Conferences in DBLP
Hiding in Groups: On the Expressiveness of Privacy Distributions. [Citation Graph (, )][DBLP ] Practical Privacy-Preserving Benchmarking. [Citation Graph (, )][DBLP ] Enhancing Privacy in Remote Data Classification. [Citation Graph (, )][DBLP ] Minimizing SSO Effort in Verifying SSL Anti-phishing Indicators. [Citation Graph (, )][DBLP ] Robbing Banks with Their Own Software-an Exploit Against Norwegian Online Banks. [Citation Graph (, )][DBLP ] Collaborative architecture for malware detection and analysis. [Citation Graph (, )][DBLP ] Realizing Stateful Public Key Encryption in Wireless Sensor Network. [Citation Graph (, )][DBLP ] Establishing secure links in low-rate wireless personal area networks. [Citation Graph (, )][DBLP ] An Asynchronous Node Replication Attack in Wireless Sensor Networks. [Citation Graph (, )][DBLP ] A B Formal Framework for Security Developments in the Domain of Smart Card Applications. [Citation Graph (, )][DBLP ] An Implementation of a Privacy Enforcement Scheme based on the Java Security Framework using XACML Policies. [Citation Graph (, )][DBLP ] Negotiation of Prohibition: An Approach Based on Policy Rewriting. [Citation Graph (, )][DBLP ] An Integrity Lock Architecture for Supporting Distributed Authorizations in Database Federations. [Citation Graph (, )][DBLP ] Role Signatures for Access Control in Open Distributed Systems. [Citation Graph (, )][DBLP ] Policies and Security Aspects For Distributed Scientific Laboratories. [Citation Graph (, )][DBLP ] A Fuzzy Model for the Composition of Intrusion Detectors. [Citation Graph (, )][DBLP ] Investigating the problem of IDS false alarms: An experimental study using Snort. [Citation Graph (, )][DBLP ] User Session Modeling for Effective Application Intrusion Detection. [Citation Graph (, )][DBLP ] A Product Machine Model for Anomaly Detection of Interposition Attacks on Cyber-Physical Systems. [Citation Graph (, )][DBLP ] Anomaly Detection with Diagnosis in Diversified Systems using Information Flow Graphs. [Citation Graph (, )][DBLP ] Behavioral Intrusion Detection Indicators. [Citation Graph (, )][DBLP ] Leveraging Lattices to Improve Role Mining. [Citation Graph (, )][DBLP ] A Parallelization Framework for Exact Knowledge Hiding in Transactional Databases. [Citation Graph (, )][DBLP ] Efficient Coalition Detection in Traitor Tracing. [Citation Graph (, )][DBLP ] SPIT Identification Criteria Implementation: Effectiveness and Lessons Learned. [Citation Graph (, )][DBLP ] Detecting More SIP Attacks on VoIP Services by Combining Rule Matching and State Transition Models. [Citation Graph (, )][DBLP ] A Decentralized Bayesian Attack Detection Algorithm for Network Security. [Citation Graph (, )][DBLP ] An Operation-Based Metric for CPA Resistance. [Citation Graph (, )][DBLP ] YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems. [Citation Graph (, )][DBLP ] Adversary Modeling and Simulation in Cyber Warfare. [Citation Graph (, )][DBLP ] Interactive Selection of ISO 27001 Controls under Multiple Objectives. [Citation Graph (, )][DBLP ] Feasibility of Automated Information Security Compliance Auditing. [Citation Graph (, )][DBLP ] Software Licence Protection and Management for Organisations. [Citation Graph (, )][DBLP ] A Vulnerability Prioritization System Using A Fuzzy Risk Analysis Approach. [Citation Graph (, )][DBLP ] ASTRA : A Security Analysis Method Based on Asset Tracking. [Citation Graph (, )][DBLP ] A Knowledge-Based Bayesian Model for Analyzing a System after an Insider Attack. [Citation Graph (, )][DBLP ] Portable User-Centric Identity Management. [Citation Graph (, )][DBLP ] Ubiquitous Privacy-Preserving Identity Managment. [Citation Graph (, )][DBLP ] Facilitating Privacy Related Decisions in Different Privacy Contexts on the Internet by Evaluating Trust in Recipients of Private Data. [Citation Graph (, )][DBLP ] Using Virtualization to Create and Deploy Computer Security Lab Exercises. [Citation Graph (, )][DBLP ] DigForNet: Digital Forensic in Networking. [Citation Graph (, )][DBLP ] A Live Digital Forensic system for Windows networks. [Citation Graph (, )][DBLP ] HoneyID : Unveiling Hidden Spywares by Generating Bogus Events. [Citation Graph (, )][DBLP ] A Security Protocol for Self-Organizing Data Storage. [Citation Graph (, )][DBLP ] Protecting Financial Institutions from Brute-Force Attacks. [Citation Graph (, )][DBLP ] Agency Theory: Can it be Used to Strengthen IT Governance?. [Citation Graph (, )][DBLP ] A new Accounting Mechanism for Modern and Future AAA Services. [Citation Graph (, )][DBLP ] A user survey on the sense of security, Anshin. [Citation Graph (, )][DBLP ] Multi-Layer Encryption for Multi-Level Access Control in Wireless Sensor Networks. [Citation Graph (, )][DBLP ] A Comparative Study of Anomaly Detection Techniques in Web Site Defacement Detection. [Citation Graph (, )][DBLP ] Managing the lifecycle of XACML delegation policies in federated environments. [Citation Graph (, )][DBLP ] Assessing the Likelihood of Privacy Policy Compliance. [Citation Graph (, )][DBLP ] Classification features for detecting Server-side and Client-side Web attacks. [Citation Graph (, )][DBLP ]