Ads-Guard - Detecting Scammers in Online Classified Ads. | 0 | 0.34 | 2020 |
Ensemble Classifiers For Network Intrusion Detection Using A Novel Network Attack Dataset | 1 | 0.35 | 2020 |
Taxonomy and Survey of Interpretable Machine Learning Method | 0 | 0.34 | 2020 |
Empirical Evaluation of the Ensemble Framework for Feature Selection in DDoS Attack | 1 | 0.37 | 2020 |
IoMT-SAF: Internet of Medical Things Security Assessment Framework | 4 | 0.47 | 2019 |
Ontology-Based Security Recommendation for the Internet of Medical Things. | 1 | 0.36 | 2019 |
Quantifying security and privacy in Internet of Things solutions. | 1 | 0.34 | 2018 |
Crowdsourcing Multi-Objective Recommendation System. | 0 | 0.34 | 2018 |
On a Generic Security Game Model. | 0 | 0.34 | 2018 |
Security and Privacy in the Internet of Medical Things: Taxonomy and Risk Assessment. | 3 | 0.45 | 2017 |
CSSR: Cloud Services Security Recommender | 1 | 0.37 | 2016 |
Building Trust in Cloud: Service Certification Challenges and Approaches | 0 | 0.34 | 2015 |
Mitigating congestion based DoS attacks with an enhanced AQM technique. | 5 | 0.45 | 2015 |
A Network Security Game Model | 0 | 0.34 | 2015 |
Towards an Effective Crowdsourcing Recommendation System: A Survey of the State-of-the-Art | 5 | 0.41 | 2015 |
A survey of cloud computing taxonomies: Rationale and overview | 1 | 0.37 | 2014 |
Use Of Attack Graphs In Security Systems | 16 | 0.89 | 2014 |
A game inspired defense mechanism against distributed denial of service attacks. | 4 | 0.48 | 2014 |
Runtime Monitors to Detect and Prevent Union Query Based SQL Injection Attacks | 0 | 0.34 | 2013 |
Mitigating congestion-based denial of service attacks with active queue management | 5 | 0.44 | 2013 |
ADAPT: A Game Inspired Attack-Defense and Performance Metric Taxonomy. | 5 | 0.61 | 2013 |
Security in the cloud based systems: Structure and breaches. | 0 | 0.34 | 2013 |
Game theory-based defense mechanisms against DDoS attacks on TCP/TCP-friendly flows | 18 | 1.00 | 2011 |
Knowledge Engineering To Visualize Complexity For Legacy Modernization Planning | 0 | 0.34 | 2010 |
An Approach to Overcoming Knowledge Sharing Challenges in a Corporate IT Environment | 0 | 0.34 | 2010 |
A Novel Approach to Knowledge Sharing in Software Systems Engineering | 4 | 0.53 | 2009 |
Clustering of Defect Reports Using Graph Partitioning Algorithms | 3 | 0.42 | 2009 |
Knowledge Management in Global Software Development | 1 | 0.37 | 2009 |
Using Semantic Wikis to Support Software Reuse | 5 | 0.46 | 2008 |
Automatic Clustering of Defect Reports | 1 | 0.36 | 2008 |
Software Reuse: Research and Practice | 12 | 0.91 | 2007 |
Will earlier projects plus a disciplined process enforce SE principles throughout the CS curriculum? | 3 | 0.65 | 2005 |
Software Practices in Academia | 0 | 0.34 | 2004 |
CMMI Framework in Small Business Environment - A Case Study | 0 | 0.34 | 2004 |
Pipelined and Parallel Computer Architecture | 9 | 3.11 | 1998 |
Interpartition communication with shared active packages | 0 | 0.34 | 1996 |
Design of a knowledge-based simulation environment | 0 | 0.34 | 1996 |
A file integrity checking system to detect and recover from program modification attacks in multi-user computer systems | 1 | 0.38 | 1990 |
An aposteriori computer security system to identify computer viruses. | 0 | 0.34 | 1989 |
On the Description of Multiprocessor Architectures | 0 | 0.34 | 1981 |
Combinational logic synthesis from an HDL description | 2 | 1.05 | 1980 |
Flip-Flops for Multiple-Valued Logic | 4 | 2.00 | 1976 |