Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
1599
search results - page 7 / 320
»
Program Analysis for Security and Privacy
Sort
relevance
views
votes
recent
update
View
thumb
title
111
Voted
ISSE
2010
125
views
Security Privacy
»
more
ISSE 2010
»
Lightweight analysis of access control models with description logic
15 years 1 months ago
Download
www.artist-embedded.org
Christiano Braga, Edward Hermann Haeusler
claim paper
Read More »
100
Voted
CSREASAM
2010
152
views
Security Privacy
»
more
CSREASAM 2010
»
Using Traffic Analysis to Identify Tor Usage - A Proposed Study
15 years 23 days ago
Download
data.openduck.com
John Barker, Peter Hannay, Christopher Bolan
claim paper
Read More »
77
click to vote
SOUPS
2009
ACM
91
views
Security Privacy
»
more
SOUPS 2009
»
Privacy stories: confidence in privacy behaviors through end user programming
15 years 10 months ago
Download
cups.cs.cmu.edu
Luke Church, Jonathan Anderson, Joseph Bonneau, Fr...
claim paper
Read More »
89
click to vote
OOPSLA
2007
Springer
122
views
Security Privacy
»
more
OOPSLA 2007
»
Confessions of a used programming language salesman
15 years 9 months ago
Download
research.microsoft.com
Erik Meijer
claim paper
Read More »
70
Voted
IEEEARES
2007
IEEE
89
views
Security Privacy
»
more
IEEEARES 2007
»
On Programming Models for Service-Level High Availability
15 years 9 months ago
Download
iweb.tntech.edu
Christian Engelmann, Stephen L. Scott, Chokchai Le...
claim paper
Read More »
« Prev
« First
page 7 / 320
Last »
Next »