The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Covert with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1982-1989 (18) 1990-1993 (16) 1994-1995 (16) 1996-1997 (18) 1998-2000 (23) 2001-2002 (30) 2003 (18) 2004 (28) 2005 (48) 2006 (39) 2007 (61) 2008 (75) 2009 (76) 2010 (50) 2011 (72) 2012 (70) 2013 (48) 2014 (73) 2015 (101) 2016 (108) 2017 (111) 2018 (129) 2019 (187) 2020 (210) 2021 (245) 2022 (257) 2023 (292) 2024 (72)
Publication types (Num. hits)
article(1168) incollection(12) inproceedings(1290) phdthesis(21)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 515 occurrences of 317 keywords

Results
Found 2502 publication records. Showing 2491 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
150Vipul Goyal, Abhishek Jain 0002 On the round complexity of covert computation. Search on Bibsonomy STOC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF covert computation, cryptography, round complexity
133Yeog Kim, Jewan Bang, Gu Taek Lee, Sangjin Lee 0002, Jongin Lim 0001 A Field Guide to Hidden Accounting Information Detection. Search on Bibsonomy FGCN (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
128Richard A. Kemmerer, Phillip A. Porras Covert Flow Trees: A Visual Approach to Analyzing Covert Storage Channels. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1991 DBLP  DOI  BibTeX  RDF covert storage channels, covert flow tree, listening process, resource attribute, covert channel operation sequences, trees (mathematics), security of data, attributes, tree structure
128Steven Gianvecchio, Haining Wang Detecting covert timing channels: an entropy-based approach. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF detection, covert timing channels
122Yi Wang, Ping Chen 0003, Yi Ge, Bing Mao, Li Xie 0001 Traffic Controller: A Practical Approach to Block Network Covert Timing Channel. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
111Zhenghong Wang, Ruby B. Lee New Constructive Approach to Covert Channel Modeling and Channel Capacity Estimation. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
106Serdar Cabuk, Carla E. Brodley, Clay Shields IP Covert Channel Detection. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Network covert channels, channel detection, information hiding
106Steven Gianvecchio, Haining Wang, Duminda Wijesekera, Sushil Jajodia Model-Based Covert Timing Channels: Automated Modeling and Evasion. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF traffic modeling, evasion, covert timing channels
99Randy Browne An Entropy Conservation Law for Testing the Completeness of Convert Channel Analysis. Search on Bibsonomy CCS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
95Gaoshou Zhai, Yufeng Zhang, Chengyu Liu, Na Yang, Minli Tian, Hengsheng Yang Automatic identification of covert channels inside Linux kernel based on source codes. Search on Bibsonomy ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF covert channel identification, information flow tree, semantic information flow, shared resource matrix, syntactic information flow, Linux kernel
95Trent Jaeger, Reiner Sailer, Yogesh Sreenivasan Managing the risk of covert information flows in virtual machine systems. Search on Bibsonomy SACMAT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF chinese wall policy, information flow secrecy, covert channels
89Sebastian Zander, Grenville J. Armitage, Philip Branch Covert channels in multiplayer first person shooter online games. Search on Bibsonomy LCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
83Alan B. Shaffer, Mikhail Auguston, Cynthia E. Irvine, Timothy E. Levin A security domain model to assess software for exploitable covert channels. Search on Bibsonomy PLAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF automated program verification, security domain model, static analysis, specification language, covert channel, dynamic slicing
83Norka B. Lucena, Grzegorz Lewandowski, Steve J. Chapin Covert Channels in IPv6. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2005 DBLP  DOI  BibTeX  RDF active warden, IPv6, IPsec, covert channel, stateful, stateless
83Luis von Ahn, Nicholas J. Hopper, John Langford 0001 Covert two-party computation. Search on Bibsonomy STOC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF covert computation, fair two-party computation, two-party computation, steganography
83Taeshik Shon, Jung-Taek Seo, Jongsub Moon A Study on the Covert Channel Detection of TCP/IP Header Using Support Vector Machine. Search on Bibsonomy ICICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF TCP/IP protocol security, support vector machine, Intrusion detection, covert channel
83Grzegorz Lewandowski, Norka B. Lucena, Steve J. Chapin Analyzing Network-Aware Active Wardens in IPv6. Search on Bibsonomy Information Hiding The full citation details ... 2006 DBLP  DOI  BibTeX  RDF active wardens, traffic normalizers, active mappers, traffic analysis, covert channels, stateful, stateless, network-aware, evasion attacks
78Jianjun Shen, Sihan Qing, Qingni Shen, Liping Li Optimization of Covert Channel Identification. Search on Bibsonomy IEEE Security in Storage Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
72Keisuke Okamura, Yoshihiro Oyama Load-based covert channels between Xen virtual machines. Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF covert channels, virtual machine monitors
72Ronald William Smith, George Scott Knight Predictable Design of Network-Based Covert Communication Systems. Search on Bibsonomy SP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF forward error correcting codes, insertion errors, probability of detection, reliability, Covert channels
72Xiaofeng Han, Louis F. Rossi, Chien-Chung Shen Autonomous navigation of wireless robot swarms with covert leaders. Search on Bibsonomy ROBOCOMM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF covert leaders, navigation, robot swarms
71Yonglak Sohn, Songchun Moon Verified Order-Based Transaction Scheduling Scheme for Multilevel Secure Database Management Systems. Search on Bibsonomy DEXA The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Database, Concurrency Control, Covert Channel, Multilevel security
67Yunchuan Guo, Lihua Yin, Yuan Zhou, Chao Li 0027, Li Guo 0001 Simulation Analysis of Probabilistic Timing Covert Channels. Search on Bibsonomy NAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
67Yali Liu, Dipak Ghosal, Frederik Armknecht, Ahmad-Reza Sadeghi, Steffen Schulz 0001, Stefan Katzenbeisser 0001 Hide and Seek in Time - Robust Covert Timing Channels. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
67Ge Cheng, Hai Jin 0001, Deqing Zou, Alex K. Ohoussou, Feng Zhao 0003 A Prioritized Chinese Wall Model for Managing the Covert Information Flows in Virtual Machine Systems. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
67Baishakhi Ray, Shivakant Mishra A Protocol for Building Secure and Reliable Covert Channel. Search on Bibsonomy PST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
67Nishanth Chandran, Vipul Goyal, Rafail Ostrovsky, Amit Sahai Covert Multi-Party Computation. Search on Bibsonomy FOCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
67Zhenghong Wang, Ruby B. Lee Covert and Side Channels Due to Processor Architecture. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
67Changda Wang 0001, Shiguang Ju The Dilemma of Covert Channels Searching. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
67Serdar Cabuk, Carla E. Brodley, Clay Shields IP covert timing channels: design and detection. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF network covert channels, TCP/IP, detection, covert timing channels
67Chii-Ren Tsai, Virgil D. Gligor, C. Sekar Chandersekaran On the Identification of Covert Storage Channels in Secure Systems. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1990 DBLP  DOI  BibTeX  RDF covert storage channels, Secure Xenix kernel, visible/alterable kernel variables, language code, sharing relationships, nondiscretionary access rules, false flow violations, kernel locations, audit code, time-delay variables, covert-channel handling, software engineering, identification, security of data, source code, operating systems (computers), secure systems, information-flow analysis, implementation languages
66Xin-guang Zou, Qiong Li, Sheng-He Sun, Xiamu Niu The Research on Information Hiding Based on Command Sequence of FTP Protocol. Search on Bibsonomy KES (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
66Gary Cantrell, David A. Dampier Experiments in hiding data inside the file structure of common office documents: a stegonography application. Search on Bibsonomy ISICT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
61Daniel V. Bailey, Dan Boneh, Eu-Jin Goh, Ari Juels Covert channels in privacy-preserving identification systems. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF privacy, mobile, identification, covert channels, rfid
60Navdeep Kaur, Rajwinder Singh, Manoj Misra, Anil Kumar Sarje Fairness Strategy for Multilevel Secure Concurrency Control Protocol. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF concurrency control, fairness, covert channel, Multilevel secure database systems
56Fedor V. Yarochkin, Shih-Yao Dai, Chih-Hung Lin, Yennun Huang, Sy-Yen Kuo Towards Adaptive Covert Communication System. Search on Bibsonomy PRDC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
56Sebastian Zander, Grenville J. Armitage, Philip Branch An Empirical Evaluation of IP Time To Live Covert Channels. Search on Bibsonomy ICON The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
56Chang-da Wang 0001, Shiguang Ju, Dianchun Guo, Zhen Yang, Wen-yi Zheng Research on the Methods of Search and Elimination in Covert Channels. Search on Bibsonomy GCC (1) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
50Wei Han, Tao Hao, Dong Zheng 0001, Kefei Chen, Xiaofeng Chen 0001 A Tamper-Evident Voting Machine Resistant to Covert Channels. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF tamper-evident, receipt-free, electronic voting, covert channel
50Geir Olav Dyrkolbotn, Einar Snekkenes A Wireless Covert Channel on Smart Cards (Short Paper). Search on Bibsonomy ICICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF EMSide-Channel, Wireless Covert Channel, Smart Cards, Subversion
50Ilaria Venturini Oracle Attacks and Covert Channels. Search on Bibsonomy IWDW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Oracle attacks, Watermarking, Covert channels
50Ira S. Moskowitz, Richard E. Newman, Daniel P. Crepeau, Allen R. Miller Covert channels and anonymizing networks. Search on Bibsonomy WPES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF anonymity, information theory, covert channel, MIX
50Richard A. Kemmerer, Tad Taylor A Modular Covert Channel Analysis Methodology for Trusted DG/UXTM. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF modular covert channel analysis methodology, Trusted DG/UX, CCA approach, subsystem architecture, DG/UX kernel, system state, abstract object, Ratings Maintenance Program, RAMP, SRM analysis, exported function, peer subsystems, kernel-wide SRM, commercial strength Unix system, operating system kernels, system calls, modular approach
50John V. A. Janeri, Daylan B. Darby, Daniel D. Schnackenberg Building higher resolution synthetic clocks for signaling in covert timing channels. Search on Bibsonomy CSFW The full citation details ... 1995 DBLP  DOI  BibTeX  RDF higher resolution synthetic clocks, timing channel countermeasure, Boeing multilevel secure local area network, secure network server, internal timing channels, time reference clock granularity, fine-grained signaling clock, timing channel throughput, timing channel capacities, local area networks, security of data, worst-case analysis, covert timing channels
49Mohammad Iftekhar Husain, Shambhu J. Upadhyaya, Madhusudhanan Chandrasekaran A Novel Approach for Security and Robustness in Wireless Embedded Systems. Search on Bibsonomy SEUS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF RTS/CTS, Security, Embedded systems, Wireless networks, Media Access Control (MAC), Covert channel
49Sihan Qing, Changxiang Shen Design of secure operating systems with high security levels. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF secure operating systems with high security levels, covert channel analysis, architecture, security model
49Nikita Borisov, Kazuhiro Minami Single-bit re-encryption with applications to distributed proof systems. Search on Bibsonomy WPES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF commutative encryption, distributed proof systems, goldwasser-micali, covert channels, re-encryption
49Todd Fine Defining Noninterference in the Temporal Logic of Actions. Search on Bibsonomy S&P The full citation details ... 1996 DBLP  DOI  BibTeX  RDF noninterference properties, temporal logic of actions, multilevel secure systems, formal specification, formal methods, temporal logic, composition, security of data, covert channels, definitions, specification refinement
45Hui Tian 0002, Ke Zhou 0001, Yongfeng Huang 0001, Dan Feng 0001, Jin Liu 0017 A Covert Communication Model Based on Least Significant Bits Steganography in Voice over IP. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
45Vipul Goyal, Payman Mohassel, Adam D. Smith Efficient Two Party and Multi Party Computation Against Covert Adversaries. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
45Yonatan Aumann, Yehuda Lindell Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries. Search on Bibsonomy TCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
45Heiko Mantel, Henning Sudbrock Comparing Countermeasures against Interrupt-Related Covert Channels in an Information-Theoretic Framework. Search on Bibsonomy CSF The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
45Gu Taek Lee, Seokhee Lee 0002, Elena Tsomko, Sangjin Lee 0002 Discovering Methodology and Scenario to Detect Covert Database System. Search on Bibsonomy FGCN (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
45Zhenghong Wang, Ruby B. Lee Capacity Estimation of Non-Synchronous Covert Channels. Search on Bibsonomy ICDCS Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
45Hui Huang Lee, Ee-Chien Chang, Mun Choon Chan Pervasive Random Beacon in the Internet for Covert Coordination. Search on Bibsonomy Information Hiding The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
45Eugene Tumoian, Maxim Anikeev Network Based Detection of Passive Covert Channels in TCP/IP. Search on Bibsonomy LCN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
45Loïc Hélouët Finding Covert Channels in Protocols with Message Sequence Charts: The Case of RMTP2. Search on Bibsonomy SAM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
45Shiguang Ju, Xiaoyu Song On the Formal Characterization of Covert Channel. Search on Bibsonomy AWCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
45Taeshik Shon, Taewoo Noh, Jongsub Moon Support Vector Machine Based ICMP Covert Channel Attack Detection. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
45John Giffin, Rachel Greenstadt, Peter Litwack, Richard Tibbetts Covert Messaging through TCP Timestamps. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
45Alexander A. Grusho Mathematical Models of the Covert Channels. Search on Bibsonomy MMM-ACNS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
45Shufen Zhang, Xuebin Chen, Shuai Zhang, Hongcan Yan The Research on the Principle of Covert Communication and Defense Strategy Based on Sniffer. Search on Bibsonomy NCM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Sniffer, Covert Channel, Covert communication
44Henrik Svensson, Anthony F. Morse, Tom Ziemke Neural Pathways of Embodied Simulation. Search on Bibsonomy ABiALS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
44Lei Zheng, Ingemar J. Cox JPEG Based Conditional Entropy Coding for Correlated Steganography. Search on Bibsonomy ICME The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
44 Practical Approaches for Analysis, Visualization and Destabilizing Terrorist Networks. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
44Ilaria Venturini Oracle Channels. Search on Bibsonomy Trans. Data Hiding Multim. Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Oracle attacks, Secure watermarking, Information hiding, Covert channels, Information leakage, Subliminal channels, Covert communications
39Sylvain Chevallier, Philippe Tarroux Covert Attention with a Spiking Neural Network. Search on Bibsonomy ICVS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF precise spike-timing, covert attention, saliency, spiking neurons
39Dario V. Forte, Cristiano Maruti, Michele R. Vetturi, Michele Zambelli SecSyslog: an Approach to Secure Logging Based on Covert Channels. Search on Bibsonomy SADFE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Log Correlation, Log Integrity, Covert Channel, Forensic, Spyware, Log analysis
39Kevin Borders, Atul Prakash 0001 Web tap: detecting covert web traffic. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF spyware detection, intrusion detection, anomaly detection, HTTP, covert channels, tunnels
39Sang Hyuk Son, Ravi Mukkamala, Rasikan David Integrating Security and Real-Time Requirements Using Covert Channel Capacity. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF covert channel analysis, real-time systems, Concurrency control, database systems, multilevel security, locking protocols
38Navdeep Kaur, Rajwinder Singh, Manoj Misra, Anil Kumar Sarje Secure Transaction Management Protocols for MLS/DDBMS. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF concurrency control, covert channel, Multilevel security, distributed database system, commit protocol
38Jong Youl Choi, Philippe Golle, Markus Jakobsson Auditable Privacy: On Tamper-Evident Mix Networks. Search on Bibsonomy Financial Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF tamper-evident, observer, malware, covert channel, Mix network, subliminal channel
38Myong H. Kang, Ira S. Moskowitz, Daniel C. Lee 0001 A Network Pump. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF security, information theory, flow control, router, Covert channel, gateway
38X. C. Dellanoy, C. Del Vigna Binary Integrity Constraints Against Confidentiality. Search on Bibsonomy DEXA The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Discretionary Models of Confidentiality, Integrity Constraints, Relational Model, Covert Channel
34Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang TCP covert timing channels: Design and detection. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
34Dan Mossop, Ronald Pose Covert Channel Analysis of the Password-Capability System. Search on Bibsonomy Asia-Pacific Computer Systems Architecture Conference The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
34Sukhoon Kang, Yong-Rak Choi A Covert Timing Channel-Free Optimistic Concurrency Control Scheme for Multilevel Secure Database Management Systems. Search on Bibsonomy KES (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
34Jianjun Shen, Sihan Qing, Qingni Shen, Liping Li Covert Channel Identification Founded on Information Flow Analysis. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
34Alexei Galatenko, Alexander A. Grusho, Alexander Kniazev, Elena E. Timonina Statistical Covert Channels Through PROXY Server. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
34Steven J. Murdoch, Piotr Zielinski Covert Channels for Collusion in Online Computer Games. Search on Bibsonomy Information Hiding The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
34Taeshik Shon, Jongsub Moon, Sangjin Lee 0002, Dong Hoon Lee 0001, Jongin Lim 0001 Covert Channel Detection in the ICMP Payload Using Support Vector Machine. Search on Bibsonomy ISCIS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
34Alexander A. Grusho, Elena E. Timonina Construction of the Covert Channels. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
34Darko Kirovski, Henrique S. Malvar Robust Covert Communication over a Public Audio Channel Using Spread Spectrum. Search on Bibsonomy Information Hiding The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
34Steve R. White Covert Distributed Processing with Computer Viruses. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
33Parvathinathan Venkitasubramaniam, Ting He 0001, Lang Tong Anonymous Networking Amidst Eavesdroppers. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Ting He 0001, Ameya Agaskar, Lang Tong On security-aware transmission scheduling. Search on Bibsonomy ICASSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Rajni Goel, Moses Garuba, Chunmei Liu, Trang Nguyen The Security Threat Posed by Steganographic Content on the Internet. Search on Bibsonomy ITNG The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
33Navdeep Kaur, Rajwinder Singh, Manoj Misra, Anil Kumar Sarje A Secure Concurrency Control for MLS/DDBSs. Search on Bibsonomy ICDIM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Ruggero Lanotte, Andrea Maggiolo-Schettini, Angelo Troina Information Flow Analysis for Probabilistic Timed Automata. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
33Abhishek Singh, Ola Nordström, Chenghuai Lu, André L. M. dos Santos Malicious ICMP Tunneling: Defense against the Vulnerability. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
33Gina Fisk, Mike Fisk, Christos Papadopoulos, Joshua Neil Eliminating Steganography in Internet Traffic with Active Wardens. Search on Bibsonomy Information Hiding The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
33Yonglak Sohn, Songchun Moon Tightly Secure Transaction Scheduler in Multi-Level Secure Database Management Systems Search on Bibsonomy DEXA The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
33Gustavus J. Simmons A Secure Subliminal Channel (?). Search on Bibsonomy CRYPTO The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
33Gustavus J. Simmons The Subliminal Channel and Digital Signature. Search on Bibsonomy EUROCRYPT The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
31Ian Covert, Chanwoo Kim 0002, Su-In Lee, James Zou 0001, Tatsunori Hashimoto Stochastic Amortization: A Unified Approach to Accelerate Feature and Data Attribution. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
31Hugh Chen, Ian C. Covert, Scott M. Lundberg, Su-In Lee Algorithms to estimate Shapley value feature attributions. Search on Bibsonomy Nat. Mac. Intell. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
31Soham Gadgil, Ian Covert, Su-In Lee Estimating Conditional Mutual Information for Dynamic Feature Selection. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
31Chris Lin, Ian Covert, Su-In Lee On the Robustness of Removal-Based Feature Attributions. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
31Ethan Weinberger, Ian Covert, Su-In Lee Feature Selection in the Contrastive Analysis Setting. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
31Ian Covert, Wei Qiu, Mingyu Lu, Nayoon Kim, Nathan J. White, Su-In Lee Learning to Maximize Mutual Information for Dynamic Feature Selection. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 2491 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license