-
1
-
-
33646886776
-
Secure knowledge management: confidentiality, trust, and privacy
-
Bertino, E., Khan, L.R., Sandhu, R., & Thuraisingham, B. (2006). Secure knowledge management: confidentiality, trust, and privacy. IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans, 36(3), 429–438.
-
(2006)
IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans
, vol.36
, Issue.3
, pp. 429-438
-
-
Bertino, E.1
Khan, L.R.2
Sandhu, R.3
Thuraisingham, B.4
-
2
-
-
33646887480
-
Secure knowledge management and the semantic web
-
Lee, J., Upadhyaya, S.J., Rao, H.R., & Sharman, R. (2005). Secure knowledge management and the semantic web. Communications of the ACM, 48(12), 48–54.
-
(2005)
Communications of the ACM
, vol.48
, Issue.12
, pp. 48-54
-
-
Lee, J.1
Upadhyaya, S.J.2
Rao, H.R.3
Sharman, R.4
-
3
-
-
84942197384
-
Message diffusion through social network service: The case of rumor and non-rumor related tweets during boston bombing 2013
-
Lee, J., Agrawal, M., & Rao, H. (2015). Message diffusion through social network service: The case of rumor and non-rumor related tweets during boston bombing 2013. Information Systems Frontiers, 17(5). doi:10.1007/s10796-015-9568-z.
-
(2015)
Information Systems Frontiers
, vol.17
, Issue.5
-
-
Lee, J.1
Agrawal, M.2
Rao, H.3
-
4
-
-
84942197423
-
Surviving advanced persistent threats in a distributed environment–architecture and analysis
-
Mehresh, R., & Upadhyaya, S. (2015). Surviving advanced persistent threats in a distributed environment–architecture and analysis. Information Systems Frontiers, 17 (5). doi:10.1007/s10796-015-9569-y.
-
(2015)
Information Systems Frontiers
, vol.17
, Issue.5
-
-
Mehresh, R.1
Upadhyaya, S.2
-
5
-
-
84942105224
-
Game-theoretic strategies for ids deployment in peer-to-peer networks
-
Narang, P., & Hota, C. (2015). Game-theoretic strategies for ids deployment in peer-to-peer networks. Information Systems Frontiers, 17(5). doi:10.1007/s10796-015-9582-1.
-
(2015)
Information Systems Frontiers
, vol.17
, Issue.5
-
-
Narang, P.1
Hota, C.2
-
6
-
-
84942196847
-
Analysis of a multistage attack embedded in a video file
-
Nath, H.V., & Mehtre, B. (2015). Analysis of a multistage attack embedded in a video file. doi:Information Systems Frontiers, 17(5), 1–9. doi:10.1007/s10796-015-9570-5.
-
(2015)
Information Systems Frontiers
, vol.17
, Issue.5
, pp. 1-9
-
-
Nath, H.V.1
Mehtre, B.2
-
7
-
-
84942205015
-
-
Knowledge from big data analytics in product development, TCS white paper
-
Rajpathak, T., & Narsingpurkar, A. (2013). Knowledge from big data analytics in product development. TCS white paper.
-
(2013)
-
-
Rajpathak, T.1
-
8
-
-
84942195676
-
Secure and privacy-preserving data processing support for active authentication
-
Sun, Y., & Upadhyaya, S. (2015). Secure and privacy-preserving data processing support for active authentication. Information Systems Frontiers, 17(5). doi:10.1007/s10796-015-9587-9.
-
(2015)
Information Systems Frontiers
, vol.17
, Issue.5
-
-
Sun, Y.1
Upadhyaya, S.2
-
9
-
-
63149181058
-
IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
-
Thuraisingham, B., & Parikh, P. (2008). Trustworthy semantic web technologies for secure knowledge management. In 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, IEEE, pp 186–193.
-
(2008)
IEEE
, pp. 186-193
-
-
-
10
-
-
84942205017
-
-
Padmanabhan, G: Secure knowledge management. Idea group inc
-
Upadhyaya, S., Rao, H.R., & Padmanabhan, G. (2006). Secure knowledge management. Idea group inc.
-
(2006)
-
-
Upadhyaya, S.1
Rao, H.R.2
-
11
-
-
84942205018
-
-
Wolf, S. Security management for knowledge assets
-
Wolf, S. (2012). Security management for knowledge assets.
-
(2012)
-
-
|