-
1
-
-
84882750204
-
An Analysis of Private Browsing Modes in Modern Browsers
-
Aggarwal, G., Bursztein, E., Jackson, C., Boneh, D.: An Analysis of Private Browsing Modes in Modern Browsers. In: Proceedings of Usenix Security (2010)
-
Proceedings of Usenix Security (2010)
-
-
Aggarwal, G.1
Bursztein, E.2
Jackson, C.3
Boneh, D.4
-
3
-
-
84958749458
-
Conceptual Information Systems Discussed Through an IT-Security Tool
-
Dieng, R., Corby, O. (eds.) EKAW 2000. Springer, Heidelberg
-
Becker, K., Stumme, G., Wille, R., Wille, U., Zickwolff, M.: Conceptual Information Systems Discussed Through an IT-Security Tool. In: Dieng, R., Corby, O. (eds.) EKAW 2000. LNCS (LNAI), vol. 1937, pp. 352-365. Springer, Heidelberg (2000)
-
(2000)
LNCS (LNAI)
, vol.1937
, pp. 352-365
-
-
Becker, K.1
Stumme, G.2
Wille, R.3
Wille, U.4
Zickwolff, M.5
-
4
-
-
79961187441
-
The N.S.A.'s Math Problem
-
May 16
-
Farley, J.D.: The N.S.A.'s Math Problem. The New York Times (May 16, 2006)
-
(2006)
The New York Times
-
-
Farley, J.D.1
-
5
-
-
34548734722
-
Mining Security-Sensitive Operations in Legacy Code using Concept Analysis
-
Ganapathy, V., King, D., Jaeger, T., Jha, S.: Mining Security-Sensitive Operations in Legacy Code using Concept Analysis. In: Proceedings of the 29th International Conference on Software Engineering (2007)
-
Proceedings of the 29th International Conference on Software Engineering (2007)
-
-
Ganapathy, V.1
King, D.2
Jaeger, T.3
Jha, S.4
-
6
-
-
0030615516
-
Assessing Modular Structure of Legacy Code Based on Mathematical Concept Analysis
-
Lindig, C., Snelting, G.: Assessing Modular Structure of Legacy Code Based on Mathematical Concept Analysis. In: International Conference on Software Engineering, pp. 349-359 (1997)
-
(1997)
International Conference on Software Engineering
, pp. 349-359
-
-
Lindig, C.1
Snelting, G.2
-
8
-
-
84864854545
-
Building and Exploiting Ad Hoc Concept Hierarchies for Web Log Analysis
-
Kambayashi, Y.,Winiwarter,W., Arikawa,M. (eds.) DaWaK 2002. Springer, Heidelberg
-
Pohle, C., Spiliopoulou, M.: Building and Exploiting Ad Hoc Concept Hierarchies for Web Log Analysis. In: Kambayashi, Y.,Winiwarter,W., Arikawa,M. (eds.) DaWaK 2002. LNCS, vol. 2454, pp. 83-93. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2454
, pp. 83-93
-
-
Pohle, C.1
Spiliopoulou, M.2
-
9
-
-
78650362442
-
Concept Neighbourhoods in Lexical Databases
-
Kwuida, L., Sertkaya, B. (eds.) ICFCA 2010. Springer, Heidelberg
-
Priss, U., Old, L.J.: Concept Neighbourhoods in Lexical Databases. In: Kwuida, L., Sertkaya, B. (eds.) ICFCA 2010. LNCS, vol. 5986, pp. 283-295. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.5986
, pp. 283-295
-
-
Priss, U.1
Old, L.J.2
-
10
-
-
79960815826
-
Data Weeding Techniques Applied to Roget's Thesaurus
-
Wolff, K.E. (ed.) KONT/KPP 2007. Springer, Heidelberg
-
Priss, U., Old, L.J.: Data Weeding Techniques Applied to Roget's Thesaurus. In:Wolff, K.E. (ed.) KONT/KPP 2007. LNCS (LNAI), vol. 6581, pp. 150-163. Springer, Heidelberg (2011)
-
(2011)
LNCS (LNAI)
, vol.6581
, pp. 150-163
-
-
Priss, U.1
Old, L.J.2
-
12
-
-
77955214796
-
A Practical Attack to De-Anonymize Social Network Users
-
Wondracek, G., Holz, T., Kirda, E., Kruegel, C.: A Practical Attack to De-Anonymize Social Network Users. In: 2010 IEEE Symposium on Security and Privacy, pp. 223-238 (2010)
-
(2010)
2010 IEEE Symposium on Security and Privacy
, pp. 223-238
-
-
Wondracek, G.1
Holz, T.2
Kirda, E.3
Kruegel, C.4
-
13
-
-
84880227675
-
Interpretation of automata in temporal concept analysis
-
Priss, U., Corbett, D., Angelova, G. (eds.) ICCS 2002. Springer, Heidelberg
-
Wolff, K.E.: Interpretation of automata in temporal concept analysis. In: Priss, U., Corbett, D., Angelova, G. (eds.) ICCS 2002. LNCS (LNAI), vol. 2393, pp. 341-353. Springer, Heidelberg (2002)
-
(2002)
LNCS (LNAI)
, vol.2393
, pp. 341-353
-
-
Wolff, K.E.1
|