Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
11603
search results - page 63 / 2321
»
Securing Embedded Systems
Sort
relevance
views
votes
recent
update
View
thumb
title
124
click to vote
CRITIS
2008
89
views
Security Privacy
»
more
CRITIS 2008
»
Interdependency Analysis in Electric Power Systems
15 years 6 months ago
Download
critis08.dia.uniroma3.it
Silvano Chiaradonna, Felicita Di Giandomenico, Pao...
claim paper
Read More »
113
Voted
CRITIS
2008
99
views
Security Privacy
»
more
CRITIS 2008
»
Modeling and Simulation of Complex Interdependent Systems: A Federated Agent-Based Approach
15 years 6 months ago
Download
critis08.dia.uniroma3.it
Emiliano Casalicchio, Emanuele Galli, Salvatore Tu...
claim paper
Read More »
97
Voted
ACISP
2010
Springer
124
views
Security Privacy
»
more
ACISP 2010
»
Repelling Sybil-Type Attacks in Wireless Ad Hoc Systems
15 years 6 months ago
Download
web.science.mq.edu.au
Marek Klonowski, Michal Koza, Miroslaw Kutylowski
claim paper
Read More »
119
click to vote
CRISIS
2009
154
views
Security Privacy
»
more
CRISIS 2009
»
Formal analysis of attacks for e-voting system
15 years 5 months ago
Download
dit.unitn.it
Komminist Weldemariam, Richard A. Kemmerer, Adolfo...
claim paper
Read More »
123
Voted
EUROPKI
2009
Springer
119
views
Security Privacy
»
more
EUROPKI 2009
»
Privacy and Liveliness for Reputation Systems
15 years 2 months ago
Download
www.cosic.esat.kuleuven.be
Stefan Schiffner, Sebastian Clauß, Sandra St...
claim paper
Read More »
« Prev
« First
page 63 / 2321
Last »
Next »