Login / Signup
From Database to Cyber Security
2018
2018
2018
Keyphrases
Publications
2018
Sharad Mehrotra
,
Kerim Yasin Oktay
,
Shantanu Sharma
Exploiting Data Sensitivity on Partitioned Data.
From Database to Cyber Security
(2018)
Steven Noel
A Review of Graph Approaches to Network Security Analytics.
From Database to Cyber Security
(2018)
Shang Li
,
Srijan Kumar
,
Tudor Dumitras
,
V. S. Subrahmanian
Breaking Bad: Forecasting Adversarial Android Bad Behavior.
From Database to Cyber Security
(2018)
Rajesh Ganesan
,
Ankit Shah
A Strategy for Effective Alert Analysis at a Cyber Security Operations Center.
From Database to Cyber Security
(2018)
Angelo Genovese
,
Enrique Muñoz Ballester
,
Vincenzo Piuri
,
Fabio Scotti
Advanced Biometric Technologies: Emerging Scenarios and Research Trends.
From Database to Cyber Security
(2018)
Sankardas Roy
,
Dewan Chaulagain
,
Shiva Bhusal
Static Analysis for Security Vetting of Android Apps.
From Database to Cyber Security
(2018)
Ramaswamy Chandramouli
Comprehensive Security Assurance Measures for Virtualized Server Environments.
From Database to Cyber Security
(2018)
Yvo Desmedt
,
Arash Shaghaghi
Function-Based Access Control (FBAC): Towards Preventing Insider Threats in Organizations.
From Database to Cyber Security
(2018)
Saptarshi Das
,
Barsha Mitra
,
Vijayalakshmi Atluri
,
Jaideep Vaidya
,
Shamik Sural
Policy Engineering in RBAC and ABAC.
From Database to Cyber Security
(2018)
Lingyu Wang
,
Mengyuan Zhang
,
Anoop Singhal
Network Security Metrics: From Known Vulnerabilities to Zero Day Attacks.
From Database to Cyber Security
(2018)
Tao Lin
,
Chen Zhong
,
John Yen
,
Peng Liu
Retrieval of Relevant Historical Data Triage Operations in Security Operation Centers.
From Database to Cyber Security
(2018)
Massimiliano Albanese
From Cyber Situational Awareness to Adaptive Cyber Defense: Leveling the Cyber Playing Field.
From Database to Cyber Security
(2018)
Sabrina De Capitani di Vimercati
,
Sara Foresti
,
Stefano Paraboschi
,
Gerardo Pelosi
,
Pierangela Samarati
Access Privacy in the Cloud.
From Database to Cyber Security
(2018)
Stelvio Cimato
,
Ernesto Damiani
Some Ideas on Privacy-Aware Data Analytics in the Internet-of-Everything.
From Database to Cyber Security
(2018)
Mauro Conti
,
Edlira Dushku
,
Luigi V. Mancini
Distributed Services Attestation in IoT.
From Database to Cyber Security
(2018)
Sabrina De Capitani di Vimercati
,
Sara Foresti
,
Giovanni Livraga
,
Vincenzo Piuri
,
Pierangela Samarati
Supporting Users in Cloud Plan Selection.
From Database to Cyber Security
(2018)
Frédéric Cuppens
,
Nora Cuppens-Boulahia
Stratification Based Model for Security Policy with Exceptions and Contraries to Duty.
From Database to Cyber Security
(2018)
Roberto Di Pietro
,
Flavio Lombardi
Virtualization Technologies and Cloud Security: Advantages, Issues, and Perspectives.
From Database to Cyber Security
(2018)
Karim Eldefrawy
,
Rafail Ostrovsky
,
Moti Yung
Theoretical Foundations for Mobile Target Defense: Proactive Secret Sharing and Secure Multiparty Computation.
From Database to Cyber Security
(2018)
George Cybenko
,
Gabriel Fortunato Stocco
Asymptotic Behavior of Attack Graph Games.
From Database to Cyber Security
(2018)
Zi Chu
,
Steven Gianvecchio
,
Haining Wang
Bot or Human? A Behavior-Based Online Bot Detection System.
From Database to Cyber Security
(2018)
Enrico Bacis
,
Sabrina De Capitani di Vimercati
,
Sara Foresti
,
Stefano Paraboschi
,
Marco Rosa
,
Pierangela Samarati
Protecting Resources and Regulating Access in Cloud-Based Object Storage.
From Database to Cyber Security
(2018)
Bruhadeshwar Bezawada
,
Indrakshi Ray
Attribute-Based Encryption: Applications and Future Directions.
From Database to Cyber Security
(2018)
volume 11170, 2018
From Database to Cyber Security - Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday
From Database to Cyber Security
11170 (2018)