default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 488 matches
- 2024
- Evgeniy K. Alekseev, Sergey Kyazhin, Stanislav Smyshlyaev:
The threat of forcing the identical roles for authenticated key establishment protocols. J. Comput. Virol. Hacking Tech. 20(2): 225-230 (2024) - Hassan Jameel Asghar, Benjamin Zi Hao Zhao, Muhammad Ikram, Giang Linh Duc Nguyen, Dali Kaafar, Sean Lamont, Daniel Coscia:
Use of cryptography in malware obfuscation. J. Comput. Virol. Hacking Tech. 20(1): 135-152 (2024) - Alexander V. Babash:
Attacks on the simple substitution cipher with the calculation of their reliability. J. Comput. Virol. Hacking Tech. 20(2): 213-218 (2024) - Jesper Bergman, Oliver Popov:
Recognition of tor malware and onion services. J. Comput. Virol. Hacking Tech. 20(2): 261-275 (2024) - Eldar Boltachev:
Correction to: Potential cyber threats of adversarial attacks on autonomous driving models. J. Comput. Virol. Hacking Tech. 20(2): 315 (2024) - Rosangela Casolare, Stefano Fagnano, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone:
Picker Blinder: a framework for automatic injection of malicious inter-app communication. J. Comput. Virol. Hacking Tech. 20(2): 331-346 (2024) - Christian Catalano, Franco Tommasi:
Persistent MobileApp-in-the-Middle (MAitM) attack. J. Comput. Virol. Hacking Tech. 20(1): 27-39 (2024) - Giovanni Ciaramella, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone:
Explainable Ransomware Detection with Deep Learning Techniques. J. Comput. Virol. Hacking Tech. 20(2): 317-330 (2024) - Rohit Dube:
Faulty use of the CIC-IDS 2017 dataset in information security research. J. Comput. Virol. Hacking Tech. 20(1): 203-211 (2024) - François Dupont:
A new Shamir's three pass random matrix ciphering mechanism. J. Comput. Virol. Hacking Tech. 20(2): 237-248 (2024) - Guillaume Dupont, Daniel Ricardo dos Santos, Stanislav Dashevskyi, Sangavi Vijayakumar, Sashaank P. Murali, Elisa Costante, Jerry den Hartog, Sandro Etalle:
Demonstration of new attacks on three healthcare network protocols in a lab environment. J. Comput. Virol. Hacking Tech. 20(2): 301-314 (2024) - Anna Epishkina, Sergey Zapechnikov, Anna Belozubova:
Historical notes on Russian cryptography. J. Comput. Virol. Hacking Tech. 20(2): 277-293 (2024) - Hafiz Usama Ishtiaq, Areeb Ahmed Bhutta, Adnan Noor Mian:
DHCP DoS and starvation attacks on SDN controllers and their mitigation. J. Comput. Virol. Hacking Tech. 20(1): 15-25 (2024) - Omid Kargarnovin, Amir Mahdi Sadeghzadeh, Rasool Jalili:
Mal2GCN: a robust malware detection approach using deep graph convolutional networks with non-negative weights. J. Comput. Virol. Hacking Tech. 20(1): 95-111 (2024) - Akram Khalesi, Zahra Ahmadian:
Provably minimum data complexity integral distinguisher based on conventional division property. J. Comput. Virol. Hacking Tech. 20(1): 113-125 (2024) - Anatoly Konkin, Sergey Zapechnikov:
Systematization of knowledge: privacy methods and zero knowledge proofs in corporate blockchains. J. Comput. Virol. Hacking Tech. 20(2): 219-224 (2024) - Alexey Kurochkin, Denis Fomin:
MGM beyond the birthday bound. J. Comput. Virol. Hacking Tech. 20(2): 231-235 (2024) - Vrinda Malhotra, Katerina Potika, Mark Stamp:
A comparison of graph neural networks for malware classification. J. Comput. Virol. Hacking Tech. 20(1): 53-69 (2024) - Hashida Haidros Rahima Manzil, S. Manohar Naik:
Android ransomware detection using a novel hamming distance based feature selection. J. Comput. Virol. Hacking Tech. 20(1): 71-93 (2024) - Grigory B. Marshalko, Svetlana Koreshkova:
Protection against adversarial attacks with randomization of recognition algorithm. J. Comput. Virol. Hacking Tech. 20(1): 127-133 (2024) - Ritik Mehta, Olha Jurecková, Mark Stamp:
A natural language processing approach to Malware classification. J. Comput. Virol. Hacking Tech. 20(1): 173-184 (2024) - Mila Dalla Preda, Michele Ianni:
Exploiting number theory for dynamic software watermarking. J. Comput. Virol. Hacking Tech. 20(1): 41-51 (2024) - Sergey Prokopev:
Cryptographic protocol conformance testing based on domain-specific state machine. J. Comput. Virol. Hacking Tech. 20(2): 249-259 (2024) - Mohamed Rasslan, Mahmoud M. Nasreldin, Doaa Abdelrahman, Aya Elshobaky, Heba Aslan:
Networking and cryptography library with a non-repudiation flavor for blockchain. J. Comput. Virol. Hacking Tech. 20(1): 1-14 (2024) - Santosh Kumar Ravva, K. L. N. C. Prakash, Sureddi R. M. Krishna:
Partial key exposure attack on RSA using some private key blocks. J. Comput. Virol. Hacking Tech. 20(1): 185-193 (2024) - Santosh Kumar Ravva, K. L. N. C. Prakash, Sureddi R. M. Krishna:
Cryptanalysis of RSA with composed decryption exponent with few most significant bits of one of the primes. J. Comput. Virol. Hacking Tech. 20(1): 195-202 (2024) - Nguyen Minh Tu, Viet Hung Nguyen, Nathan Shone:
Using deep graph learning to improve dynamic analysis-based malware detection in PE files. J. Comput. Virol. Hacking Tech. 20(1): 153-172 (2024) - Dmitry Zakharov, M. Pudovkina:
Full round impossible differentials for Feistel ciphers. J. Comput. Virol. Hacking Tech. 20(2): 295-300 (2024) - 2023
- Manar Aldaoud, Dawood Al-Abri, Ahmed Al-Maashri, Firdous Kausar:
Detecting and mitigating DHCP attacks in OpenFlow-based SDN networks: a comprehensive approach. J. Comput. Virol. Hacking Tech. 19(4): 597-614 (2023) - Saeed Azizpour, MohammadReza Majma:
NADA: new architecture for detecting DoS and DDoS attacks in fog computing. J. Comput. Virol. Hacking Tech. 19(1): 51-64 (2023)
skipping 458 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-18 14:38 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint