![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 37 matches
- 2013
- Pieter Burghouwt, Marcel E. M. Spruit, Henk J. Sips:
Detection of Covert Botnet Command and Control Channels by Causal Analysis of Traffic Flows. CSS 2013: 117-131 - Zemin Cai, Yi Wang
, Renfa Li:
An Improved Differential Fault Analysis Attack to AES Using Reduced Searching Space. CSS 2013: 441-449 - Christian Callegari
, Stefano Giordano
, Susanna Mannella, Michele Pagano
:
Design and Implementation of a Testbed for the Security Assessment of MANETs. CSS 2013: 228-242 - Jan-Min Chen:
A Crawler Guard for Quickly Blocking Unauthorized Web Robot. CSS 2013: 1-13 - Shuhong Chen, Guojun Wang, Weijia Jia
:
A Trust Model Using Implicit Call Behavioral Graph for Mobile Cloud Computing. CSS 2013: 387-402 - Shaoyin Cheng, Shengmei Luo, Zifeng Li, Wei Wang, Yan Wu, Fan Jiang:
Static Detection of Dangerous Behaviors in Android Apps. CSS 2013: 363-376 - Youssou Faye, Hervé Guyennet, Ibrahima Niang, Yanbo Shou:
Fast Scalar Multiplication on Elliptic Curve Cryptography in Selected Intervals Suitable for Wireless Sensor Networks. CSS 2013: 171-182 - Chong Fu, Tao Wang, Zhao-yu Meng, Jun-Xin Chen
, Hong-feng Ma:
A Fast Chaos-Based Symmetric Image Cipher with a Novel Bit-Level Permutation Strategy. CSS 2013: 52-66 - Cai Fu, Deliang Xu, Lansheng Han, Jingfang Xu, Zhicun Fang:
Restraining and Characterization of Virus Propagation in Large-Scale Wireless LAN. CSS 2013: 429-440 - Haichang Gao, Wei Jia, Ning Liu, Kaisheng Li:
The Hot-Spots Problem in Windows 8 Graphical Password Scheme. CSS 2013: 349-362 - Baosheng Ge, Wen Tao Zhu:
Preserving User Privacy in the Smart Grid by Hiding Appliance Load Characteristics. CSS 2013: 67-80 - Javier González, Philippe Bonnet:
Towards an Open Framework Leveraging a Trusted Execution Environment. CSS 2013: 458-467 - Nizar Kheir, Xiao Han:
PeerViewer: Behavioral Tracking and Classification of P2P Malware. CSS 2013: 282-298 - Natsuki Kimura, Noriaki Yoshiura:
Construction and Verification of Mobile Ad Hoc Network Protocols. CSS 2013: 198-212 - Robert Koch, Mario Golling, Gabi Dreo Rodosek:
Geolocation and Verification of IP-Addresses with Specific Focus on IPv6. CSS 2013: 151-170 - Cheng-Chi Lee
, Chun-Ta Li
, Chi-Yao Weng, Jian-Jhong Jheng, Xiao-Qian Zhang, Yi-Rui Zhu:
Cryptanalysis and Improvement of an ECC-Based Password Authentication Scheme Using Smart Cards. CSS 2013: 338-348 - Qiang Liu, Jianping Yin, Shui Yu
:
A Bio-inspired Jamming Detection and Restoration for WMNs: In View of Adaptive Immunology. CSS 2013: 243-257 - Ang Mi, Weiping Wang, Shigeng Zhang, Hong Song:
Design of Lightweight Web Page Tamper-Resistant Mechanism for Linux. CSS 2013: 29-39 - Seyed Ali Mirheidari, Sajjad Arshad, Rasool Jalili:
Alert Correlation Algorithms: A Survey and Taxonomy. CSS 2013: 183-197 - Aihua Peng, Lansheng Han, Yanan Yu, Nan Du, Mingquan Li:
Algebra-Based Behavior Identification of Trojan Horse. CSS 2013: 323-337 - Tao Peng, Qin Liu, Guojun Wang:
Privacy Preserving for Location-Based Services Using Location Transformation. CSS 2013: 14-28 - Lin-Bo Qiao, Bo-Feng Zhang, Rui-Yuan Zhao, Jinshu Su:
Online Mining of Attack Models in IDS Alerts from Network Backbone by a Two-Stage Clustering Method. CSS 2013: 104-116 - Layal Samarji, Frédéric Cuppens, Nora Cuppens-Boulahia, Wael Kanoun, Samuel Dubus:
Situation Calculus and Graph Based Defensive Modeling of Simultaneous Attacks. CSS 2013: 132-150 - Ronghua Shi, Ye Kang, Zhaoyuan Zhang:
Quantum Secret Sharing Based on Chinese Remainder Theorem in Hyperchaotic System. CSS 2013: 417-428 - Jingping Song, Zhiliang Zhu, Peter Scully, Chris J. Price:
Selecting Features for Anomaly Intrusion Detection: A Novel Method using Fuzzy C Means and Decision Tree Classification. CSS 2013: 299-307 - Changji Wang, Wentao Li, Yuan Li, Xi-Lei Xu:
A Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Keyword Search Function. CSS 2013: 377-386 - Juan Wang, Yong Wang, Hongxin Hu, Qingxin Sun, He Shi, Longjie Zeng:
Towards a Security-Enhanced Firewall Application for OpenFlow Networks. CSS 2013: 92-103 - Zhenyu Wang, Yanqiu Ye, Ruimin Wang:
An Out-of-the-Box Dynamic Binary Analysis Tool for ARM-Based Linux. CSS 2013: 450-457 - Sheng Wen
, Ping Li, Di Wu, Yang Xiang
, Wanlei Zhou
:
Detecting Stepping Stones by Abnormal Causality Probability. CSS 2013: 308-322 - Kok-Seng Wong
, Myung Ho Kim
:
Secure Re-publication of Dynamic Big Data. CSS 2013: 468-477
skipping 7 more matches
loading more results
failed to load more results, please try again later
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-19 08:27 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint