Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 85 matches
- 2010
- Nabil R. Adam:
Cyber physical systems R&D at DHS Science and Technology Directorate. CSIIRW 2010: 4 - Anis Ben Aissa, Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili:
Modeling stakeholder/value dependency through mean failure cost. CSIIRW 2010: 55 - Anis Ben Aissa, Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili:
Software requirements for a system to compute mean failure cost. CSIIRW 2010: 73 - Susan Alexander:
Change the game or win the war: the metaphor matters. CSIIRW 2010: 1 - Josef D. Allen, Xiuwen Liu, Liam M. Mayron, Washington Mio:
On generalization of performance of classifiers for steganalysis. CSIIRW 2010: 69 - Scott Augenbaum:
A break down in trust, the emerging threat of cyber crime in connection with our dependence on web 2.0 technologies. CSIIRW 2010: 9 - Robert Baird, Rose F. Gamble:
Reasoning about policy noncompliance. CSIIRW 2010: 63 - Michael E. Bartell:
CIO/CTO perspectives panel. CSIIRW 2010: 16 - Clive Blackwell:
A security ontology for incident analysis. CSIIRW 2010: 46 - Kenton Born, David Gustafson:
NgViz: detecting DNS tunnels through n-gram visualization and quantitative analysis. CSIIRW 2010: 47 - Stan L. Bowie, Brenda S. Lenard, Craig A. Shue:
Towards an empirical measure for assessing public attitudes regarding government cybercrime countermeasures. CSIIRW 2010: 31 - Richard R. Brooks, Juan Deng:
Lies and the lying liars that tell them: a fair and balanced look at TLS. CSIIRW 2010: 59 - Srinivasa Anuradha Bulusu, Benjamin Arazi, Itamar Arel, Andrew S. Davis, George Bitar:
A data security protocol for the Trusted Truck® system. CSIIRW 2010: 37 - Dawn M. Cappelli:
Risk mitigation strategies: lessons learned from actual insider attacks. CSIIRW 2010: 13 - Timothy Casey, Patrick Koeberl, Claire Vishik:
Threat agents: a necessary component of threat analysis. CSIIRW 2010: 56 - Varun Chandola, Shyam Boriah, Vipin Kumar:
A reference based analysis framework for analyzing system call traces. CSIIRW 2010: 33 - Ryan Craven, Christopher Abbott, Harikrishnan Bhanu, Juan Deng, Richard R. Brooks:
Orwell was an optimist. CSIIRW 2010: 57 - Timothy Daly, Luanne Burns:
Concordia: a Google for malware. CSIIRW 2010: 30 - Dipankar Dasgupta, Harkeerat Bedi, Deon Garrett:
A conceptual model of self-monitoring multi-core systems. CSIIRW 2010: 83 - Swetha Dasireddy, Wade Gasior, Xiaohui Cui, Li Yang:
Alerts visualization and clustering in network-based intrusion detection. CSIIRW 2010: 41 - Alessandro Distefano, Antonio Grillo, Alessandro Lentini, Giuseppe F. Italiano:
SecureMyDroid: enforcing security in the mobile devices lifecycle. CSIIRW 2010: 27 - Ramy Eltarras, Mohamed Eltoweissy, Stephan Olariu, Ing-Ray Chen:
Towards trustworthy shared networked sensor-actuator systems. CSIIRW 2010: 43 - Joseph R. Erskine, Gilbert L. Peterson, Barry E. Mullins, Michael R. Grimaila:
Developing cyberspace data understanding: using CRISP-DM for host-based IDS feature mining. CSIIRW 2010: 74 - Kevin D. Fairbanks, Christopher P. Lee, Henry L. Owen III:
Forensic implications of Ext4. CSIIRW 2010: 22 - Benjamin Gittins:
Overview of SLL's proposal in response to NIST's call for new global IdM/CKM designs without public keys. CSIIRW 2010: 60 - Mahadevan Gomathisankaran, Gayatri Mehta, Kamesh Namuduri:
Power, performance and security optimized hardware design for H.264. CSIIRW 2010: 62 - Michael R. Grimaila:
Mission assurance: challenges and opportunities. CSIIRW 2010: 14 - Stephen Groat, Matthew Dunlop, Randy C. Marchany, Joseph G. Tront:
The privacy implications of stateless IPv6 addressing. CSIIRW 2010: 52 - Ezequiel Gutesman, Ariel Waissbein:
The impact of predicting attacker tools in security risk assessments. CSIIRW 2010: 75 - Adam Hahn, Benjamin Kregel, Manimaran Govindarasu, Justin Fitzpatrick, Rafi Adnan, Siddharth Sridhar, Michael Higdon:
Development of the PowerCyber SCADA security testbed. CSIIRW 2010: 21
skipping 55 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-04 08:45 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint