Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 30 matches
- 2019
- Matthias Schäfer, Markus Fuchs, Martin Strohmeier, Markus Engel, Marc Liechti, Vincent Lenders:
BlackWidow: Monitoring the Dark Web for Cyber Security Information. CyCon 2019: 1-21 - Robert Koch, Mario Golling:
Silent Battles: Towards Unmasking Hidden Cyber Attack. CyCon 2019: 1-20 - Giovanni Apruzzese, Michele Colajanni, Luca Ferretti, Mirco Marchetti:
Addressing Adversarial Attacks Against Security Systems Based on Machine Learning. CyCon 2019: 1-18 - Gil Baram, Udi Sommer:
Covert or not Covert: National Strategies During Cyber Conflict. CyCon 2019: 1-16 - Alicia Bargar, Stephanie Pitts, Janis Butkevics, Ian McCulloh:
Challenges and Opportunities to Counter Information Operations Through Social Network Analysis and Theory. CyCon 2019: 1-18 - Brad Bigelow:
What are Military Cyberspace Operations Other Than War? CyCon 2019: 1-17 - Joe Burton, Simona R. Soare:
Understanding the Strategic Implications of the Weaponization of Artificial Intelligence. CyCon 2019: 1-17 - Pierre Dumont, Roland Meier, David Gugelmann, Vincent Lenders:
Detection of Malicious Remote Shell Sessions. CyCon 2019: 1-20 - Keir Giles, Kim Hartmann:
"Silent Battle" Goes Loud: Entering a New Era of State-Avowed Cyber Conflict. CyCon 2019: 1-13 - Roman Graf, Leon Aaron Kaplan, Ross King:
Neural Network-Based Technique for Android Smartphone Applications Classification. CyCon 2019: 1-17 - Jason Healey, Neil Jenkins:
Rough-and-Ready: A Policy Framework to Determine if Cyber Deterrence is Working or Failing. CyCon 2019: 1-20 - Nicolas Känzig, Roland Meier, Luca Gambazzi, Vincent Lenders, Laurent Vanbever:
Machine Learninģ-based Detection of C&C Channels with a Focus on the Locked Shields Cyber Defense Exercise. CyCon 2019: 1-19 - Daniel Kapellmann, Rhyner Washburn:
Call to Action: Mobilizing Community Discussion to Improve Information-Sharing About Vulnerabilities in Industrial Control Systems and Critical Infrastructure. CyCon 2019: 1-23 - Joonsoo Kim, Kyeongho Kim, Moonsu Jang:
Cyber-Physical Battlefield Platform for Large-Scale Cybersecurity Exercises. CyCon 2019: 1-19 - Robert Koch:
Hidden in the Shadow: The Dark Web - A Growing Risk for Military Operations? CyCon 2019: 1-24 - Ji-Young Kong, Jong-In Lim, Kyoung-Gon Kim:
The All-Purpose Sword: North Korea's Cyber Operations and Strategies. CyCon 2019: 1-20 - Jeff Kosseff:
The Contours of 'Defend Forward' Under International Law. CyCon 2019: 1-13 - Kenneth Kraszewski:
SamSam and the Silent Battle of Atlanta. CyCon 2019: 1-16 - Arturs Lavrenovs:
Towards Measuring Global DDoS Attack Capacity. CyCon 2019: 1-15 - Martin Libicki:
For a Baltic Cyberspace Alliance? CyCon 2019: 1-14 - Bilyana Lilly, Lillian Ablon, Quentin E. Hodgson, Adam S. Moore:
Applying Indications and Warning Frameworks to Cyber Incidents. CyCon 2019: 1-21 - Giuseppina Murino, Alessandro Armando, Armando Tacchella:
Resilience of Cyber-Physical Systems: an Experimental Appraisal of Quantitative Measures. CyCon 2019: 1-19 - Erwin Orye, Olaf Manuel Maennel:
Recommendations for Enhancing the Results of Cyber Effects. CyCon 2019: 1-19 - Nikolas Ott, Anna-Maria Osula:
The Rise of the Regionals: How Regional Organisations Contribute to International Cyber Stability Negotiations at the United Nations Level. CyCon 2019: 1-25 - Barls Egemen Özkan, Serol Bulkan:
Hidden Risks to Cyberspace Security from Obsolete COTS Software. CyCon 2019: 1-19 - James Pavur, Ivan Martinovic:
The Cyber-ASAT: On the Impact of Cyber Weapons in Outer Space. CyCon 2019: 1-18 - Przemyslaw Roguski:
Layered Sovereignty: Adjusting Traditional Notions of Sovereignty to a Digital Environment. CyCon 2019: 1-13 - Barrie Sander:
The Sound of Silence: International Law and the Governance of Peacetime Cyber Operations. CyCon 2019: 1-21 - Max Smeets:
NATO Members' Organizational Path Towards Conducting Offensive Cyber Operations: A Framework for Analysis. CyCon 2019: 1-15 - Tomás Minárik, Siim Alatalu, S. Biondi, M. Signoretti, I. Tolga, G. Visky:
11th International Conference on Cyber Conflict, CyCon 2019, Tallinn, Estonia, May 28-31, 2019. IEEE 2019, ISBN 978-9949-9904-5-0 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-28 23:40 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint