|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 7090 occurrences of 2819 keywords
|
|
|
Results
Found 22916 publication records. Showing 22913 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
77 | Colette Reekie, Basie von Solms |
A Corporate Capital Protection and Assurance Model. |
OTM Workshops (1) |
2006 |
DBLP DOI BibTeX RDF |
Corporate Capital Protection and Assurance, Information Security Governance, Digital Forensic Governance, Project Management Governance, IT Governance, Corporate Governance |
73 | Dan Assaf |
Government Intervention in Information Infrastructure Protection. |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
Critical information infrastructure protection, market failures, cyber security, government regulation |
65 | Pin-Han Ho, János Tapolcai, Tibor Cinkler |
Segment shared protection in mesh communications networks with bandwidth guaranteed tunnels. |
IEEE/ACM Trans. Netw. |
2004 |
DBLP DOI BibTeX RDF |
survivable routing, working and protection paths, integer linear programming (ILP), shared risk link group (SRLG), segment shared protection (SSP) |
59 | Cheng-De Qin |
Personal data protection in electronic business. |
ICEC |
2005 |
DBLP DOI BibTeX RDF |
personal data protection, tort, privacy, legislation, electronic business |
57 | Qin Zheng 0002, Mohan Gurusamy |
Integrated Dynamic Routing of LSPs in IP over WDM Networks: Full Protection and Partial Spatial-Protection. |
NETWORKING |
2004 |
DBLP DOI BibTeX RDF |
|
56 | Jianli Shen, Guru Venkataramani, Milos Prvulovic |
Tradeoffs in fine-grained heap memory protection. |
ASID |
2006 |
DBLP DOI BibTeX RDF |
heap security, protection granularity, memory protection |
53 | Srinivasan Ramasubramanian |
Supporting multiple protection strategies in optical networks. |
IEEE/ACM Trans. Netw. |
2008 |
DBLP DOI BibTeX RDF |
multiple protection strategies, path protection, optical networks, dynamic routing, link protection |
51 | Elisa Boschi |
Legal requirements and issues in network traffic data protection. |
NDA |
2008 |
DBLP DOI BibTeX RDF |
data protection law, legal requirements, network traffic data |
51 | Wolfgang Kilian, Dörte Funkat |
Structuring Legal Knowledge on Data Protection: The EU-Data Protection Research Project DAPRO. |
DEXA Workshops |
2000 |
DBLP DOI BibTeX RDF |
legal knowledge structuring, DAPRO EU data protection research project, data privacy law, personal data dissemination, personal data storage, personal data collection, legal training, electronic accessibility, structured data protection rules, interactive checklists, decision support, data privacy, data protection, decision makers |
50 | Abdelilah Maach, Gregor von Bochmann, Hussein T. Mouftah |
An optimal shared protection scheme for optical networks. |
AICCSA |
2005 |
DBLP DOI BibTeX RDF |
|
47 | Chava Vijaya Saradhi, Lian Kian Wei, Mohan Gurusamy |
Provisioning Fault-Tolerant Scheduled Lightpath Demands in WDM Mesh Networks. |
BROADNETS |
2004 |
DBLP DOI BibTeX RDF |
|
46 | Jing Zhang 0003, Keyao Zhu, Hui Zang, Norman S. Matloff, Biswanath Mukherjee |
Availability-aware provisioning strategies for differentiated protection services in wavelength-convertible WDM mesh networks. |
IEEE/ACM Trans. Netw. |
2007 |
DBLP DOI BibTeX RDF |
connection provisioning, optical mesh network, service reliability, availability, differentiated services, protection, WDM |
46 | Timothy Y. Chow, Fabián A. Chudak, Anthony M. Ffrench |
Fast optical layer mesh protection using pre-cross-connected trails. |
IEEE/ACM Trans. Netw. |
2004 |
DBLP DOI BibTeX RDF |
cage graph, mesh protection, mesh restoration, self-healing networks, survivable optical networks, online algorithm, experimental design, bandwidth sharing, SONET, dijkstra algorithm, p-cycle |
46 | Dae-Hee Seo, Im-Yeong Lee, Hee-Un Park |
A Study on Key Recovery Agent Protection Profile Having Composition Function. |
ICCSA (1) |
2004 |
DBLP DOI BibTeX RDF |
Key Recovery Protection Profile, Evaluation Methodology, Common Criteria |
46 | Karthikeyan Sathyamurthy, Srinivasan Ramasubramanian |
Benefits of Link Protection at Connection Granularity. |
BROADNETS |
2004 |
DBLP DOI BibTeX RDF |
Optical networks, Dynamic routing, Traffic grooming, Link Protection |
46 | Xu Shao, Luying Zhou, Xiaofei Cheng, Weiguo Zheng, Yixin Wang |
Best Effort Shared Risk Link Group (SRLG) Failure Protection in WDM Networks. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
46 | Canhui Ou, Hui Zang, Narendra K. Singhal, Keyao Zhu, Laxman H. Sahasrabuddhe, R. A. MacDonald, Biswanath Mukherjee |
Subpath protection for scalability and fast recovery in optical WDM mesh networks. |
IEEE J. Sel. Areas Commun. |
2004 |
DBLP DOI BibTeX RDF |
|
46 | Adam Wiggins, Simon Winwood, Harvey Tuch, Gernot Heiser |
Legba: Fast Hardware Support for Fine-Grained Protection. |
Asia-Pacific Computer Systems Architecture Conference |
2003 |
DBLP DOI BibTeX RDF |
|
46 | Christian Damsgaard Jensen, Daniel Hagimont |
Protection Reconfiguration for Reusable Software. |
CSMR |
1998 |
DBLP DOI BibTeX RDF |
|
44 | Consumer Financial Protection Bureau |
Consumer Complaints. |
|
2019 |
DOI RDF |
|
44 | IEEE Standards Association, NFPA National Fire Protection Association |
Arc Flash Phenomena. |
|
2019 |
DOI RDF |
|
44 | European Data Protection Supervisor |
EDPS calls for consistency in EU approach to criminal records. |
Datenschutz und Datensicherheit |
2018 |
DBLP DOI BibTeX RDF |
|
44 | János Tapolcai, Pin-Han Ho |
A Deeper Study on Segment Shared Protection. |
ISPAN |
2004 |
DBLP DOI BibTeX RDF |
restoration time, protection and restoration, switching/merging, integer linear program (ILP), segment shared protection (SSP), protection domain |
44 | Mikio Hashimoto |
Secure Processor Consistent with Both Foreign Software Protection and User Privacy Protection (Transcript of Discussion). |
Security Protocols Workshop |
2004 |
DBLP DOI BibTeX RDF |
|
43 | Pin-Han Ho, Hussein T. Mouftah |
Allocation of Protection Domains in Dynamic WDM Mesh Networks. |
ICNP |
2002 |
DBLP DOI BibTeX RDF |
lighgtpath, shared protection, diverse routing, working and protection paths, wavelength division multiplexing (WDM) |
42 | Dan Wang 0002, Qian Zhang 0001, Jiangchuan Liu |
The self-protection problem in wireless sensor networks. |
ACM Trans. Sens. Networks |
2007 |
DBLP DOI BibTeX RDF |
Sensor networks, coverage, protection |
42 | Jianping Wang 0001, Mei Yang, Bin Yang, S. Q. Zheng 0001 |
Dual-Homing Based Scalable Partia Multicast Protection. |
IEEE Trans. Computers |
2006 |
DBLP DOI BibTeX RDF |
complexity, Networks, multicast, NP-completeness, survivability, protection |
42 | Josep Domingo-Ferrer |
Mobile Agent Route Protection through Hash-Based Mechanisms. |
INDOCRYPT |
2001 |
DBLP DOI BibTeX RDF |
agent route protection, Mobile agent security, Merkle trees, hash collisions |
41 | Yu Wang 0003, Xiang-Yang Li 0001, Qian Zhang 0001 |
Efficient Algorithms for p-Self-Protection Problem in Static Wireless Sensor Networks. |
IEEE Trans. Parallel Distributed Syst. |
2008 |
DBLP DOI BibTeX RDF |
|
41 | Ahmed E. Kamal 0001 |
A Generalized Strategy for 1+N Protection. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
41 | Chava Vijaya Saradhi, Mohan Gurusamy, Luying Zhou |
Segment-Based Partial Protection Scheme for Routing Reliability Guaranteed Connections in WDM Optical Networks. |
BROADNETS |
2006 |
DBLP DOI BibTeX RDF |
|
41 | Abdelilah Maach, Gregor von Bochmann, Hussein T. Mouftah |
Shared Protection for Time Slotted Optical Networks. |
NCA |
2004 |
DBLP DOI BibTeX RDF |
|
41 | Harald Gossner |
ESD protection for the deep sub micron regime - a challenge for design methodology. |
VLSI Design |
2004 |
DBLP DOI BibTeX RDF |
|
41 | Chi Wai Yung, Hung Fai Fu, Chi-Ying Tsui, Roger S. Cheng, D. George |
Unequal error protection for wireless transmission of MPEG audio. |
ISCAS (6) |
1999 |
DBLP DOI BibTeX RDF |
|
40 | Arrvindh Shriraman, Sandhya Dwarkadas |
Sentry: light-weight auxiliary memory access control. |
ISCA |
2010 |
DBLP DOI BibTeX RDF |
sentry, access control, multiprocessors, safety, cache coherence, memory protection, protection domains |
40 | Ron Banner, Ariel Orda |
The power of tuning: a novel approach for the efficient design of survivable networks. |
IEEE/ACM Trans. Netw. |
2007 |
DBLP DOI BibTeX RDF |
path restoration/protection, routing, survivability |
40 | Fangcheng Tang, Lu Ruan 0001 |
A Protection Tree Scheme for First-Failure Protection and Second-Failure Restoration in Optical Networks. |
ICCNMC |
2005 |
DBLP DOI BibTeX RDF |
|
39 | Thomas Schierl, Heiko Schwarz, Detlev Marpe, Thomas Wiegand |
Wireless Broadcasting Using the Scalable Extension of H.264/AVC. |
ICME |
2005 |
DBLP DOI BibTeX RDF |
|
39 | Salvatore D'Antonio, Francesco Oliviero, Roberto Setola |
High-Speed Intrusion Detection in Support of Critical Infrastructure Protection. |
CRITIS |
2006 |
DBLP DOI BibTeX RDF |
critical infrastructure protection (CIP), critical information infrastructure protection (CIIP), flow monitoring, intrusion detection, security management, SCADA |
39 | Vito Cappellini, Franco Bartolini, Mauro Barni, M. Wada |
Copyright Protection of Cultural Heritage Multimedia Data through Digital Watermarking Techniques. |
DEXA Workshops |
2000 |
DBLP DOI BibTeX RDF |
cultural heritage multimedia data, intellectual property rights protection, Art Virtual Gallery, World Wide Web, digital watermarking, art, copyright protection |
38 | Markos Fountoulakis, Manolis Marazakis, Michail Flouris, Angelos Bilas |
DARC: design and evaluation of an I/O controller for data protection. |
SYSTOR |
2010 |
DBLP DOI BibTeX RDF |
block-level I/O, storage architecture, storage controllers, virtualization, error detection, versioning, data protection, I/O performance |
38 | Anders Mykkeltveit, Bjarne E. Helvik |
Comparison of Schemes for Provision of Differentiated Availability-Guaranteed Services Using Dedicated Protection. |
ICN |
2008 |
DBLP DOI BibTeX RDF |
QoS, availability, protection |
38 | Wen Ji, Yiqiang Chen, Min Chen 0003, Yi Kang |
Unequal error protection based on objective video evaluation model. |
MobiMedia |
2007 |
DBLP DOI BibTeX RDF |
unequal error protection (UEP), video quality evaluation, fuzzy theory |
38 | Francesco Palmieri 0002, Ugo Fiore |
A Low Cost and Effective Link Protection Approach for Enhanced Survivability in Optical Transport Networks. |
ISPA Workshops |
2006 |
DBLP DOI BibTeX RDF |
Network resiliency, Fast rerouting, Link protection |
38 | Matthew S. Simpson, Bhuvan Middha, Rajeev Barua |
Segment protection for embedded systems using run-time checks. |
CASES |
2005 |
DBLP DOI BibTeX RDF |
MMU, MPU, ewmbedded systems, safe languages, segment protection, segmentation violations, reliability, compilers, virtual memory, memory safety, run-time checks |
38 | Masahiko Takahashi, Kenji Kono, Takashi Masuda |
Efficient Kernel Support of Fine-Grained Protection Domains for Mobile Code. |
ICDCS |
1999 |
DBLP DOI BibTeX RDF |
operating system, mobile code, lightweight, fine-grained, protection domain, page table |
38 | Shoji Suzuki, Kang G. Shin |
On memory protection in real-time OS for small embedded systems. |
RTCSA |
1997 |
DBLP DOI BibTeX RDF |
real-time OS, small embedded systems, region enlargement, memory consumption, processing overhead, intermediate-level skip multi-size paging, multi-level paging, short-circuit segment tree, real-time systems, reliability, safety, microprocessors, paged segmentation, hardware support, memory protection |
38 | Jeffrey S. Chase, Henry M. Levy, Michael J. Feeley, Edward D. Lazowska |
Sharing and Protection in a Single-Address-Space Operating System. |
ACM Trans. Comput. Syst. |
1994 |
DBLP DOI BibTeX RDF |
capability-based systems, microkernel operating systems, single-address-space operating systems, wide-address architectures, protection, object-oriented database systems, persistent storage, 64-bit architectures |
37 | Antonia Colibasanu |
NATO's Frontier Critical Infrastructure Protection Buildup - Discussion on the Romanian Energy Sector Protection Challenges. |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges |
2016 |
DBLP DOI BibTeX RDF |
|
37 | Daniel Le Métayer, Julien Le Clainche |
From the Protection of Data to the Protection of Individuals: Extending the Application of Non-discrimination Principles. |
European Data Protection |
2012 |
DBLP DOI BibTeX RDF |
|
37 | Ian Ellefsen, Sebastiaan H. von Solms |
Critical Information Infrastructure Protection in the Developing World. |
Critical Infrastructure Protection |
2010 |
DBLP DOI BibTeX RDF |
|
37 | János Tapolcai, Pin-Han Ho, Dominique Verchère, Tibor Cinkler, Anwar Haque |
A New Shared Segment Protection Method for Survivable Networks with Guaranteed Recovery Time. |
IEEE Trans. Reliab. |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Abraham Jacobus Johannes Mouton, C. Smith, George E. Smith |
Wireless Control and Communication to Motor Protection Relays by using an Embedded Microprocessor. |
CCECE |
2006 |
DBLP DOI BibTeX RDF |
|
37 | Jing Fang, Mahesh Sivakumar, Arun K. Somani, Krishna M. Sivalingam |
On Partial Protection in Groomed Optical WDM Mesh Networks. |
DSN |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Wissam Fawaz, Fabio Martignon, Ken Chen 0004, Guy Pujolle |
A Priority-Aware Protection Technique for Quality of Service Enabled WDM Networks. |
NETWORKING |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Lei Guo 0005, Hongfang Yu, Lemin Li |
A New Path Protection Algorithm for Meshed Survivable Wavelength-Division-Multiplexing Networks. |
ICN (1) |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Javier A. Salcedo, Juin J. Liou, Muhammad Yaqub Afridi, Allen R. Hefner |
Novel electrostatic discharge protection structure for a monolithic gas sensor systems-on-a-chip. |
ISCAS (1) |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Christophe Rippert |
Protection in flexible operating system architectures. |
ACM SIGOPS Oper. Syst. Rev. |
2003 |
DBLP DOI BibTeX RDF |
|
36 | Ken C. K. Lee, Wang-Chien Lee, Hong Va Leong, Baihua Zheng |
Navigational path privacy protection: navigational path privacy protection. |
CIKM |
2009 |
DBLP DOI BibTeX RDF |
privacy protection, road network, path search |
35 | Bernard A. Galler |
Letters to the editor: Language protection by trademark ill-advised. |
Commun. ACM |
1968 |
DBLP DOI BibTeX RDF |
Mooers doctrine, TRAC languages, patent protection, procedure-oriented language, proprietary software, protection of software, standardization, copyright protection, licensing, trademarks |
35 | Nils Kalstad Svendsen, Stephen D. Wolthusen |
Multigraph Dependency Models for Heterogeneous Infrastructures. |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
Infrastructure interdependencies, multigraph models, simulation |
34 | Emile J. C. Kelkboom, Berk Gökberk, Tom A. M. Kevenaar, Anton H. M. Akkermans, Michiel van der Veen |
"3D Face": Biometric Template Protection for 3D Face Recognition. |
ICB |
2007 |
DBLP DOI BibTeX RDF |
helper data system (HDS), privacy protection, 3D face recognition, Template protection |
34 | Bart J. van Rijnsoever, Peter Lenoir, Jean-Paul M. G. Linnartz |
Interoperable Protection for Digital Multimedia Content. |
J. VLSI Signal Process. |
2003 |
DBLP DOI BibTeX RDF |
OPIMA, architecture, interoperability, DRM, content-protection, copy-protection, conditional-access |
34 | Agnieszka C. Miguel, Eve A. Riskin |
Protection of Regions of Interest against Data Loss in a Generalized Multiple Description Framework. |
Data Compression Conference |
2000 |
DBLP DOI BibTeX RDF |
Protection of Regions of Interest, Error Resilience of ROI, MD-SPIHT, Packet Erasure Networks, Lossy Communications Networks, Unequal Loss Protection, Region of Interest, ROI, Multiple Description Coding, SPIHT |
34 | Kai Rannenberg, Giovanni Iachello |
Protection Profiles for Remailer Mixes -Do the New Evaluation Criteria Help? |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
protection profiles, remailer mixes, IT security evaluation criteria, privacy-related requirements, remailer mix networks, unobservable message transfer, ISO-ECITS, TCSEC, ITSEC, information technology, information technology, certification, privacy protection, electronic mail, data privacy, CC, evaluation criteria, user anonymity |
34 | Richard E. Smith |
Mandatory Protection for Internet Server Software. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
multilevel security applications, Internet server software, server overrun, attack code, server host, mandatory protection mechanisms, commercial systems, Unix chroot isolation, type enforcement, server protection, Internet, MLS, security flaws |
34 | Mojtaba Mehrara, Todd M. Austin |
Exploiting selective placement for low-cost memory protection. |
ACM Trans. Archit. Code Optim. |
2008 |
DBLP DOI BibTeX RDF |
Partial memory protection, selective placement, transient faults, fault-tolerant design, memory system design |
34 | Eun-Jun Yoon, Kee-Young Yoo |
Improving the Host Authentication Mechanism for POD Copy Protection System. |
New Directions in Intelligent Interactive Multimedia |
2008 |
DBLP DOI BibTeX RDF |
Host authentication, POD copy protection system, Diffie-Hellman key agreement, Replay attack |
34 | Yongho Seok, Taekyoung Kwon 0001, Yanghee Choi, Jean-Marie Bonnin |
Temporal fairness guarantee in multi-rate wireless LANs for per-flow protection. |
Wirel. Networks |
2007 |
DBLP DOI BibTeX RDF |
Temporal fairness, Per-flow protection, Wireless LAN, Packet scheduling, CSMA/CA |
34 | Yanjun Zuo, Timothy O'Keefe |
Post-release information privacy protection: A framework and next-generation privacy-enhanced operating system. |
Inf. Syst. Frontiers |
2007 |
DBLP DOI BibTeX RDF |
Information privacy protection, Privacy violation detection, Privacy-enhanced operating system, Information post-release control |
34 | Jimena L. Bastos, Yujie Zhang, Anurag K. Srivastava 0001, Noel N. Schulz |
A design paradigm for integrated protection of shipboard power systems. |
SCSC |
2007 |
DBLP BibTeX RDF |
protection system, rapid prototyping, design process, modeling and simulation, real-time simulation, power system, hardware-in-the-loop |
34 | Min Xu, Xuxian Jiang, Ravi S. Sandhu, Xinwen Zhang |
Towards a VMM-based usage control framework for OS kernel integrity protection. |
SACMAT |
2007 |
DBLP DOI BibTeX RDF |
kernel integrity, operating system protection, access control, authorization, security architecture, usage control, VMM, UCON |
34 | Zude Li, Guoqiang Zhan, Xiaojun Ye |
Role-Based Peer-to-Peer Model: Capture Global Pseudonymity for Privacy Protection. |
WAIM |
2006 |
DBLP DOI BibTeX RDF |
Peer-to-Peer, Role, Privacy Protection, Pseudonymity |
34 | Jen-Hao Hsiao, Jenq-Haur Wang, Ming-Syan Chen, Chu-Song Chen, Lee-Feng Chien |
Constructing a Wrapper-Based DRM System for Digital Content Protection in Digital Libraries. |
ICADL |
2005 |
DBLP DOI BibTeX RDF |
access control, digital watermark, Digital rights management, intellectual property, content protection |
34 | Emmett Witchel, Junghwan Rhee, Krste Asanovic |
Mondrix: memory isolation for linux using mondriaan memory protection. |
SOSP |
2005 |
DBLP DOI BibTeX RDF |
fine-grained memory protection |
34 | Lin Yuan, Gang Qu 0001, Ankur Srivastava 0001 |
VLSI CAD tool protection by birthmarking design solutions. |
ACM Great Lakes Symposium on VLSI |
2005 |
DBLP DOI BibTeX RDF |
birthmarking, CAD, protection, intellectual property |
34 | Yu-Quan Zhang, Sabu Emmanuel |
A Novel Watermarking Framework for Joint-Creatorship Protection. |
CW |
2005 |
DBLP DOI BibTeX RDF |
Joint-Creatorship Protection, Joint-Ownership Verification, Watermarking Framework |
34 | Silvia Polettini, Luisa Franconi, Julian Stander |
Model Based Disclosure Protection. |
Inference Control in Statistical Databases |
2002 |
DBLP DOI BibTeX RDF |
Business microdata, protection models, confidentiality, regression models, performance assessment |
34 | Oded Goldreich 0001, Rafail Ostrovsky |
Software Protection and Simulation on Oblivious RAMs. |
J. ACM |
1996 |
DBLP DOI BibTeX RDF |
simulation of random access machines, software protection, pseudorandom functions |
33 | Michael Stilkerich, Daniel Lohmann, Wolfgang Schröder-Preikschat |
Memory protection at option. |
EDCC-CARS |
2010 |
DBLP DOI BibTeX RDF |
|
33 | Yang Xiao 0001, Frank Haizhon Li, Sunghyun Choi 0001 |
Two-level protection and guarantee for multimedia traffic in IEEE 802.11e distributed WLANs. |
Wirel. Networks |
2009 |
DBLP DOI BibTeX RDF |
Quality of Service (QoS), Wireless LAN, Admission control, Medium access control (MAC), IEEE 802.11e |
33 | Emad Mahmoud Alsukhni, Hussein T. Mouftah |
A novel distributed destination routing-based Availability-Aware provisioning framework for differentiated protection services in optical mesh networks. |
ISCC |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Ningning Zhu, Tzi-cker Chiueh |
Portable and Efficient Continuous Data Protection for Network File Servers. |
DSN |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Hyunsu Lim, Sang-il Ahn, Eun-kyou Kim, Hong-Shik Park |
A QoS-Based Adaptive Resource Sharing Protection for Optical Burst Switching Networks. |
ICOIN |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Hyunseung Choo, Minhan Son, Min Young Chung, Tae-Jin Lee 0001 |
Shared Protection by Concatenated Rings in Optical WDM Networks. |
NETWORKING |
2004 |
DBLP DOI BibTeX RDF |
|
33 | Antony L. Hosking, J. Eliot B. Moss |
Protection Traps and Alternatives for Memory Management of an Object-Oriented Language. |
SOSP |
1993 |
DBLP DOI BibTeX RDF |
Smalltalk |
33 | Ravi S. Sandhu |
The schematic protection model: its definition and analysis for acyclic attenuating schemes. |
J. ACM |
1988 |
DBLP DOI BibTeX RDF |
|
32 | Hans Ulrich Buhl, Marcus Kaiser, Veronica Winkler |
Beratungsindividualisierung in der Finanzdienstleistungsbranche Umsetzungskonzepte und rechtliche Rahmenbedingungen. |
Wirtschaftsinf. |
2007 |
DBLP DOI BibTeX RDF |
Individualisation, Consumer Protection, Role-Orientation, Situation-Orientation, Advisory, Data Protection, Financial Services |
32 | Chung-Lin Huang, Sling Liang |
A Model-Driven Joint Source and Channel Coder for MPEG-2 Video Transmission. |
ITCC |
2002 |
DBLP DOI BibTeX RDF |
Joint Source and channel coding (JSCC), Unequal error protection (UEP), rate compatible punctured convolution (RCPC) coding and Equal error protection (EEP) |
32 | Robert Grimm 0001, Brian N. Bershad |
Separating access control policy, enforcement, and functionality in extensible systems. |
ACM Trans. Comput. Syst. |
2001 |
DBLP DOI BibTeX RDF |
access check, policy-neutral enforcement, protection domain transfer, Java, security policy, auditing, SPIN, extensible systems, protection domain |
32 | Robert N. Smith, Sourav Bhattacharya |
Firewall placement in a large network topology. |
FTDCS |
1997 |
DBLP DOI BibTeX RDF |
firewall placement heuristics, large network topology, multi-user distributed information environment, firewall cascade, potential attack point, comprehensive security protection, end-to-end security protection, simulation, performance, network security, completeness, authorisation, operations research, cost optimization, delay minimization, sensitive data, confidence degree |
31 | Mikio Hashimoto, Hiroyoshi Haruki, Takeshi Kawabata |
Secure Processor Consistent with Both Foreign Software Protection and User Privacy Protection. |
Security Protocols Workshop |
2004 |
DBLP DOI BibTeX RDF |
|
31 | Dee Meng Kang, Haadee Faahym, Souhail Meftah, Sye Loong Keoh, Khin Mi Mi Aung |
Practical Deep Neural Network Protection for Unmodified Applications in Intel Software Guard Extension Environments. |
Critical Infrastructure Protection |
2023 |
DBLP DOI BibTeX RDF |
|
31 | Daniel Celebucki, Scott R. Graham, Sanjeev Gunawardena |
Reversing a Lattice ECP3 FPGA for Bitstream Protection. |
Critical Infrastructure Protection |
2018 |
DBLP DOI BibTeX RDF |
|
31 | Francesco Cavallaro, Andrea Chiappetta, Massimiliano De Santis, Anna Pinnarelli |
Critical Infrastructure Protection: Smart Grids. |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges |
2016 |
DBLP DOI BibTeX RDF |
|
31 | Edoardo Camilli |
OSINT, Big Data & Critical Infrastructures Protection (CIP). |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges |
2016 |
DBLP DOI BibTeX RDF |
|
31 | Gianluca Baldassarre |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges. |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges |
2016 |
DBLP DOI BibTeX RDF |
|
31 | Cyril Onwubiko |
Exploring web analytics to enhance cyber situational awareness for the protection of online web services. |
Cyber Security And Protection Of Digital Services |
2016 |
DBLP DOI BibTeX RDF |
|
31 | Gaofeng Zhang, Paolo Falcarin, Elena Gómez-Martínez, Shareeful Islam, Christophe Tartary, Bjorn De Sutter, Jérôme d'Annoville |
Attack simulation based software protection assessment method. |
Cyber Security And Protection Of Digital Services |
2016 |
DBLP DOI BibTeX RDF |
|
31 | George Stergiopoulos, Efstratios Vasilellis, Georgia Lykou, Panayiotis Kotzanikolaou, Dimitris Gritzalis |
Classification and Comparison of Critical Infrastructure Protection Tools. |
Critical Infrastructure Protection |
2016 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 22913 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|