Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/skm/skm2021.bht:"
@proceedings{DBLP:conf/skm/2021, editor = {Ram Krishnan and H. Raghav Rao and Sanjay K. Sahay and Sagar Samtani and Ziming Zhao}, title = {Secure Knowledge Management In The Artificial Intelligence Era - 9th International Conference, {SKM} 2021, San Antonio, TX, USA, October 8-9, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1549}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97532-6}, doi = {10.1007/978-3-030-97532-6}, isbn = {978-3-030-97531-9}, timestamp = {Thu, 03 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/skm/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/skm/0002WR21, author = {Yuan Li and Jingguo Wang and H. Raghav Rao}, title = {Metacognitive Skills in Phishing Email Detection: {A} Study of Calibration and Resolution}, booktitle = {{SKM}}, pages = {37--47}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-97532-6\_3}, doi = {10.1007/978-3-030-97532-6\_3}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/skm/0002WR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/skm/DanielMA21, author = {Clinton Daniel and Matthew Mullarkey and Manish Agrawal}, title = {{RQ} Labs: {A} Cybersecurity Workforce Talent Program Design}, booktitle = {{SKM}}, pages = {171--185}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-97532-6\_10}, doi = {10.1007/978-3-030-97532-6\_10}, timestamp = {Sat, 18 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/skm/DanielMA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/skm/IyerSR21, author = {Vivek Iyer and Lalit Mohan Sanagavarapu and Y. Raghu Reddy}, title = {A Framework for Syntactic and Semantic Quality Evaluation of Ontologies}, booktitle = {{SKM}}, pages = {73--93}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-97532-6\_5}, doi = {10.1007/978-3-030-97532-6\_5}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/skm/IyerSR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/skm/KlepetkoK21, author = {Randy Klepetko and Ram Krishnan}, title = {Analyzing {CNN} Models' Sensitivity to the Ordering of Non-natural Data}, booktitle = {{SKM}}, pages = {130--148}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-97532-6\_8}, doi = {10.1007/978-3-030-97532-6\_8}, timestamp = {Thu, 03 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/skm/KlepetkoK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/skm/LawalK21, author = {Sherifdeen Lawal and Ram Krishnan}, title = {Attribute-Based Access Control Policy Review in Permissioned Blockchain}, booktitle = {{SKM}}, pages = {97--109}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-97532-6\_6}, doi = {10.1007/978-3-030-97532-6\_6}, timestamp = {Thu, 03 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/skm/LawalK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/skm/NosenkoCC21, author = {Alex Nosenko and Yuan Cheng and Haiquan Chen}, title = {Learning Password Modification Patterns with Recurrent Neural Networks}, booktitle = {{SKM}}, pages = {110--129}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-97532-6\_7}, doi = {10.1007/978-3-030-97532-6\_7}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/skm/NosenkoCC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/skm/RathoreBSS21, author = {Hemant Rathore and Taeeb Bandwala and Sanjay K. Sahay and Mohit Sewak}, title = {Adversarial Robustness of Image Based Android Malware Detection Models}, booktitle = {{SKM}}, pages = {3--22}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-97532-6\_1}, doi = {10.1007/978-3-030-97532-6\_1}, timestamp = {Thu, 03 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/skm/RathoreBSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/skm/ReuterL0K21, author = {Lenhard Reuter and Maria Leitner and Paul Smith and Manuel Koschuch}, title = {Dealing with Complexity for Immune-Inspired Anomaly Detection in Cyber Physical Systems}, booktitle = {{SKM}}, pages = {151--170}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-97532-6\_9}, doi = {10.1007/978-3-030-97532-6\_9}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/skm/ReuterL0K21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/skm/Rubio-MedranoHC21, author = {Carlos E. Rubio{-}Medrano and Matthew Hill and Luis M. Claramunt and Jaejong Baek and Gail{-}Joon Ahn}, title = {DyPolDroid: Protecting Users and Organizations from Permission-Abuse Attacks in Android}, booktitle = {{SKM}}, pages = {23--36}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-97532-6\_2}, doi = {10.1007/978-3-030-97532-6\_2}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/skm/Rubio-MedranoHC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/skm/SewakSR21, author = {Mohit Sewak and Sanjay K. Sahay and Hemant Rathore}, title = {Deep Reinforcement Learning for Cybersecurity Threat Detection and Protection: {A} Review}, booktitle = {{SKM}}, pages = {51--72}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-97532-6\_4}, doi = {10.1007/978-3-030-97532-6\_4}, timestamp = {Thu, 03 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/skm/SewakSR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/skm/ZhouTLZ21, author = {Lina Zhou and Jie Tao and Evan Lai and Dongsong Zhang}, title = {Do Fake News Between Different Languages Talk Alike? {A} Case Study of {COVID-19} Related Fake News}, booktitle = {{SKM}}, pages = {186--199}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-97532-6\_11}, doi = {10.1007/978-3-030-97532-6\_11}, timestamp = {Thu, 03 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/skm/ZhouTLZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.