Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 2,090 matches
- 2024
- Samuel Aiello, Bhaskar Prasad Rimal:
Secure Access Service Edge Convergence: Recent Progress and Open Issues. IEEE Secur. Priv. 22(2): 8-16 (2024) - Matilda Backendal, Miro Haller, Kenny Paterson:
End-to-End Encrypted Cloud Storage. IEEE Secur. Priv. 22(2): 69-74 (2024) - Michele Bezzi:
Large Language Models and Security. IEEE Secur. Priv. 22(2): 60-68 (2024) - Eric Bodden, Jens Pottebaum, Markus Fockel, Iris Gräßler:
Evaluating Security Through Isolation and Defense in Depth. IEEE Secur. Priv. 22(1): 69-72 (2024) - Karoline Brehm, Yan Shvartzshnaider:
Understanding Privacy in Virtual Reality Classrooms: A Contextual Integrity Perspective. IEEE Secur. Priv. 22(1): 53-62 (2024) - Derin Cayir, Abbas Acar, Riccardo Lazzeretti, Marco Angelini, Mauro Conti, A. Selcuk Uluagac:
Augmenting Security and Privacy in the Virtual Realm: An Analysis of Extended Reality Devices. IEEE Secur. Priv. 22(1): 10-23 (2024) - Matthew Corbett, Brendan David-John, Jiacheng Shang, Y. Charlie Hu, Bo Ji:
Securing Bystander Privacy in Mixed Reality While Protecting the User Experience. IEEE Secur. Priv. 22(1): 33-42 (2024) - Vaughn Hamilton, Gabriel Kaptchuk, Allison McDonald, Elissa M. Redmiles:
Safer Digital Intimacy for Sex Workers and Beyond: A Technical Research Agenda. IEEE Secur. Priv. 22(2): 17-28 (2024) - Alice Hutchings:
The Amplification of Online Deviancy Through the Language of Violent Crime, War, and Aggression. IEEE Secur. Priv. 22(2): 81-84 (2024) - Gregory Lyon:
Trust in Data Security Protocols and Knowledge of Privacy and Security Technology. IEEE Secur. Priv. 22(2): 29-37 (2024) - Fabio Massacci:
The Holy Grail of Vulnerability Predictions. IEEE Secur. Priv. 22(1): 4-6 (2024) - Winnie Mbaka, Katja Tuma:
Role of Gender in the Evaluation of Security Decisions. IEEE Secur. Priv. 22(2): 38-48 (2024) - Abraham H. Mhaidli, Shwetha Rajaram, Selin Fidan, Gina Herakovic, Florian Schaub:
Shockvertising, Malware, and a Lack of Accountability: Exploring Consumer Risks of Virtual Reality Advertisements and Marketing Experiences. IEEE Secur. Priv. 22(1): 43-52 (2024) - Vivek Nair, Louis B. Rosenberg, James F. O'Brien, Dawn Song:
Truth in Motion: The Unprecedented Risks and Opportunities of Extended Reality Motion Data. IEEE Secur. Priv. 22(1): 24-32 (2024) - Helen Nissenbaum:
AI Safety: A Poisoned Chalice? IEEE Secur. Priv. 22(2): 94-96 (2024) - Joseph O'Hagan, Jan Gugenheimer, Florian Mathis, Jolie Bonner, Richard Jones, Mark McGill:
A Viewpoint on the Societal Impact of Everyday Augmented Reality and the Need for Perceptual Human Rights. IEEE Secur. Priv. 22(1): 64-68 (2024) - Frank Pallas, Katharina Koerner, Isabel Barberá, Jaap-Henk Hoepman, Meiko Jensen, Nandita Rao Narla, Nikita Samarin, Max-Robert Ulbricht, Isabel Wagner, Kim Wuyts, Christian Zimmermann:
Privacy Engineering From Principles to Practice: A Roadmap. IEEE Secur. Priv. 22(2): 86-92 (2024) - Frank Piessens, Paul C. van Oorschot:
Side-Channel Attacks: A Short Tour. IEEE Secur. Priv. 22(2): 75-80 (2024) - Elissa M. Redmiles:
Friction Matters: Balancing the Pursuit of Perfect Protection With Target Hardening. IEEE Secur. Priv. 22(1): 76-75 (2024) - Franziska Roesner, Tadayoshi Kohno:
Security and Privacy in the Metaverse. IEEE Secur. Priv. 22(1): 7-9 (2024) - Antonino Sabetta, Serena Elisa Ponta, Rocío Cabrera Lozoya, Michele Bezzi, Tommaso Sacchetti, Matteo Greco, Gergö Balogh, Péter Hegedüs, Rudolf Ferenc, Ranindya Paramitha, Ivan Pashchenko, Aurora Papotti, Ákos Milánkovich, Fabio Massacci:
Known Vulnerabilities of Open Source Projects: Where Are the Fixes? IEEE Secur. Priv. 22(2): 49-59 (2024) - Laurie A. Williams:
Narrowing the Software Supply Chain Attack Vectors: The SSDF Is Wonderful but not Enough. IEEE Secur. Priv. 22(2): 4-7 (2024) - 2023
- Konstantinos Adamos, Fabio Di Franco, Athanasios Vasileios Grammatopoulos:
An Analysis of European Union Cybersecurity Higher Education Programs Through the Crowd-Sourced Database CyberHEAD. IEEE Secur. Priv. 21(5): 85-94 (2023) - Daniel Arp, Erwin Quiring, Feargus Pendlebury, Alexander Warnecke, Fabio Pierazzi, Christian Wressnegger, Lorenzo Cavallaro, Konrad Rieck:
Lessons Learned on Machine Learning for Computer Security. IEEE Secur. Priv. 21(5): 72-77 (2023) - Adeen Ayub, Wooyeon Jo, Syed Ali Qasim, Irfan Ahmed:
How Are Industrial Control Systems Insecure by Design? A Deeper Insight Into Real-World Programmable Logic Controllers. IEEE Secur. Priv. 21(4): 10-19 (2023) - Musard Balliu, Benoit Baudry, Sofia Bobadilla, Mathias Ekstedt, Martin Monperrus, Javier Ron Arteaga, Aman Sharma, Gabriel Skoglund, César Soto-Valero, Martin Wittlinger:
Challenges of Producing Software Bill of Materials for Java. IEEE Secur. Priv. 21(6): 12-23 (2023) - Steven M. Bellovin:
Is Cybersecurity Liability a Liability? IEEE Secur. Priv. 21(4): 99-100 (2023) - Terry Benzel:
Security and Privacy Research Artifacts: Are We Making Progress? IEEE Secur. Priv. 21(1): 4-6 (2023) - Terry Benzel, Hilarie Orman:
IEEE Security and Privacy Symposium in the Year 2003. IEEE Secur. Priv. 21(2): 43-47 (2023) - Elisa Bertino:
Privacy in the Era of 5G, IoT, Big Data, and Machine Learning. IEEE Secur. Priv. 21(1): 91-92 (2023)
skipping 2,060 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-04 18:36 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint