|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 43 occurrences of 38 keywords
|
|
|
Results
Found 13 publication records. Showing 13 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Cecilia S. Gal, Paul B. Kantor, Michael E. Lesk (eds.) |
Protecting Persons While Protecting the People, Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers |
ISIPS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Eugene H. Spafford |
Cyber Security: Assessing Our Vulnerabilities and Developing an Effective Defense. |
ISIPS |
2008 |
DBLP DOI BibTeX RDF |
security policy, vulnerabilities, patching, cyber security, security education |
1 | Roshan K. Thomas, Ravi S. Sandhu, Elisa Bertino, Ismailcem Budak Arpinar, Shouhuai Xu |
Privacy-Preserving Accountable Accuracy Management Systems (PAAMS). |
ISIPS |
2008 |
DBLP DOI BibTeX RDF |
privacy, accuracy, accountability, entity disambiguation |
1 | Mark K. Goldberg, Malik Magdon-Ismail, Stephen Kelley, Konstantin Mertsalov |
Stable Statistics of the Blogograph. |
ISIPS |
2008 |
DBLP DOI BibTeX RDF |
Social networks, graph theory, blogs |
1 | Giovanni Di Crescenzo |
On the Statistical Dependency of Identity Theft on Demographics. |
ISIPS |
2008 |
DBLP DOI BibTeX RDF |
US Demographics, Statistics, Regression Analysis, Identity Theft |
1 | Slava Kisilevich, Yuval Elovici, Bracha Shapira, Lior Rokach |
kACTUS 2: Privacy Preserving in Classification Tasks Using k-Anonymity. |
ISIPS |
2008 |
DBLP DOI BibTeX RDF |
suppression, data mining, anonymity, generalization, privacy preserving |
1 | Stephen E. Fienberg, Yuval Nardi, Aleksandra B. Slavkovic |
Valid Statistical Analysis for Logistic Regression with Multiple Sources. |
ISIPS |
2008 |
DBLP DOI BibTeX RDF |
Horizontal Partitioned Data, Secure Logistic Regression, Vertical Partitioned Data, Distributed Databases, Privacy Preserving Data Mining, Log-linear models |
1 | Robyn R. Mace |
Intelligence, Dataveillance, and Information Privacy. |
ISIPS |
2008 |
DBLP DOI BibTeX RDF |
dataveillance, privacy, surveillance, intelligence, terrorism |
1 | Carl E. Landwehr |
Results of Workshops on Privacy Protection Technologies. |
ISIPS |
2008 |
DBLP DOI BibTeX RDF |
privacy protection technologies, intelligence community, strategies, workshop |
1 | Maureen Baginski |
Intelligence Policy and the Science of Intelligence. |
ISIPS |
2008 |
DBLP DOI BibTeX RDF |
US Persons, privacy, information sharing |
1 | Paul B. Kantor, Michael E. Lesk |
The Challenges of Seeking Security While Respecting Privacy. |
ISIPS |
2008 |
DBLP DOI BibTeX RDF |
intelligence agencies, computer security, national security, personal privacy |
1 | James J. Horning |
Words Matter: Privacy, Security, and Related Terms. |
ISIPS |
2008 |
DBLP DOI BibTeX RDF |
freedom of speech, security, Privacy, network security, computer security, definitions, homeland security, national security |
1 | Joan T. McNamara |
Suspicious Activity Reporting (SAR). |
ISIPS |
2008 |
DBLP DOI BibTeX RDF |
Suspicious Activity Report (SAR), Institutionalization, Measurement, Standardization, Paradigm Shift |
Displaying result #1 - #13 of 13 (100 per page; Change: )
|
|