Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
2517
search results - page 22 / 504
»
Secure Deployment of Components
Sort
relevance
views
votes
recent
update
View
thumb
title
116
click to vote
ESSOS
2010
Springer
160
views
Software Engineering
»
more
ESSOS 2010
»
Model-Driven Security Policy Deployment: Property Oriented Approach
15 years 12 months ago
Download
deic.uab.es
Stere Preda, Nora Cuppens-Boulahia, Fréd&ea...
claim paper
Read More »
112
click to vote
COMPSAC
2001
IEEE
113
views
Software Engineering
»
more
COMPSAC 2001
»
A Runtime Composite Service Creation and Deployment Infrastructure and its Applications in Internet Security, E-Commerce, and So
15 years 6 months ago
Download
www.sce.carleton.ca
David Mennie, Bernard Pagurek
claim paper
Read More »
111
click to vote
SECRYPT
2007
60
views
Business
»
more
SECRYPT 2007
»
Reliable Process for Security Policy Deployment
15 years 4 months ago
Download
www.cs.sunysb.edu
Stere Preda, Nora Cuppens-Boulahia, Fréd&ea...
claim paper
Read More »
79
click to vote
ICAART
2010
INSTICC
141
views
Intelligent Agents
»
more
ICAART 2010
»
Risk Analysis and Deployment Security Issues in a Multi-agent System
15 years 4 months ago
Download
lia.deis.unibo.it
Ambra Molesini, Marco Prandini, Elena Nardini, Enr...
claim paper
Read More »
108
click to vote
ADHOC
2008
69
views
more
ADHOC 2008
»
Secure probabilistic location verification in randomly deployed wireless sensor networks
15 years 3 months ago
Download
cs.nju.edu.cn
Eylem Ekici, Serdar Vural, Janise McNair, Dawood A...
claim paper
Read More »
« Prev
« First
page 22 / 504
Last »
Next »