Search concepts
|
Selected Filters
|
- 33,950 - 34,000 out of 144,253 results
Search results
-
Security solutions for pervasive healthcare
Venkatasubramanian, K. & Gupta, S. K. S., Jan 1 2007, Security in Distributed, Grid, Mobile, and Pervasive Computing. CRC Press, p. 349-366 18 p.Research output: Chapter in Book/Report/Conference proceeding › Chapter
25 Scopus citations -
Security screening via computational imaging using frequency-diverse metasurface apertures
Smith, D. R., Reynolds, M. S., Gollub, J. N., Marks, D. L., Imani, M. F., Yurduseven, O., Arnitz, D., Pedross-Engel, A., Sleasman, T., Trofatter, P., Boyarsky, M., Rose, A., Odabasi, H. & Lipworth, G., 2017, Passive and Active Millimeter-Wave Imaging XX. Wikner, D. A. & Robertson, D. A. (eds.). SPIE, 101890B. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 10189).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
12 Scopus citations -
Security prospects in Southeast Asia: Collaborative efforts and the ASEAN regional forum
Simon, S. W., Jan 1 1998, In: Pacific Review. 11, 2, p. 195-212 18 p.Research output: Contribution to journal › Article › peer-review
22 Scopus citations -
Security primitive design with nanoscale devices: A case study with resistive RAM
Karam, R., Liu, R., Chen, P. Y., Yu, S. & Bhunia, S., May 18 2016, GLSVLSI 2016 - Proceedings of the 2016 ACM Great Lakes Symposium on VLSI. Association for Computing Machinery, Vol. 18-20-May-2016. p. 299-304 6 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
8 Scopus citations -
Security policy integration and conflict reconciliation for collaborations among organizations in ubiquitous computing environments
Yau, S-S. & Chen, Z., 2008, Ubiquitous Intelligence and Computing - 5th International Conference, UIC 2008, Proceedings. p. 3-19 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5061 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
13 Scopus citations -
Security policy checking in distributed SDN based clouds
Pisharody, S., Chowdhary, A. & Huang, D., Feb 21 2017, 2016 IEEE Conference on Communications and Network Security, CNS 2016. Institute of Electrical and Electronics Engineers Inc., p. 19-27 9 p. 7860466. (2016 IEEE Conference on Communications and Network Security, CNS 2016).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
15 Scopus citations -
Security model consistency in secure object-oriented systems
Keefe, T. F. & Tsai, W. T., Dec 1 1989, Fifth Annu Comput Secur Appl Conf. Anon (ed.). Publ by IEEE, p. 290-298 9 p. (Annual Computer Security Applications Conference).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Security in wireless networks
Dasgupta, P. & Boyd, T., Jan 1 2005, Handbook of Wireless Local Area Networks: Applications, Technology, Security, and Standards. CRC Press, p. 501-521 21 p.Research output: Chapter in Book/Report/Conference proceeding › Chapter
1 Scopus citations -
Security for pervasive health monitoring sensor applications
Venkatasubramanian, K. K. & Gupta, S., 2006, Proceedings - 4th International Conference on Intelligent Sensing and Information Processing, ICISIP 2006. p. 197-202 6 p. 4286096. (Proceedings - 4th International Conference on Intelligent Sensing and Information Processing, ICISIP 2006).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
68 Scopus citations -
Security-Enhanced OSGi service environments
Ahn, G-J., Hu, H. & Jin, J., 2009, In: IEEE Transactions on Systems, Man and Cybernetics Part C: Applications and Reviews. 39, 5, p. 562-571 10 p.Research output: Contribution to journal › Article › peer-review
15 Scopus citations -
Security education in the 21st century: The role of engineering
Rogers, B., Palmgren, D., Giever, D. & Garcia, M. L., 2007, In: ASEE Annual Conference and Exposition, Conference Proceedings.Research output: Contribution to journal › Article › peer-review
2 Scopus citations -
Security considerations for distributed Web-based e-commerce applications in Java
Lindquist, T., 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences, HICSS 2002. Sprague, R. H. (ed.). IEEE Computer Society, p. 5 1 p. 994193. (Proceedings of the Annual Hawaii International Conference on System Sciences; vol. 2002-January).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
2 Scopus citations -
Security at what cost? A comparative evaluation of increased court security
Gould, J. B., Jan 1 2007, In: Justice System Journal. 28, 1, p. 62-78 17 p.Research output: Contribution to journal › Article › peer-review
2 Scopus citations -
Security assessment of the year 2020 planned Western Interconnection
Quintero, J., Vittal, V., Heydt, G. T., Zhang, H. & Nickell, B., Dec 1 2013, 2013 IEEE Power and Energy Society General Meeting, PES 2013. 6672219. (IEEE Power and Energy Society General Meeting).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
3 Scopus citations -
Security and tourism: Towards a new understanding?
Hall, M. C., Duval, D. T. & Timothy, D., Jan 16 2004, In: Journal of Travel and Tourism Marketing. 15, 2-3, p. 1-18 18 p.Research output: Contribution to journal › Article › peer-review
87 Scopus citations -
Security and tourism: Towards a new understanding?
Michael Hall, C., Timothy, D. & Duval, D. T., Jan 1 2012, Safety and Security in Tourism: Relationships, Management, and Marketing. Taylor and Francis, p. 1-18 18 p.Research output: Chapter in Book/Report/Conference proceeding › Chapter
7 Scopus citations -
Security and privacy in social networks
Ahn, G-J., Shehab, M. & Squicciarini, A., May 2011, In: IEEE Internet Computing. 15, 3, p. 10-12 3 p., 5755600.Research output: Contribution to journal › Review article › peer-review
32 Scopus citations -
Security and privacy in emerging wireless networks
Cao, G., Hubaux, J. P., Kim, Y. & Zhang, Y., Oct 2010, In: IEEE Wireless Communications. 17, 5, p. 10-11 2 p., 5416337.Research output: Contribution to journal › Review article › peer-review
13 Scopus citations -
Security and privacy in cloud computing: Towards a comprehensive framework
Takabi, H., Joshi, J. B. D. & Ahn, G-J., 2013, Principles, Methodologies, and Service-Oriented Approaches for Cloud Computing. IGI Global, p. 164-184 21 p.Research output: Chapter in Book/Report/Conference proceeding › Chapter
12 Scopus citations -
Security and privacy challenges in cloud computing environments
Takabi, H., Joshi, J. B. D. & Ahn, G-J., Nov 2010, In: IEEE Security and Privacy. 8, 6, p. 24-31 8 p., 5655240.Research output: Contribution to journal › Article › peer-review
899 Scopus citations -
Security and interdependency in a public cloud: A game-theoretic approach
Kamhoua, C. A., Kwiat, L., Kwiat, K. A., Park, J. S., Zhao, M. & Rodriguez, M., 2018, Static and Dynamic Game Theory: Foundations and Applications. Birkhauser, p. 253-284 32 p. (Static and Dynamic Game Theory: Foundations and Applications).Research output: Chapter in Book/Report/Conference proceeding › Chapter
3 Scopus citations -
Security and closeness with mothers and fathers in the transition to adolescence: Differences by temperament.
Bradley, R. H. & Corwyn, R. F., Oct 2021, In: Journal of Family Psychology. 35, 7, p. 950-960 11 p.Research output: Contribution to journal › Article › peer-review
-
Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem
Kim, D., Cho, H., Kwon, Y., Doupé, A., Son, S., Ahn, G. J. & Dumitras, T., May 24 2021, ASIA CCS 2021 - Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 407-420 14 p. (ASIA CCS 2021 - Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
1 Scopus citations -
Securitizing environmental risk and the keystone XL pipeline
Smith, V. K., Jan 2012, In: Economists' Voice. 9, 1Research output: Contribution to journal › Article › peer-review
2 Scopus citations -
Securitization and mortgage renegotiation: Evidence from the great depression
Ghent, A. C., Jun 2011, In: Review of Financial Studies. 24, 6, p. 1814-1847 34 p.Research output: Contribution to journal › Article › peer-review
21 Scopus citations -
Securing wireless sensor networks: A survey
Zhou, Y., Fang, Y. & Zhang, Y., 2008, In: IEEE Communications Surveys and Tutorials. 10, 3, p. 6-28 23 p., 4625802.Research output: Contribution to journal › Article › peer-review
319 Scopus citations -
Securing social media user data - An adversarial approach
Beigi, G., Shu, K., Zhang, Y. & Liu, H., Jul 3 2018, HT 2018 - Proceedings of the 29th ACM Conference on Hypertext and Social Media. Association for Computing Machinery, Inc, p. 165-173 9 p. (HT 2018 - Proceedings of the 29th ACM Conference on Hypertext and Social Media).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
15 Scopus citations -
Securing sensor networks with location-based keys
Zhang, Y., Liu, W., Lou, W. & Fang, Y., 2005, 2005 IEEE Wireless Communications and Networking Conference, WCNC 2005: Broadband Wireless for the Masses - Ready for Take-off. p. 1909-1914 6 p. NET30-1. (IEEE Wireless Communications and Networking Conference, WCNC; vol. 4).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
70 Scopus citations -
Securing resource-constrained wireless ad hoc networks
Fang, Y., Zhu, X. & Zhang, Y., Apr 2009, In: IEEE Wireless Communications. 16, 2, p. 24-29 6 p., 4907556.Research output: Contribution to journal › Article › peer-review
23 Scopus citations -
Securing resource-constrained wireless ad hoc networks
Fang, Y. & Zhang, Y., 2007, 2007 IEEE Sarnoff Symposium, SARNOFF. 4567365. (2007 IEEE Sarnoff Symposium, SARNOFF).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
1 Scopus citations -
Securing reputation data in peer-to-peer networks
Dewan, P. & Dasgupta, P., 2004, Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Systems. Gonzalez, T. (ed.). Vol. 16. p. 485-490 6 p. 439-039Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
20 Scopus citations -
Securing P2P networks using peer reputations: Is there a silver bullet?
Dewan, P. & Dasgupta, P., Dec 1 2005, 2005 2nd IEEE Consumer Communications and Networking Conference, CCNC2005. p. 30-36 7 p. 1405139. (2005 2nd IEEE Consumer Communications and Networking Conference, CCNC2005; vol. 2005).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
31 Scopus citations -
Securing mobile ad hoc networks with certificateless public keys
Zhang, Y., Liu, W., Lou, W. & Fang, Y., 2006, In: IEEE Transactions on Dependable and Secure Computing. 3, 4, p. 386-399 14 p.Research output: Contribution to journal › Article › peer-review
166 Scopus citations -
Securing knowledge in organizations: Lessons from the defense and intelligence sectors
Desouza, K. C. & Vanapalli, G. K., Feb 2005, In: International Journal of Information Management. 25, 1, p. 85-98 14 p.Research output: Contribution to journal › Article › peer-review
53 Scopus citations -
Securing knowledge assets and processes: Lessons from the defense and intelligence sectors
Desouza, K. C. & Vanapalli, G. K., 2005, Proceedings of the Annual Hawaii International Conference on System Sciences. Spraque, Jr., R. H. (ed.). p. 27 1 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
5 Scopus citations -
Securing information assets: The great information game
Desouza, K. C., Mar 2009, In: Business Information Review. 26, 1, p. 35-41 7 p.Research output: Contribution to journal › Article › peer-review
1 Scopus citations -
Securing ICN-Based UAV Ad Hoc Networks with Blockchain
Lei, K., Zhang, Q., Lou, J., Bai, B. & Xu, K., Jun 2019, In: IEEE Communications Magazine. 57, 6, p. 26-32 7 p., 8740789.Research output: Contribution to journal › Article › peer-review
42 Scopus citations -
Securing dynamic spectrum use
Cui, M., Syrotiuk, V. & Colbourn, C., 2004, IEEE Vehicular Technology Conference. 2 ed. Vol. 60. p. 1153-1157 5 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Securing cyberspace: Identifying key actors in hacker communities
Benjamin, V. & Chen, H., 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 24-29 6 p. 6283296. (ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
55 Scopus citations -
Securing borders: Patriotism, vigilantism and the Brutalization of the US American public
Kil, S. H., Menjívar, C. & Doty, R., Dec 1 2009, Immigration, Crime and Justice. McDonald, W. (ed.). p. 297-312 16 p. (Sociology of Crime Law and Deviance; vol. 13).Research output: Chapter in Book/Report/Conference proceeding › Chapter
14 Scopus citations -
Secure wireless gateway
Godber, A. & Dasgupta, P., 2002, Proceedings of the Workshop on Wireless Security. Association for Computing Machinery (ACM), p. 41-46 6 p. (Proceedings of the Workshop on Wireless Security).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
18 Scopus citations -
Secure wireless communications via cooperative relaying and jamming
Tang, L., Gong, X., Wu, J. & Zhang, J., Dec 1 2011, 2011 IEEE GLOBECOM Workshops, GC Wkshps 2011. p. 849-853 5 p. 6162575. (2011 IEEE GLOBECOM Workshops, GC Wkshps 2011).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
26 Scopus citations -
Secure web referral services for mobile cloud computing
Xu, L., Li, L., Nagarajan, V., Huang, D. & Tsai, W. T., Aug 5 2013, Proceedings - 2013 IEEE 7th International Symposium on Service-Oriented System Engineering, SOSE 2013. p. 584-593 10 p. 6525579. (Proceedings - 2013 IEEE 7th International Symposium on Service-Oriented System Engineering, SOSE 2013).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
9 Scopus citations -
Secure web referral service
Nagarajan, V. & Huang, D., May 11 2012, International Conference on Information Networking 2012, ICOIN 2012 - Conference Program. p. 53-58 6 p. 6164348. (International Conference on Information Networking).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
1 Scopus citations -
Secure true random number generation using 1.5-T transistor flash memory
Clark, L. & Holbert, K., Aug 6 2015Research output: Patent
-
Secure top-k query processing via untrusted location-based service providers
Zhang, R., Zhang, Y. & Zhang, C., Jun 4 2012, 2012 Proceedings IEEE INFOCOM, INFOCOM 2012. p. 1170-1178 9 p. 6195476. (Proceedings - IEEE INFOCOM).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
33 Scopus citations -
Secure top-k query processing in unattended tiered sensor networks
Zhang, R., Shi, J., Zhang, Y. & Huang, X., Nov 1 2014, In: IEEE Transactions on Vehicular Technology. 63, 9, p. 4681-4693 13 p., 6767141.Research output: Contribution to journal › Article › peer-review
11 Scopus citations -
Secure the Internet, one home at a time
Xu, K., Wang, F. & Jia, X., Nov 10 2016, In: Security and Communication Networks. 9, 16, p. 3821-3832 12 p.Research output: Contribution to journal › Article › peer-review
13 Scopus citations -
Secure the internet, one home at a time
Xu, K., Wang, F. & Jia, X., 2015, 2015 IEEE Global Communications Conference, GLOBECOM 2015. Institute of Electrical and Electronics Engineers Inc., 7417086. (2015 IEEE Global Communications Conference, GLOBECOM 2015).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Secure spatial top-k query processing via untrusted location-based service providers
Zhang, R., Sun, J., Zhang, Y. & Zhang, C., Jan 1 2015, In: IEEE Transactions on Dependable and Secure Computing. 12, 1, p. 111-124 14 p., 6803036.Research output: Contribution to journal › Article › peer-review
25 Scopus citations