default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 102 matches
- 2023
- Tanwir Ahmad, Dragos Truscan:
Efficient Early Anomaly Detection of Network Security Attacks Using Deep Learning. CSR 2023: 154-159 - Khatereh Ahmadi, Reza Javidan:
DDoS Attack Detection in a Real Urban IoT Environment Using Federated Deep Learning. CSR 2023: 117-122 - Callum Aitchison, Basel Halak, Alexander Serb, Themis Prodromakis:
A PUF Based on the Non-Linearity of Memristors. CSR 2023: 558-563 - Khaled Alotaibi, Rafat Rob, Dana Nour, Doaa Zamzami:
Detecting Subspace Malicious Vectors Attack Against Smart Grid Using Sequence-Alignment Method. CSR 2023: 367-372 - Alba Amato, Dario Branco, Salvatore Venticinque, Giuseppina Renda, Sabrina Mataluna:
Metadata and Semantic Annotation of Digital Heritage Assets: a case study. CSR 2023: 516-522 - Jan von der Assen, Alberto Huertas Celdrán, Nicolas Huber, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller:
Moving Target Defense Strategy Selection against Malware in Resource-Constrained Devices. CSR 2023: 123-129 - Nahid Ferdous Aurna, Md Delwar Hossain, Yuzo Taenaka, Youki Kadobayashi:
Federated Learning-Based Credit Card Fraud Detection: Performance Analysis with Sampling Methods and Deep Learning Algorithms. CSR 2023: 180-186 - Nikos Avgerinos, Salvatore D'Antonio, Irene Kamara, Christos Kotselidis, Ioannis Lazarou, Teresa Mannarino, Georgios Meditskos, Konstantina Papachristopoulou, Angelos Papoutsis, Paolo Roccetti, Martin Zuber:
A Practical and Scalable Privacy-preserving Framework. CSR 2023: 598-603 - Alessandro Bellini, Emanuele Bellini, Massimo Bertini, Doaa Almhaithawi, Stefano Cuomo:
Multi-party Computation for Privacy and Security in Machine Learning: a Practical Review. CSR 2023: 174-179 - Emanuele Bellini, Ernesto Damiani, Stefano Marrone:
Blockchain-Based Trustworthy O2O Interaction in the Next 6G Ecosystem. CSR 2023: 92-98 - Valeria Bonagura, Chiara Foglietta, Stefano Panzieri, Federica Pascucci:
Enhancing Industrial Cyber-Physical Systems Security with Smart Probing Approach. CSR 2023: 387-393 - Valeria Bonagura, Stefano Panzieri, Federica Pascucci, Leonardo Badia:
A Game of Age of Incorrect Information Against an Adversary Injecting False Data. CSR 2023: 347-352 - Silvia Bonomi, Marco Cuoci, Simone Lenti:
A Semi-automatic Approach for Enhancing the Quality of Automatically Generated Inventories. CSR 2023: 307-314 - Myria Bouhaddi, Kamel Adi:
Mitigating Membership Inference Attacks in Machine Learning as a Service. CSR 2023: 262-268 - Simone Bussa, Riccardo Sisto, Fulvio Valenza:
Formal Verification of a V2X Privacy Preserving Scheme Using Proverif. CSR 2023: 341-346 - Lelio Campanile, Maria Stella de Biase, Roberta De Fazio, Michele Di Giovanni, Fiammetta Marulli, Laura Verde:
Merging Model-Based and Data-Driven Approaches for Resilient Systems Digital Twins Design. CSR 2023: 301-306 - Jorge Casajús-Setién, Concha Bielza, Pedro Larrañaga:
Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models. CSR 2023: 72-77 - Roberto Caviglia, Giovanni Battista Gaggero, Nicola Vincis, Omar Morando, Alessio Aceti, Mario Marchese:
SPAT: A Testbed for Automotive Cybersecurity Training. CSR 2023: 381-386 - Massinissa Chelghoum, Gueltoum Bendiab, Mohamed Benmohammed, Stavros Shiaeles, Emanuele Bellini:
BTV2P: Blockchain-based Trust Model for Secure Vehicles and Pedestrians Networks. CSR 2023: 148-153 - Key-whan Chung, Phuong Cao, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer:
stealthML: Data-driven Malware for Stealthy Data Exfiltration. CSR 2023: 16-21 - Luigi Coppolino, Salvatore D'Antonio, Federica Uccello, Anastasios Lyratzis, Constantinos Bakalis, Souzana Touloumtzi, Ioannis Papoutsis:
Detection of Radio Frequency Interference in Satellite Ground Segments. CSR 2023: 648-653 - Waldemar Cruz, Laurent D. Michel, Benjamin Drozdenko, Steven Roodbeen:
ML and Network Traces to M.A.R.S. CSR 2023: 240-245 - Salvatore D'Antonio, Giannis Lazarou, Giovanni Mazzeo, Oana Stan, Martin Zuber, Ioannis Tsavdaridis:
The Alliance of HE and TEE to Enhance their Performance and Security. CSR 2023: 641-647 - Alexander Khalil Daou, Fudong Li, Stavros Shiaeles:
A Cost-Efficient Threat Intelligence Platform Powered by Crowdsourced OSINT. CSR 2023: 48-53 - Ortal Dayan, Lior Wolf, Fang Wang, Yaniv Harel:
Optimizing AI for Mobile Malware Detection by Self-Built-Dataset GAN Oversampling and LGBM. CSR 2023: 60-65 - Judith Sáinz-Pardo Díaz, Álvaro López García:
Comparison of machine learning models applied on anonymized data with different techniques. CSR 2023: 618-623 - Evangelos Dragonas, Costas Lambrinoudakis:
IoT Forensics: Analysis of Ajax Systems' mobile app for the end user. CSR 2023: 446-451 - Evangelos Dragonas, Costas Lambrinoudakis, Michael Kotsis:
IoT Forensics: Investigating the Mobile App of Dahua Technology. CSR 2023: 452-457 - Ekzhin Ear, Jose L. C. Remy, Shouhuai Xu:
Towards Automated Cyber Range Design: Characterizing and Matching Demands to Supplies. CSR 2023: 329-334 - Mohamed Faisal Elrawy, Lenos Hadjidemetriou, Christos Laoudias, Maria K. Michael:
Modelling and Analysing Security Threats Targeting Protective Relay Operations in Digital Substations. CSR 2023: 523-529
skipping 72 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-03 23:20 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint