|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1926 occurrences of 1317 keywords
|
|
|
Results
Found 2279 publication records. Showing 2279 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
68 | Hui Song, Liang Xie 0002, Sencun Zhu, Guohong Cao |
Sensor node compromise detection: the location perspective. |
IWCMC |
2007 |
DBLP DOI BibTeX RDF |
node compromise detection, wireless sensor networks |
52 | Shouhuai Xu, Ravi S. Sandhu |
A Scalable and Secure Cryptographic Service. (PDF / PS) |
DBSec |
2007 |
DBLP DOI BibTeX RDF |
cryptographic service, compromise detection, compromise confinement, security, scalability, availability |
48 | Prince Mahajan, Ramakrishna Kotla, Catherine C. Marshall, Venugopalan Ramasubramanian, Thomas L. Rodeheffer, Douglas B. Terry, Ted Wobber |
Effective and efficient compromise recovery for weakly consistent replication. |
EuroSys |
2009 |
DBLP DOI BibTeX RDF |
compromise recovery, replication |
48 | Ethem Tolga, S. Emre Alptekin |
Product Development Process Using a Fuzzy Compromise-Based Goal Programming Approach. |
ICCSA (1) |
2007 |
DBLP DOI BibTeX RDF |
compromise programming, e-learning, goal programming, Quality function deployment, analytic network process |
48 | Maurizio Adriano Strangio |
On the Resilience of Key Agreement Protocols to Key Compromise Impersonation. |
EuroPKI |
2006 |
DBLP DOI BibTeX RDF |
key agreement protocols, key compromise impersonation |
48 | Xiangqian Chen, Kia Makki, Kang Yen, Niki Pissinou |
Node Compromise Modeling and its Applications in Sensor Networks. |
ISCC |
2007 |
DBLP DOI BibTeX RDF |
|
48 | Craig Gentry, Philip D. MacKenzie, Zulfikar Ramzan |
A Method for Making Password-Based Key Exchange Resilient to Server Compromise. |
CRYPTO |
2006 |
DBLP DOI BibTeX RDF |
|
42 | M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto |
Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Group Key Exchange, Insider Attacks, Key Compromise Impersonation |
42 | Haigen Hu, Lihong Xu, Qingsong Hu |
Model-based compromise control of greenhouse climate using pareto optimization. |
GEC Summit |
2009 |
DBLP DOI BibTeX RDF |
compromise control algorithm, greenhouse climate model, weather forecast model, energy-saving, NSGA-ii |
42 | Henryk Piech, Pawel Figat |
A Method for Evaluation of Compromise in Multiple Criteria Problems. |
ICAISC |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Michael Backes 0001, Martin P. Grochulla, Catalin Hritcu, Matteo Maffei |
Achieving Security Despite Compromise Using Zero-knowledge. |
CSF |
2009 |
DBLP DOI BibTeX RDF |
Protocol Transformation, Security Despite Compromise, Type Systems, Protocol Design, Zero-Knowledge Proofs |
35 | Xiangqian Chen, Kia Makki, Kang Yen, Niki Pissinou, Zhihua Liu |
A proactive secure routing algorithm defense against node compromise in sensor networks. |
LCN |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Yanchao Zhang, Wei Liu 0008, Wenjing Lou, Yuguang Fang |
Location-based compromise-tolerant security mechanisms for wireless sensor networks. |
IEEE J. Sel. Areas Commun. |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Samir Aknine, Onn Shehory |
A Feasible and Practical Coalition Formation Mechanism Leveraging Compromise and Task Relationships. |
IAT |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Michael A. Palley, Jeffrey S. Simonoff |
The Use of Regression Methodology for the Compromise of Confidential Information in Statistical Databases. |
ACM Trans. Database Syst. |
1987 |
DBLP DOI BibTeX RDF |
|
33 | Christoph Krauß, Markus Schneider 0002, Claudia Eckert 0001 |
Defending against false-endorsement-based dos attacks in wireless sensor networks. |
WISEC |
2008 |
DBLP DOI BibTeX RDF |
security, wireless sensor network, node compromise, denial-of-service attacks, report generation |
33 | Yun Zhou, Yuguang Fang |
A Two-Layer Key Establishment Scheme for Wireless Sensor Networks. |
IEEE Trans. Mob. Comput. |
2007 |
DBLP DOI BibTeX RDF |
Sensor networks, key establishment, transport layer, link layer, node compromise |
33 | Wiebren de Jonge |
Compromising Statistical Databases Responding to Queries about Means. |
ACM Trans. Database Syst. |
1983 |
DBLP DOI BibTeX RDF |
database security, statistical databases, compromise |
31 | Francisco J. André, Carlos Romero |
Computing compromise solutions: On the connections between compromise programming and composite programming. |
Appl. Math. Comput. |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Pradip De, Yonghe Liu, Sajal K. Das 0001 |
Deployment-aware modeling of node compromise spread in wireless sensor networks using epidemic theory. |
ACM Trans. Sens. Networks |
2009 |
DBLP DOI BibTeX RDF |
Random key predistribution, epidemic theory, group-based deployment, sensor networks, random graph |
29 | Tyler Moore 0001, Richard Clayton 0001 |
Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing. |
Financial Cryptography |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Xiaodong Lin 0001, Rongxing Lu, Pin-Han Ho, Xuemin Shen, Zhenfu Cao |
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks. |
IEEE Trans. Wirel. Commun. |
2008 |
DBLP DOI BibTeX RDF |
|
29 | David John Leversage, Eric James James |
Estimating a System's Mean Time-to-Compromise. |
IEEE Secur. Priv. |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Odysseus G. Manoliadis, John Paris Pantouvakis, Ioannis E. Tsolas |
compromise programming model in site selection for construction temporary facilities. |
Oper. Res. |
2007 |
DBLP DOI BibTeX RDF |
Multi-criteria decision making analysis, composite programming, site selection, construction |
29 | Pradip De, Yonghe Liu, Sajal K. Das 0001 |
Modeling Node Compromise Spread in Wireless Sensor Networks Using Epidemic Theory. |
WOWMOM |
2006 |
DBLP DOI BibTeX RDF |
Random Key Predistribution, Sensor Networks, Random Graph, Epidemiology |
29 | Abdulrahman Alarifi, Wenliang Du |
Diversify sensor nodes to improve resilience against node compromise. |
SASN |
2006 |
DBLP DOI BibTeX RDF |
wireless sensor networks, reverse engineering, diversity, obfuscation |
29 | Andrew D. Gordon 0001, Alan Jeffrey |
Secrecy Despite Compromise: Types, Cryptography, and the Pi-Calculus. |
CONCUR |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Krzysztof Cpalka, Leszek Rutkowski |
Fuzzy Modelling with a Compromise Fuzzy Reasoning. |
ICAISC |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Alain Herment, Elodie Roullot, Isabelle Bloch, Claire Pellot, Andrew Todd-Pokropek, Élie Mousseaux |
Improvement of the SNR-resolution compromise in MRA using spatial segmented k-space acquisitions. |
ISBI |
2002 |
DBLP DOI BibTeX RDF |
|
26 | Linchun Li, Jianhua Li 0001, Yue Wu 0010, Ping Yi |
A Group Key Management Scheme with Revocation and Loss-tolerance Capability for Wireless Sensor Networks. |
PerCom |
2008 |
DBLP DOI BibTeX RDF |
loss tolerance, authentication, revocation, group key management, node compromise |
26 | Konstantinos Chalkias, Spyros T. Halkidis, Dimitrios Hristu-Varsakelis, George Stephanides, Anastasios Alexiadis |
A Provably Secure One-Pass Two-Party Key Establishment Protocol. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
One-pass protocols, two-party key agreement, loss of information, key-compromise impersonation |
26 | Yuichi Sei, Shinichi Honiden |
Resilient Security for False Event Detection Without Loss of Legitimate Events in Wireless Sensor Networks. |
OTM Conferences (1) |
2007 |
DBLP DOI BibTeX RDF |
false event, security, wireless sensor network, node compromise, en-route filtering |
26 | Gary T. Leavens, Curtis Clifton |
Multiple concerns in aspect-oriented language design: a language engineering approach to balancing benefits, with examples. |
SPLAT |
2007 |
DBLP DOI BibTeX RDF |
aspect-oriented programming language design, ease of maintenance, ease of reasoning, goals, quantification, tradeoff, balance, scattering, concerns, compromise, tangling, obliviousness |
26 | Md. Abdul Hamid, Choong Seon Hong |
A Secure Message Percolation Scheme for Wireless Sensor Network. |
ICOIN |
2007 |
DBLP DOI BibTeX RDF |
Secure Group, Star Key Graph, Robustness, Node Compromise |
26 | Di Ma, Gene Tsudik |
Extended Abstract: Forward-Secure Sequential Aggregate Authentication. |
S&P |
2007 |
DBLP DOI BibTeX RDF |
key compromise, sensors, forward security, signature schemes, authentication schemes, aggregate signatures |
26 | Michal Ren, Tanmoy Kanti Das, Jianying Zhou 0001 |
Diverging Keys in Wireless Sensor Networks. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
Node Compromise Attack, Diverging Keys, Sensor Network Security |
26 | Ik Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee 0001 |
A Diffie-Hellman Key Exchange Protocol Without Random Oracles. |
CANS |
2006 |
DBLP DOI BibTeX RDF |
Diffie-Hellman protocol, Strong forward secrecy, Unknown key share, Key exchange, Key compromise impersonation |
26 | Patricia Jaramillo, Ricardo A. Smith, Joaquín Andréu |
Multi-Decision-Makers Equalizer: A Multiobjective Decision Support System for Multiple Decision-Makers. |
Ann. Oper. Res. |
2005 |
DBLP DOI BibTeX RDF |
multicriteria decision support system, compromise programming, group decision making, multiobjective |
26 | Hao Yang 0004, Fan Ye 0003, Yuan Yuan 0035, Songwu Lu, William A. Arbaugh |
Toward resilient security in wireless sensor networks. |
MobiHoc |
2005 |
DBLP DOI BibTeX RDF |
location-based security, wireless sensor networks, resiliency, key distribution, node compromise, en-route filtering |
26 | Hajime Sawamura, Yuichi Umeda, Robert K. Meyer |
Computational Dialectics for Argument-Based Agent Systems. |
ICMAS |
2000 |
DBLP DOI BibTeX RDF |
dialectical logic, Aufheben, argumentation, dialectics, compromise |
26 | Yuichi Umeda, Masashi Yamashita, Masanobu Inagaki, Hajime Sawamura |
Argumentation as a Social Computing Paradigm. |
PRIMA |
2000 |
DBLP DOI BibTeX RDF |
Aufheben, concession, agent, cooperation, argumentation, dialectics, compromise |
26 | David P. Dobkin, Anita K. Jones, Richard J. Lipton |
Secure Databases: Protection Against User Influence. |
ACM Trans. Database Syst. |
1979 |
DBLP DOI BibTeX RDF |
security, database, information flow, inference, protection, compromise, statistical query |
26 | Wei-Min Shi |
ID-Based Non-interactive Deniable Authentication Protocol. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Miles A. McQueen, Wayne F. Boyer, Mark A. Flynn, George A. Beitel |
Quantitative Cyber Risk Reduction Estimation Methodology for a Small SCADA Control System. |
HICSS |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Yi Tang 0001, Jiming Liu 0001, Xiaolong Jin |
Agent Compromises in Distributed Problem Solving. |
IDEAL |
2003 |
DBLP DOI BibTeX RDF |
Agent Compromises, Distributed GCP Solving, Graph Coloring Problem, Distributed Constraint Satisfaction Problem |
22 | Manuel A. Pulido, Peter Borm, Ruud Hendrickx, Natividad Llorca, Joaquín Sánchez-Soriano |
Compromise solutions for bankruptcy situations with references. |
Ann. Oper. Res. |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Nhan Tran, Vijay Somers |
Modeling privacy compromise: visibility of individuals via DRM and RFID in ubiquitous computing. |
SpringSim |
2008 |
DBLP DOI BibTeX RDF |
distributed security, modeling, privacy, ubiquitous computing, pervasive computing, RFID, digital rights management |
22 | Chao-Lieh Chen, Syue-You Chen, Jeng-Wei Lee, Yau-Hwang Kuo |
Hierarchical cross-layer fuzzy control for compromise of multiple objectives in wireless mobile networks. |
Mobility Conference |
2008 |
DBLP DOI BibTeX RDF |
hierarchical fuzzy control, wireless networks, cross-layer design |
22 | Ming-Guang Shi, Michael R. Lyu, Tat-Ming Lok |
Maximal-Robustness-Minimal-Fragility Controller: A Compromise between Robustness and Fragility of Biochemical Networks. |
ICIC (2) |
2008 |
DBLP DOI BibTeX RDF |
?/H2/H??? control, Biochemical networks, Maximal-Robustness- Minimal-Fragility controller, Perfect Bayesian-Nash equilibrium |
22 | Iosif Androulidakis, Chris Basios |
A plain type of mobile attack: Compromise of user's privacy through a simple implementation method. |
COMSWARE |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Ting-Ching Lin, Hsien-Chao Huang, Yueh-Min Huang |
A Parallax-Map-Based DIBR System to Compromise Visual Quality and Depth Resolution. |
PCM |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Christoph Krauß, Frederic Stumpf, Claudia Eckert 0001 |
Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques. |
ESAS |
2007 |
DBLP DOI BibTeX RDF |
Security, Sensor Network, Trusted Computing, Attestation |
22 | Xiang Li 0006, Baoding Liu |
Compromise Chance Measure for Hybrid Events. |
FUZZ-IEEE |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Jesus Molina, Xavier Chorin, Michel Cukier |
Filesystem Activity Following a SSH Compromise: An Empirical Study of File Sequences. |
ICISC |
2007 |
DBLP DOI BibTeX RDF |
SSH compromises, filesystem data, host intrusion detection systems, intrusion detection systems evaluation |
22 | Hongfeng Zhu, Tianhua Liu, Jie Liu, Guiran Chang |
An Efficient Client-to-Client Password-Authenticated Key Exchange Resilient to Server Compromise. |
PRDC |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Taekyoung Kwon 0002, Dong Hoon Lee 0002 |
Three-Party Password Authenticated Key Agreement Resistant to Server Compromise. |
WISA |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Cor J. Veenman, Marcel J. T. Reinders |
The Nearest Subclass Classifier: A Compromise between the Nearest Mean and Nearest Neighbor Classifier. |
IEEE Trans. Pattern Anal. Mach. Intell. |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Jacob W. Crandall, Michael A. Goodrich |
Learning to compete, compromise, and cooperate in repeated general-sum games. |
ICML |
2005 |
DBLP DOI BibTeX RDF |
|
22 | David McSherry |
Similarity and Compromise. |
ICCBR |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Seung Bae Park, Moon Seol Kang, Sang Jun Lee |
Authenticated Key Exchange Protocol Secure against Offline Dictionary Attack and Server Compromise. |
GCC (1) |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Ljiljana Brankovic, Jozef Sirán |
2-Compromise Usability in 1-Dimensional Statistical Databases. |
COCOON |
2002 |
DBLP DOI BibTeX RDF |
privacy in data mining, statistical database security, combinatorics, discrete mathematics |
22 | Pieter S. Kritzinger, J. W. Graham |
A Theorem in the Theory of Compromise Merge Methods. |
J. ACM |
1974 |
DBLP DOI BibTeX RDF |
|
20 | Jesus Molina, Michel Cukier |
Evaluating Files to Audit for Detecting Intrusions in FileSystem Data. |
NCA |
2009 |
DBLP DOI BibTeX RDF |
filesystem data, attacker behavior, SSH compromise, Intrusion detection systems, honeypots, empirical analysis |
20 | Shouhuai Xu, Moti Yung |
Expecting the Unexpected: Towards Robust Credential Infrastructure. |
Financial Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Credential infrastructures, key compromise, hit-and-run attack, hit-and-stick attack, digital signatures, PKI, insider attack |
20 | Raphael C.-W. Phan, Wei-Chuen Yau, Bok-Min Goi |
Analysis of Two Pairing-Based Three-Party Password Authenticated Key Exchange Protocols. |
NSS |
2009 |
DBLP DOI BibTeX RDF |
three-party, cryptanalysis, provable security, attacks, Weil pairing, Password-authenticated key exchange, key compromise impersonation |
20 | Fucai Zhou, Xiumei Liu, Hong Yan, Guiran Chang |
Cryptanalysis and Improvement of EC2C-PAKA Protocol in Cross-Realm. |
NPC Workshops |
2008 |
DBLP DOI BibTeX RDF |
C2C-PAKA, password-compromise impersonate attack, Cross-Realm |
20 | Chung-Wei Chen, Shiuh-Jeng Wang, Yuh-Ren Tsai |
Geometrically Reciprocal Authentication Scheme Using Shift Tangent Line in Ad Hoc Network Systems. |
MUE |
2008 |
DBLP DOI BibTeX RDF |
Ad-hoc network, authentication, security analysis, compromise |
20 | Heinrich J. Rommelfanger |
Optimization of Fuzzy Objective Functions in Fuzzy (Multicriteria) Linear Programs - A Critical Survey. |
IFSA (2) |
2007 |
DBLP DOI BibTeX RDF |
fuzzy objective functions, fuzzy inequality relations, compromise solution, set of feasible solutions, Fuzzy linear programming |
20 | Mary Mathews, Min Song 0002, Sachin Shetty, Rick McKenzie |
Detecting Compromised Nodes in Wireless Sensor Networks. |
SNPD (1) |
2007 |
DBLP DOI BibTeX RDF |
Sensor networks, algorithm, detection, intrusion, compromise |
20 | Rituparna Chaki, Nabendu Chaki |
IDSX: A Cluster Based Collaborative Intrusion Detection Algorithm for Mobile Ad-Hoc Network. |
CISIM |
2007 |
DBLP DOI BibTeX RDF |
Compromise node, Internal intrusion, Phantom intrusion detection, Mobile ad hoc network, IDS |
20 | Feng Li 0001, Jie Wu 0001 |
A probabilistic voting-based filtering scheme in wireless sensor networks. |
IWCMC |
2006 |
DBLP DOI BibTeX RDF |
probabilistic key assignment, voting method, wireless sensor networks, wireless communications, node compromise |
20 | Wei-Chi Ku |
A hash-based strong-password authentication scheme without using smart cards. |
ACM SIGOPS Oper. Syst. Rev. |
2004 |
DBLP DOI BibTeX RDF |
password-file compromise attack, strong password, user authentication, replay attack, denial-of-service attack |
20 | Kyungah Shim |
The Risks of Compromising Secret Information. |
ICICS |
2002 |
DBLP DOI BibTeX RDF |
Authenticated key agreement protocol, insider, known-key attack, key-compromise impersonation attack |
20 | Poppy L. McLeod, Scott E. Elston |
Persuasive linguistic devices in anonymous vs. identified computer supported groups: an exploratory study. |
HICSS (4) |
1995 |
DBLP DOI BibTeX RDF |
persuasive linguistic devices, anonymous computer supported groups, identified computer supported groups, jury decision-making task, character identities, factual information errors, compromise requests, persuasive arguments, groupware, human factors, cooperation, consensus, flexibility, group decision support systems, linguistics, polling, negotiation support systems, electronic communication, law administration |
20 | G. D. Miller |
Programming Techniques: An algorithm for the probability of the union of a large number of events. |
Commun. ACM |
1968 |
DBLP DOI BibTeX RDF |
mutually exclusive events, optimum, storage vs. time compromise, algorithm, probability, set union |
19 | Gicheol Wang, Deokjai Choi, Daewook Kang |
A lightweight key renewal scheme for clustered sensor networks. |
ICUIMC |
2009 |
DBLP DOI BibTeX RDF |
security, wireless sensor networks, key management |
19 | Stephen S. Yau, Yin Yin |
A Privacy Preserving Repository for Data Integration across Data Sharing Services. |
IEEE Trans. Serv. Comput. |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Chris Grier, Shuo Tang, Samuel T. King |
Secure Web Browsing with the OP Web Browser. |
SP |
2008 |
DBLP DOI BibTeX RDF |
security, browser, web security |
19 | Xiaolong Xue, Jinfeng Lu, Yaowu Wang, Qiping Shen 0001 |
A Relative Entropy Method for Improving Agent-Based Negotiation Efficiency of Collaborative Working in Construction Projects. |
CDVE |
2007 |
DBLP DOI BibTeX RDF |
Agent, Negotiation, Collaborative working, Relative entropy |
19 | Chengqing Zong, Mark Seligman |
Toward Practical Spoken Language Translation. |
Mach. Transl. |
2005 |
DBLP DOI BibTeX RDF |
User cooperation, Human factors engineering, Cooperative systems, Spoken Language Translation |
19 | Sarit Kraus, Onn Shehory, Gilad Taase |
The Advantages of Compromising in Coalition Formation with Incomplete Information. |
AAMAS |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Liqun Chen 0002, Caroline Kudla |
Identity Based Authenticated Key Agreement Protocols from Pairings. |
CSFW |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Dimitar Lakov, George Kirov |
On intelligent human intelligible routing. |
KES |
2000 |
DBLP DOI BibTeX RDF |
|
19 | Joseph F. Traub, Yechiam Yemini, Henryk Wozniakowski |
The Statistical Security of a Statistical Database. |
ACM Trans. Database Syst. |
1984 |
DBLP DOI BibTeX RDF |
|
19 | Mayer D. Schwartz, Dorothy E. Denning, Peter J. Denning |
Linear Queries in Statistical Databases. |
ACM Trans. Database Syst. |
1979 |
DBLP DOI BibTeX RDF |
linear query, secure query functions, statical database, inference, confidentiality, data security, database security |
19 | David Alan Hanson |
Data security. |
ACM Southeast Regional Conference |
1979 |
DBLP DOI BibTeX RDF |
|
16 | Wenchang Zou, Shu-Ping Wan, Jiu-Ying Dong |
Trust evolution based minimum adjustment consensus framework with dynamic limited compromise behavior for probabilistic linguistic large scale group decision-making. |
Inf. Sci. |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Olivia Cannon, Ty Bondurant, Malindi Whyte, Arnd Scheel |
Shifting Consensus in a Biased Compromise Model. |
SIAM J. Appl. Dyn. Syst. |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Roberto Sanchis 0001, Ignacio Peñarrocha |
A PID tuning approach to find the optimal compromise among robustness, performance and control effort: implementation in a free software tool. |
Int. J. Control |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Dávid Zajacek, Adriána Dunárová, Lukás Bucinský, Marek Steklác |
Compromise in Docking Power of Liganded Crystal Structures of Mpro SARS-CoV-2 Surpasses 90% Success Rate. |
J. Chem. Inf. Model. |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Vincent Tan |
Framework and Classification of Indicator of Compromise for physics-based attacks. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Tianyang Chen, Peng Xu, Stjepan Picek, Bo Luo, Willy Susilo, Hai Jin 0001, Kaitai Liang |
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Zhenjun Ming, Yuyu Luo, Guoxin Wang 0001, Yan Yan 0008, Janet K. Allen, Farrokh Mistree |
Designing self-organizing systems using surrogate models and the compromise decision support problem construct. |
Adv. Eng. Informatics |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Anastasios Papathanasiou, George Liontos, Georgios Paparis, Vasiliki Liagkou, Euripides Glavas |
BEC Defender: QR Code-Based Methodology for Prevention of Business Email Compromise (BEC) Attacks. |
Sensors |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Alexander Goldberg, Giulia Fanti, Nihar B. Shah |
Batching of Tasks by Users of Pseudonymous Forums: Anonymity Compromise and Protection. |
Proc. ACM Meas. Anal. Comput. Syst. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Mostapha Diss, Clinton Gubong Gassi, Issofa Moyouwou |
Social acceptability and the majoritarian compromise rule. |
Soc. Choice Welf. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Atieh Mohammadkhani, Seyed Meysam Mousavi |
A new last aggregation fuzzy compromise solution approach for evaluating sustainable third-party reverse logistics providers with an application to food industry. |
Expert Syst. Appl. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Zhiqiang Liao, Huchang Liao, Xinli Zhang |
A contextual Choquet integral-based preference learning model considering both criteria interactions and the compromise effects of decision-makers. |
Expert Syst. Appl. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Wenchao Jiang, Xiaolei Yang, Yuqi Zang, Xumei Yuan, Rui Liu |
Picture hesitant fuzzy grey compromise relational bidirectional projection method with application in multi-attribute recommendation. |
J. Intell. Fuzzy Syst. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Engla Rencelj Ling, Mathias Ekstedt |
Estimating Time-To-Compromise for Industrial Control System Attack Techniques Through Vulnerability Data. |
SN Comput. Sci. |
2023 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 2279 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|