Pascal and Francis Bibliographic Databases

Help

Search results

Your search

cc.\*:("001D02B07C")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 13655

  • Page / 547
Export

Selection :

  • and

SBA-XACML: Set-based approach providing efficient policy decision process for accessing Web servicesMOURAD, Azzam; JEBBAOUI, Hussein.Expert systems with applications. 2015, Vol 42, Num 1, pp 165-178, issn 0957-4174, 14 p.Article

How Well Do You Know Your Personae Non Gratae?CLELAND-HUANG, Jane.IEEE software. 2014, Vol 31, Num 4, pp 28-31, issn 0740-7459, 4 p.Article

Securing Cloud and Mobility: A Practitioner's Guide, I. Lim, E. Coleen Coolidge, P. Hourani, Auerbach Publications, USA (2013)TSALIS, Nikolaos; GRITZALIS, Dimitris.Computers & security. 2014, Vol 45, issn 0167-4048, p. 305Article

Privacy Issues in Identity VerificationSLOMOVIC, Anna.IEEE security & privacy. 2014, Vol 12, Num 3, pp 71-73, issn 1540-7993, 3 p.Article

The Eyes Have It: Surveillance and How It EvolvedPFLEEGER, Shari Lawrence.IEEE security & privacy. 2014, Vol 12, Num 4, pp 74-79, issn 1540-7993, 6 p.Article

Willis Ware's Lasting Contribution to Privacy: Fair Information PracticesGELLMAN, Robert.IEEE security & privacy. 2014, Vol 12, Num 4, pp 51-54, issn 1540-7993, 4 p.Article

A Delaunay Quadrangle-Based Fingerprint Authentication System With Template Protection Using Topology Code for Local Registration and Security EnhancementWENCHENG YANG; JIANKUN HU; SONG WANG et al.IEEE transactions on information forensics and security. 2014, Vol 9, Num 7-8, pp 1179-1192, issn 1556-6013, 14 p.Article

A Distributed and Collaborative Intrusion Detection Architecture for Wireless Mesh Networks : DEVELOPMENTS IN SECURITY AND PRIVACY-PRESERVING MECHANISMS FOR FUTURE MOBILE COMMUNICATION NETWORKSMORAIS, Anderson; CAVALLI, Ana.Journal on special topics in mobile networks and applications. 2014, Vol 19, Num 1, pp 101-120, issn 1383-469X, 20 p.Article

A Dynamic Matching Algorithm for Audio Timestamp Identification Using the ENF CriterionGUANG HUA; GOH, Jonathan; THING, Vrizlynn L. L et al.IEEE transactions on information forensics and security. 2014, Vol 9, Num 7-8, pp 1045-1055, issn 1556-6013, 11 p.Article

A Phase-Based Audio Watermarking System Robust to Acoustic Path PropagationARNOLD, Michael; CHEN, Xiao-Ming; BAUM, Peter et al.IEEE transactions on information forensics and security. 2014, Vol 9, Num 3-4, pp 411-425, issn 1556-6013, 15 p.Article

A balance of power principle for decentralized resource sharingYEMINI, Yechiam.Computer networks (1999). 2014, Vol 66, pp 46-51, issn 1389-1286, 6 p.Article

A blind audio watermarking algorithm by logarithmic quantization index modulationXINKAI WANG; PENGJUN WANG; PENG ZHANG et al.Multimedia tools and applications. 2014, Vol 71, Num 3, pp 1157-1177, issn 1380-7501, 21 p.Article

A bottom-up approach to verifiable embedded system information flow securityDEJUN MU; WEI HU; BAOLEI MAO et al.IET information security (Print). 2014, Vol 8, Num 1, pp 12-17, issn 1751-8709, 6 p.Article

A classification of location privacy attacks and approaches : Security and Trust in Context-Aware ApplicationsWERNKE, Marius; SKVORTSOV, Pavel; DÜRR, Frank et al.Personal and ubiquitous computing (Print). 2014, Vol 18, Num 1, pp 163-175, issn 1617-4909, 13 p.Article

A defense framework against malware and vulnerability exploitsMENG ZHANG; RAGHUNATHAN, Anand; JHA, Niraj K et al.International journal of information security (Print). 2014, Vol 13, Num 5, pp 439-452, issn 1615-5262, 14 p.Article

A distance sum-based hybrid method for intrusion detectionCHUN GUO; YAJIAN ZHOU; YUAN PING et al.Applied intelligence (Boston). 2014, Vol 40, Num 1, pp 178-188, issn 0924-669X, 11 p.Article

A general framework for scalable transductive transfer learningMOHAMMAD TAHA BAHADORI; YAN LIU; DAN ZHANG et al.Knowledge and information systems (Print). 2014, Vol 38, Num 1, pp 61-83, issn 0219-1377, 23 p.Article

A lightweight privacy preserving SMS-based recommendation system for mobile usersBECCHETTI, L; BERGAMINI, L; COLESANTI, U. M et al.Knowledge and information systems (Print). 2014, Vol 40, Num 1, pp 49-77, issn 0219-1377, 29 p.Article

A queueing theoretic approach for performance evaluation of low-power multi-core embedded systemsMUNIR, Arslan; GORDON-ROSS, Ann; RANKA, Sanjay et al.Journal of parallel and distributed computing (Print). 2014, Vol 74, Num 1, pp 1872-1890, issn 0743-7315, 19 p.Article

A transform domain-based anomaly detection approach to network-wide trafficDINGDE JIANG; ZHENGZHENG XU; PENG ZHANG et al.Journal of network and computer applications. 2014, Vol 40, pp 292-306, issn 1084-8045, 15 p.Article

Active versus Passive Malware CollectionLIN, Ying-Dar; LEE, Chia-Yin; WU, Yu-Sung et al.Computer (Long Beach, CA). 2014, Vol 47, Num 4, pp 59-65, issn 0018-9162, 7 p.Article

Adaptive blacklist-based packet filter with a statistic-based approach in network intrusion detectionYUXIN MENG; KWOK, Lam-For.Journal of network and computer applications. 2014, Vol 39, pp 83-92, issn 1084-8045, 10 p.Article

An adaptive elliptical anomaly detection model for wireless sensor networksMOSHTAGHI, Masud; LECKIE, Christopher; KARUNASEKERA, Shanika et al.Computer networks (1999). 2014, Vol 64, pp 195-207, issn 1389-1286, 13 p.Article

An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometricsCHUANG, Ming-Chin; MENG CHANG CHEN.Expert systems with applications. 2014, Vol 41, Num 4, pp 1411-1418, issn 0957-4174, 8 p., 1Article

An ant colony model based replica consistency maintenance strategy in unstructured P2P networksXIANFU MENG; CHANGYUAN ZHANG.Computer networks (1999). 2014, Vol 62, pp 1-11, issn 1389-1286, 11 p.Article

  • Page / 547