
|
36 | Yuan Tian 0003, Biao Song, Eui-nam Huh |
A threat-based privacy preservation system in untrusted environment. |
ICHIT |
2009 |
DBLP DOI BibTeX RDF |
threaten, privacy, purpose |
27 | Shi Dong 0001, Huadong Su, Yuanjun Xia, Fei Zhu, Xinrong Hu, Bangchao Wang |
A Comprehensive Survey on Authentication and Attack Detection Schemes That Threaten It in Vehicular Ad-Hoc Networks. |
IEEE Trans. Intell. Transp. Syst. |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Maria Pawelec |
Deepfakes and Democracy (Theory): How Synthetic Audio-Visual Media for Disinformation and Hate Speech Threaten Core Democratic Functions. |
Digit. Soc. |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Claudia Romagnoli, Alessandro Bosman, Daniele Casalbore, Marco Anzidei, Fawzi Doumaz, Fabiana Bonaventura, Matteo Meli, Carmelo Verdirame |
Coastal Erosion and Flooding Threaten Low-Lying Coastal Tracts at Lipari (Aeolian Islands, Italy). |
Remote. Sens. |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Zeguo Wang, Shijie Wei, Gui-Lu Long 0001, Lajos Hanzo |
Variational quantum attacks threaten advanced encryption standard based symmetric cryptography. |
Sci. China Inf. Sci. |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Laura Carolina Martínez Esmeral, Andreas Uhl |
Low-Effort Re-identification Techniques Based on Medical Imagery Threaten Patient Privacy. |
MIUA |
2022 |
DBLP DOI BibTeX RDF |
|
27 | John Dorsch |
Hijacking Epistemic Agency: How Emerging Technologies Threaten our Wellbeing as Knowers. |
AIES |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Emmanuelle Vaast, Alain Pinsonneault |
When Digital Technologies Enable and Threaten Occupational Identity: The Delicate Balancing Act of Data Scientists. |
MIS Q. |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Michael L. Littman |
Collusion rings threaten the integrity of computer science research. |
Commun. ACM |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Muhammad Zudhy Irawan, Prawira Fajarindra Belgiawan, Tri Basuki Joewono, Nurvita I. M. Simanjuntak |
Do motorcycle-based ride-hailing apps threaten bus ridership? A hybrid choice modeling approach with latent variables. |
Public Transp. |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Sushma Venkatesh, Haoyu Zhang, Raghavendra Ramachandra, Kiran B. Raja, Naser Damer, Christoph Busch 0001 |
Can GAN Generated Morphs Threaten Face Recognition Systems Equally as Landmark Based Morphs? - Vulnerability and Detection. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
27 | David Knichel, Thorben Moos, Amir Moradi 0001 |
The Risk of Outsourcing: Hidden SCA Trojans in Third-Party IP-Cores Threaten Cryptographic ICs. |
IACR Cryptol. ePrint Arch. |
2020 |
DBLP BibTeX RDF |
|
27 | David Knichel, Thorben Moos, Amir Moradi 0001 |
The Risk of Outsourcing: Hidden SCA Trojans in Third-Party IP-Cores Threaten Cryptographic ICs. |
ETS |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Sushma Venkatesh, Haoyu Zhang, Raghavendra Ramachandra, Kiran B. Raja, Naser Damer, Christoph Busch 0001 |
Can GAN Generated Morphs Threaten Face Recognition Systems Equally as Landmark Based Morphs? - Vulnerability and Detection. |
IWBF |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Sofiane Takarabt, Alexander Schaub 0001, Adrien Facon, Sylvain Guilley, Laurent Sauvage, Youssef Souissi, Yves Mathieu |
Cache-Timing Attacks Still Threaten IoT Devices. |
C2SI |
2019 |
DBLP DOI BibTeX RDF |
|
27 | Robert M. Davison, Monideepa Tarafdar |
Shifting baselines in information systems research threaten our future relevance. |
Inf. Syst. J. |
2018 |
DBLP DOI BibTeX RDF |
|
27 | Irene P. Kan, Anna Drummey |
Do imposters threaten data quality? An examination of worker misrepresentation and downstream consequences in Amazon's Mechanical Turk workforce. |
Comput. Hum. Behav. |
2018 |
DBLP DOI BibTeX RDF |
|
27 | Bob Duncan |
Attackers Constantly Threaten the Survival of Organisations, but there is a New Shark in the Water: Carcharodon Carcharias Moderator Europa Universalis. |
Cyber Security |
2018 |
DBLP DOI BibTeX RDF |
|
27 | Yvonne Höller, Andreas Uhl |
Do EEG-Biometric Templates Threaten User Privacy? |
IH&MMSec |
2018 |
DBLP DOI BibTeX RDF |
|
27 | Tibor Bosse, Tilo Hartmann, Romy A. M. Blankendaal, Nienke Dokter, Marco Otte, Linford Goedschalk |
Virtually Bad: A Study on Virtual Agents that Physically Threaten Human Beings. |
AAMAS |
2018 |
DBLP BibTeX RDF |
|
27 | Varada S. Shevade, Peter V. Potapov, Nancy L. Harris, Tatiana V. Loboda |
Expansion of Industrial Plantations Continues to Threaten Malayan Tiger Habitat. |
Remote. Sens. |
2017 |
DBLP DOI BibTeX RDF |
|
27 | Jakub Zlotowski, Kumar Yogeeswaran, Christoph Bartneck |
Can we control it? Autonomous robots threaten human identity, uniqueness, safety, and resources. |
Int. J. Hum. Comput. Stud. |
2017 |
DBLP DOI BibTeX RDF |
|
27 | A. David Wunsch |
Reality Check: How Science Deniers Threaten Our Future [Book Reviews]. |
IEEE Technol. Soc. Mag. |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Yongjing Chao, Yingmei Wei, Xiaolei Du, Fang Yuan |
Alarm thresholds of threaten regions based on triangle mesh voxelization. |
FSKD |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Marko Jusup, Tadasu Matsuo, Yoh Iwasa |
Barriers to Cooperation Aid Ideological Rigidity and Threaten Societal Collapse. |
PLoS Comput. Biol. |
2014 |
DBLP DOI BibTeX RDF |
|
27 | Sebastian Labitzke, Florian Werling, Jens Mittag, Hannes Hartenstein |
Do online social network friends still threaten my privacy? |
CODASPY |
2013 |
DBLP DOI BibTeX RDF |
|
27 | Max Steiner, Peter Liggesmeyer |
Combination of Safety and Security Analysis - Finding Security Problems That Threaten The Safety of a System. |
DECS@SAFECOMP |
2013 |
DBLP BibTeX RDF |
|
27 | Gang Li, Qingzhong Wang |
The Research of Modeling Method about Underwater Vehicle Penetration Threaten Viewsheds Space. |
BIFE |
2013 |
DBLP DOI BibTeX RDF |
|
27 | Jeff Chester |
Cookie Wars: How New Data Profiling and Targeting Techniques Threaten Citizens and Consumers in the "Big Data" Era. |
European Data Protection |
2012 |
DBLP DOI BibTeX RDF |
|
27 | Paul Alexander Bernal |
Do deficiencies in data privacy threaten our autonomy and if so, can informational privacy rights meet this threat? |
|
2011 |
RDF |
|
27 | Bastiaan van Loenen, Jaap Zevenbergen |
Privacy (Regimes) Do Not Threaten Location Technology Development. |
MDM |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Erwin Louis Carrow |
Puppetnets and botnets: information technology vulnerability exploits that threaten basic internet use. |
InfoSecCD |
2007 |
DBLP DOI BibTeX RDF |
|
27 | David Geer |
Malicious Bots Threaten Network Security. |
Computer |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Jeff Grove |
Legal and technological efforts to lock up content threaten innovation. |
Commun. ACM |
2003 |
DBLP DOI BibTeX RDF |
|
27 | Sharon Eisner Gillett, William H. Lehr, John Wroclawski, David D. Clark |
Do appliances threaten Internet innovation? |
IEEE Commun. Mag. |
2001 |
DBLP DOI BibTeX RDF |
|
27 | Jeffrey M. Voas |
Quality Time - Does Untested Software Threaten Infrastructures? |
IEEE Softw. |
1999 |
DBLP DOI BibTeX RDF |
|
27 | Joseph P. McMenamin |
Does products liability litigation threaten picture archiving and communication systems and/or telemedicine? |
J. Digit. Imaging |
1998 |
DBLP DOI BibTeX RDF |
|
27 | |
Do Expert Systems Threaten Democracy? |
IEEE Expert |
1991 |
DBLP DOI BibTeX RDF |
|
13 | Tianyin Xu, Yang Chen 0001, Xiaoming Fu 0001, Pan Hui 0001 |
Twittering by cuckoo: decentralized and socio-aware online microblogging services. |
SIGCOMM |
2010 |
DBLP DOI BibTeX RDF |
microblogging services, peer-to-peer systems, online social networking |
13 | Qijun Gu |
Efficient code diversification for network reprogramming in sensor networks. |
WISEC |
2010 |
DBLP DOI BibTeX RDF |
code diversity, code security, deluge, tinyos, network reprogramming |
13 | Ebrahim Bagheri, Ali A. Ghorbani 0001 |
Astrolabe: A Collaborative Multiperspective Goal-Oriented Risk Analysis Methodology. |
IEEE Trans. Syst. Man Cybern. Part A |
2009 |
DBLP DOI BibTeX RDF |
|
13 | Reouven Elbaz, David Champagne, Catherine H. Gebotys, Ruby B. Lee, Nachiketh R. Potlapally, Lionel Torres |
Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines. |
Trans. Comput. Sci. |
2009 |
DBLP DOI BibTeX RDF |
Memory Authentication, Integrity Trees, Board level attacks, Security, Trusted Computing, Active attacks |
13 | Sadaf Mustafiz, Jörg Kienzle |
DREP: A Requirements Engineering Process for Dependable Reactive Systems. |
Methods, Models and Tools for Fault Tolerance |
2009 |
DBLP DOI BibTeX RDF |
|
13 | Kohei Tatara, Kouichi Sakurai |
A Signature Scheme Associated with Universal Re-signcryption. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
13 | Mehran Ahsant, Jim Basney |
Workflows in Dynamic and Restricted Delegation. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
13 | Benjamin Edelman |
Running Out of Numbers: Scarcity of IP Addresses and What to Do about It. |
AMMA |
2009 |
DBLP DOI BibTeX RDF |
Internet, network, Market design, IP addresses |
13 | Noman Mohammed, Benjamin C. M. Fung, Patrick C. K. Hung, Cheuk-kwong Lee |
Anonymizing healthcare data: a case study on the blood transfusion service. |
KDD |
2009 |
DBLP DOI BibTeX RDF |
classification, privacy, anonymity, healthcare |
13 | Mahvish Khurum, Tony Gorschek, Lefteris Angelis, Robert Feldt |
A Controlled Experiment of a Method for Early Requirements Triage Utilizing Product Strategies. |
REFSQ |
2009 |
DBLP DOI BibTeX RDF |
requirements triage, product strategies, MERTS, effectiveness and efficiency, experiment, Market driven requirements engineering |
13 | Shay Gueron |
Intel's New AES Instructions for Enhanced Performance and Security. |
FSE |
2009 |
DBLP DOI BibTeX RDF |
new instructions set, computer architecture, Advanced Encryption Standard |
13 | Jin Sung Choi |
Tom n Jerry. |
SIGGRAPH ASIA Animations |
2009 |
DBLP DOI BibTeX RDF |
|
13 | Ray A. Perlner, David A. Cooper |
Quantum resistant public key cryptography: a survey. |
IDtrust |
2009 |
DBLP DOI BibTeX RDF |
quantum computers, public key cryptography |
13 | Markus Jakobsson, Peter Finn, Nathaniel A. Johnson |
Why and How to Perform Fraud Experiments. |
IEEE Secur. Priv. |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Li Li 0008, Guosun Zeng, Bo Chen |
Trusted Transmission Protocol for Content Security. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Changhee Han, Chan-Hyun Youn, Woo Ram Jung |
Web-Based System for Advanced Heart Disease Identification Using Grid Computing Technology. |
CBMS |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Gerardo Canfora, Corrado Aaron Visaggio |
A System to Prevent Multi-users and Multi-sessions Attack to Breach Privacy Policies in a Trust-End Filter. |
COMPSAC |
2008 |
DBLP DOI BibTeX RDF |
front end trust filter, data privacy |
13 | Jivika Govil, Navkeerat Kaur, Harkeerat Kaur, Jivesh Govil |
Data/Information Lifecycle Management: A Solution for Taming Data Beast. |
ITNG |
2008 |
DBLP DOI BibTeX RDF |
ILM, Application, Discipline |
13 | Hakem Beitollahi, Geert Deconinck |
An overlay protection layer against Denial-of-Service attacks. |
IPDPS |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Irina Shklovski, Robert E. Kraut, Jonathon N. Cummings |
Keeping in touch by technology: maintaining friendships after a residential move. |
CHI |
2008 |
DBLP DOI BibTeX RDF |
communication, mobility, social relationships, friendship, cmc |
13 | Diane K. Davies, Hein F. Vosloo, Suresh K. Santhana Vannan, Philip E. Frost |
Near real-time fire alert system in South Africa: from desktop to mobile service. |
Conference on Designing Interactive Systems |
2008 |
DBLP DOI BibTeX RDF |
fire alerts, GIS, remote sensing, mobile technology, satellite, electricity, South Africa, web mapping services |
13 | Joseph Chabarek, Joel Sommers, Paul Barford, Cristian Estan, David Tsiang, Stephen J. Wright 0001 |
Power Awareness in Network Design and Routing. |
INFOCOM |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Somitra Kumar Sanadhya, Palash Sarkar 0001 |
New Collision Attacks against Up to 24-Step SHA-2. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
SHA-2 hash family, reduced round attacks, Cryptanalysis |
13 | Dong Hee Shin, Murali Venkatesh |
Analysis of the Development of Kutztown Community Network. |
HICSS |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Hao Tu, Zhitang Li, Bin Liu 0013 |
Mining Network Traffic for Worm Signature Extraction. |
FSKD (4) |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Andreas Holzinger, Klaus Schaupp, Walter Eder-Halbedl |
An Investigation on Acceptance of Ubiquitous Devices for the Elderly in a Geriatric Hospital Environment: Using the Example of Person Tracking. |
ICCHP |
2008 |
DBLP DOI BibTeX RDF |
Person localization, Human-Computer Interaction, Usability, Ubiquitous Computing, Older Adults, Acceptance, Hospital |
13 | Wei Wang 0062, Dongyao Ji |
Using SPIN to Detect Vulnerabilities in the AACS Drive-Host Authentication Protocol. |
FORTE |
2008 |
DBLP DOI BibTeX RDF |
AACS, Authenticity, SPIN, LTL, Collusion Attack, Model Checker |
13 | Michael L. Brodie |
The End of the Computing Era: Hephaestus Meets the Olympians. |
TOOLS (46) |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Xianfeng Zhao, Bingbing Xia, Yi Deng 0002 |
Strengthening QIM-Based Watermarking by Non-uniform Discrete Cosine Transform. |
Information Hiding |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Henry Cook, Kevin Skadron |
Predictive design space exploration using genetically programmed response surfaces. |
DAC |
2008 |
DBLP DOI BibTeX RDF |
genetic programming, design space exploration, predictive modeling |
13 | Yonghong Yang, Zhenyu (Peter) Gu, Changyun Zhu, Robert P. Dick, Li Shang |
ISAC: Integrated Space-and-Time-Adaptive Chip-Package Thermal Analysis. |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Mo Liu 0005, Craig S. Lent |
Reliability and Defect Tolerance in Metallic Quantum-dot Cellular Automata. |
J. Electron. Test. |
2007 |
DBLP DOI BibTeX RDF |
single electronics, nanoelectronics, QCA, quantum-dot cellular automata, molecular electronics |
13 | Christos K. Dimitriadis |
Improving Mobile Core Network Security with Honeynets. |
IEEE Secur. Priv. |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Tina R. Knutson |
Building Privacy into Software Products and Services. |
IEEE Secur. Priv. |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Mi Kyung Han, Brian Overstreet, Lili Qiu |
Greedy Receivers in IEEE 802.11 Hotspots. |
DSN |
2007 |
DBLP DOI BibTeX RDF |
Greedy receiver, wireless LAN |
13 | Vasileios Pappas, Daniel Massey, Lixia Zhang 0001 |
Enhancing DNS Resilience against Denial of Service Attacks. |
DSN |
2007 |
DBLP DOI BibTeX RDF |
caching, resilience, DDoS, DNS |
13 | Jose Romero-Mariona, Hadar Ziv, Debra J. Richardson |
CCARCH: Architecting Common Criteria Security Requirements. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Rebeca Roe Dunn-Krahn, Yvonne Coady |
The elephant in the room: who will take care of the code? |
OOPSLA Companion |
2007 |
DBLP DOI BibTeX RDF |
children and computer science, future of the computer industry, women in computer science |
13 | Bipin Bihari Jayasingh, Manas Ranjan Patra |
Rule Based Evidence Mining for Network Attack. |
ICIT |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Jörn Müller-Quade, Dominique Unruh |
Long-Term Security and Universal Composability. |
TCC |
2007 |
DBLP DOI BibTeX RDF |
long-term security, commitment, zero-knowledge, Universal Composability |
13 | Mahvish Khurum, Khurum Aslam, Tony Gorschek |
A Method for Early Requirements Triage and Selection Utilizing Product Strategies. |
APSEC |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Ettore Merlo, Dominic Letarte, Giuliano Antoniol |
Automated Protection of PHP Applications Against SQL-injection Attacks. |
CSMR |
2007 |
DBLP DOI BibTeX RDF |
|
13 | James L. Hilton |
Sunrise or perfect storm: technology, education, and the knowledge economy. |
SIGUCCS |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Chong (Alex) Wang, Xiaoquan (Michael) Zhang |
Sampling of information goods. |
ICEC |
2007 |
DBLP DOI BibTeX RDF |
consumer search, free sample, information technology, advertising, economic model, information goods |
13 | Michael D. Bailey, Jon Oberheide, Jon Andersen, Zhuoqing Morley Mao, Farnam Jahanian, Jose Nazario |
Automated Classification and Analysis of Internet Malware. |
RAID |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Jugash Chandarlapati, Mainak Chaudhuri |
LEMap: Controlling leakage in large chip-multiprocessor caches via profile-guided virtual address translation. |
ICCD |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Sean Zdenek |
Frozen ecstasy: visualizing hearing in marketing materials for cochlear implants. |
SIGDOC |
2007 |
DBLP DOI BibTeX RDF |
deaf studies, discourse studies, technical marketing communication, visual rhetoric, cochlear implants |
13 | Wm. Arthur Conklin, Glenn B. Dietrich |
Secure Software Engineering: A New Paradigm. |
HICSS |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Ching-Hsue Cheng 0001, Jr-Shian Chen |
Reinforced Rough Set Theory Based on Modified MEPA in Classifying Cardiovascular Disease. |
FSKD (3) |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Andra Leurdijk |
Will Broadcasters Survive in the Online and Digital Domain? |
EuroITV |
2007 |
DBLP DOI BibTeX RDF |
audiovisual archives, internet, broadcaster, business model, user generated content, digital television |
13 | Hyun-A Park, Dong Hoon Lee 0001, Jongin Lim 0001, Sang Hyun Cho |
PPIDS: Privacy Preserving Intrusion Detection System. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
Host-based IDS, Privacy, Intrusion Detection System, Audit log, Privacy Homomorphism |
13 | Christopher C. Yang, Tobun D. Ng, Jau-Hwang Wang, Chih-Ping Wei, Hsinchun Chen |
Analyzing and Visualizing Gray Web Forum Structure. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
Gray Web forum, security informatics, information visualization, information extraction, social network analysis |
13 | Aggelos Kiayias, Serdar Pehlivanoglu |
Pirate Evolution: How to Make the Most of Your Traitor Keys. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
|
13 | David Whyte, Paul C. van Oorschot, Evangelos Kranakis |
Tracking Darkports for Network Defense. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Mariusz Jacyno, Seth Bullock, Terry R. Payne, Michael Luck |
Understanding decentralised control of resource allocation in a minimal multi-agent system. |
AAMAS |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Bridget Kane, Saturnino Luz |
Multidisciplinary Medical Team Meetings: An Analysis of Collaborative Working with Special Attention to Timing and Teleconferencing. |
Comput. Support. Cooperative Work. |
2006 |
DBLP DOI BibTeX RDF |
multidisciplinary medical team meetings, ethnography, healthcare, interaction analysis, teleconference |
13 | Carman Neustaedter, Saul Greenberg, Michael Boyle |
Blur filtration fails to preserve privacy for home-based video conferencing. |
ACM Trans. Comput. Hum. Interact. |
2006 |
DBLP DOI BibTeX RDF |
awareness, video conferencing, Telecommuting |
13 | David Geer |
Security of Critical Control Systems Sparks Concern. |
Computer |
2006 |
DBLP DOI BibTeX RDF |
Security, Safety-critical systems |
13 | Christos Xenakis |
Malicious actions against the GPRS technology. |
J. Comput. Virol. |
2006 |
DBLP DOI BibTeX RDF |
|