|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1664 occurrences of 928 keywords
|
|
|
Results
Found 6558 publication records. Showing 6558 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
112 | Hyung-Jong Kim 0002 |
Vulnerability Modeling and Simulation for DNS Intrusion Tolerance System Construction. |
AIS |
2004 |
DBLP DOI BibTeX RDF |
Atomic Vulnerability, DNS, Intrusion Tolerance, Vulnerability Analysis, DEVS formalism |
105 | HyungJong Kim, KyungHee Koh, DongHoon Shin, HongGeun Kim |
Vulnerability Assessment Simulation for Information Infrastructure Protection. |
InfraSec |
2002 |
DBLP DOI BibTeX RDF |
Knowledge-Based Simulation, Modeling and Simulation, Vulnerability Analysis, Information Infrastructure, Vulnerability Assessment |
100 | Hasan Cavusoglu, Huseyin Cavusoglu, Srinivasan Raghunathan |
Efficiency of Vulnerability Disclosure Mechanisms to Disseminate Vulnerability Knowledge. |
IEEE Trans. Software Eng. |
2007 |
DBLP DOI BibTeX RDF |
disclosure mechanisms, responsible vulnerability disclosure, game theory, Information security, economic modeling, software vulnerabilities |
91 | David Brumley, James Newsome, Dawn Song, Hao Wang, Somesh Jha |
Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures. |
IEEE Trans. Dependable Secur. Comput. |
2008 |
DBLP DOI BibTeX RDF |
|
83 | Aviral Shrivastava, Jongeun Lee, Reiley Jeyapaul |
Cache vulnerability equations for protecting data in embedded processor caches from soft errors. |
LCTES |
2010 |
DBLP DOI BibTeX RDF |
cache vulnerability, static analysis, embedded processors, soft errors, code transformation, compiler technique |
83 | Wangyuan Zhang, Xin Fu, Tao Li 0006, José A. B. Fortes |
An Analysis of Microarchitecture Vulnerability to Soft Errors on Simultaneous Multithreaded Architectures. |
ISPASS |
2007 |
DBLP DOI BibTeX RDF |
thread-aware reliability optimization, microarchitecture vulnerability, simultaneous multithreaded architecture, semiconductor transient fault, microprocessor reliability, processor throughput, soft error vulnerability analysis, SPEC CPU 2000 benchmark, microarchitecture structure, microarchitecture reliability profile, fetch policy, thread-level parallelism, multithreading architecture |
76 | Cuisong Yu, Zhenchun Hao, Jiahu Wang, Zhenhua Wang, Shouchang Hao |
Based on Fuzzy Clustering Theory: Vulnerability Classification Research of Water Resources System. |
FSKD (3) |
2008 |
DBLP DOI BibTeX RDF |
|
76 | David Brumley, James Newsome, Dawn Xiaodong Song, Hao Wang, Somesh Jha |
Towards Automatic Generation of Vulnerability-Based Signatures. |
S&P |
2006 |
DBLP DOI BibTeX RDF |
|
76 | Youngsup Kim, Seung Yub Baek, Geuk Lee |
Intelligent Tool for Enterprise Vulnerability Assessment on a Distributed Network Environment Using Nessus and OVAL. |
KES (2) |
2005 |
DBLP DOI BibTeX RDF |
|
76 | Fanglu Guo, Yang Yu, Tzi-cker Chiueh |
Automated and Safe Vulnerability Assessment. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
76 | Haitao Tian, Liusheng Huang, Zhi Zhou, Hui Zhang |
Common Vulnerability Markup Language. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
|
76 | Zhichun Li, Gao Xia, Hongyu Gao, Yi Tang 0002, Yan Chen 0004, Bin Liu 0001, Junchen Jiang, Yuezhou Lv |
NetShield: massive semantics-based vulnerability signature matching for high-speed networks. |
SIGCOMM |
2010 |
DBLP DOI BibTeX RDF |
vulnerability signature, intrusion detection, deep packet inspection, signature matching |
76 | Ashlesha Joshi, Samuel T. King, George W. Dunlap, Peter M. Chen |
Detecting past and present intrusions through vulnerability-specific predicates. |
SOSP |
2005 |
DBLP DOI BibTeX RDF |
IntroVirt, virtual-machine introspection, virtual-machine replay, vulnerability-specific predicates, intrusion detection, semantic gap |
75 | Karen Scarfone, Peter Mell |
Vulnerability scoring for security configuration settings. |
QoP |
2008 |
DBLP DOI BibTeX RDF |
common configuration scoring system (ccss), common vulnerability scoring system (cvss), security configuration, vulnerability scoring, risk assessment, vulnerability |
69 | Ping Chen 0003, Yi Wang, Zhi Xin, Bing Mao, Li Xie 0001 |
BRICK: A Binary Tool for Run-Time Detecting and Locating Integer-Based Vulnerability. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
69 | Haitao Tian, Liusheng Huang, Zhi Zhou, Yonglong Luo |
Arm up Administrators: Automated Vulnerability Management. |
ISPAN |
2004 |
DBLP DOI BibTeX RDF |
|
68 | Vilas Sridharan, David R. Kaeli |
Using hardware vulnerability factors to enhance AVF analysis. |
ISCA |
2010 |
DBLP DOI BibTeX RDF |
architectural vulnerability factor, fault tolerance, reliability |
68 | Ashish Arora, Anand Nandkumar, Rahul Telang |
Does information security attack frequency increase with vulnerability disclosure? An empirical analysis. |
Inf. Syst. Frontiers |
2006 |
DBLP DOI BibTeX RDF |
Disclosure policy, Risk management, Economics, Patching, Software vulnerability |
68 | Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan |
An OVAL-based active vulnerability assessment system for enterprise computer networks. |
Inf. Syst. Frontiers |
2008 |
DBLP DOI BibTeX RDF |
Open vulnerability assessment language, Attack path, Network security, Relational database management system, Predicate logic, Security vulnerability |
62 | Christian Frühwirth, Tomi Männistö |
Improving CVSS-based vulnerability prioritization and response with context information. |
ESEM |
2009 |
DBLP DOI BibTeX RDF |
|
62 | Ryan Iwahashi, Daniela Alvim Seabra de Oliveira, Shyhtsun Felix Wu, Jedidiah R. Crandall, Young-Jun Heo, Jintae Oh, Jong-Soo Jang |
Towards Automatically Generating Double-Free Vulnerability Signatures Using Petri Nets. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
|
61 | Xuejiao Liu, Debao Xiao, Nian Ma, Jie Yu |
A Scalable, Vulnerability Modeling and Correlating Method for Network Security. |
Infoscale |
2009 |
DBLP DOI BibTeX RDF |
vulnerability correlation, modeling, scalable, Network security |
61 | Rahul Telang, Sunil Wattal |
An Empirical Analysis of the Impact of Software Vulnerability Announcements on Firm Stock Price. |
IEEE Trans. Software Eng. |
2007 |
DBLP DOI BibTeX RDF |
software vendors, quality, Information security, patching, software vulnerability, event-study |
61 | Davide Balzarotti, Marco Cova, Viktoria Felmetsger, Giovanni Vigna |
Multi-module vulnerability analysis of web-based applications. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
multi-step attacks, static analysis, web applications, dynamic analysis, vulnerability analysis |
60 | Jaziar Radianti, Jose J. Gonzalez |
Understanding Hidden Information Security Threats: The Vulnerability Black Market. |
HICSS |
2007 |
DBLP DOI BibTeX RDF |
Vulnerability Black Market, Information Security, System Dynamics, Software Vulnerability, Integrated Operations |
54 | Geraldine Vache |
Vulnerability analysis for a quantitative security evaluation. |
ESEM |
2009 |
DBLP DOI BibTeX RDF |
|
54 | Ching-Huang Lin, Chih-Hao Chen, Chi-Sung Laih |
A Study and Implementation of Vulnerability Assessment and Misconfiguration Detection. |
APSCC |
2008 |
DBLP DOI BibTeX RDF |
|
54 | David McKinney |
Vulnerability Bazaar. |
IEEE Secur. Priv. |
2007 |
DBLP DOI BibTeX RDF |
|
54 | Jinyoo Kim, Yashwant K. Malaiya, Indrakshi Ray |
Vulnerability Discovery in Multi-Version Software Systems. |
HASE |
2007 |
DBLP DOI BibTeX RDF |
|
54 | Geuk Lee, Youngsup Kim, Sang-Jo Youk |
Development of Oval Based Vulnerability Management Tool (OVMT) on a Distributed Network Environment. |
KES (3) |
2006 |
DBLP DOI BibTeX RDF |
|
54 | Andy Ozment |
Improving vulnerability discovery models. |
QoP |
2007 |
DBLP DOI BibTeX RDF |
measuring software security, measuring vulnerabilities, vulnerability discovery model, security metrics |
54 | Mohammad Ebrahim Rafiei, Mohsen Taherian, Hamid Mousavi, Ali Movaghar 0001, Rasool Jalili |
Vulnerability Analysis in VGBPS Using Prolog. |
FSEN |
2007 |
DBLP DOI BibTeX RDF |
Protection System, Safety Problem, Prolog, Vulnerability Analysis |
48 | Helen J. Wang, Chuanxiong Guo, Daniel R. Simon, Alf Zugenmaier |
Shield: vulnerability-driven network filters for preventing known vulnerability exploits. |
SIGCOMM |
2004 |
DBLP DOI BibTeX RDF |
generic protocol analyzer, network filter, vulnerability signature, worm defense, patching |
48 | Ha-Thanh Le, Deepak Subramanian, Wen-Jing Hsu, Peter Kok Keong Loh |
Scoring Web-Based Vulnerability Impact Using Property-Based Vulnerability Model. |
AINA Workshops |
2010 |
DBLP DOI BibTeX RDF |
Web application vulnerability, vulnerable property relationship graph (VPRG), vulnerable property relationship matrix (VPRM), vulnerability impact score |
47 | Kyle Coffey, Leandros A. Maglaras, Richard Smith 0002, Helge Janicke, Mohamed Amine Ferrag, Abdelouahid Derhab, Mithun Mukherjee 0001, Stylianos Rallis, Awais Yousaf |
Vulnerability Assessment of Cyber Security for SCADA Systems. |
Guide to Vulnerability Analysis for Computer Networks and Systems |
2018 |
DBLP DOI BibTeX RDF |
|
47 | Igor V. Kotenko, Elena Doynikova, Andrey Chechulin, Andrey Fedorchenko |
AI- and Metrics-Based Vulnerability-Centric Cyber Security Assessment and Countermeasure Selection. |
Guide to Vulnerability Analysis for Computer Networks and Systems |
2018 |
DBLP DOI BibTeX RDF |
|
47 | Yi Shi 0001, Yalin E. Sagduyu, Kemal Davaslioglu, Renato Levy |
Vulnerability Detection and Analysis in Adversarial Deep Learning. |
Guide to Vulnerability Analysis for Computer Networks and Systems |
2018 |
DBLP DOI BibTeX RDF |
|
47 | Saad Khan 0001, Simon Parkinson |
Review into State of the Art of Vulnerability Assessment using Artificial Intelligence. |
Guide to Vulnerability Analysis for Computer Networks and Systems |
2018 |
DBLP DOI BibTeX RDF |
|
47 | Patrick Tague, David Slater, Jason Rogers, Radha Poovendran |
Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis. |
IEEE Trans. Dependable Secur. Comput. |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Sebastian Roschke, Feng Cheng 0002, Robert Schuppenies, Christoph Meinel |
Towards Unifying Vulnerability Information for Attack Graph Construction. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Steve Counsell, Stephen Swift |
An Empirical Study of Potential Vulnerability Faults in Java Open-Source Software. |
Innovative Techniques in Instruction Technology, E-learning, E-assessment, and Education |
2008 |
DBLP DOI BibTeX RDF |
|
47 | HyunChul Joh, Jinyoo Kim, Yashwant K. Malaiya |
Vulnerability Discovery Modeling Using Weibull Distribution. |
ISSRE |
2008 |
DBLP DOI BibTeX RDF |
|
47 | Nabil Schear, David R. Albrecht, Nikita Borisov |
High-Speed Matching of Vulnerability Signatures. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
47 | José Fonseca 0002, Marco Vieira, Henrique Madeira |
Testing and Comparing Web Vulnerability Scanning Tools for SQL Injection and XSS Attacks. |
PRDC |
2007 |
DBLP DOI BibTeX RDF |
|
47 | Muhammad Abedin, Syeda Nessa, Ehab Al-Shaer, Latifur Khan |
Vulnerability analysis For evaluating quality of protection of security policies. |
QoP |
2006 |
DBLP DOI BibTeX RDF |
security, evaluation, metric, policy |
47 | Hossein Asadi 0001, Vilas Sridharan, Mehdi Baradaran Tahoori, David R. Kaeli |
Vulnerability analysis of L2 cache elements to single event upsets. |
DATE |
2006 |
DBLP DOI BibTeX RDF |
|
47 | Young-Ju Han, Jin S. Yang, Beom-Hwan Chang, Jung C. Na, Tai-Myung Chung |
The Vulnerability Assessment for Active Networks; Model, Policy, Procedures, and Performance Evaluations. |
ICCSA (1) |
2004 |
DBLP DOI BibTeX RDF |
|
47 | William A. Arbaugh, William L. Fithen, John McHugh |
Windows of Vulnerability: A Case Study Analysis. |
Computer |
2000 |
DBLP DOI BibTeX RDF |
|
46 | Mohammad Ali Hadavi, Hossein Shirazi, Hasan Mokhtari Sangchi, Vahid Saber Hamishagi |
Software Security; A Vulnerability Activity Revisit. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
security, design, implementation, software, Vulnerability, Activity |
46 | Marcus Kaiser, Claus C. Hilgetag |
Edge vulnerability in neural and metabolic networks. |
Biol. Cybern. |
2004 |
DBLP DOI BibTeX RDF |
Brain networks, Edge betweenness, Cluster, Small world, Network vulnerability |
45 | James Walden, Maureen Doyle, Grant A. Welch, Michael Whelan |
Security of open source web applications. |
ESEM |
2009 |
DBLP DOI BibTeX RDF |
|
45 | Somak Bhattacharya, S. K. Ghosh |
Security Threat Prediction in a Local Area Network Using Statistical Model. |
IPDPS |
2007 |
DBLP DOI BibTeX RDF |
|
45 | Furkan Tari, A. Ant Ozok, Stephen H. Holden |
A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords. |
SOUPS |
2006 |
DBLP DOI BibTeX RDF |
authentication, human factors, usable security, graphical passwords, social engineering, shoulder surfing, password security |
44 | Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu 0003 |
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
memory corruption, debugging, vulnerability analysis |
44 | Mohd A. Bashar, Ganesh Krishnan, Markus G. Kuhn, Eugene H. Spafford, Samuel S. Wagstaff Jr. |
Low-threat security patches and tools. |
ICSM |
1997 |
DBLP DOI BibTeX RDF |
low-threat security patches, dangerous information, vulnerability information, software vendor, binary program patch, differential application times, cryptoprocessors, enciphered operating systems, synchronization, reverse engineering, customization, security of data, security tools |
39 | Aaron Steele |
Ontological Vulnerability Assessment. |
WISE Workshops |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Diptikalyan Saha |
Extending logical attack graphs for efficient vulnerability analysis. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
logic programming, attack graphs, incremental analysis |
39 | Yulong Wang, Fangchun Yang, Qibo Sun |
Measuring Network Vulnerability Based on Pathology. |
WAIM |
2008 |
DBLP DOI BibTeX RDF |
|
39 | HyunChul Joh, Yashwant K. Malaiya |
Seasonality in Vulnerability Discovery in Major Software Systems. |
ISSRE |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Makoto Sugihara |
SEU Vulnerability of Multiprocessor Systems and Task Scheduling for Heterogeneous Multiprocessor Systems. |
ISQED |
2008 |
DBLP DOI BibTeX RDF |
Heterogeneous Multiprocessor Systems, Reliability, Task Scheduling, Soft Error, Single Event Upset |
39 | David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong Song |
Creating Vulnerability Signatures Using Weakest Preconditions. |
CSF |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Shuai Wang 0006, Jie S. Hu, Sotirios G. Ziavras |
On the Characterization of Data Cache Vulnerability in High-Performance Embedded Microprocessors. |
ICSAMOS |
2006 |
DBLP DOI BibTeX RDF |
|
39 | Josh Dehlinger, Qian Feng, Lan Hu |
SSVChecker: unifying static security vulnerability detection tools in an Eclipse plug-in. |
ETX |
2006 |
DBLP DOI BibTeX RDF |
security auditing, software security, secure programming |
39 | Karthik N. Kannan, Rahul Telang, Hao Xu |
Economic Analysis of the Market for Software Vulnerability Disclosure. |
HICSS |
2004 |
DBLP DOI BibTeX RDF |
|
39 | Young-Ju Han, Jin S. Yang, Beom-Hwan Chang, Tai-Myung Chung |
SVAM: The Scalable Vulnerability Analysis Model Based on Active Networks. |
ICOIN |
2004 |
DBLP DOI BibTeX RDF |
|
39 | Silvia Rapicetta, Vittorio Zanon |
GIS-based method for the environmental vulnerability assessment to volcanic ashfall at Etna Volcano. |
GeoInformatica |
2009 |
DBLP DOI BibTeX RDF |
Environmental vulnerability, Corine land cover, Volcanic risk, GIS |
39 | Yong-Jun You, Sung-Do Chi |
SIMVA: simulation-based network vulnerability analysis system. |
SpringSim |
2009 |
DBLP DOI BibTeX RDF |
SES/MB, vulnerability analysis system, simulation, network security, DEVS |
39 | Charles Reis, John Dunagan, Helen J. Wang, Opher Dubrovsky, Saher Esmeir |
BrowserShield: Vulnerability-driven filtering of dynamic HTML. |
ACM Trans. Web |
2007 |
DBLP DOI BibTeX RDF |
code rewriting, JavaScript, Web browser, vulnerability |
39 | Giorgos Valvis, Despina Polemi |
An XML-Based Data Model for Vulnerability Assessment Reports. |
I3E |
2005 |
DBLP DOI BibTeX RDF |
XML modeling, Vulnerability assessment |
37 | Swathi Nambiar Kadala Manikoth, Fabio Di Troia, Mark Stamp 0001 |
Masquerade Detection on Mobile Devices. |
Guide to Vulnerability Analysis for Computer Networks and Systems |
2018 |
DBLP DOI BibTeX RDF |
|
37 | Suvodeep Mazumdar, Jing Wang |
Big Data and Cyber Security: A Visual Analytics Perspective. |
Guide to Vulnerability Analysis for Computer Networks and Systems |
2018 |
DBLP DOI BibTeX RDF |
|
37 | Steven Walker-Roberts, Mohammad Hammoudeh |
Artificial Intelligence Agents as Mediators of Trustless Security Systems and Distributed Computing Applications. |
Guide to Vulnerability Analysis for Computer Networks and Systems |
2018 |
DBLP DOI BibTeX RDF |
|
37 | Deebiga Rajeswaran, Fabio Di Troia, Thomas H. Austin, Mark Stamp 0001 |
Function Call Graphs Versus Machine Learning for Malware Detection. |
Guide to Vulnerability Analysis for Computer Networks and Systems |
2018 |
DBLP DOI BibTeX RDF |
|
37 | Mark Stamp 0001 |
A Survey of Machine Learning Algorithms and Their Application in Information Security. |
Guide to Vulnerability Analysis for Computer Networks and Systems |
2018 |
DBLP DOI BibTeX RDF |
|
37 | Alexandros Chrysikos, Stephen McGuire |
A Predictive Model for Risk and Trust Assessment in Cloud Computing: Taxonomy and Analysis for Attack Pattern Detection. |
Guide to Vulnerability Analysis for Computer Networks and Systems |
2018 |
DBLP DOI BibTeX RDF |
|
37 | Bo Zhou 0001, Curtis L. Maines, Stephen Tang 0001, Qi Shi 0001 |
A Framework for the Visualisation of Cyber Security Requirements and Its Application in BPMN. |
Guide to Vulnerability Analysis for Computer Networks and Systems |
2018 |
DBLP DOI BibTeX RDF |
|
37 | Saad Khan 0001, Simon Parkinson |
Automated Planning of Administrative Tasks Using Historic Events: A File System Case Study. |
Guide to Vulnerability Analysis for Computer Networks and Systems |
2018 |
DBLP DOI BibTeX RDF |
|
37 | Vivin Paliath, Paulo Shakarian |
Defending Against Chained Cyber-Attacks by Adversarial Agents. |
Guide to Vulnerability Analysis for Computer Networks and Systems |
2018 |
DBLP DOI BibTeX RDF |
|
37 | Dhiviya Dhanasekar, Fabio Di Troia, Katerina Potika, Mark Stamp 0001 |
Detecting Encrypted and Polymorphic Malware Using Hidden Markov Models. |
Guide to Vulnerability Analysis for Computer Networks and Systems |
2018 |
DBLP DOI BibTeX RDF |
|
37 | Liam Grant, Simon Parkinson |
Identifying File Interaction Patterns in Ransomware Behaviour. |
Guide to Vulnerability Analysis for Computer Networks and Systems |
2018 |
DBLP DOI BibTeX RDF |
|
37 | Muhammad Ajmal Azad, Junaid Arshad, Farhan Riaz |
SOCIO-LENS: Spotting Unsolicited Caller Through Network Analysis. |
Guide to Vulnerability Analysis for Computer Networks and Systems |
2018 |
DBLP DOI BibTeX RDF |
|
37 | Panos M. Pardalos, Vitaliy A. Yatsenko, Michael B. Fenn, Arkadii A. Chikrii |
Bilinear Markovian Processes of Search for Stationary and Moving Objects. |
Examining Robustness and Vulnerability of Networked Systems |
2014 |
DBLP DOI BibTeX RDF |
|
37 | Yuriy Stoyan, Petro Stetsyuk, Tatiana E. Romanova |
Optimal Balanced Packing Using Phi-Function Technique. |
Examining Robustness and Vulnerability of Networked Systems |
2014 |
DBLP DOI BibTeX RDF |
|
37 | Zhen Kan, John M. Shea, Warren E. Dixon |
Navigation Function Based Decentralized Control of A Multi-Agent System with Network Connectivity Constraints. |
Examining Robustness and Vulnerability of Networked Systems |
2014 |
DBLP DOI BibTeX RDF |
|
37 | Foad Mahdavi Pajouh, Alexander Veremyev, Vladimir Boginski |
Analysis and Design of Robust Network Clusters with Bounded Diameter. |
Examining Robustness and Vulnerability of Networked Systems |
2014 |
DBLP DOI BibTeX RDF |
|
37 | Vardan Sargsyan, Arman Sargsyan, Armen Ghazaryan |
Distributed Computer Attack Detection System for Corporate Networks. |
Examining Robustness and Vulnerability of Networked Systems |
2014 |
DBLP DOI BibTeX RDF |
|
37 | Alexander Gutfraind |
Monotonic and Non-Monotonic Infections on Networks. |
Examining Robustness and Vulnerability of Networked Systems |
2014 |
DBLP DOI BibTeX RDF |
|
37 | Oleg Burdakov, Patrick Doherty 0001, Jonas Kvarnström |
Local Search for Hop-Constrained Directed Steiner Tree Problem with Application to UAV-Based Multi-Target Surveillance. |
Examining Robustness and Vulnerability of Networked Systems |
2014 |
DBLP DOI BibTeX RDF |
|
37 | Yannis Marinakis, Athanasios Migdalas |
Multiobjective Particle Swarm Optimization for a Multicast Routing Problem. |
Examining Robustness and Vulnerability of Networked Systems |
2014 |
DBLP DOI BibTeX RDF |
|
37 | Siddhartha S. Mehta, William MacKunis, Jess Willard Curtis |
Robust Networked Control Systems with Communication Constraints. |
Examining Robustness and Vulnerability of Networked Systems |
2014 |
DBLP DOI BibTeX RDF |
|
37 | Sonia Cafieri, Pierre Hansen, Nenad Mladenovic |
Variable Neighborhood Search for Edge-Ratio Network Clustering. |
Examining Robustness and Vulnerability of Networked Systems |
2014 |
DBLP DOI BibTeX RDF |
|
37 | Marta S. R. Monteiro, Dalila B. M. M. Fontes, Fernando A. C. C. Fontes |
Hop-Constrained Tree-Shaped Networks. |
Examining Robustness and Vulnerability of Networked Systems |
2014 |
DBLP DOI BibTeX RDF |
|
37 | Mario Ventresca, Dionne M. Aleman |
Approximation Algorithms for Detecting Critical Nodes. |
Examining Robustness and Vulnerability of Networked Systems |
2014 |
DBLP DOI BibTeX RDF |
|
37 | Satish Vadlamani, Hugh R. Medal, Burak Eksioglu |
Security in Wireless Networks: A Tutorial. |
Examining Robustness and Vulnerability of Networked Systems |
2014 |
DBLP DOI BibTeX RDF |
|
37 | Austin Buchanan, Nannan Chen, Xin Ma 0002 |
Using GRASP for the Cover by s-Defective Independent Sets Problem. |
Examining Robustness and Vulnerability of Networked Systems |
2014 |
DBLP DOI BibTeX RDF |
|
37 | Nickolay A. Kuznetsov |
Evaluation of the Reliability of Repairable s - t Networks by Fast Simulation Method. |
Examining Robustness and Vulnerability of Networked Systems |
2014 |
DBLP DOI BibTeX RDF |
|
37 | Joydeep Banerjee, Arun Das 0002, Arunabha Sen |
A Survey of Interdependency Models for Critical Infrastructure Networks. |
Examining Robustness and Vulnerability of Networked Systems |
2014 |
DBLP DOI BibTeX RDF |
|
37 | Paola Festa |
On Data Clustering: Exact and Approximate Solutions. |
Examining Robustness and Vulnerability of Networked Systems |
2014 |
DBLP DOI BibTeX RDF |
|
37 | Krishna Reddy Gujjula, Krishnan Ayalur Seshadrinathan, Amirhossein Meisami |
A Hybrid Metaheuristic for the Maximum k-Plex Problem. |
Examining Robustness and Vulnerability of Networked Systems |
2014 |
DBLP DOI BibTeX RDF |
|
37 | Maciej Rysz, Foad Mahdavi Pajouh, Pavlo A. Krokhmal, Eduardo L. Pasiliao |
On Risk-Averse Weighted k-Club Problems. |
Examining Robustness and Vulnerability of Networked Systems |
2014 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 6558 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|