Pascal and Francis Bibliographic Databases

Help

Search results

Your search

ct.\*:("Memory and file management (including protection and security)")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 13655

  • Page / 547

Export

Selection :

  • and

A Bug Hunter's Diary, T. Klein, No Starch Press (2011)STERGIOPOULOS, George; GRITZALIS, Dimitris.Computers & security. 2014, Vol 43, issn 0167-4048, p. 188Article

By Any Means Possible: How Intelligence Agencies Have Gotten Their DataBELLOVIN, Steven M.IEEE security & privacy. 2014, Vol 12, Num 4, pp 80-84, issn 1540-7993, 5 p.Article

Genomic Privacy and the Rise of a New Research CommunityDE CRISTOFARO, Emiliano.IEEE security & privacy. 2014, Vol 12, Num 2, pp 80-83, issn 1540-7993, 4 p.Article

Toward a Science of Secure EnvironmentsMcDANIEL, Patrick; RIVERA, Brian; SWAMI, Ananthram et al.IEEE security & privacy. 2014, Vol 12, Num 4, pp 68-70, issn 1540-7993, 3 p.Article

A situation awareness model for information security risk managementWEBB, Jeb; AHMAD, Atif; MAYNARD, Sean B et al.Computers & security. 2014, Vol 44, pp 1-15, issn 0167-4048, 15 p.Article

Incident-centered information security: Managing a strategic balance between prevention and responseBASKERVILLE, Richard; SPAGNOLETTI, Paolo; JONGWOO KIM et al.Information & management. 2014, Vol 51, Num 1, pp 138-151, issn 0378-7206, 14 p.Article

Leadership Failures in the' National Security ComplexBERGHEL, Hal.Computer (Long Beach, CA). 2014, Vol 47, Num 6, pp 64-67, issn 0018-9162, 4 p.Article

Defense on the Move: Ant-Based Cyber Defense : Moving TargetFINK, Glenn A; HAACK, Jereme N; MCKINNON, A. David et al.IEEE security & privacy. 2014, Vol 12, Num 2, pp 36-43, issn 1540-7993, 8 p.Article

Security in Cloud ComputingGRITZALIS, Stefanos; MITCHELL, Chris; THURAISINGHAM, Bhavani et al.International journal of information security (Print). 2014, Vol 13, Num 2, issn 1615-5262, 122 p.Serial Issue

SYSTEMS SECURITY, SAFETY AND SUSTAINABILITYInternational journal of electronic security and digital forensics (Print). 2014, Vol 6, Num 2, issn 1751-911X, 77 p.Serial Issue

Anon-Pass: Practical Anonymous SubscriptionsLEE, Michael Z; DUNN, Alan M; KATZ, Jonathan et al.IEEE security & privacy. 2014, Vol 12, Num 3, pp 20-27, issn 1540-7993, 8 p.Conference Paper

Eternal War in MemorySZEKERES, László; PAYER, Mathias; LENX TAO WEI et al.IEEE security & privacy. 2014, Vol 12, Num 3, pp 45-53, issn 1540-7993, 9 p.Conference Paper

Bayesian Theory Based Adaptive Proximity Data Accessing for CMP Caches : Circuit, System, and Computer TechnologiesLI, Guohong; LIU, Zhenyu; GUO, Sanchuan et al.IEICE transactions on fundamentals of electronics, communications and computer science. 2013, Vol 96, Num 6, pp 1293-1305, issn 0916-8508, 13 p.Article

Can a Phone's GPS Lie Intelligently?DEWRI, Rinku; THURIMELLA, Ramakrishna.Computer (Long Beach, CA). 2013, Vol 46, Num 2, pp 91-93, issn 0018-9162, 3 p.Article

Catching the Behavioral Differences between Multiple Executions for Malware Detection : Cryptography and Information SecurityKASAMA, Takahir O; YOSHIOKA, Katsunar I; INOUE, Daisuke et al.IEICE transactions on fundamentals of electronics, communications and computer science. 2013, Vol 96, Num 1, pp 225-232, issn 0916-8508, 8 p.Article

Combating Good Point Set Scanning-based Self-learning Worms by Using PredatorsFANGWEI WANG; YUNKAI ZHANG; HONGGANG GUO et al.International journal of network security (Print). 2013, Vol 15, Num 3, pp 171-178, issn 1816-353X, 8 p.Article

Defeating SQL InjectionKHIN SHAR, Lwin; KUAN TAN, Hee Beng.Computer (Long Beach, CA). 2013, Vol 46, Num 3, pp 69-77, issn 0018-9162, 9 p.Article

Evaluation in the absence of absolute ground truth: toward reliable evaluation methodology for scan detectorsALSALEH, Mansour; VAN OORSCHOT, P. C.International journal of information security (Print). 2013, Vol 12, Num 2, pp 97-110, issn 1615-5262, 14 p.Article

Monitoring Integrity Using Limited Local MemoryKINEBUCHI, Yuki; BUTT, Shakeel; GANAPATHY, Vinod et al.IEEE transactions on information forensics and security. 2013, Vol 8, Num 7-8, pp 1230-1242, issn 1556-6013, 13 p.Article

Rethinking PasswordsCHESWICK, William.Communications of the ACM. 2013, Vol 56, Num 2, pp 40-44, issn 0001-0782, 5 p.Article

Targeted Cyberattacks: A Superset of Advanced Persistent ThreatsSOOD, Aditya K; ENBODY, Richard J.IEEE security & privacy. 2013, Vol 11, Num 1, pp 54-61, issn 1540-7993, 8 p.Article

The Personal Data Store Approach to Personal Data Security : Identity IntegrityKIRKHAM, Tom; WINFIELD, Sandra; RAVET, Serge et al.IEEE security & privacy. 2013, Vol 11, Num 5, pp 12-19, issn 1540-7993, 8 p.Article

Wiretap Channels: Implications of the More Capable Condition and Cyclic Shift SymmetryOZEL, Omur; ULUKUS, Sennur.IEEE transactions on information theory. 2013, Vol 59, Num 4, pp 2153-2164, issn 0018-9448, 12 p.Article

A Novel Watermarking Scheme for Secure Relational DatabasesRAJESH KUMAR TIWARI; SAHOO, G.Information security journal (Print). 2013, Vol 22, Num 1-3, pp 105-116, issn 1939-3555, 12 p.Article

A Survey on Cache Tuning from a Power/Energy PerspectiveWEI ZANG; GORDON-ROSS, Ann.ACM computing surveys. 2013, Vol 45, Num 3, issn 0360-0300, 32.1-32.49Article

  • Page / 547