DE eng

Search in the Catalogues and Directories

Page: 1 2 3 4 5
Hits 1 – 20 of 82

1
Enhanced Topic-Based Vector Space Model for Semantics-Aware Spam Filtering
In: http://paginaspersonales.deusto.es/claorden/publications/2011/Santos_2011_ESWA_Enhanced_Topic_Based_Vector_Space_Model_For_Spam_Filtering.pdf (2012)
BASE
Show details
2
Learning to Detect Malicious URLs
In: http://www.cs.ucsd.edu/%7Esavage/papers/TIST11.pdf (2011)
BASE
Show details
3
Novel Text Steganography through Special Code Generation
In: http://wikieducator.org/images/1/1c/CI-3.4.pdf (2011)
BASE
Show details
4
Frontex real-time news event extraction framework
In: http://users.cis.fiu.edu/~lzhen001/activities/KDD2011Program/docs/p749.pdf (2011)
BASE
Show details
5
View update translation for XML
In: http://hal.inria.fr/docs/00/61/31/72/PDF/bgtcrs-icdt11.pdf (2011)
BASE
Show details
6
Uncovering spoken phrases in encrypted voice over IP conversations
In: http://www.cs.unc.edu/~fabian/papers/tissec2010.pdf (2010)
BASE
Show details
7
Generating Low-Overhead Dynamic Binary Translators Mathias Payer
In: http://www.lst.inf.ethz.ch/research/publications/SYSTOR_2010/SYSTOR_2010.pdf (2010)
BASE
Show details
8
Beyond Blacklists: Learning to Detect Malicious Web Sites from Suspicious URLs
In: http://www.cs.ucsd.edu/~savage/papers/KDD09.pdf (2009)
BASE
Show details
9
Inaccessible entropy
In: http://research.microsoft.com/en-us/um/people/iftach/papers/AccessibleEntropy/AE-stoc.pdf (2009)
BASE
Show details
10
Whitesteg: a new scheme in information hiding using text steganography
In: http://www.wseas.us/e-library/transactions/computers/2008/27-357.pdf (2008)
BASE
Show details
11
AKOKA, LAGOS 2
In: http://www.dcc.ufla.br/infocomp/artigos/v7.3/art09.pdf (2008)
BASE
Show details
12
E.: Data security analysis using unsupervised learning and explanations
In: http://www.iiia.csic.es/files/pdfs/1572.pdf (2007)
BASE
Show details
13
From Early Requirements Analysis towards Secure Workflows
In: http://eprints.biblio.unitn.it/archive/00001220/01/SecureBPEL_FrankovaMassacciSeguran.pdf (2007)
BASE
Show details
14
Loneliness and international students – an Australian study
In: http://www.cshe.unimelb.edu.au/pdfs/JSIE%20online%20Sawir%20et%20al%20loneliness.pdf (2007)
BASE
Show details
15
Bungale HDTrans: An Open Source, Low-Level Dynamic Instrumentation System
In: https://www.usenix.org/legacy/events/vee06/full_papers/p175-sridhar.pdf (2006)
BASE
Show details
16
Dictionary Attacks Using Keyboard Acoustic Emanations
In: http://www.eng.tau.ac.il/~yash/p245-berger.pdf (2006)
BASE
Show details
17
Towards an Independent Semantics and Verification Technology for the HLPSL Specification Language
In: http://www.cl.cam.ac.uk/~ovg20/papers/hlpsl-arspa05.pdf (2005)
BASE
Show details
18
Proving abstract non-interference
In: http://profs.sci.univr.it/~mastroen/download/axiomaticANI.pdf (2004)
BASE
Show details
19
A Comparison of Publicly Available Tools for Static Intrusion Prevention
In: http://www.ida.liu.se/~johwi/research_publications/./paper_nordsec2002_john_wilander.pdf (2002)
BASE
Show details
20
Modeling Personalized and Context Sensitive Behavior for Location Aware Services by Employing Fuzzy Logic
In: http://www.wseas.us/e-library/conferences/crete2002/papers/444-719.pdf (2002)
BASE
Show details

Page: 1 2 3 4 5

Catalogues
0
0
0
0
0
0
0
Bibliographies
0
0
0
0
0
0
0
0
0
Linked Open Data catalogues
0
Online resources
0
0
0
0
Open access documents
82
0
0
0
0
© 2013 - 2024 Lin|gu|is|tik | Imprint | Privacy Policy | Datenschutzeinstellungen ändern