Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:streams/conf/isips:"
@proceedings{DBLP:conf/isips/2008, editor = {Cecilia S. Gal and Paul B. Kantor and Michael E. Lesk}, title = {Protecting Persons While Protecting the People, Second Annual Workshop on Information Privacy and National Security, {ISIPS} 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5661}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10233-2}, doi = {10.1007/978-3-642-10233-2}, isbn = {978-3-642-10232-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isips/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isips/Baginski08, author = {Maureen Baginski}, editor = {Cecilia S. Gal and Paul B. Kantor and Michael E. Lesk}, title = {Intelligence Policy and the Science of Intelligence}, booktitle = {Protecting Persons While Protecting the People, Second Annual Workshop on Information Privacy and National Security, {ISIPS} 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5661}, pages = {11--19}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-10233-2\_2}, doi = {10.1007/978-3-642-10233-2\_2}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/isips/Baginski08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isips/Crescenzo08, author = {Giovanni Di Crescenzo}, editor = {Cecilia S. Gal and Paul B. Kantor and Michael E. Lesk}, title = {On the Statistical Dependency of Identity Theft on Demographics}, booktitle = {Protecting Persons While Protecting the People, Second Annual Workshop on Information Privacy and National Security, {ISIPS} 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5661}, pages = {122--137}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-10233-2\_12}, doi = {10.1007/978-3-642-10233-2\_12}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isips/Crescenzo08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isips/FienbergNS08, author = {Stephen E. Fienberg and Yuval Nardi and Aleksandra B. Slavkovic}, editor = {Cecilia S. Gal and Paul B. Kantor and Michael E. Lesk}, title = {Valid Statistical Analysis for Logistic Regression with Multiple Sources}, booktitle = {Protecting Persons While Protecting the People, Second Annual Workshop on Information Privacy and National Security, {ISIPS} 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5661}, pages = {82--94}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-10233-2\_8}, doi = {10.1007/978-3-642-10233-2\_8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isips/FienbergNS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isips/GoldbergMKM08, author = {Mark K. Goldberg and Malik Magdon{-}Ismail and Stephen Kelley and Konstantin Mertsalov}, editor = {Cecilia S. Gal and Paul B. Kantor and Michael E. Lesk}, title = {Stable Statistics of the Blogograph}, booktitle = {Protecting Persons While Protecting the People, Second Annual Workshop on Information Privacy and National Security, {ISIPS} 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5661}, pages = {104--114}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-10233-2\_10}, doi = {10.1007/978-3-642-10233-2\_10}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isips/GoldbergMKM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isips/Horning08, author = {James J. Horning}, editor = {Cecilia S. Gal and Paul B. Kantor and Michael E. Lesk}, title = {Words Matter: Privacy, Security, and Related Terms}, booktitle = {Protecting Persons While Protecting the People, Second Annual Workshop on Information Privacy and National Security, {ISIPS} 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5661}, pages = {57--62}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-10233-2\_6}, doi = {10.1007/978-3-642-10233-2\_6}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isips/Horning08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isips/KantorL08, author = {Paul B. Kantor and Michael E. Lesk}, editor = {Cecilia S. Gal and Paul B. Kantor and Michael E. Lesk}, title = {The Challenges of Seeking Security While Respecting Privacy}, booktitle = {Protecting Persons While Protecting the People, Second Annual Workshop on Information Privacy and National Security, {ISIPS} 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5661}, pages = {1--10}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-10233-2\_1}, doi = {10.1007/978-3-642-10233-2\_1}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isips/KantorL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isips/KisilevichESR08, author = {Slava Kisilevich and Yuval Elovici and Bracha Shapira and Lior Rokach}, editor = {Cecilia S. Gal and Paul B. Kantor and Michael E. Lesk}, title = {kACTUS 2: Privacy Preserving in Classification Tasks Using k-Anonymity}, booktitle = {Protecting Persons While Protecting the People, Second Annual Workshop on Information Privacy and National Security, {ISIPS} 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5661}, pages = {63--81}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-10233-2\_7}, doi = {10.1007/978-3-642-10233-2\_7}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isips/KisilevichESR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isips/Landwehr08, author = {Carl E. Landwehr}, editor = {Cecilia S. Gal and Paul B. Kantor and Michael E. Lesk}, title = {Results of Workshops on Privacy Protection Technologies}, booktitle = {Protecting Persons While Protecting the People, Second Annual Workshop on Information Privacy and National Security, {ISIPS} 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5661}, pages = {45--56}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-10233-2\_5}, doi = {10.1007/978-3-642-10233-2\_5}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isips/Landwehr08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isips/Mace08, author = {Robyn R. Mace}, editor = {Cecilia S. Gal and Paul B. Kantor and Michael E. Lesk}, title = {Intelligence, Dataveillance, and Information Privacy}, booktitle = {Protecting Persons While Protecting the People, Second Annual Workshop on Information Privacy and National Security, {ISIPS} 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5661}, pages = {34--44}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-10233-2\_4}, doi = {10.1007/978-3-642-10233-2\_4}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isips/Mace08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isips/McNamara08, author = {Joan T. McNamara}, editor = {Cecilia S. Gal and Paul B. Kantor and Michael E. Lesk}, title = {Suspicious Activity Reporting {(SAR)}}, booktitle = {Protecting Persons While Protecting the People, Second Annual Workshop on Information Privacy and National Security, {ISIPS} 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5661}, pages = {95--103}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-10233-2\_9}, doi = {10.1007/978-3-642-10233-2\_9}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isips/McNamara08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isips/Spafford08, author = {Eugene H. Spafford}, editor = {Cecilia S. Gal and Paul B. Kantor and Michael E. Lesk}, title = {Cyber Security: Assessing Our Vulnerabilities and Developing an Effective Defense}, booktitle = {Protecting Persons While Protecting the People, Second Annual Workshop on Information Privacy and National Security, {ISIPS} 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5661}, pages = {20--33}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-10233-2\_3}, doi = {10.1007/978-3-642-10233-2\_3}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isips/Spafford08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isips/ThomasSBAX08, author = {Roshan K. Thomas and Ravi S. Sandhu and Elisa Bertino and Ismailcem Budak Arpinar and Shouhuai Xu}, editor = {Cecilia S. Gal and Paul B. Kantor and Michael E. Lesk}, title = {Privacy-Preserving Accountable Accuracy Management Systems {(PAAMS)}}, booktitle = {Protecting Persons While Protecting the People, Second Annual Workshop on Information Privacy and National Security, {ISIPS} 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5661}, pages = {115--121}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-10233-2\_11}, doi = {10.1007/978-3-642-10233-2\_11}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isips/ThomasSBAX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.