|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1717 occurrences of 1015 keywords
|
|
|
Results
Found 5607 publication records. Showing 5606 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
71 | Mark A. Whiting, Wendy Cowley, Jereme Haack, Douglas Love, Stephen Tratz, Caroline Varley, Kim Wiessner |
Threat stream data generator: creating the known unknowns for test and evaluation of visual analytics tools. |
BELIV |
2006 |
DBLP DOI BibTeX RDF |
threat stream, threat, data generator |
68 | Dianxiang Xu, Kendall E. Nygard |
Threat-Driven Modeling and Verification of Secure Software Using Aspect-Oriented Petri Nets. |
IEEE Trans. Software Eng. |
2006 |
DBLP DOI BibTeX RDF |
aspect-oriented Petri nets, modeling, verification, Petri nets, aspect-oriented software development, Software security, threat modeling |
61 | Sangho Lee, Dong Hwi Lee, Kuinam J. Kim |
A Conceptual Design of Knowledge-Based Real-Time Cyber-Threat Early Warning System. |
ISPA Workshops |
2006 |
DBLP DOI BibTeX RDF |
Cyber-threat, TMS, Early-Warning, ESM |
57 | Punam Bedi, Vandana Gandotra, Archana Singhal, Vandita Vats, Neha Mishra |
Avoiding Threats Using Multi Agent System Planning for Web Based Systems. |
ICCCI |
2009 |
DBLP DOI BibTeX RDF |
HTN, GOAP, MASPTA, Multi agent system, Threat modeling |
57 | Fredrik Johansson, Göran Falkman |
A Comparison between Two Approaches to Threat Evaluation in an Air Defense Scenario. |
MDAI |
2008 |
DBLP DOI BibTeX RDF |
fuzzy inference rules, threat assessment, threat evaluation, weapons allocation, fuzzy logic, Bayesian networks |
54 | Michael D. Carroll |
Information security: examining and managing the insider threat. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
insider threat |
54 | Ragib Hasan, Suvda Myagmar, Adam J. Lee, William Yurcik |
Toward a threat model for storage systems. |
StorageSS |
2005 |
DBLP DOI BibTeX RDF |
security, storage system, threat model |
54 | Volkmar Lotz |
Threat Scenarios as a Means to Formally Develop Secure Systems. |
ESORICS |
1996 |
DBLP DOI BibTeX RDF |
Threat Identification, Stream Processing Functions, Security, Authentication, Formal Methods, Protocols, Risk Analysis |
51 | Otto Carlander, Lars Eriksson, Per-Anders Oskarsson |
Handling Uni- and Multimodal Threat Cueing with Simultaneous Radio Calls in a Combat Vehicle Setting. |
HCI (6) |
2007 |
DBLP DOI BibTeX RDF |
Combat Vehicle, Simulation, Multimodal, Display technologies |
51 | Neeli Rashmi Prasad |
Threat Model Framework and Methodology for Personal Networks (PNs). |
COMSWARE |
2007 |
DBLP DOI BibTeX RDF |
|
51 | Ramkumar Chinchani, Anusha Iyer, Hung Q. Ngo 0001, Shambhu J. Upadhyaya |
Towards a Theory of Insider Threat Assessment. |
DSN |
2005 |
DBLP DOI BibTeX RDF |
|
51 | Oliver J. Bear Don't Walk IV, Kevin K. Wiley, Lois Walters-Threat, Rebecca L. Rivera, Martin Chieng Were, Tiffani J. Bright |
A Framework to Support Diversity, Equity, and Inclusion within AMIA Through Strengthened Pathways, Support and Leadership. |
AMIA |
2021 |
DBLP BibTeX RDF |
|
50 | Peter Torr |
Demystifying the Threat-Modeling Process. |
IEEE Secur. Priv. |
2005 |
DBLP DOI BibTeX RDF |
threat environment, security, software development, product development, threat modeling |
50 | Ghi Paul Im, Richard L. Baskerville |
A longitudinal study of information system threat categories: the enduring problem of human error. |
Data Base |
2005 |
DBLP DOI BibTeX RDF |
information infrastructure protection, information system threat, information system threat taxonomy, software quality and reliability, information security, computer security, human error, software defects |
47 | Emily M. Zechman |
Integrating complex adaptive system simulation and evolutionary computation to support water infrastructure threat management. |
GECCO (Companion) |
2010 |
DBLP DOI BibTeX RDF |
threat management, water distribution security, agent-based modeling |
47 | Dianxiang Xu, Kendall E. Nygard |
A threat-driven approach to modeling and verifying secure software. |
ASE |
2005 |
DBLP DOI BibTeX RDF |
aspect-oriented Petri nets, verification, Petri nets, aspect-oriented software development, software security, threat modeling |
44 | Anton Bolfing, Tobias Halbherr, Adrian Schwaninger |
How Image Based Factors and Human Factors Contribute to Threat Detection Performance in X-Ray Aviation Security Screening. |
USAB |
2008 |
DBLP DOI BibTeX RDF |
aviation security, image based factors, human factors, X-ray imaging |
44 | Kevin S. Killourhy, Roy A. Maxion |
Toward Realistic and Artifact-Free Insider-Threat Data. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Robert S. Garfinkel, Ram D. Gopal, Daniel O. Rice |
New Approaches to Disclosure Limitation While Answering Queries to a Database: Protecting Numerical Confidential Data against Insider Threat Based on Data or Algorithms. |
HICSS |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Syed Naqvi, Michel Riguidel |
Threat Model for Grid Security Services. |
EGC |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Jonathan W. Butts, Robert F. Mills, Rusty O. Baldwin |
Developing an Insider Threat Model Using Functional Decomposition. |
MMM-ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
40 | Ignacio J. Martinez-Moyano, Eliot H. Rich, Stephen H. Conrad, David F. Andersen, Thomas R. Stewart |
A behavioral theory of insider-threat risks: A system dynamics approach. |
ACM Trans. Model. Comput. Simul. |
2008 |
DBLP DOI BibTeX RDF |
behavioral theory, judgment and decision making, signal detection theory, system dynamics modeling, risk, security modeling, Insider threat, policy analysis |
40 | Andreas Ekelhart, Stefan Fenz, Thomas Neubauer, Edgar R. Weippl |
Formal threat descriptions for enhancing governmental risk assessment. |
ICEGOV |
2007 |
DBLP DOI BibTeX RDF |
formal threat descriptions, inventory, security ontology |
40 | Lanxiang Chen, Dan Feng 0001, Liang Ming |
The Security Threats and Corresponding Measures to Distributed Storage Systems. |
APPT |
2007 |
DBLP DOI BibTeX RDF |
process of security, threat modeling, security threat, storage security, security measure |
37 | Hui Wang 0071, Heli Xu, Bibo Lu, Zihao Shen |
Research on Security Architecture for Defending Insider Threat. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
37 | Jianxin Li 0002, Teodor Sommestad, Patrick C. K. Hung, Xiang Li |
Web Service-Based Business Process Development, Threat Modeling and Security Assessment Tool. |
ICWS |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Teresa Musiol, Katarzyna Ujma-Wasowicz |
Identification of Threat of Isolation as a Result of Work with a Computer in Free Time. |
HCI (7) |
2007 |
DBLP DOI BibTeX RDF |
sociometric measure, reduction of threats, active recreation, computer, isolation |
37 | Zhitang Li, Jie Lei 0004, Li Wang 0015, Dong Li |
Assessing Attack Threat by the Probability of Following Attacks. |
IEEE NAS |
2007 |
DBLP DOI BibTeX RDF |
|
37 | Sanguk Noh |
Autonomous Situation Awareness Through Threat Data Integration. |
IRI |
2007 |
DBLP DOI BibTeX RDF |
|
37 | Zhitang Li, Jie Lei 0004, Li Wang 0015, Dong Li, Yang-ming Ma |
Towards Identifying True Threat from Network Security Data. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
|
37 | Ileana Buhan, Asker M. Bazen, Pieter H. Hartel, Raymond N. J. Veldhuis |
A False Rejection Oriented Threat Model for the Design of Biometric Authentication Systems. |
ICB |
2006 |
DBLP DOI BibTeX RDF |
|
37 | Alan N. Steinberg |
Threat Assessment Technology Development. |
CONTEXT |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Seong Chae Seo, Jin Ho You, Young Dae Kim, Jun Yong Choi, Sang Jun Lee, Byung Ki Kim |
Building Security Requirements Using State Transition Diagram at Security Threat Location. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Mohsen Saffarian, Matei Ciobanu Morogan |
A novel protocol to prevent malicious nodes from misdirecting forward ants in AntNet algorithm. |
SAC |
2008 |
DBLP DOI BibTeX RDF |
AntNet, free-roaming forward ants, misdirection threat |
37 | Jinghua Wu, Guorui Jiang, Tiyun Huang |
Using Two Main Arguments in Agent Negotiation. |
PRIMA |
2006 |
DBLP DOI BibTeX RDF |
Agent, Negotiation, Threat, Reward |
37 | Thomas Thomsen |
Lambda-Search in Game Trees - with Application to Go. |
Computers and Games |
2000 |
DBLP DOI BibTeX RDF |
binary tree search, threat-sequences, null-moves, proof-number search, abstract game-knowledge, Go block tactics |
37 | Ikuya Morikawa, Yuji Yamaoka |
Threat Tree Templates to Ease Difficulties in Threat Modeling. |
NBiS |
2011 |
DBLP DOI BibTeX RDF |
software design, security analysis, threat modeling |
34 | Robert Willison, Mikko T. Siponen |
Overcoming the insider: reducing employee computer crime through Situational Crime Prevention. |
Commun. ACM |
2009 |
DBLP DOI BibTeX RDF |
|
34 | Wihem Arsac, Giampaolo Bella, Xavier Chantry, Luca Compagna |
Validating Security Protocols under the General Attacker. |
ARSPA-WITS |
2009 |
DBLP DOI BibTeX RDF |
|
34 | Ali Razavi, Kostas Kontogiannis |
Pattern and Policy Driven Log Analysis for Software Monitoring. |
COMPSAC |
2008 |
DBLP DOI BibTeX RDF |
Software Auditing, Trace Analysis, Software Monitoring |
34 | Allen Christiansen, Damian Johnson, Lawrence B. Holder |
Game-Based Simulation for the Evaluation of Threat Detection in a Seaport Environment. |
ICEC |
2008 |
DBLP DOI BibTeX RDF |
seaport, particle propagation, threat detection, security, Simulation, sensor modeling |
34 | Marwan Abi-Antoun, Daniel Wang, Peter Torr |
Checking threat modeling data flow diagrams for implementation conformance and security. |
ASE |
2007 |
DBLP DOI BibTeX RDF |
reflexion models, denial of service, security analysis, threat modeling, data flow diagrams, information disclosure, tampering, spoofing |
34 | Merv Matson, Mihaela Ulieru |
Persistent information security: beyond the e-commerce threat model. |
ICEC |
2006 |
DBLP DOI BibTeX RDF |
document security, insecurity expense, persistent information security, risk remediation, digital rights management, DRM, threat model |
34 | Michel Barbeau |
WiMax/802.16 threat analysis. |
Q2SWinet |
2005 |
DBLP DOI BibTeX RDF |
wireless network, WiMax, 802.16, threat analysis |
34 | Vassilios Morellas, Ioannis T. Pavlidis, Panagiotis Tsiamyrtzis |
DETER: Detection of events for threat evaluation and recognition. |
Mach. Vis. Appl. |
2003 |
DBLP DOI BibTeX RDF |
Multicamera calibration, Threat assessment, Object tracking, Surveillance system, Security system |
34 | Sridhar R. Kundur, Daniel Raviv |
Novel active-vision-based visual-threat-cue for autonomous navigation tasks. |
CVPR |
1996 |
DBLP DOI BibTeX RDF |
active-vision-based visual-threat-cue, autonomous navigation tasks, moving observer, time-based imaginary 3-D surfaces, 3D surface texture, mobile robots, active vision, robot vision, visual fields |
33 | John Diamant |
Resilient Security Architecture: A Complementary Approach to Reducing Vulnerabilities. |
IEEE Secur. Priv. |
2011 |
DBLP DOI BibTeX RDF |
HP Comprehensive Applications Threat Analysis, W. Edwards Deming, dynamic application security testing, static application security testing, security requirements gap analysis, architectural threat analysis, security quality, zero day, 0-day, software development, security and privacy, security vulnerabilities |
33 | Mohammed A. Alhabeeb, Abdullah Mohammed Almuhaideb, Phu Dung Le, Bala Srinivasan 0002 |
Information Security Threats Classification Pyramid. |
AINA Workshops |
2010 |
DBLP DOI BibTeX RDF |
deliberate threat, threat classification |
31 | Simon N. Foley, William M. Fitzgerald |
An Approach to Security Policy Configuration Using Semantic Threat Graphs. (PDF / PS) |
DBSec |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Wencong Cheng, Xishan Xu, Yan Jia 0001, Peng Zou |
Network Dynamic Risk Assessment Based on the Threat Stream Analysis. |
WAIM |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Feng Wu, Yan Zhong, Quanyuan Wu |
Network Threat Frequency Forecasting Based on Fuzzy Time Series and D-S Evidence Theory. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Hervé Debar, Yohann Thomas, Frédéric Cuppens, Nora Cuppens-Boulahia |
Enabling automated threat response through the use of a dynamic security policy. |
J. Comput. Virol. |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Do-Hoon Kim, Taek Lee, Sung-Oh David Jung, Hoh Peter In, Heejo Lee |
Cyber Threat Trend Analysis Model Using HMM. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Ferat Sahin, Prasanna Sridhar, Ben Horan, Vikraman Raghavan, Mo M. Jamshidi |
System of systems approach to threat detection and integration of heterogeneous independently operable systems. |
SMC |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Nabil R. Adam, Vijayalakshmi Atluri, Vandana Pursnani Janeja, Aabhas V. Paliwal, Mahmoud Youssef, Soon Ae Chun, Jim Cooper, John Paczkowski, Christof Bornhövd, Ike Nassi, Joachim Schaper |
Semantics-based threat structure mining. |
DG.O |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Yael Shahar |
Indicators of Threat: Reflecting New Trends. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Neelam Jain, Thomas D. Jeitschko, Leonard J. Mirman |
Strategic Experimentation in Financial Intermediation with Threat of Entry. |
Ann. Oper. Res. |
2002 |
DBLP DOI BibTeX RDF |
strategic experimentation, signal dampening, financial intermediation, limit pricing, entry deterrence, experimentation |
30 | Rebecca Fribourg, Evan Blanpied, Ludovic Hoyet, Anatole Lécuyer, Ferran Argelaguet |
Does virtual threat harm VR experience?: Impact of threat occurrence and repeatability on virtual embodiment and threat response. |
Comput. Graph. |
2021 |
DBLP DOI BibTeX RDF |
|
30 | Lundy Lewis, John F. Buford, Gabriel Jakobson |
Inferring threats in urban environments with uncertain and approximate data: an agent-based approach. |
Appl. Intell. |
2009 |
DBLP DOI BibTeX RDF |
Threat assessment, Uncertain/approximate data, Fuzzy, BDI agent, Agent platform, Peer-to-peer overlay |
30 | Fredrik Johansson, Göran Falkman |
Performance Evaluation of TEWA Systems for Improved Decision Support. |
MDAI |
2009 |
DBLP DOI BibTeX RDF |
TEWA, threat evaluation, weapon allocation, Performance evaluation, testbed |
30 | Yi-Ming Chen 0008, Dachrahn Wu, Cheng-Kuang Wu |
A Game Theoretic Approach for Deploying Intrusion Detection Agent. |
PRIMA |
2007 |
DBLP DOI BibTeX RDF |
Agent deployment, threat levels, Nash equilibrium, Shapley value |
30 | Andreas Ekelhart, Stefan Fenz, Markus D. Klemen, Edgar R. Weippl |
Security Ontology: Simulating Threats to Corporate Assets. |
ICISS |
2006 |
DBLP DOI BibTeX RDF |
risk analysis, threat modeling, security ontology |
30 | Howard Chivers |
Information Modeling for Automated Risk Analysis. |
Communications and Multimedia Security |
2006 |
DBLP DOI BibTeX RDF |
security, model, communication, information, risk, service-oriented, threat |
30 | Sjouke Mauw, Martijn Oostdijk |
Foundations of Attack Trees. |
ICISC |
2005 |
DBLP DOI BibTeX RDF |
semantics, attack trees, threat analysis |
30 | Andrew James Simmonds, Peter Sandilands, Louis van Ekert |
An Ontology for Network Security Attacks. |
AACC |
2004 |
DBLP DOI BibTeX RDF |
cyber, security, ontology, network, attack, failure, vulnerability, threat |
30 | Young-Hwan Bang, Yoon-Jung Jung, In-Jung Kim, Namhoon Lee, Gang-Soo Lee |
The Design and Development for Risk Analysis Automatic Tool. |
ICCSA (1) |
2004 |
DBLP DOI BibTeX RDF |
Safeguard, Vulnerability, Risk Analysis, Interview, Threat, Asset, Inquiry |
30 | Cynthia E. Irvine, Timothy E. Levin, Jeffery D. Wilson, David J. Shifflett, Barbara Pereira |
An Approach to Security Requirements Engineering for a High Assurance System. |
Requir. Eng. |
2002 |
DBLP DOI BibTeX RDF |
Security, Specification, Requirements, Engineering, Assurance, Threat |
30 | Sridhar R. Kundur, Daniel Raviv, Ernest Kent |
An image-based visual-motion-cue for autonomous navigatio. |
CVPR |
1997 |
DBLP DOI BibTeX RDF |
visual-motion-cue, visual motion cue, Hybrid Visual Threat Cue, 3D textured surface, sequence of images, active vision, active vision, collision avoidance, visual navigation, autonomous navigation |
27 | Yi-Ming Chen 0008, Dachrahn Wu, Cheng-Kuang Wu |
A game theory approach for an emergency management security advisory system. |
ISI |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Dianxiang Xu, Vivek Goel, Kendall E. Nygard |
An Aspect-Oriented Approach to Security Requirements Analysis. |
COMPSAC (2) |
2006 |
DBLP DOI BibTeX RDF |
use case, aspect-oriented software development, Security requirements, threats, mitigation |
27 | Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad Verbowski, Helen J. Wang, Jacob R. Lorch |
SubVirt: Implementing malware with virtual machines. |
S&P |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Steven R. Johnston |
Development of a Legal Framework for Intrusion Detection. |
RAID |
2002 |
DBLP DOI BibTeX RDF |
Anti-terrorism law, criminal law, private communications, privacy, intrusion detection, wiretap, interception |
27 | Jung-Min Kang, Wook Shin, C.-G. Park, Dong-Ik Lee |
Extended BLP Security Model Based on Process Reliability for Secure Linux Kernel. |
PRDC |
2001 |
DBLP DOI BibTeX RDF |
|
27 | Hee Ock Rho, Il Ryu |
The Impact of Information Technology Threat on IT Appropriation and IT Avoidance. |
CICSyN |
2011 |
DBLP DOI BibTeX RDF |
Information Technology Threat, Coping Theory, IT appropriation, IT avoidance |
27 | Holger Schmidt 0001 |
Threat- and Risk-Analysis During Early Security Requirements Engineering. |
ARES |
2010 |
DBLP DOI BibTeX RDF |
risk analysis, domain knowledge, threat analysis, security requirements engineering |
27 | Qizeng Li, Zanfu Xie |
A Correlation Analysis Method for Threat Factors in Information System Based on Cloud Model. |
MVHI |
2010 |
DBLP DOI BibTeX RDF |
single rule generator, threat identification, correlation analysis, cloud model |
27 | Antonietta Stango, Neeli R. Prasad, Dimitris M. Kyriazanos |
A Threat Analysis Methodology for Security Evaluation and Enhancement Planning. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
vulnerabilities, security metrics, assets, threat analysis |
27 | Xudong Miao, Demin Xu, Yongchun Wang |
Intuitionistic Fuzzy Likelihood Methods and Models for Naval Air Defense Situation and Threat Assessment. |
FSKD (6) |
2009 |
DBLP DOI BibTeX RDF |
Situation Threat Assessment, Uncertainty, Fuzzy Set, Intuitionistic Fuzzy Set |
27 | Yair Amir |
The insider threat in scalable distributed systems: algorithms, metrics and gaps. |
STC |
2007 |
DBLP DOI BibTeX RDF |
distributed system, insider threat |
27 | Sébastien Foulle, Steve A. Schneider, Jacques Traoré, Zhe Xia |
Threat Analysis of a Practical Voting Scheme with Receipts. |
VOTE-ID |
2007 |
DBLP DOI BibTeX RDF |
Voter verifiable, voting ducks, electronic voting, threat analysis |
27 | Mohd A. Bashar, Ganesh Krishnan, Markus G. Kuhn, Eugene H. Spafford, Samuel S. Wagstaff Jr. |
Low-threat security patches and tools. |
ICSM |
1997 |
DBLP DOI BibTeX RDF |
low-threat security patches, dangerous information, vulnerability information, software vendor, binary program patch, differential application times, cryptoprocessors, enciphered operating systems, synchronization, reverse engineering, customization, security of data, security tools |
24 | Mariusz Chmielewski, Andrzej Galka, Piotr Jarema, Kamil Krasowski, Artur Kosinski |
Semantic Knowledge Representation in Terrorist Threat Analysis for Crisis Management Systems. |
ICCCI |
2009 |
DBLP DOI BibTeX RDF |
counter-terrorism, GTD, ontology, GIS, decision support, crisis management |
24 | Frank L. Greitzer, Andrew P. Moore, Dawn M. Cappelli, Dee H. Andrews, Lynn A. Carroll, Thomas D. Hull |
Combating the Insider Cyber Threat. |
IEEE Secur. Priv. |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Wilian Segatto, Eduardo Herzer, Cristiano L. Mazzotti, João Ricardo Bittencourt, Jorge L. V. Barbosa |
Mobio threat: A mobile game based on the integration of wireless technologies. |
Comput. Entertain. |
2008 |
DBLP DOI BibTeX RDF |
RFID, Bluetooth, Pervasive, QR code, social gaming |
24 | Jose Andre Morales |
Threat of renovated .NET viruses to mobile devices. |
ACM Southeast Regional Conference |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Xuezhong Liu, Zengliang Liu |
Evaluating Method of Security Threat Based on Attacking-Path Graph Model. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Xi Liu, Alastair G. Gale |
Searching for Possible Threat Items to Safe Air Travel: Human Error and Training. |
HCI (13) |
2007 |
DBLP DOI BibTeX RDF |
airport X-ray luggage image, visual search, perceptual learning |
24 | Umit Ayvaz, Murat Dere, Yao Ming Tiah |
Using the MANA agent-based simulation tool to evaluate and compare the effectiveness of ground-based and airborne communications jammers in countering the IED threat to ground convoys. |
SpringSim (2) |
2007 |
DBLP BibTeX RDF |
Counter-IED, MANA, communications jammers, nearly orthogonal Latin hypercube, IED |
24 | Yue Chen, Barry W. Boehm, Luke Sheppard |
Value Driven Security Threat Modeling Based on Attack Path Analysis. |
HICSS |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Hervé Debar, Yohann Thomas, Nora Boulahia-Cuppens, Frédéric Cuppens |
Using Contextual Security Policies for Threat Response. |
DIMVA |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Dick Brackney, Terrance Goan, Allen Ott, Lockheed Martin |
The Cyber Enemy Within ... Countering the Threat from Malicious Insiders. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Wenbo Mao |
A Structured Operational Modelling of the Dolev-Yao Threat Model. |
Security Protocols Workshop |
2002 |
DBLP DOI BibTeX RDF |
|
24 | William L. Spight |
Evaluating Kos in a Neutral Threat Environment: Preliminary Results. |
Computers and Games |
2002 |
DBLP DOI BibTeX RDF |
|
24 | Ali Berrached, Mohsen Beheshti, André de Korvin, Richard A. Aló |
Applying Fuzzy Relation Equations to Threat Analysis. |
HICSS |
2002 |
DBLP DOI BibTeX RDF |
|
23 | Medha Bhargava, Chia-Chih Chen, Michael S. Ryoo, Jake K. Aggarwal |
Detection of object abandonment using temporal logic. |
Mach. Vis. Appl. |
2009 |
DBLP DOI BibTeX RDF |
Abandoned objects, Threat detection, Public areas, Temporal logic |
23 | Debin Liu, XiaoFeng Wang 0001, L. Jean Camp |
Mitigating Inadvertent Insider Threats with Incentives. |
Financial Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Incentive Engineering, Game Theory, Insider Threat, Human Subject |
23 | Dattatraya S. Bhilare, Ashwini K. Ramani, Sanjay K. Tanwani |
Protecting intellectual property and sensitive information in academic campuses from trusted insiders: leveraging active directory. |
SIGUCCS |
2009 |
DBLP DOI BibTeX RDF |
audit automation, real time action, insider threat, active directory, user identification |
23 | Charalampos Z. Patrikakis, Dimitris M. Kyriazanos, Athanasios Voulodimos, Ioannis G. Nikolakopoulos |
Privacy and resource protection in personal network federations. |
PETRA |
2009 |
DBLP DOI BibTeX RDF |
security, privacy, threat analysis, personal networks |
23 | Xin Liu, Peidong Zhu, Yuxing Peng 0001 |
SEM: A Security Evaluation Model for Inter-domain Routing System in the Internet. |
IPOM |
2008 |
DBLP DOI BibTeX RDF |
Security Threat Situation, BGP, Security Evaluation |
23 | Madhusudhanan Chandrasekaran, Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya |
Inferring Sources of Leaks in Document Management Systems. (PDF / PS) |
IFIP Int. Conf. Digital Forensics |
2008 |
DBLP DOI BibTeX RDF |
information leaks, insider threat, Document management system |
Displaying result #1 - #100 of 5606 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|