Tag: security
Track this tag via RSS

Showing 48 results

  1. "cMix: Anonymization by High-Performance Scalable Mixing" Cryptology ePrint Archive, Report 2016/008
  2. "Privacy control in smart phones using semantically rich reasoning and context modeling" Proceedings of the IEEE Workshop on Semantic Computing and Securit
  3. "A Knowledge-Based Approach To Intrusion Detection Modeling" Proceedings of the IEEE Workshop on Semantic Computing and Security
  4. "Managing and Securing Critical Infrastructure - A Semantic Policy and Trust Driven Approach" Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges
  5. "SAT: an SVM-based Automated Trust Management System for Mobile Ad-hoc Networks" Proceedings of the 2011 Military Communications Conference
  6. "Extracting Information about Security Vulnerabilities from Web Text" Proceedings of the Web Intelligence for Information Security Workshop
  7. "ATM: Automated Trust Management for Mobile Ad-hoc Networks Using Support Vector Machine" 12th IEEE International Conference on Mobile Data Management (MDM 2011)
  8. "CARE-CPS: Context-Aware tRust Evaluation for Wireless Networks in Cyber-Physical System Using Policies" Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks
  9. "Security Through Collaboration and Trust in MANETs" Mobile Networks and Applications (MONET)
  10. "Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-Dimensional Trust Management Approach" The 11th International Conference on Mobile Data Management (MDM 2010)
  11. "Policy-based Malicious Peer Detection in Ad Hoc Networks " Proceedings of the 2009 International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2009)
  12. "Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory" 10th International Conference on Mobile Data Management (MDM 2009)
  13. "Security through Collaboration in MANETs" Proceedings of The 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2008)
  14. "SecurePass: Guarding sensitive information from untrusted machines"
  15. "Security Policies and Trust in Ubiquitous Computing" Philosophical Transactions of the Royal Society A
  16. "Proceedings of the ISWC 2007 Workshop on Privacy Enforcement and Accountability"
  17. "ROWLBAC - Representing Role Based Access Control in OWL" Proceedings of the 13th Symposium on Access control Models and Technologies
  18. "Role Based Access Control and OWL" Proceedings of the fourth OWL: Experiences and Directions Workshop
  19. "Using OWL to Model Role Based Access Control"
  20. "Threshold-based Intrusion Detection in Ad Hoc Networks and Secure AODV" Ad Hoc Networks Journal (ADHOCNET)
  21. "Personal Security Agent: KQML-based PKI" Proceedings of the 2nd International Conference on Autonomous Agents
  22. "Protecting the privacy of RFID tags"
  23. "Policy-Based Access Control for an RDF Store" Proceedings of the IJCAI-07 Workshop on Semantic Web for Collaborative Knowledge Acquisition
  24. "Security and Privacy Challenges in Open and Dynamic Environments " Computer
  25. "Proceedings of the Semantic Web and Policy Workshop"
  26. "A Holistic Approach to Secure Sensor Networks"
  27. "Policy-based Access Control for Task Computing Using Rei " Proceedings of the Policy Management for the Web Workshop
  28. " Authorization and Privacy for Semantic Web Services" IEEE Intelligent Systems (Special Issue on Semantic Web Services)
  29. "Intrusion Detection: Modeling System State to Detect and Classify Aberrant Behavior"
  30. "Authorization and Privacy for Semantic Web Services" First International Semantic Web Services Symposium, AAAI 2004 Spring Symposium
  31. "Rei : A Policy Language for the Me-Centric Project"
  32. "A Framework for Distributed Trust Management" Second Workshop on Norms and Institutions in MAS, Autonomous Agents
  33. "Trust-Based Security in Pervasive Computing Environments" IEEE Computer
  34. "Developing Secure Agent Systems Using Delegation Based Trust Management" Security of Mobile Multi-Agent Systems Workshop, Autonomous Agents and Multiagent Systems (AAMAS 2002)
  35. "A Policy Language for A Pervasive Computing Environment" IEEE 4th International Workshop on Policies for Distributed Systems and Networks
  36. "A Policy Based Approach to Security for the Semantic Web" 2nd International Semantic Web Conference (ISWC2003)
  37. "Security in Mobile Systems" Workshop on Security in Large Scale Distributed Systems, IEEE SRDS
  38. "Security for DAML Web Services: Annotation and Matchmaking" Second International Semantic Web Conference
  39. "Secure Sensor Networks for Perimeter Protection" Computer Networks
  40. "On Web, Semantics, and Data Mining: Intrusion Detection as a Case Study" Proceedings of the NSF Workshop on Next Generation Data Mining
  41. "Fuzzy Clustering for Intrusion Detection" Proceedings of the 12th IEEE International Conference on Fuzzy Systems
  42. "Modeling Computer Attacks: An Ontology for Intrusion Detection" The Sixth International Symposium on Recent Advances in Intrusion Detection
  43. "A Target-Centric Ontology for Intrusion Detection" The 18th International Joint Conference on Artificial Intelligence
  44. "Using DAML+ OIL to classify intrusive behaviours" Knowledge Engineering Review
  45. "Vigil: Providing Trust for Enhanced Security in Pervasive Systems"
  46. "SHOMAR: An Open Architecture for Distributed Intrusion Detection Services"
  47. "A Security Architecture Based on Trust Management for Pervasive Computing Systems" Grace Hopper Celebration of Women in Computing
  48. "A Secure Infrastructure for Service Discovery and Access in Pervasive Computing" ACM Monet: Special Issue on Security in Mobile Computing Environments

Log in