ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
2014 IEEE Security and Privacy Workshops
Latest Publications
TOTAL DOCUMENTS
49
(FIVE YEARS 0)
H-INDEX
11
(FIVE YEARS 0)
Published By IEEE
9781479951031
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Phantom Boundaries and Cross-Layer Illusions in 802.15.4 Digital Radio
2014 IEEE Security and Privacy Workshops
◽
10.1109/spw.2014.33
◽
2014
◽
Cited By ~ 3
Author(s):
Travis Goodspeed
Keyword(s):
Cross Layer
◽
Digital Radio
Download Full-text
Architecture, Workflows, and Prototype for Stateful Data Usage Control in Cloud
2014 IEEE Security and Privacy Workshops
◽
10.1109/spw.2014.13
◽
2014
◽
Cited By ~ 7
Author(s):
Aliaksandr Lazouski
◽
Gaetano Mancini
◽
Fabio Martinelli
◽
Paolo Mori
Keyword(s):
Usage Control
◽
Data Usage
Download Full-text
Collusion and Fraud Detection on Electronic Energy Meters - A Use Case of Forensics Investigation Procedures
2014 IEEE Security and Privacy Workshops
◽
10.1109/spw.2014.19
◽
2014
◽
Cited By ~ 6
Author(s):
Rubens Alexandre De Faria
◽
Keiko V. Ono Fonseca
◽
Bertoldo Schneider
◽
Sing Kiong Nguang
Keyword(s):
Fraud Detection
◽
Electronic Energy
◽
Use Case
Download Full-text
[Copyright notice]
2014 IEEE Security and Privacy Workshops
◽
10.1109/spw.2014.3
◽
2014
◽
Keyword(s):
Copyright Notice
Download Full-text
IWCC 2014: International Workshop on Cyber Crime
2014 IEEE Security and Privacy Workshops
◽
10.1109/spw.2014.8
◽
2014
◽
Keyword(s):
International Workshop
◽
Cyber Crime
Download Full-text
Table of contents
2014 IEEE Security and Privacy Workshops
◽
10.1109/spw.2014.4
◽
2014
◽
Download Full-text
P2U: A Privacy Policy Specification Language for Secondary Data Sharing and Usage
2014 IEEE Security and Privacy Workshops
◽
10.1109/spw.2014.12
◽
2014
◽
Cited By ~ 16
Author(s):
Johnson Iyilade
◽
Julita Vassileva
Keyword(s):
Data Sharing
◽
Secondary Data
◽
Specification Language
◽
Privacy Policy
◽
Policy Specification
Download Full-text
LEGO(TM) Bricks for Reactive Programming
2014 IEEE Security and Privacy Workshops
◽
10.1109/spw.2014.30
◽
2014
◽
Author(s):
Dennis Volpano
Keyword(s):
Reactive Programming
Download Full-text
Author index
2014 IEEE Security and Privacy Workshops
◽
10.1109/spw.2014.47
◽
2014
◽
Download Full-text
Ethics in Data Sharing: Developing a Model for Best Practice
2014 IEEE Security and Privacy Workshops
◽
10.1109/spw.2014.43
◽
2014
◽
Cited By ~ 2
Author(s):
Sven Dietrich
◽
Jeroen Van Der Ham
◽
Aiko Pras
◽
Roland Van Rijswijk Deij
◽
Darren Shou
◽
...
Keyword(s):
Data Sharing
◽
Best Practice
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close