|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
No Growbag Graphs found.
|
|
|
Results
Found 29 publication records. Showing 29 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Satyajeet Nimgaonkar, Srujan Kotikela, Mahadevan Gomathisankaran |
CTrust: A Framework for Secure and Trustworthy Application Execution in Cloud Computing. |
CyberSecurity |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Hanchen Song, Chris Muelder, Kwan-Liu Ma |
Crucial Nodes Centric Visual Monitoring and Analysis of Computer Networks. |
CyberSecurity |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Pallavi Patil, Pavol Zavarsky, Dale Lindskog, Ron Ruhl |
Fault Tree Analysis of Accidental Insider Security Events. |
CyberSecurity |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Tanja Zseby |
Is IPv6 Ready for the Smart Grid? |
CyberSecurity |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Bo Zhou 0001, David Llewellyn-Jones, Qi Shi 0001, Muhammad Asim 0001, Madjid Merabti, David J. Lamb |
A Compose Language-Based Framework for Secure Service Composition. |
CyberSecurity |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Fernando Sanchez, Zhenhai Duan |
A Sender-Centric Approach to Detecting Phishing Emails. |
CyberSecurity |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Wade Gasior, Li Yang |
Exploring Covert Channel in Android Platform. |
CyberSecurity |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Marlies Rybnicek, Rainer Poisel, Manfred Ruzicka, Simon Tjoa |
A Generic Approach to Critical Infrastructure Modeling and Simulation. |
CyberSecurity |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ahmed Aleroud, George Karabatis |
A Contextual Anomaly Detection Approach to Discover Zero-Day Attacks. |
CyberSecurity |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Chung-Wei Lin, Alberto L. Sangiovanni-Vincentelli |
Cyber-Security for the Controller Area Network (CAN) Communication Protocol. |
CyberSecurity |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Nazari Skrupsky, Maliheh Monshizadeh, Prithvi Bisht, Timothy L. Hinrichs, V. N. Venkatakrishnan, Lenore D. Zuck |
WAVES: Automatic Synthesis of Client-Side Validation Code for Web Applications. |
CyberSecurity |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Todd Baumeister, Yingfei Dong, Zhenhai Duan, Guanyu Tian |
A Routing Table Insertion (RTI) Attack on Freenet. |
CyberSecurity |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Simon Reay Atkinson, David Walker 0002, Kevin Beaulne, Liaquat Hossain |
Cyber - Transparencies, Assurance and Deterrence. |
CyberSecurity |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Denise Ferebee, Dipankar Dasgupta, Qishi Wu |
A Cyber-Security Storm MAP. |
CyberSecurity |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Johannes de Vries, Hans Hoogstraaten, Jan van den Berg, Semir Daskapan |
Systems for Detecting Advanced Persistent Threats: A Development Roadmap Using Intelligent Data Analysis. |
CyberSecurity |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Paul Giura, Wei Wang |
A Context-Based Detection Framework for Advanced Persistent Threats. |
CyberSecurity |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Sharif Hassan, Ratan Guha |
Security and Integrity Analysis Using Indicators. |
CyberSecurity |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Olga Kulikova, Ronald Heil, Jan van den Berg, Wolter Pieters |
Cyber Crisis Management: A Decision-Support Framework for Disclosing Security Incident Information. |
CyberSecurity |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Shlomi Dolev, Niv Gilboa, Marina Kopeetsky |
Permanent Revocation in Attribute Based Broadcast Encryption. |
CyberSecurity |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Alex Doyal, Justin Zhan, Huiming Anna Yu |
Towards Defeating DDoS Attacks. |
CyberSecurity |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Kazuya Kishimoto, Kenji Ohira, Yukiko Yamaguchi, Hirofumi Yamaki, Hiroki Takakura |
An Adaptive Honeypot System to Capture IPv6 Address Scans. |
CyberSecurity |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Anass Bayaga, Stephen Flowerday |
Principal Causes of Information Communication Technology (ICT) Risk Failure in an SME. |
CyberSecurity |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Munene W. Kanampiu, Justin Zhan |
A Dynamic Covert Passive Actors Detection Scheme for a Healthy Networked Community. |
CyberSecurity |
2012 |
DBLP DOI BibTeX RDF |
|
1 | |
2012 ASE International Conference on Cyber Security, Alexandria, VA, USA, December 14-16, 2012 |
CyberSecurity |
2012 |
DBLP BibTeX RDF |
|
1 | Woohyun Shim, Luca Allodi, Fabio Massacci |
Crime Pays If You Are Just an Average Hacker. |
CyberSecurity |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Andre Abadie, Duminda Wijesekera |
Leveraging an Inventory of the Cognitive Radio Attack Surface. |
CyberSecurity |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jun Dai, Xiaoyan Sun 0003, Peng Liu 0005, Nicklaus A. Giacobe |
Gaining Big Picture Awareness through an Interconnected Cross-Layer Situation Knowledge Reference Model. |
CyberSecurity |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Robert F. Erbacher, Steve E. Hutchinson |
Extending Case-Based Reasoning to Network Alert Reporting. |
CyberSecurity |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Shams Zawoad, Ragib Hasan |
I Have the Proof: Providing Proofs of Past Data Possession in Cloud Forensics. |
CyberSecurity |
2012 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #29 of 29 (100 per page; Change: )
|
|