Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
3420
search results - page 11 / 684
»
A Language-Based Approach to Security
Sort
relevance
views
votes
recent
update
View
thumb
title
93
click to vote
SAFECOMP
2001
Springer
89
views
Security Privacy
»
more
SAFECOMP 2001
»
About the Design of Distributed Control Systems: The Quasi-Synchronous Approach
15 years 7 months ago
Download
www-verimag.imag.fr
Paul Caspi, Christine Mazuet, Natacha Reynaud Pali...
claim paper
Read More »
94
click to vote
ACSAC
1999
IEEE
81
views
Security Privacy
»
more
ACSAC 1999
»
SCR: A Practical Approach to Building a High Assurance COMSEC System
15 years 7 months ago
Download
www.acsac.org
James Kirby, Myla Archer, Constance L. Heitmeyer
claim paper
Read More »
93
Voted
CCS
2006
ACM
105
views
Security Privacy
»
more
CCS 2006
»
Measuring intrusion detection capability: an information-theoretic approach
15 years 7 months ago
Download
faculty.cs.tamu.edu
Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, ...
claim paper
Read More »
75
Voted
CCS
2006
ACM
116
views
Security Privacy
»
more
CCS 2006
»
A natural language approach to automated cryptanalysis of two-time pads
15 years 7 months ago
Download
www.cs.jhu.edu
Joshua Mason, Kathryn Watkins, Jason Eisner, Adam ...
claim paper
Read More »
98
Voted
CRITIS
2007
79
views
Security Privacy
»
more
CRITIS 2007
»
An Approach to Trust Management Challenges for Critical Infrastructures
15 years 5 months ago
Download
www.grid.ucy.ac.cy
Ioanna Dionysiou, Deborah A. Frincke, David E. Bak...
claim paper
Read More »
« Prev
« First
page 11 / 684
Last »
Next »