Funding Data Link References Status API Help
Page 1 of 1019121 results
Sort by: relevance publication year

Using targeted Bayesian network learning for suspect identification in communication networks

Journal Article published 8 Feb 2017 in International Journal of Information Security volume 17 issue 2 on pages 169 to 181

Authors: A. Gruber, I. Ben-Gal

Resistance and Security Index of Networks: Structural Information Perspective of Network Security

Journal Article published 3 Jun 2016 in Scientific Reports volume 6 issue 1

Authors: Angsheng Li, Qifu Hu, Jun Liu, Yicheng Pan

Ensuring security in depth based on heterogeneous network security technologies

Journal Article published 24 Mar 2009 in International Journal of Information Security volume 8 issue 4 on pages 233 to 246

Authors: Meharouech Sourour, Bouhoula Adel, Abbes Tarek

Metaphors advance scientific research

Journal Article published Oct 2013 in Nature volume 502 issue 7471 on pages 303 to 303

Authors: Andrea Loettgers

Criminal network investigation

Journal Article published 2014 in Security Informatics volume 3 issue 1 on page 1

Authors: Uffe Wiil

Complete analysis of configuration rules to guarantee reliable network security policies

Journal Article published 16 Oct 2007 in International Journal of Information Security volume 7 issue 2 on pages 103 to 122

Authors: J. G. Alfaro, N. Boulahia-Cuppens, F. Cuppens

Rigorous automated network security management

Journal Article published Feb 2005 in International Journal of Information Security volume 4 issue 1-2 on pages 29 to 48

Authors: Joshua D. Guttman, Amy L. Herzog

Game strategies in network security

Journal Article published Feb 2005 in International Journal of Information Security volume 4 issue 1-2 on pages 71 to 86

Authors: Kong-wei Lye, Jeannette M. Wing

The Conceptual and Scientific Demarcation of Security in Contrast to Safety

Journal Article published 7 Nov 2017 in European Journal for Security Research

Authors: S. H. Jore

Sensor Guardian: prevent privacy inference on Android sensors

Journal Article published 8 Jun 2017 in EURASIP Journal on Information Security volume 2017 issue 1

Research funded by Tsinghua University Initiative Scientific Research Program (2014z09102)

Authors: Xiaolong Bai, Jie Yin, Yu-Ping Wang