![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Computer Science Review, Volume 33
Volume 33, August 2019
- Rakesh Kumar
, Rinkaj Goyal:
On cloud security requirements, threats, vulnerabilities and countermeasures: A survey. 1-48 - Irum Rauf
, Elena Troubitsyna, Ivan Porres:
A systematic mapping study of API usability evaluation methods. 49-68 - Sunil Chaudhary
, Tiina Schafeitel-Tähtinen
, Marko Helenius
, Eleni Berki:
Usability, security and trust in password managers: A quest for user-centric properties and features. 69-90 - Massimo Melucci:
A brief survey on probability distribution approximation. 91-97 - Tanwir Ahmad
, Junaid Iqbal
, Adnan Ashraf
, Dragos Truscan
, Ivan Porres:
Model-based testing using UML activity diagrams: A systematic mapping study. 98-112
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.