![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 45 matches
- 2015
- Abdelrahman Abuarqoub
:
Optimal Mobile Sink Selection Scheme for Multiple Sink Mobile Wireless Sensor Networks. EISIC 2015: 169-172 - Ahmed H. Al-Noori
, Khamis A. Al-Karawi
, Francis F. Li:
Improving Robustness of Speaker Recognition in Noisy and Reverberant Conditions via Training. EISIC 2015: 180 - Fahad Alanazi, Andrew Jones
:
The Value of Metadata in Digital Forensics. EISIC 2015: 182 - Fayez Alfayez, Ian Neill:
Topology-based Optimization of Linear Wireless Sensor Networks. EISIC 2015: 183 - Albandari Alsumayt
, John Haggerty, Ahmad Lotfi
:
Performance, Analysis, and Comparison of MrDR Method to Detect DoS Attacks in MANET. EISIC 2015: 121-124 - Michael Ashcroft, Ali Fisher, Lisa Kaati, Enghin Omer, Nico Prucha:
Detecting Jihadist Messages on Twitter. EISIC 2015: 161-164 - Michael Ashcroft, Lisa Kaati, Maxime Meyer:
A Step Towards Detecting Online Grooming - Identifying Adults Pretending to be Children. EISIC 2015: 98-104 - Mustafa Aydin, Jeremy L. Jacob:
Cloud-COVER: Using User Security Attribute Preferences and Propagation Analysis to Prioritise Threats to Systems. EISIC 2015: 53-60 - Rodrigo Carvalho
, Michael Goldsmith, Sadie Creese:
Applying Semantic Technologies to Fight Online Banking Fraud. EISIC 2015: 61-68 - Michelle Cayford:
Measures of Success: Developing a Method for Evaluating the Effectiveness of Surveillance Technology. EISIC 2015: 187 - Frodo Kin-Sun Chan, Adams Wai-Kin Kong:
Using Hair Follicles with Leg Geometry to Align Androgenic Hair Patterns. EISIC 2015: 137-140 - Mandeep K. Dhami, Kathryn E. Careless:
Ordinal Structure of the Generic Analytic Workflow: A Survey of Intelligence Analysts. EISIC 2015: 141-144 - Amna Eleyan
, Derar Eleyan
:
Forensic Process as a Service (FPaaS) for Cloud Computing. EISIC 2015: 157-160 - Thomas C. Eskridge
, Marco M. Carvalho
, Fitzroy Nembhard
, Hari Thotempudi, Peter J. Polack:
Interactive Visualization of Netflow Traffic. EISIC 2015: 188 - Carl-Heinz Genzel, Richard Sethmann:
Custom Transport Interface for the Integration of Trusted Network Connect in German Smart Metering Systems. EISIC 2015: 45-52 - Linus Gisslén, Anders Törne:
A Semantic Approach to Information Management and Decision Support: An Application to Humanitarian Demining Operations. EISIC 2015: 75-82 - Ning Gu, Duoyong Sun, Bo Li, Ze Li:
Sentiment Analysis for Topics based on Interaction Chain Model. EISIC 2015: 133-136 - Lei Guan, Zan Li, Song Xiao, Jiangbo Si, Jiajun Wan:
A Family of Adaptive Frequency Slot Number FH Sequences for High Security and Reliability Communication. EISIC 2015: 30-36 - Fadi Hamad, Jamal Zraqou, Adi Maaita, Anas Abu Taleb
:
A Secure Authentication System for ePassport Detection and Verification. EISIC 2015: 173-176 - Hatem Hassan, Ahmad Mostafa, Ahmed Shawish:
S-SAC: Towards a Scalable Secure Access Control Framework for Cloud Storage. EISIC 2015: 165-168 - Robert Hegarty
, John Haggerty:
SlackStick: Signature-Based File Identification for Live Digital Forensics Examinations. EISIC 2015: 24-29 - Eva-Catherine Hillemann, Alexander Nussbaumer
, Dietrich Albert
:
The Role of Cognitive Biases in Criminal Intelligence Analysis and Approaches for their Mitigation. EISIC 2015: 125-128 - Erik Johansson, Christoffer Gahlin, Anton Borg
:
Crime Hotspots: An Evaluation of the KDE Spatial Mapping Technique. EISIC 2015: 69-74 - Mhair Kashif, Zahoor ul Haq:
An Optimal Use of Intrusion Detection and Prevention System (IDPS). EISIC 2015: 190 - Manuel Jose Gazapo Lapayese:
Terrorism and its Transition to Cyberspace. EISIC 2015: 178 - Ze Li, Duoyong Sun, Bo Li, Zi-Han Lin, Min Tang:
Detecting Changes in Terrorism Networks: A Perspective of Multi-Meta-Network Modeling. EISIC 2015: 179 - Bo Li, Duoyong Sun, Ze Li, Chaomin Ou, Renqi Zhu:
Understanding the Dynamic of Covert Organization with Multilayer Networks Model. EISIC 2015: 37-44 - Zi-Han Lin, Duoyong Sun, Bo Li, Ze Li:
Game Analysis on the Counter-Terrorism Cooperation of Shanghai Cooperation Organization. EISIC 2015: 185 - Apostolos Malatras, Éric Freyssinet, Laurent Beslay:
Mobile Botnets Taxonomy and Challenges. EISIC 2015: 149-152 - Sarah Mount, Robert M. Newman:
Energy-Efficient Brute Force Password Cracking. EISIC 2015: 189
skipping 15 more matches
loading more results
failed to load more results, please try again later
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-23 11:02 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint