|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 2004 occurrences of 1111 keywords
|
|
|
Results
Found 4563 publication records. Showing 4562 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
64 | Joaquín García-Alfaro, Michel Barbeau, Evangelos Kranakis |
Analysis of Threats to the Security of EPC Networks. |
CNSR |
2008 |
DBLP DOI BibTeX RDF |
Electronic Product Code (EPC), Radio frequency identification (RFID), Network Security, Wireless Security, Threats analysis |
58 | Spyros C. Kontogiannis, Paul G. Spirakis |
Equilibrium Points in Fear of Correlated Threats. |
WINE |
2008 |
DBLP DOI BibTeX RDF |
|
57 | Ménel Lassoued |
Intentional Services Specification Enhancement with Scenario-Based Techniques to Analyze Security Threats. |
COMPSAC |
2008 |
DBLP DOI BibTeX RDF |
intentional service, scenario, security threats |
53 | Dianxiang Xu, Kendall E. Nygard |
Threat-Driven Modeling and Verification of Secure Software Using Aspect-Oriented Petri Nets. |
IEEE Trans. Software Eng. |
2006 |
DBLP DOI BibTeX RDF |
aspect-oriented Petri nets, modeling, verification, Petri nets, aspect-oriented software development, Software security, threat modeling |
51 | Rabiah Ahmad, Ganthan Narayana Samy, Nuzulha Khilwani Ibrahim, Peter A. Bath, Zuraini Ismail |
Threats Identification in Healthcare Information Systems Using Genetic Algorithm and Cox Regression. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
51 | Robert C. Newman |
Cybercrime, identity theft, and fraud: practicing safe internet - network security threats and vulnerabilities. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
internet fraud, identity theft, cybercrime |
51 | Tracy Hall, Austen Rainer, Dorota Jagielska |
Using Software Development Progress Data to Understand Threats to Project Outcomes. |
IEEE METRICS |
2005 |
DBLP DOI BibTeX RDF |
|
51 | Terika McCall, Megan Threats, Malvika Pillai, Adnan Lakdawala, Clinton S. Bolton III |
Recommendations for design of a mobile application to support management of anxiety and depression among Black American women. |
Frontiers Digit. Health |
2022 |
DBLP DOI BibTeX RDF |
|
50 | Cyril Onwubiko, Andrew P. Lenaghan |
An Evolutionary Approach in Threats Detection for Distributed Security Defence Systems. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
security defence framework, genetic algorithms, security threats |
49 | Ehab Al-Shaer, Brent Lagesse, Craig A. Shue (eds.) |
Proceedings of the 2010 ACM workshop on Insider threats, Insider Threats '10, Chicago, Illinois, USA, October 8, 2010 |
Insider Threats@CCS |
2010 |
DBLP DOI BibTeX RDF |
|
49 | Christian W. Probst, Jeffrey Hunker, Dieter Gollmann, Matt Bishop |
Aspects of Insider Threats. |
Insider Threats in Cyber Security |
2010 |
DBLP DOI BibTeX RDF |
|
49 | Peter G. Neumann |
Combatting Insider Threats. |
Insider Threats in Cyber Security |
2010 |
DBLP DOI BibTeX RDF |
|
49 | Brian M. Bowen, Malek Ben Salem 0001, Angelos D. Keromytis, Salvatore J. Stolfo |
Monitoring Technologies for Mitigating Insider Threats. |
Insider Threats in Cyber Security |
2010 |
DBLP DOI BibTeX RDF |
|
49 | Jason Crampton, Michael Huth 0001 |
Towards an Access-Control Framework for Countering Insider Threats. |
Insider Threats in Cyber Security |
2010 |
DBLP DOI BibTeX RDF |
|
49 | Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst |
10341 Report - Insider Threats: Strategies for Prevention, Mitigation, and Response. |
Insider Threats: Strategies for Prevention, Mitigation, and Response |
2010 |
DBLP BibTeX RDF |
|
49 | Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst |
10341 Abstracts Collection - Insider Threats: Strategies for Prevention, Mitigation, and Response. |
Insider Threats: Strategies for Prevention, Mitigation, and Response |
2010 |
DBLP BibTeX RDF |
|
49 | William R. Claycomb, Dongwan Shin |
Detecting insider activity using enhanced directory virtualization. |
Insider Threats@CCS |
2010 |
DBLP DOI BibTeX RDF |
|
49 | John Tuttle, Robert J. Walls, Erik G. Learned-Miller, Brian Neil Levine |
Reverse engineering for mobile systems forensics with Ares. |
Insider Threats@CCS |
2010 |
DBLP DOI BibTeX RDF |
|
49 | Amir Harel, Asaf Shabtai, Lior Rokach, Yuval Elovici |
M-score: estimating the potential damage of data leakage incident by assigning misuseability weight. |
Insider Threats@CCS |
2010 |
DBLP DOI BibTeX RDF |
|
49 | Dawn M. Cappelli |
Using empirical insider threat case data to design a mitigation strategy. |
Insider Threats@CCS |
2010 |
DBLP DOI BibTeX RDF |
|
49 | Emil Stefanov, Mikhail Atallah |
Duress detection for authentication attacks against multiple administrators. |
Insider Threats@CCS |
2010 |
DBLP DOI BibTeX RDF |
|
49 | Ruj Akavipat, Apurv Dhadphale, Apu Kapadia, Matthew Wright 0001 |
ReDS: reputation for directory services in P2P systems. |
Insider Threats@CCS |
2010 |
DBLP DOI BibTeX RDF |
|
49 | Suraj Nellikar, David M. Nicol, Jai J. Choi |
Role-based differentiation for insider detection algorithms. |
Insider Threats@CCS |
2010 |
DBLP DOI BibTeX RDF |
|
49 | Ma'ayan Gafny, Asaf Shabtai, Lior Rokach, Yuval Elovici |
Detecting data misuse by applying context-based data linkage. |
Insider Threats@CCS |
2010 |
DBLP DOI BibTeX RDF |
|
49 | Christian W. Probst, Jeffrey Hunker, Matt Bishop, Dieter Gollmann |
08302 Summary - Countering Insider Threats. |
Countering Insider Threats |
2008 |
DBLP BibTeX RDF |
|
49 | Matt Bishop, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst |
08302 Abstracts Collection - Countering Insider Threats. |
Countering Insider Threats |
2008 |
DBLP BibTeX RDF |
|
46 | Dianxiang Xu, Vivek Goel, Kendall E. Nygard |
An Aspect-Oriented Approach to Security Requirements Analysis. |
COMPSAC (2) |
2006 |
DBLP DOI BibTeX RDF |
use case, aspect-oriented software development, Security requirements, threats, mitigation |
44 | Punam Bedi, Vandana Gandotra, Archana Singhal, Vandita Vats, Neha Mishra |
Avoiding Threats Using Multi Agent System Planning for Web Based Systems. |
ICCCI |
2009 |
DBLP DOI BibTeX RDF |
HTN, GOAP, MASPTA, Multi agent system, Threat modeling |
44 | Haruhiko Kaiya, Kouta Sasaki, Kenji Kaijiri |
PORTAM: Policy, Requirements and Threats Analyzer for Mobile Code Application. |
QSIC |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Mark W. Storer, Kevin M. Greenan, Ethan L. Miller |
Long-term threats to secure archives. |
StorageSS |
2006 |
DBLP DOI BibTeX RDF |
secret splitting, cryptography, encryption, threat modeling, secure storage, archival storage, survivable storage |
44 | Joaquín García-Alfaro, Michel Barbeau, Evangelos Kranakis |
Security Threats on EPC Based RFID Systems. |
ITNG |
2008 |
DBLP DOI BibTeX RDF |
Electronic Product Code (EPC), Radio frequency identification (RFID), Network security, Wireless security, Threats analysis, Information systems security |
40 | Joon S. Park, Joseph Giordano |
Role-based profile analysis for scalable and accurate insider-anomaly detection. |
IPCCC |
2006 |
DBLP DOI BibTeX RDF |
|
39 | Charles B. Haley, Robin C. Laney, Bashar Nuseibeh |
Deriving security requirements from crosscutting threat descriptions. |
AOSD |
2004 |
DBLP DOI BibTeX RDF |
security requirements, threats, problem frames, assets |
38 | Simon D. Byers, Aviel D. Rubin, David P. Kormann |
Defending against an Internet-based attack on the physical world. |
WPES |
2002 |
DBLP DOI BibTeX RDF |
Internet Threats, automated attacks, comuter security, internet threats, computer security, cybercrime |
38 | Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst (eds.) |
Insider Threats: Strategies for Prevention, Mitigation, and Response, 22.08. - 26.08.2010 |
Insider Threats: Strategies for Prevention, Mitigation, and Response |
2010 |
DBLP BibTeX RDF |
|
38 | George Magklaras, Steven Furnell |
Insider Threat Specification as a Threat Mitigation Technique. |
Insider Threats in Cyber Security |
2010 |
DBLP DOI BibTeX RDF |
|
38 | Lizzie Coles-Kemp, Marianthi Theoharidou |
Insider Threat and Information Security Management. |
Insider Threats in Cyber Security |
2010 |
DBLP DOI BibTeX RDF |
|
38 | Ulrich Flegel, Florian Kerschbaum, Philip Miseldine, Ganna Monakova, Richard Wacker, Frank Leymann |
Legally Sustainable Solutions for Privacy Issues in Collaborative Fraud Detection. |
Insider Threats in Cyber Security |
2010 |
DBLP DOI BibTeX RDF |
|
38 | Matt Bishop, Sophie Engle, Deborah A. Frincke, Carrie Gates, Frank L. Greitzer, Sean Peisert, Sean Whalen |
A Risk Management Approach to the "Insider Threat". |
Insider Threats in Cyber Security |
2010 |
DBLP DOI BibTeX RDF |
|
38 | Ulrich Flegel, Julien Vayssière, Gunter Bitz |
A State of the Art Survey of Fraud Detection Technology. |
Insider Threats in Cyber Security |
2010 |
DBLP DOI BibTeX RDF |
|
38 | Frank L. Greitzer, Deborah A. Frincke |
Combining Traditional Cyber Security Audit Data with Psychosocial Data: Towards Predictive Modeling for Insider Threat Mitigation. |
Insider Threats in Cyber Security |
2010 |
DBLP DOI BibTeX RDF |
|
38 | Matt Bishop, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst (eds.) |
Countering Insider Threats, 20.07. - 25.07.2008 |
Countering Insider Threats |
2008 |
DBLP BibTeX RDF |
|
38 | Ulrich Flegel, Julien Vayssière, Gunter Bitz |
Fraud Detection from a Business Perspective: Future Directions and Challenges. |
Countering Insider Threats |
2008 |
DBLP BibTeX RDF |
|
38 | Ulrich Flegel, Florian Kerschbaum, Richard Wacker |
Collaborative Fraud Detection in Outsourcing Scenarios: Issues of and Solutions for Privacy and Confidentiality. |
Countering Insider Threats |
2008 |
DBLP BibTeX RDF |
|
38 | Rebecca N. Wright, Peter G. Neumann (eds.) |
Network Threats, Proceedings of a DIMACS Workshop, December 2-4, 1996 |
Network Threats |
1998 |
DBLP DOI BibTeX RDF |
|
38 | Mike Burmester, Yvo Desmedt, Gregory Kabatianskii |
Trust and security: A new look at the Byzantine generals problem. |
Network Threats |
1996 |
DBLP DOI BibTeX RDF |
|
38 | Sarvar Patel |
Information leakage in encrypted key exchange. |
Network Threats |
1996 |
DBLP DOI BibTeX RDF |
|
38 | Robert J. Hall 0001 |
Channels: Avoiding unwanted electronic mail. |
Network Threats |
1996 |
DBLP DOI BibTeX RDF |
|
38 | |
Foreword. |
Network Threats |
1996 |
DBLP BibTeX RDF |
|
38 | Dan S. Wallach, Jim A. Roskind, Edward W. Felten |
Flexible, extensible Java security using digital signatures. |
Network Threats |
1996 |
DBLP DOI BibTeX RDF |
|
38 | Marc Joye, Jean-Jacques Quisquater |
Cryptanalysis of RSA-type cryptosystems: A visit. |
Network Threats |
1996 |
DBLP DOI BibTeX RDF |
|
38 | Dan Zhou, Shiu-Kai Chin |
Verifying privacy enhanced mail functions with higher order logic. |
Network Threats |
1996 |
DBLP DOI BibTeX RDF |
|
38 | Cynthia Cullen |
Demonstration of hacker techniques. |
Network Threats |
1996 |
DBLP DOI BibTeX RDF |
|
38 | |
Preface. |
Network Threats |
1996 |
DBLP BibTeX RDF |
|
38 | Catherine Meadows 0001 |
A representation of protocol attacks for risk assessment. |
Network Threats |
1996 |
DBLP DOI BibTeX RDF |
|
38 | Adam Shostack |
Observed weaknesses in security dynamics' client/server protocol. |
Network Threats |
1996 |
DBLP DOI BibTeX RDF |
|
38 | Drew Dean |
Web security: A high level view. |
Network Threats |
1996 |
DBLP DOI BibTeX RDF |
|
38 | Lanxiang Chen, Dan Feng 0001, Liang Ming |
The Security Threats and Corresponding Measures to Distributed Storage Systems. |
APPT |
2007 |
DBLP DOI BibTeX RDF |
process of security, threat modeling, security threat, storage security, security measure |
38 | Joon S. Park, Joseph Giordano |
Access Control Requirements for Preventing Insider Threats. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
|
38 | Elena Ivankina, Camille Salinesi |
Eliciting Requirements by Analysing Threats Caused by Users. |
SERA |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Leila Amgoud, Jean-François Bonnefon, Henri Prade |
The Logical Handling of Threats, Rewards, Tips, and Warnings. |
ECSQARU |
2007 |
DBLP DOI BibTeX RDF |
Threats/Rewards, Tips/Warnings, Negotiation, Argumentation |
37 | Jiawen Su, Daniel W. Manchala |
Trust vs. Threats: Recovery and Survival in Electronic Commerce. |
ICDCS |
1999 |
DBLP DOI BibTeX RDF |
Trust protocols, EC Threats, Trust, Anonymity, Electronic Commerce |
33 | Yuan Tian 0003, Biao Song, Eui-nam Huh |
A threat-based privacy preservation system in untrusted environment. |
ICHIT |
2009 |
DBLP DOI BibTeX RDF |
threaten, privacy, purpose |
33 | Fabrício A. Braz, Eduardo B. Fernández, Michael VanHilst |
Eliciting Security Requirements through Misuse Activities. |
DEXA Workshops |
2008 |
DBLP DOI BibTeX RDF |
software engineering, security requirements, security patterns |
33 | Shanai Ardi, David Byers, Per Håkon Meland, Inger Anne Tøndel, Nahid Shahmehri |
How can the developer benefit from security modeling? |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Evan Cooke, Zhuoqing Morley Mao, Farnam Jahanian |
Hotspots: The Root Causes of Non-Uniformity in Self-Propagating Malware. |
DSN |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Ghi Paul Im, Richard L. Baskerville |
A longitudinal study of information system threat categories: the enduring problem of human error. |
Data Base |
2005 |
DBLP DOI BibTeX RDF |
information infrastructure protection, information system threat, information system threat taxonomy, software quality and reliability, information security, computer security, human error, software defects |
33 | Dianxiang Xu, Kendall E. Nygard |
A threat-driven approach to modeling and verifying secure software. |
ASE |
2005 |
DBLP DOI BibTeX RDF |
aspect-oriented Petri nets, verification, Petri nets, aspect-oriented software development, software security, threat modeling |
33 | Garfield Zhiping Wu, Sylvia L. Osborn, Xin Jin |
Database Intrusion Detection Using Role Profiling with Role Hierarchy. |
Secure Data Management |
2009 |
DBLP DOI BibTeX RDF |
Role profiling, Intrusion detection, RBAC, Database security, Insider threats |
33 | Jackie Phahlamohlaka |
Globalisation and national security issues for the state: Implications for national ICT policies. |
HCC |
2008 |
DBLP DOI BibTeX RDF |
national ICT policies, information and communications technologies, security threats, Globalisation, national security |
33 | Marcelo Masera, Igor Nai Fovino |
A Service-Oriented Approach for Assessing Infrastructure Security. |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
systemof- systems, services, attacks, vulnerabilities, threats, Security assessment |
33 | Roland Rieke |
Modelling and Analysing Network Security Policies in a Given Vulnerability Setting. |
CRITIS |
2006 |
DBLP DOI BibTeX RDF |
attack simulation, network security policies, security modelling and simulation, risk assessment, threats analysis, critical infrastructure protection |
33 | Adam L. Young, Moti Yung |
Malicious Cryptography: Kleptographic Aspects. |
CT-RSA |
2005 |
DBLP DOI BibTeX RDF |
Rabin, malicious cryptography, RSA, public key cryptography, attacks, random oracle, security threats, kleptography, SETUP |
33 | Gustavo A. Santana Torrellas |
A Network Security Architectural Approach for Systems Integrity using Multi Agent Systems Engineering. |
ISPAN |
2004 |
DBLP DOI BibTeX RDF |
Mobile Agents, Security Architecture, Security Threats |
33 | R. E. Niemeyer |
Using Web Technologies in Two MLS Environments: A Security Analysis. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
World Wide Web technologies, multi-level secure systems, single-level network environments, Web browser software, security sensitivity level, information transfer, security boundaries, security classification, network client, malicious code insertion, Trojan horse code, primary information flow direction, Internet, HTTP, Web server, security of data, intranet, threats, security vulnerabilities, computer viruses, database server, HyperText Transfer Protocol, denial of service attacks |
33 | Ning Zhang, Qi Shi 0001 |
Security Issues in an EDI Environment. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
EDI environment, electronic transmission, trade related documents, EDI system, EDI specific security requirement, non repudiation of receipt, heterogeneous system platform, protocol, electronic data interchange, Electronic Data Interchange, security threats, security issues |
31 | Ganthan Narayana Samy, Rabiah Ahmad, Zuraini Ismail |
Threats to Health Information Security. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Brandon M. Malone, Ambareen Siraj |
Tracking requirements and threats for secure software development. |
ACM Southeast Regional Conference |
2008 |
DBLP DOI BibTeX RDF |
requirements tracking, security engineering, misuse case |
31 | Stylianos Basagiannis, Panagiotis Katsaros, Andrew Pombortsis, Nikolaos Alexiou 0001 |
A Probabilistic Attacker Model for Quantitative Verification of DoS Security Threats. |
COMPSAC |
2008 |
DBLP DOI BibTeX RDF |
security, model checking, Denial of Service |
31 | Guillermo Horacio Ramirez Caceres, Yoshimi Teshigawara |
A Knowledge-Based Tool to Support Clear Relationship between Threats and Countermeasures Based on International Standards. |
APNOMS |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Jorrit N. Herder, Herbert Bos, Ben Gras, Philip Homburg, Andrew S. Tanenbaum |
Countering IPC Threats in Multiserver Operating Systems (A Fundamental Requirement for Dependability). |
PRDC |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Luk Boral, Maria Disla, Shivraj Patil, Jari Williams, Joon S. Park |
Countering Insider Threats in Personal Devices. |
ISI |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Cyril Onwubiko, Andrew P. Lenaghan |
Managing Security Threats and Vulnerabilities for Small to Medium Enterprises. |
ISI |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Christine Laurendeau, Michel Barbeau |
Threats to Security in DSRC/WAVE. |
ADHOC-NOW |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Bharat K. Bhargava, Leszek Lilien |
Vulnerabilities and Threats in Distributed Systems. |
ICDCIT |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Tobias Hoppe, Stefan Kiltz, Jana Dittmann |
Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures. |
SAFECOMP |
2008 |
DBLP DOI BibTeX RDF |
Practical tests, Exemplary threats and countermeasures, Safety, Automotive, IT-Security |
27 | Wihem Arsac, Luca Compagna, Samuel Paul Kaluvuri, Serena Elisa Ponta |
Security validation tool for business processes. |
SACMAT |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Yu Wang 0002, Jiang Xu 0001, Shengxi Huang, Weichen Liu, Huazhong Yang |
A case study of on-chip sensor network in multiprocessor system-on-chip. |
CASES |
2009 |
DBLP DOI BibTeX RDF |
sensor network, reliability, low-power, system on chip, dynamic control, power grid noise |
27 | Natalia Stakhanova, Oleg Stakhanov, Ali A. Ghorbani 0001 |
A Behavioral Model of Ideologically-motivated "Snowball" Attacks. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
ideological attacks, conceptual model, cyber attacks |
27 | Xin Liu, Peidong Zhu, Yuxing Peng 0001 |
SEM: A Security Evaluation Model for Inter-domain Routing System in the Internet. |
IPOM |
2008 |
DBLP DOI BibTeX RDF |
Security Threat Situation, BGP, Security Evaluation |
27 | Klara Nahrstedt |
Need for integrated quality of service and quality of protection in mobile systems. |
MSWiM |
2008 |
DBLP DOI BibTeX RDF |
security, multimedia, cryptography |
27 | Xuezhong Liu, Zengliang Liu |
Evaluating Method of Security Threat Based on Attacking-Path Graph Model. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Christos Xenakis, Danae Apostolopoulou, Angeliki Panou, Ioannis Stavrakakis |
A Qualitative Risk Analysis for the GPRS Technology. |
EUC (2) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Ding-Long Huang, Pei-Luen Patrick Rau, Gavriel Salvendy |
A Survey of Factors Influencing People's Perception of Information Security. |
HCI (4) |
2007 |
DBLP DOI BibTeX RDF |
Perception, Survey, Information Security, Factor Analysis |
27 | Kerstin Voß |
Enhance Self-managing Grids by Risk Management. |
ICNS |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Shunsuke Soeda, Tomoyuki Kaneko, Tetsuro Tanaka |
Dual Lambda Search and Shogi Endgames. |
ACG |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Dave Stainforth, Andrew P. Martin, Andrew Simpson, Carl Christensen, Jamie Kettleborough, Tolu Aina, Myles Allen |
Security Principles for Public-Resource Modeling Research. |
WETICE |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Seongje Cho, Chulyean Chang, Joonmo Kim, Jongmoo Choi |
A Study on Monitoring and Protecting Computer System against Interception Threat. |
Human.Society@Internet 2003 |
2003 |
DBLP DOI BibTeX RDF |
|
27 | Jeff Rollason |
SUPER-SOMA - Solving Tactical Exchanges in Shogi without Tree Searching. |
Computers and Games |
2000 |
DBLP DOI BibTeX RDF |
shotest, soma, super-soma, evaluation, search, shogi |
26 | Duc T. Ha, Shambhu J. Upadhyaya, Hung Q. Ngo 0001, Suranjan Pramanik, Ramkumar Chinchani, Sunu Mathew |
Insider Threat Analysis Using Information-Centric Modeling. (PDF / PS) |
IFIP Int. Conf. Digital Forensics |
2007 |
DBLP DOI BibTeX RDF |
capability acquisition graphs, key challenge graphs, Insider threats |
Displaying result #1 - #100 of 4562 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|