Pascal and Francis Bibliographic Databases

Help

Search results

Your search

cc.\*:("001D02B07C")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 9133

  • Page / 366
Export

Selection :

  • and

On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on Intrusion Detection SystemsELHAG, Salma; FERNANDEZ, Alberto; BAWAKID, Abdullah et al.Expert systems with applications. 2015, Vol 42, Num 1, pp 193-202, issn 0957-4174, 10 p.Article

Social Media versus Privacy and CredibilityHUESCH, Marco D.IEEE intelligent systems. 2014, Vol 29, Num 2, pp 71-74, issn 1541-1672, 4 p.Article

Quantitative Security Metrics: Unattainable Holy Grail or a Vital Breakthrough within Our Reach?SANDERS, William H.IEEE security & privacy. 2014, Vol 12, Num 2, pp 67-69, issn 1540-7993, 3 p.Article

Stuxnet and the vital role of critical infrastructure operators and engineersHAGEROTT, Mark.International journal of critical infrastructure protection (Print). 2014, Vol 7, Num 4, pp 244-246, issn 1874-5482, 3 p.Article

The Enduring Importance of TransparencyMULLIGAN, Deirdre K.IEEE security & privacy. 2014, Vol 12, Num 3, pp 61-65, issn 1540-7993, 5 p.Article

A General Framework of Wiretap Channel With Helping Interference and State InformationPENG XU; ZHIGUO DING; XUCHU DAI et al.IEEE transactions on information forensics and security. 2014, Vol 9, Num 1-2, pp 182-195, issn 1556-6013, 14 p.Article

A construction for t-fold perfect authentication codes with arbitrationMIAO LIANG; MINGCHAO LI; BEILIANG DU et al.Designs, codes and cryptography. 2014, Vol 73, Num 3, pp 781-790, issn 0925-1022, 10 p.Article

A defence scheme against Identity Theft Attack based on multiple social networksHE, Bing-Zhe; CHEN, Chien-Ming; SU, Yi-Ping et al.Expert systems with applications. 2014, Vol 41, Num 5, pp 2345-2352, issn 0957-4174, 8 p.Article

A framework for generating realistic traffic for Distributed Denial-of-Service attacks and Flash EventsBHATIA, Sajal; SCHMIDT, Desmond; MOHAY, George et al.Computers & security. 2014, Vol 40, pp 95-107, issn 0167-4048, 13 p.Article

A multi-issued tag key agreement with time constraint for homeland defense sub-department in NFC environment : Advanced Technologies for Homeland Defense and SecurityCHEN, Hsing-Chung.Journal of network and computer applications. 2014, Vol 38, pp 88-98, issn 1084-8045, 11 p.Article

A novel cache aware routing scheme for Information-Centric NetworksSOURLAS, Vasilis; FLEGKAS, Paris; TASSIULAS, Leandros et al.Computer networks (1999). 2014, Vol 59, pp 44-61, issn 1389-1286, 18 p.Article

A novel cache size optimization scheme based on manifold learning in Content Centric NetworkingYUEMEI XU; YANG LI; TAO LIN et al.Journal of network and computer applications. 2014, Vol 37, pp 273-281, issn 1084-8045, 9 p.Article

A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notionTURKANOVIC, Muhamed; BRUMEN, Boštjan; HÖLBL, Marko et al.Ad hoc networks. 2014, Vol 20, pp 96-112, issn 1570-8705, 17 p.Article

A proof technique for security assessment of on-demand ad hoc routing protocolsVAJDA, István.International journal of security and networks (Print). 2014, Vol 9, Num 1, pp 12-19, issn 1747-8405, 8 p.Article

A secure smart-work service model based OpenStack for Cloud computing : Advanced Grid and Pervasive Computing and its ApplicationsKIM, Jin-Mook; JEONG, Hwa-Young; ILKWON CHO et al.Cluster computing. 2014, Vol 17, Num 3, pp 691-702, issn 1386-7857, 12 p.Article

A semantic authorization model for pervasive healthcare : Advanced Technologies for Homeland Defense and SecurityZANG LI; CHU, Chao-Hsien; WEN YAO et al.Journal of network and computer applications. 2014, Vol 38, pp 76-87, issn 1084-8045, 12 p.Article

A semi-fragile image watermarking algorithm with two-stage detectionYAORAN HUO; HONGJIE HE; FAN CHEN et al.Multimedia tools and applications. 2014, Vol 72, Num 1, pp 123-149, issn 1380-7501, 27 p.Article

A survey of secure protocols in Mobile IPv6MODARES, Hero; MORAVEJOSHARIEH, Amirhossein; LLORET, Jaime et al.Journal of network and computer applications. 2014, Vol 39, pp 351-368, issn 1084-8045, 18 p.Article

A survey on trust management for Internet of Things : Internet of ThingsZHENG YAN; PENG ZHANG; VASILAKOS, Athanasios V et al.Journal of network and computer applications. 2014, Vol 42, pp 120-134, issn 1084-8045, 15 p.Article

A taxonomy of privilege escalation attacks in Android applicationsRANGWALA, Mohammed; PING ZHANG; XUKAI ZOU et al.International journal of security and networks (Print). 2014, Vol 9, Num 1, pp 40-55, issn 1747-8405, 16 p.Article

Achieving an effective, scalable and privacy-preserving data sharing service in cloud computingXIN DONG; JIADI YU; YUAN LUO et al.Computers & security. 2014, Vol 42, pp 151-164, issn 0167-4048, 14 p.Article

Adaptive and context-aware privacy preservation exploiting user interactions in smart environments : Data Security and Privacy in Wireless NetworksPALLAPA, Gautham; DAS, Sajal K; DI FRANCESCO, Mario et al.Pervasive and mobile computing (Print). 2014, Vol 12, pp 232-243, issn 1574-1192, 12 p.Article

An Efficient Intrusion Alerts Miner for Forensics Readiness in High Speed NetworksAKREMI, Aymen; SALLAY, Hassen; ROUACHED, Mohsen et al.International journal of information security and privacy. 2014, Vol 8, Num 1, pp 62-78, issn 1930-1650, 17 p.Article

An Efficient Ticket Based Authentication Protocol with Unlinkability for Wireless Access NetworksQI JIANG; JIANFENG MA; GUANGSONG LI et al.Wireless personal communications. 2014, Vol 77, Num 2, pp 1489-1506, issn 0929-6212, 18 p.Article

An Integrated Dynamic Model Optimizing the Risk on Real Time Operating SystemPRASHANTA KUMAR PATRA; PADMA LOCHAN PRADHAN.International journal of information security and privacy. 2014, Vol 8, Num 1, pp 38-61, issn 1930-1650, 24 p.Article

  • Page / 366