![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
15th ISCISC 2018: Tehran, Iran
- 15th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, ISCISC 2018, Tehran, Iran, August 28-29, 2018. IEEE 2018, ISBN 978-1-5386-7582-3
- Bardia Azizian, Shahrokh Ghaemmaghami:
Tampering Detection and Restoration of Compressed Video. 1-5 - Hassan Khodaiemehr
, Daniel Panario
, Mohammad-Reza Sadeghi
:
Modular Construction a Lattices from Cyclotomic Fields and their Applications in Information Security. 1-8 - Atieh Bakhshandeh, Zahra Eskandari:
An efficient user identification approach based on Netflow analysis. 1-5 - Atefeh Zareh
:
BotcoinTrap: Detection of Bitcoin Miner Botnet Using Host Based Approach. 1-6 - Masoumeh Zeinali, Mohammad Ali Hadavi:
Threat Extraction Method Based on UML Software Description. 1-8 - Zohreh Bohluli, Hamid Reza Shahriari
:
Detecting Privacy Leaks in Android Apps using Inter-Component Information Flow Control Analysis. 1-6 - Zahra Esmaeilbeig, Shahrokh Ghaemmaghami:
Compressed Video Watermarking for Authentication and Reconstruction of the Audio Part. 1-6 - Mitra Alidoosti, Alireza Nowroozi
:
BLProM: Business-Layer Process Miner of the Web Application. 1-6 - SeyedMohamad MirhoseiniNejad
, Ali Rahmanpour, Seyed Mohammad Razavizadeh
:
Phase Jamming Attack: A Practical Attack on Physical layer-Based Key Derivation. 1-4 - Farnood Faghihi
, Mahdi Abadi, Asghar Tajoddin:
SMSBotHunter: A Novel Anomaly Detection Technique to Detect SMS Botnets. 1-6 - Hassan Khodaiemehr
, Taraneh Eghlidos:
A Practical and Secure Lattice-based Scheme for Full-Duplex Gaussian One-Way Relay Channels. 1-8 - Saeid Salehi, Hamid Reza Shahriari
, Mohammad Mehdi Ahmadian, Ladan Tazik:
A Novel Approach for Detecting DGA-based Ransomwares. 1-7 - Hossein As'adi, Alireza Keshavarz-Haddad, Ali Jamshidi:
A New Statistical Method for Wormhole Attack Detection in MANETs. 1-6 - Ahmad Jalali, Mohammad Ali Hadavi:
Software Security Analysis Based on the Principle of Defense-in-Depth. 1-6 - Nasrollah Pakniat, Behnam Abasi Vanda:
Cryptanalysis and Improvement of a Pairing-Free Certificateless Signature Scheme. 1-5
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.