The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for QoP with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1996-2005 (24) 2006-2007 (31) 2008 (15) 2009-2022 (13)
Publication types (Num. hits)
article(19) inproceedings(61) proceedings(3)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 136 occurrences of 98 keywords

Results
Found 83 publication records. Showing 83 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
254Xu Shao, Luying Zhou, Weiguo Zheng, Yixin Wang Providing Differentiated Quality-of-Protection for Surviving Double-Link Failures in WDM Mesh Networks. Search on Bibsonomy ICC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
153Weiyi Zhang 0001, Guoliang Xue, Jian Tang 0008, Krishnaiyan Thulasiraman Faster algorithms for construction of recovery trees enhancing QoP and QoS. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF protection and restoration, quality of protection (QoP), redundant trees, quality of service (QoS), bottleneck bandwidth
138Cai Ming, Luying Zhou, Mohan Gurusamy Dynamic Routing of Dependable Connections with Different QoP Grades in WDM Optical Networks. Search on Bibsonomy ISCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
120Yan Sun, Anup Kumar Quality-of-Protection (QoP): A Quantitative Methodology to Grade Security Services. Search on Bibsonomy ICDCS Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
106George Ghinea, Johnson P. Thomas, Robert S. Fish Multimedia, network protocols and users - bridging the gap. Search on Bibsonomy ACM Multimedia (1) The full citation details ... 1999 DBLP  DOI  BibTeX  RDF QoP, protocol adaptation, QoS, perception
102Weiyi Zhang 0001, Guoliang Xue, Jian Tang 0008, Krishnaiyan Thulasiraman Linear time construction of redundant trees for recovery schemes enhancing QoP and QoS. Search on Bibsonomy INFOCOM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
76Muhammad Abedin, Syeda Nessa, Ehab Al-Shaer, Latifur Khan Vulnerability analysis For evaluating quality of protection of security policies. Search on Bibsonomy QoP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, evaluation, metric, policy
72Gokhan Sahin, Suresh Subramaniam 0001 Providing quality-of-protection classes through control-message scheduling in DWDM mesh networks with capacity sharing. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
66Monica Tentori, Jesús Favela, Marcela D. Rodríguez, Víctor M. González 0001 Supporting Quality of Privacy (QoP) in Pervasive Computing. Search on Bibsonomy ENC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
58Andy Ozment, Ketil Stølen (eds.) Proceedings of the 4th ACM Workshop on Quality of Protection, QoP 2008, Alexandria, VA, USA, October 27, 2008 Search on Bibsonomy QoP The full citation details ... 2008 DBLP  BibTeX  RDF
58Karen Scarfone, Peter Mell Vulnerability scoring for security configuration settings. Search on Bibsonomy QoP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF common configuration scoring system (ccss), common vulnerability scoring system (cvss), security configuration, vulnerability scoring, risk assessment, vulnerability
58Gunnar Peterson The economics of finding and fixing vulnerabilities in distributed systems. Search on Bibsonomy QoP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF managing security
58Marcel Frigault, Lingyu Wang 0001, Anoop Singhal, Sushil Jajodia Measuring network security using dynamic bayesian network. Search on Bibsonomy QoP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, intrusion detection, security metric, attack graph
58Michael Gegick, Laurie A. Williams, Jason A. Osborne, Mladen A. Vouk Prioritizing software security fortification throughcode-level metrics. Search on Bibsonomy QoP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF attack-prone, vulnerability-prone
58Kevin Clark, Ethan Singleton, Stephen Tyree, John Hale Strata-Gem: risk assessment through mission modeling. Search on Bibsonomy QoP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF mission modeling, risk assessment
58Marco Domenico Aime, Andrea S. Atzeni, Paolo Carlo Pomi The risks with security metrics. Search on Bibsonomy QoP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF runtime risk analysis, security measurement
58Mariano Ceccato, Massimiliano Di Penta, Jasvir Nagra, Paolo Falcarin, Filippo Ricca, Marco Torchiano, Paolo Tonella Towards experimental evaluation of code obfuscation techniques. Search on Bibsonomy QoP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF empirical studies, software obfuscation
58Yijun Yu, Haruhiko Kaiya, Hironori Washizaki, Yingfei Xiong 0001, Zhenjiang Hu, Nobukazu Yoshioka Enforcing a security pattern in stakeholder goal models. Search on Bibsonomy QoP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF model transformations, goal models, security patterns, rbac
58Gerardo Canfora, Corrado Aaron Visaggio Does enforcing anonymity mean decreasing data usefulness? Search on Bibsonomy QoP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF data usefulness, anonymity, data privacy
58Yudistira Asnar, Nicola Zannone Perceived risk assessment. Search on Bibsonomy QoP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF subjective input, risk assessment, perceived risk
58Yonghee Shin, Laurie A. Williams Is complexity really the enemy of software security? Search on Bibsonomy QoP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF vulnerability prediction, reliability, software metrics, security metrics, software complexity, fault prediction
58Günter Karjoth, Ketil Stølen (eds.) Proceedings of the 3th ACM Workshop on Quality of Protection, QoP 2007, Alexandria, VA, USA, October 29, 2007 Search on Bibsonomy QoP The full citation details ... 2007 DBLP  BibTeX  RDF
58Reijo Savola Towards a taxonomy for information security metrics. Search on Bibsonomy QoP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF information security metrics, security assurance, network security, software security, information assurance
58Vadim Okun, William F. Guthrie, Romain Gaucher, Paul E. Black Effect of static analysis tools on software security: preliminary investigation. Search on Bibsonomy QoP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF vulnerability, software security, static analysis tools
58Marco Domenico Aime, Andrea S. Atzeni, Paolo Carlo Pomi AMBRA: automated model-based risk analysis. Search on Bibsonomy QoP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF computer-aided risk analysis, system modelling, security metrics
58Daniel Boteanu, Edouard Reich, José M. Fernandez 0001, John McHugh Implementing and testing dynamic timeout adjustment as a dos counter-measure. Search on Bibsonomy QoP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF degradation of service, denial of service, SYN flood
58Mohammed S. Gadelrab, Anas Abou El Kalam, Yves Deswarte Defining categories to select representative attack test-cases. Search on Bibsonomy QoP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF classification, evaluation, test, intrusion detection systems, attack
58Bertrand Anckaert, Matias Madou, Bjorn De Sutter, Bruno De Bus, Koen De Bosschere, Bart Preneel Program obfuscation: a quantitative approach. Search on Bibsonomy QoP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF program obfuscation, metrics, quantification
58Yolanta Beres, Adrian Baldwin, Simon Shiu Model-based assurance of security controls. Search on Bibsonomy QoP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF control effectiveness, models, risk, audit, assurance
58Fabio Massacci, Artsiom Yautsiukhin An algorithm for the appraisal of assurance indicators for complex business processes. Search on Bibsonomy QoP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF assurance indicator, quality of protection, security indicator, business process, hypergraphs, security metrics
58Lingyu Wang 0001, Anoop Singhal, Sushil Jajodia Toward measuring network security using attack graphs. Search on Bibsonomy QoP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF intrusion detection, security metrics, attack graphs, vulnerability analysis
58Hongxia Jin, Ginger Myles A technique for self-certifying tamper resistant software. Search on Bibsonomy QoP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF software tamper resistance, content protection, attack tree, security measurement
58Andy Ozment Improving vulnerability discovery models. Search on Bibsonomy QoP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF measuring software security, measuring vulnerabilities, vulnerability discovery model, security metrics
58Shari Lawrence Pfleeger Measuring up: how to keep security metrics useful and realistic. Search on Bibsonomy QoP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security metrics, security measurement
58Idongesit Mkpong-Ruffin, David A. Umphress, John Hamilton, Juan E. Gilbert Quantitative software security risk assessment model. Search on Bibsonomy QoP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF quantitative risk assessment, empirical software engineering, software security
58Günter Karjoth, Fabio Massacci (eds.) Proceedings of the 2nd ACM Workshop on Quality of Protection, QoP 2006, Alexandria, VA, USA, October 30, 2006 Search on Bibsonomy QoP The full citation details ... 2006 DBLP  BibTeX  RDF
58Jari Råman Contracting over the quality aspect of security in software product markets. Search on Bibsonomy QoP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF contracting, regulation, law, secure software development
58Jelena Mirkovic, Peter L. Reiher, Sonia Fahmy, Roshan K. Thomas, Alefiya Hussain, Stephen Schwab, Calvin Ko Measuring denial Of service. Search on Bibsonomy QoP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF metrics, denial of service
58John McHugh Quality of protection: measuring the unmeasurable? Search on Bibsonomy QoP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF measurement, quality, speculation
58Pratyusa K. Manadhata, Jeannette M. Wing, Mark Flynn, Miles McQueen Measuring the attack surfaces of two FTP daemons. Search on Bibsonomy QoP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF attack surface, attack surface metric, security metric
58Joseph Pamula, Sushil Jajodia, Paul Ammann, Vipin Swarup A weakest-adversary security metric for network configuration security analysis. Search on Bibsonomy QoP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF network security, vulnerability, security metric, attack graphs, exploit, quantitative measure
58Hanno Langweg Framework for malware resistance metrics. Search on Bibsonomy QoP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF software architecture, malware, resistance
58Gyrd Brændeland, Ketil Stølen Using model-based security analysis in component-oriented system development. Search on Bibsonomy QoP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security risk analysis, case studies
58O. Sami Saydjari Is risk a good security metric? Search on Bibsonomy QoP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, measurement, metric, management, risk analysis
58Riccardo Scandariato, Bart De Win, Wouter Joosen Towards a measuring framework for security properties of software. Search on Bibsonomy QoP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security properties, secure design
58Ho Chung, Clifford Neuman Modelling the relative strength of security protocols. Search on Bibsonomy QoP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF relative strength, cryptographic protocols, lattice, comparison
54Arif Ghafoor Distributed multimedia information systems: an end-to-end perspective. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Distributed systems, Semantic web, Resource allocations, Information security, QoS management, Multimedia documents, Broadband networking
54M. Farrukh Khan, Halima Ghafoor, Shahab Baqai, Muhammad Naeem Ayyaz, Sohail Sheikh Quality-based I/O resource managementfor multimedia document database servers. Search on Bibsonomy Multim. Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Quality of presentation, I/O resource allocation, Storage management, Multimedia servers
54George Ghinea, Johnson P. Thomas Quality of perception: user quality of service in multimedia presentations. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
54Stephen R. Gulliver, George Ghinea How level and type of deafness affect user perception of multimedia video clips. Search on Bibsonomy Univers. Access Inf. Soc. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Multimedia, Video, Perception, Quality, Deafness
36Roel Apfelbaum, Itay Ben-Dan, Stefan Felsner, Rom Pinchasi, Tillmann Miltzow Points with large quadrant-depth. Search on Bibsonomy SCG The full citation details ... 2010 DBLP  DOI  BibTeX  RDF depth, point set, plane
36Klara Nahrstedt Need for integrated quality of service and quality of protection in mobile systems. Search on Bibsonomy MSWiM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, multimedia, cryptography
36Srilaxmi Malladi, Sushil K. Prasad, Shamkant B. Navathe Improving Secure Communication Policy Agreements by Building Coalitions. Search on Bibsonomy IPDPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
36Stephen R. Gulliver, George Ghinea Stars in their eyes: what eye-tracking reveals about multimedia perceptual quality. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Part A The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
36Canhui Ou, Biswanath Mukherjee Differentiated Quality-of-Protection Provisioning in Optical/MPLS Networks. Search on Bibsonomy NETWORKING The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
36George Ghinea, Johnson P. Thomas Crossing the Man-Machine Divide: A Mapping Based on Empirical Results. Search on Bibsonomy J. VLSI Signal Process. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF QoS, mapping, perception
30Yutong Wang, Yonglin Tian, Jiangong Wang, Yansong Cao, Shixing Li, Bin Tian 0003 Integrated Inspection of QoM, QoP, and QoS for AOI Industries in Metaverses. Search on Bibsonomy IEEE CAA J. Autom. Sinica The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
30Xian Liu QoP and Secrecy of a Cooperative Communication System. Search on Bibsonomy ISSE The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
30Hongwei Li 0001, Dongxiao Liu, Yuanshun Dai, Tom H. Luan Engineering searchable encryption of mobile cloud networks: when QoE meets QoP. Search on Bibsonomy IEEE Wirel. Commun. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
30Chia-Hui Wang, Hsing-Shao Liu, Ching-Chia Hsieh Rate-sensitive leverage of QoS and QoP for ubiquitous video streaming via buffer-aware feedback control. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
30Katarzyna Mazur, Bogdan Ksiezopolski Comparison and Assessment of Security Modeling Approaches in Terms of the QoP-ML. Search on Bibsonomy CSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
30Bogdan Ksiezopolski, Damian Rusinek, Adam Wierzbicki On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML). Search on Bibsonomy ICT-EurAsia The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
30Bogdan Ksiezopolski, Damian Rusinek, Adam Wierzbicki On the modelling of Kerberos protocol in the Quality of Protection Modelling Language (QoP-ML). Search on Bibsonomy Ann. UMCS Informatica The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
30Shyh-Fang Huang Video Classification and Adaptive QoP/QoS Control for Multiresolution Video Applications on IPTV. Search on Bibsonomy Int. J. Digit. Multim. Broadcast. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
30Bogdan Ksiezopolski QoP-ML: Quality of protection modelling language for cryptographic protocols. Search on Bibsonomy Comput. Secur. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
30Paul Seymer, Angelos Stavrou, Duminda Wijesekera, Sushil Jajodia QoP and QoS Policy Cognizant Module Composition. Search on Bibsonomy POLICY The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Policy-based software composition, Policies for software interfaces, Policies for aspect-oriented software
30Yanping Xiao, Chuang Lin 0002, Yixin Jiang, Xiaowen Chu 0001, Shengling Wang 0001 Risk-Aware QoP/QoS Optimization for Multimedia Applications in Wireless Networks. Search on Bibsonomy QSHINE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
30Monica Tentori, Jesús Favela, Víctor M. González 0001 Quality of Privacy (QoP) for the Design of Ubiquitous Healthcare Applications. Search on Bibsonomy J. Univers. Comput. Sci. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Wayne D. Grover, Matthieu Clouqueur Span-Restorable Mesh Networks with Multiple Quality of Protection (QoP) Service Classes. Search on Bibsonomy Photonic Netw. Commun. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Salim Hariri, Guangzhi Qu, R. Modukuri, Huoping Chen, Mazin S. Yousif Quality-of-protection (QoP)-an online monitoring and self-protection mechanism. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Shaoxiong Hua, Gang Qu 0001 QoP-driven scheduling for MPEG video decoding. Search on Bibsonomy IEEE Trans. Consumer Electron. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
18Kai Wang 0039, Chuang Lin 0002, Fangqin Liu Quality of Protection with Performance Analysis in IP Multimedia Subsystem. Search on Bibsonomy ACIS-ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Avesh Kumar Agarwal, Wenye Wang On the Impact of Quality of Protection in Wireless Local Area Networks with IP Mobility. Search on Bibsonomy Mob. Networks Appl. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF quality of protection, quality of service, performance analysis, security protocols, mobile IP, wireless local area networks
18Jing Fang, Mahesh Sivakumar, Arun K. Somani, Krishna M. Sivalingam On Partial Protection in Groomed Optical WDM Mesh Networks. Search on Bibsonomy DSN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Antonia Marie Boadi The use of hyper-hidden markov models in wireless channel simulation. Search on Bibsonomy WSC The full citation details ... 2005 DBLP  BibTeX  RDF
18Xiangli Qu, Xuejun Yang, Jingwei Zhong, Xuefeng Lv Integration Patterns of Grid Security Service. Search on Bibsonomy PDCAT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Tacha Serif, Stephen R. Gulliver, George Ghinea Infotainment across access devices: the perceptual impact of multimedia QoS. Search on Bibsonomy SAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF eye-tracking, perception, personal digital assistant (PDA), head mounted display (HMD)
18Xiangli Qu, Nong Xiao, Guang Xiang, Xuejun Yang Reputation-Aware Contract-Supervised Grid Computing. Search on Bibsonomy GCC Workshops The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Cláudia M. F. A. Ribeiro, Nelson S. Rosa, Paulo Roberto Freire Cunha Towards a Model for Personalized Communication Services. Search on Bibsonomy AINA (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Quality of Service, Personalized Services, User Perception
18Apu Kapadia, Prasad Naldurg, Roy H. Campbell Routing with Confidence: Supporting Discretionary Routing Requirements in Policy Based Networks. Search on Bibsonomy POLICY The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Sunwoo Park, Bernard P. Zeigler Distributing Simulation Work Based on Component Activity: A New Approach to Partitioning Hierarchical DEVS Models. Search on Bibsonomy CLADE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
18Franck Rousseau, Andrzej Duda Streaming Support in an Advanced Multimedia Infrastructure for the WWW. Search on Bibsonomy ISCC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Quality of presentation, Data streaming, Multimedia presentations
18Takeo Hamada, Takashige Hoshiai, Martin Yates A perspective on TINA service security architecture. Search on Bibsonomy WETICE The full citation details ... 1996 DBLP  DOI  BibTeX  RDF TINA service security architecture, Telecommunication Information Network Architecture, integrated information network architecture, distributed object-oriented technology, service transaction, agreed security interests, security management context, consistent protection quality, multi-provider service domains, Common Security Service Object, application-specific extension, security of data, network operators
Displaying result #1 - #83 of 83 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license