Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
254 | Xu Shao, Luying Zhou, Weiguo Zheng, Yixin Wang |
Providing Differentiated Quality-of-Protection for Surviving Double-Link Failures in WDM Mesh Networks. |
ICC |
2007 |
DBLP DOI BibTeX RDF |
|
153 | Weiyi Zhang 0001, Guoliang Xue, Jian Tang 0008, Krishnaiyan Thulasiraman |
Faster algorithms for construction of recovery trees enhancing QoP and QoS. |
IEEE/ACM Trans. Netw. |
2008 |
DBLP DOI BibTeX RDF |
protection and restoration, quality of protection (QoP), redundant trees, quality of service (QoS), bottleneck bandwidth |
138 | Cai Ming, Luying Zhou, Mohan Gurusamy |
Dynamic Routing of Dependable Connections with Different QoP Grades in WDM Optical Networks. |
ISCC |
2005 |
DBLP DOI BibTeX RDF |
|
120 | Yan Sun, Anup Kumar |
Quality-of-Protection (QoP): A Quantitative Methodology to Grade Security Services. |
ICDCS Workshops |
2008 |
DBLP DOI BibTeX RDF |
|
106 | George Ghinea, Johnson P. Thomas, Robert S. Fish |
Multimedia, network protocols and users - bridging the gap. |
ACM Multimedia (1) |
1999 |
DBLP DOI BibTeX RDF |
QoP, protocol adaptation, QoS, perception |
102 | Weiyi Zhang 0001, Guoliang Xue, Jian Tang 0008, Krishnaiyan Thulasiraman |
Linear time construction of redundant trees for recovery schemes enhancing QoP and QoS. |
INFOCOM |
2005 |
DBLP DOI BibTeX RDF |
|
76 | Muhammad Abedin, Syeda Nessa, Ehab Al-Shaer, Latifur Khan |
Vulnerability analysis For evaluating quality of protection of security policies. |
QoP |
2006 |
DBLP DOI BibTeX RDF |
security, evaluation, metric, policy |
72 | Gokhan Sahin, Suresh Subramaniam 0001 |
Providing quality-of-protection classes through control-message scheduling in DWDM mesh networks with capacity sharing. |
IEEE J. Sel. Areas Commun. |
2004 |
DBLP DOI BibTeX RDF |
|
66 | Monica Tentori, Jesús Favela, Marcela D. Rodríguez, Víctor M. González 0001 |
Supporting Quality of Privacy (QoP) in Pervasive Computing. |
ENC |
2005 |
DBLP DOI BibTeX RDF |
|
58 | Andy Ozment, Ketil Stølen (eds.) |
Proceedings of the 4th ACM Workshop on Quality of Protection, QoP 2008, Alexandria, VA, USA, October 27, 2008 |
QoP |
2008 |
DBLP BibTeX RDF |
|
58 | Karen Scarfone, Peter Mell |
Vulnerability scoring for security configuration settings. |
QoP |
2008 |
DBLP DOI BibTeX RDF |
common configuration scoring system (ccss), common vulnerability scoring system (cvss), security configuration, vulnerability scoring, risk assessment, vulnerability |
58 | Gunnar Peterson |
The economics of finding and fixing vulnerabilities in distributed systems. |
QoP |
2008 |
DBLP DOI BibTeX RDF |
managing security |
58 | Marcel Frigault, Lingyu Wang 0001, Anoop Singhal, Sushil Jajodia |
Measuring network security using dynamic bayesian network. |
QoP |
2008 |
DBLP DOI BibTeX RDF |
security, intrusion detection, security metric, attack graph |
58 | Michael Gegick, Laurie A. Williams, Jason A. Osborne, Mladen A. Vouk |
Prioritizing software security fortification throughcode-level metrics. |
QoP |
2008 |
DBLP DOI BibTeX RDF |
attack-prone, vulnerability-prone |
58 | Kevin Clark, Ethan Singleton, Stephen Tyree, John Hale |
Strata-Gem: risk assessment through mission modeling. |
QoP |
2008 |
DBLP DOI BibTeX RDF |
mission modeling, risk assessment |
58 | Marco Domenico Aime, Andrea S. Atzeni, Paolo Carlo Pomi |
The risks with security metrics. |
QoP |
2008 |
DBLP DOI BibTeX RDF |
runtime risk analysis, security measurement |
58 | Mariano Ceccato, Massimiliano Di Penta, Jasvir Nagra, Paolo Falcarin, Filippo Ricca, Marco Torchiano, Paolo Tonella |
Towards experimental evaluation of code obfuscation techniques. |
QoP |
2008 |
DBLP DOI BibTeX RDF |
empirical studies, software obfuscation |
58 | Yijun Yu, Haruhiko Kaiya, Hironori Washizaki, Yingfei Xiong 0001, Zhenjiang Hu, Nobukazu Yoshioka |
Enforcing a security pattern in stakeholder goal models. |
QoP |
2008 |
DBLP DOI BibTeX RDF |
model transformations, goal models, security patterns, rbac |
58 | Gerardo Canfora, Corrado Aaron Visaggio |
Does enforcing anonymity mean decreasing data usefulness? |
QoP |
2008 |
DBLP DOI BibTeX RDF |
data usefulness, anonymity, data privacy |
58 | Yudistira Asnar, Nicola Zannone |
Perceived risk assessment. |
QoP |
2008 |
DBLP DOI BibTeX RDF |
subjective input, risk assessment, perceived risk |
58 | Yonghee Shin, Laurie A. Williams |
Is complexity really the enemy of software security? |
QoP |
2008 |
DBLP DOI BibTeX RDF |
vulnerability prediction, reliability, software metrics, security metrics, software complexity, fault prediction |
58 | Günter Karjoth, Ketil Stølen (eds.) |
Proceedings of the 3th ACM Workshop on Quality of Protection, QoP 2007, Alexandria, VA, USA, October 29, 2007 |
QoP |
2007 |
DBLP BibTeX RDF |
|
58 | Reijo Savola |
Towards a taxonomy for information security metrics. |
QoP |
2007 |
DBLP DOI BibTeX RDF |
information security metrics, security assurance, network security, software security, information assurance |
58 | Vadim Okun, William F. Guthrie, Romain Gaucher, Paul E. Black |
Effect of static analysis tools on software security: preliminary investigation. |
QoP |
2007 |
DBLP DOI BibTeX RDF |
vulnerability, software security, static analysis tools |
58 | Marco Domenico Aime, Andrea S. Atzeni, Paolo Carlo Pomi |
AMBRA: automated model-based risk analysis. |
QoP |
2007 |
DBLP DOI BibTeX RDF |
computer-aided risk analysis, system modelling, security metrics |
58 | Daniel Boteanu, Edouard Reich, José M. Fernandez 0001, John McHugh |
Implementing and testing dynamic timeout adjustment as a dos counter-measure. |
QoP |
2007 |
DBLP DOI BibTeX RDF |
degradation of service, denial of service, SYN flood |
58 | Mohammed S. Gadelrab, Anas Abou El Kalam, Yves Deswarte |
Defining categories to select representative attack test-cases. |
QoP |
2007 |
DBLP DOI BibTeX RDF |
classification, evaluation, test, intrusion detection systems, attack |
58 | Bertrand Anckaert, Matias Madou, Bjorn De Sutter, Bruno De Bus, Koen De Bosschere, Bart Preneel |
Program obfuscation: a quantitative approach. |
QoP |
2007 |
DBLP DOI BibTeX RDF |
program obfuscation, metrics, quantification |
58 | Yolanta Beres, Adrian Baldwin, Simon Shiu |
Model-based assurance of security controls. |
QoP |
2007 |
DBLP DOI BibTeX RDF |
control effectiveness, models, risk, audit, assurance |
58 | Fabio Massacci, Artsiom Yautsiukhin |
An algorithm for the appraisal of assurance indicators for complex business processes. |
QoP |
2007 |
DBLP DOI BibTeX RDF |
assurance indicator, quality of protection, security indicator, business process, hypergraphs, security metrics |
58 | Lingyu Wang 0001, Anoop Singhal, Sushil Jajodia |
Toward measuring network security using attack graphs. |
QoP |
2007 |
DBLP DOI BibTeX RDF |
intrusion detection, security metrics, attack graphs, vulnerability analysis |
58 | Hongxia Jin, Ginger Myles |
A technique for self-certifying tamper resistant software. |
QoP |
2007 |
DBLP DOI BibTeX RDF |
software tamper resistance, content protection, attack tree, security measurement |
58 | Andy Ozment |
Improving vulnerability discovery models. |
QoP |
2007 |
DBLP DOI BibTeX RDF |
measuring software security, measuring vulnerabilities, vulnerability discovery model, security metrics |
58 | Shari Lawrence Pfleeger |
Measuring up: how to keep security metrics useful and realistic. |
QoP |
2007 |
DBLP DOI BibTeX RDF |
security metrics, security measurement |
58 | Idongesit Mkpong-Ruffin, David A. Umphress, John Hamilton, Juan E. Gilbert |
Quantitative software security risk assessment model. |
QoP |
2007 |
DBLP DOI BibTeX RDF |
quantitative risk assessment, empirical software engineering, software security |
58 | Günter Karjoth, Fabio Massacci (eds.) |
Proceedings of the 2nd ACM Workshop on Quality of Protection, QoP 2006, Alexandria, VA, USA, October 30, 2006 |
QoP |
2006 |
DBLP BibTeX RDF |
|
58 | Jari Råman |
Contracting over the quality aspect of security in software product markets. |
QoP |
2006 |
DBLP DOI BibTeX RDF |
contracting, regulation, law, secure software development |
58 | Jelena Mirkovic, Peter L. Reiher, Sonia Fahmy, Roshan K. Thomas, Alefiya Hussain, Stephen Schwab, Calvin Ko |
Measuring denial Of service. |
QoP |
2006 |
DBLP DOI BibTeX RDF |
metrics, denial of service |
58 | John McHugh |
Quality of protection: measuring the unmeasurable? |
QoP |
2006 |
DBLP DOI BibTeX RDF |
measurement, quality, speculation |
58 | Pratyusa K. Manadhata, Jeannette M. Wing, Mark Flynn, Miles McQueen |
Measuring the attack surfaces of two FTP daemons. |
QoP |
2006 |
DBLP DOI BibTeX RDF |
attack surface, attack surface metric, security metric |
58 | Joseph Pamula, Sushil Jajodia, Paul Ammann, Vipin Swarup |
A weakest-adversary security metric for network configuration security analysis. |
QoP |
2006 |
DBLP DOI BibTeX RDF |
network security, vulnerability, security metric, attack graphs, exploit, quantitative measure |
58 | Hanno Langweg |
Framework for malware resistance metrics. |
QoP |
2006 |
DBLP DOI BibTeX RDF |
software architecture, malware, resistance |
58 | Gyrd Brændeland, Ketil Stølen |
Using model-based security analysis in component-oriented system development. |
QoP |
2006 |
DBLP DOI BibTeX RDF |
security risk analysis, case studies |
58 | O. Sami Saydjari |
Is risk a good security metric? |
QoP |
2006 |
DBLP DOI BibTeX RDF |
security, measurement, metric, management, risk analysis |
58 | Riccardo Scandariato, Bart De Win, Wouter Joosen |
Towards a measuring framework for security properties of software. |
QoP |
2006 |
DBLP DOI BibTeX RDF |
security properties, secure design |
58 | Ho Chung, Clifford Neuman |
Modelling the relative strength of security protocols. |
QoP |
2006 |
DBLP DOI BibTeX RDF |
relative strength, cryptographic protocols, lattice, comparison |
54 | Arif Ghafoor |
Distributed multimedia information systems: an end-to-end perspective. |
Multim. Tools Appl. |
2007 |
DBLP DOI BibTeX RDF |
Distributed systems, Semantic web, Resource allocations, Information security, QoS management, Multimedia documents, Broadband networking |
54 | M. Farrukh Khan, Halima Ghafoor, Shahab Baqai, Muhammad Naeem Ayyaz, Sohail Sheikh |
Quality-based I/O resource managementfor multimedia document database servers. |
Multim. Syst. |
2005 |
DBLP DOI BibTeX RDF |
Quality of presentation, I/O resource allocation, Storage management, Multimedia servers |
54 | George Ghinea, Johnson P. Thomas |
Quality of perception: user quality of service in multimedia presentations. |
IEEE Trans. Multim. |
2005 |
DBLP DOI BibTeX RDF |
|
54 | Stephen R. Gulliver, George Ghinea |
How level and type of deafness affect user perception of multimedia video clips. |
Univers. Access Inf. Soc. |
2003 |
DBLP DOI BibTeX RDF |
Multimedia, Video, Perception, Quality, Deafness |
36 | Roel Apfelbaum, Itay Ben-Dan, Stefan Felsner, Rom Pinchasi, Tillmann Miltzow |
Points with large quadrant-depth. |
SCG |
2010 |
DBLP DOI BibTeX RDF |
depth, point set, plane |
36 | Klara Nahrstedt |
Need for integrated quality of service and quality of protection in mobile systems. |
MSWiM |
2008 |
DBLP DOI BibTeX RDF |
security, multimedia, cryptography |
36 | Srilaxmi Malladi, Sushil K. Prasad, Shamkant B. Navathe |
Improving Secure Communication Policy Agreements by Building Coalitions. |
IPDPS |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Stephen R. Gulliver, George Ghinea |
Stars in their eyes: what eye-tracking reveals about multimedia perceptual quality. |
IEEE Trans. Syst. Man Cybern. Part A |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Canhui Ou, Biswanath Mukherjee |
Differentiated Quality-of-Protection Provisioning in Optical/MPLS Networks. |
NETWORKING |
2004 |
DBLP DOI BibTeX RDF |
|
36 | George Ghinea, Johnson P. Thomas |
Crossing the Man-Machine Divide: A Mapping Based on Empirical Results. |
J. VLSI Signal Process. |
2001 |
DBLP DOI BibTeX RDF |
QoS, mapping, perception |
30 | Yutong Wang, Yonglin Tian, Jiangong Wang, Yansong Cao, Shixing Li, Bin Tian 0003 |
Integrated Inspection of QoM, QoP, and QoS for AOI Industries in Metaverses. |
IEEE CAA J. Autom. Sinica |
2022 |
DBLP DOI BibTeX RDF |
|
30 | Xian Liu |
QoP and Secrecy of a Cooperative Communication System. |
ISSE |
2020 |
DBLP DOI BibTeX RDF |
|
30 | Hongwei Li 0001, Dongxiao Liu, Yuanshun Dai, Tom H. Luan |
Engineering searchable encryption of mobile cloud networks: when QoE meets QoP. |
IEEE Wirel. Commun. |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Chia-Hui Wang, Hsing-Shao Liu, Ching-Chia Hsieh |
Rate-sensitive leverage of QoS and QoP for ubiquitous video streaming via buffer-aware feedback control. |
Multim. Tools Appl. |
2014 |
DBLP DOI BibTeX RDF |
|
30 | Katarzyna Mazur, Bogdan Ksiezopolski |
Comparison and Assessment of Security Modeling Approaches in Terms of the QoP-ML. |
CSS |
2014 |
DBLP DOI BibTeX RDF |
|
30 | Bogdan Ksiezopolski, Damian Rusinek, Adam Wierzbicki |
On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML). |
ICT-EurAsia |
2013 |
DBLP DOI BibTeX RDF |
|
30 | Bogdan Ksiezopolski, Damian Rusinek, Adam Wierzbicki |
On the modelling of Kerberos protocol in the Quality of Protection Modelling Language (QoP-ML). |
Ann. UMCS Informatica |
2012 |
DBLP DOI BibTeX RDF |
|
30 | Shyh-Fang Huang |
Video Classification and Adaptive QoP/QoS Control for Multiresolution Video Applications on IPTV. |
Int. J. Digit. Multim. Broadcast. |
2012 |
DBLP DOI BibTeX RDF |
|
30 | Bogdan Ksiezopolski |
QoP-ML: Quality of protection modelling language for cryptographic protocols. |
Comput. Secur. |
2012 |
DBLP DOI BibTeX RDF |
|
30 | Paul Seymer, Angelos Stavrou, Duminda Wijesekera, Sushil Jajodia |
QoP and QoS Policy Cognizant Module Composition. |
POLICY |
2010 |
DBLP DOI BibTeX RDF |
Policy-based software composition, Policies for software interfaces, Policies for aspect-oriented software |
30 | Yanping Xiao, Chuang Lin 0002, Yixin Jiang, Xiaowen Chu 0001, Shengling Wang 0001 |
Risk-Aware QoP/QoS Optimization for Multimedia Applications in Wireless Networks. |
QSHINE |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Monica Tentori, Jesús Favela, Víctor M. González 0001 |
Quality of Privacy (QoP) for the Design of Ubiquitous Healthcare Applications. |
J. Univers. Comput. Sci. |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Wayne D. Grover, Matthieu Clouqueur |
Span-Restorable Mesh Networks with Multiple Quality of Protection (QoP) Service Classes. |
Photonic Netw. Commun. |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Salim Hariri, Guangzhi Qu, R. Modukuri, Huoping Chen, Mazin S. Yousif |
Quality-of-protection (QoP)-an online monitoring and self-protection mechanism. |
IEEE J. Sel. Areas Commun. |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Shaoxiong Hua, Gang Qu 0001 |
QoP-driven scheduling for MPEG video decoding. |
IEEE Trans. Consumer Electron. |
2003 |
DBLP DOI BibTeX RDF |
|
18 | Kai Wang 0039, Chuang Lin 0002, Fangqin Liu |
Quality of Protection with Performance Analysis in IP Multimedia Subsystem. |
ACIS-ICIS |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Avesh Kumar Agarwal, Wenye Wang |
On the Impact of Quality of Protection in Wireless Local Area Networks with IP Mobility. |
Mob. Networks Appl. |
2007 |
DBLP DOI BibTeX RDF |
quality of protection, quality of service, performance analysis, security protocols, mobile IP, wireless local area networks |
18 | Jing Fang, Mahesh Sivakumar, Arun K. Somani, Krishna M. Sivalingam |
On Partial Protection in Groomed Optical WDM Mesh Networks. |
DSN |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Antonia Marie Boadi |
The use of hyper-hidden markov models in wireless channel simulation. |
WSC |
2005 |
DBLP BibTeX RDF |
|
18 | Xiangli Qu, Xuejun Yang, Jingwei Zhong, Xuefeng Lv |
Integration Patterns of Grid Security Service. |
PDCAT |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Tacha Serif, Stephen R. Gulliver, George Ghinea |
Infotainment across access devices: the perceptual impact of multimedia QoS. |
SAC |
2004 |
DBLP DOI BibTeX RDF |
eye-tracking, perception, personal digital assistant (PDA), head mounted display (HMD) |
18 | Xiangli Qu, Nong Xiao, Guang Xiang, Xuejun Yang |
Reputation-Aware Contract-Supervised Grid Computing. |
GCC Workshops |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Cláudia M. F. A. Ribeiro, Nelson S. Rosa, Paulo Roberto Freire Cunha |
Towards a Model for Personalized Communication Services. |
AINA (2) |
2004 |
DBLP DOI BibTeX RDF |
Quality of Service, Personalized Services, User Perception |
18 | Apu Kapadia, Prasad Naldurg, Roy H. Campbell |
Routing with Confidence: Supporting Discretionary Routing Requirements in Policy Based Networks. |
POLICY |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Sunwoo Park, Bernard P. Zeigler |
Distributing Simulation Work Based on Component Activity: A New Approach to Partitioning Hierarchical DEVS Models. |
CLADE |
2003 |
DBLP DOI BibTeX RDF |
|
18 | Franck Rousseau, Andrzej Duda |
Streaming Support in an Advanced Multimedia Infrastructure for the WWW. |
ISCC |
1999 |
DBLP DOI BibTeX RDF |
Quality of presentation, Data streaming, Multimedia presentations |
18 | Takeo Hamada, Takashige Hoshiai, Martin Yates |
A perspective on TINA service security architecture. |
WETICE |
1996 |
DBLP DOI BibTeX RDF |
TINA service security architecture, Telecommunication Information Network Architecture, integrated information network architecture, distributed object-oriented technology, service transaction, agreed security interests, security management context, consistent protection quality, multi-provider service domains, Common Security Service Object, application-specific extension, security of data, network operators |