![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 317 matches
- 2021
- Sabu M. Thampi, Guojun Wang
, Danda B. Rawat, Ryan K. L. Ko, Chun-I Fan:
Security in Computing and Communications - 8th International Symposium, SSCC 2020, Chennai, India, October 14-17, 2020, Revised Selected Papers. Communications in Computer and Information Science 1364, Springer 2021, ISBN 978-981-16-0421-8 [contents] - 2020
- Mohammed Asrar Ahmed
, S. Ramachandram, Khaleel Ur Rahman Khan:
Conjunctive Keyword Forward Secure Ranked Dynamic Searchable Encryption Over Outsourced Encrypted Data. SSCC 2020: 197-212 - Belal Asad, Neetesh Saxena:
On the Feasibility of DoS Attack on Smart Door Lock IoT Network. SSCC 2020: 123-138 - Eranga Bandara, Xueping Liang, Peter Foytik, Sachin Shetty
, Nalin Ranasinghe, Kasun De Zoysa, Wee Keong Ng:
SaaS - Microservices-Based Scalable Smart Contract Architecture. SSCC 2020: 228-243 - Naga Venkata Hrushikesh Chunduri, Ashok Kumar Mohan:
A Forensic Analysis on the Availability of MQTT Network Traffic. SSCC 2020: 262-274 - Paulo Ferreira, Mário Antunes
:
Benchmarking Behavior-Based Intrusion Detection Systems with Bio-inspired Algorithms. SSCC 2020: 152-164 - Jheng-Jia Huang, Chun-I Fan, Yu-Chen Hsu, Arijit Karati
:
A Fast Authentication Scheme for Cross-Network-Slicing Based on Multiple Operators in 5G Environments. SSCC 2020: 92-106 - Hetong Jiang
, Taejun Choi, Ryan K. L. Ko:
Pandora: A Cyber Range Environment for the Safe Testing and Deployment of Autonomous Cyber Attack Tools. SSCC 2020: 1-20 - Teenu S. John, Tony Thomas
:
Evading Static and Dynamic Android Malware Detection Mechanisms. SSCC 2020: 33-48 - Angeliki Kalapodi, Nicolas Sklavos
:
The Concerns of Personal Data Privacy, on Calling and Messaging, Networking Applications. SSCC 2020: 275-289 - Zbigniew Kotulski
, Wojciech Niewolski
, Tomasz Wojciech Nowak
, Mariusz Sepczuk
:
New Security Architecture of Access Control in 5G MEC. SSCC 2020: 77-91 - Chinmay D. Kuchinad, N. Chiranjeevi, Kartik Vishnu Hegde, Shikha Tripathi:
Audio Steganography Using Multi LSB and IGS Techniques. SSCC 2020: 252-261 - N. P. Arun Kumar, Renganathan Laxmanan, S. Ram Kumar, Vobbilisetty Srinidh, R. Ramanathan
:
Performance Study of Multi-target Tracking Using Kalman Filter and Hungarian Algorithm. SSCC 2020: 213-227 - Rinoy Macwan, Sankha Das, Manik Lal Das:
GIDS: Anomaly Detection Using Generative Adversarial Networks. SSCC 2020: 244-251 - Houssem Mansouri, Al-Sakib Khan Pathan
:
A Communication-Induced Checkpointing Algorithm for Consistent-Transaction in Distributed Database Systems. SSCC 2020: 21-32 - Seema Nambiar, Nandakrishna, Chirag Tubakad, Adithya Kiran, Subramaniam Kalambur:
Multilevel Secure Container Deployment Framework in Edge Computing. SSCC 2020: 49-61 - Ilia Odeski, Michael Segal:
Anomaly Detection in CAN-BUS Using Pattern Matching Algorithm. SSCC 2020: 180-196 - Felix O. Olowononi, Danda B. Rawat
, Chunmei Liu:
Trust-Based Adversarial Resiliency in Vehicular Cyber Physical Systems Using Reinforcement Learning. SSCC 2020: 139-151 - Taiguo Qu, Wenjun Jiang, Dong Liu, Guojun Wang:
Deep Hierarchical App Recommendation with Dynamic Behaviors. SSCC 2020: 62-76 - Vangara Saiprudhvi
, R. Ramanathan
:
Analysis of Orthogonal Time Frequency Space Transceiver in Baseband Environment. SSCC 2020: 290-303 - Betty Saridou
, Gueltoum Bendiab, Stavros N. Shiaeles
, Basil K. Papadopoulos:
Thermal Management in Large Data Centres: Security Threats and Mitigation. SSCC 2020: 165-179 - Chintala Yehoshuva, R. Raja Adhithan, N. Nalla Anandakumar:
A Survey of Security Attacks on Silicon Based Weak PUF Architectures. SSCC 2020: 107-122 - Sabu M. Thampi, Gregorio Martínez Pérez, Ryan K. L. Ko, Danda B. Rawat:
Security in Computing and Communications - 7th International Symposium, SSCC 2019, Trivandrum, India, December 18-21, 2019, Revised Selected Papers. Communications in Computer and Information Science 1208, Springer 2020, ISBN 978-981-15-4824-6 [contents] - 2019
- Qasem Abu Al-Haija
, Ibrahim Marouf, Mohammad M. Asad, Pankaj Mishra:
Pipelined Implementation of Millar-Rabin Primality Tester Using Altera FPGA Kit. SSCC 2019: 237-246 - Khaled A. Al-Thelaya
, El-Sayed M. El-Alfy
:
Android Malware Detector Based on Sequences of System Calls and Bidirectional Recurrent Networks. SSCC 2019: 309-321 - Abdulrahman Alruban, Muhammed Abduallah, Gueltoum Bendiab, Stavros Shiaeles
, Marco Palomino
:
Improving Sentiment Analysis of Arabic Tweets. SSCC 2019: 146-158 - Faisal Alsakran, Gueltoum Bendiab, Stavros Shiaeles
, Nicholas Kolokotronis
:
Intrusion Detection Systems for Smart Home IoT Devices: Experimental Comparison Study. SSCC 2019: 87-98 - Anindita Banerjee:
Security of Quantum Cryptography. SSCC 2019: 186-197 - Paola Barra
, Carmen Bisogni, Michele Nappi, David Freire-Obregón
, Modesto Castrillón Santana
:
Gotcha-I: A Multiview Human Videos Dataset. SSCC 2019: 213-224 - A. S. Ajeena Beegom, Gayatri Ashok:
Malware Detection in Android Applications Using Integrated Static Features. SSCC 2019: 1-10
skipping 287 more matches
loading more results
failed to load more results, please try again later
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-25 06:10 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint