Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 28 matches
- 2020
- Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie I. Antón, Stefanos Gritzalis, Frank Pallas, Jörg Pohle, M. Angela Sasse, Weizhi Meng, Steven Furnell, Joaquín García-Alfaro:
Computer Security - ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26-27, 2019 Revised Selected Papers. Lecture Notes in Computer Science 11980, Springer 2020, ISBN 978-3-030-42047-5 [contents] - 2019
- Matthias Schäfer, Carolina Nogueira, Jens B. Schmitt, Vincent Lenders:
Secure Location Verification: Why You Want Your Verifiers to Be Mobile. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 419-437 - Yang Liu, Andrew Simpson:
On the Trade-Off Between Privacy and Utility in Mobile Services: A Qualitative Study. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 261-278 - Amna Altaf, Shamal Faily, Huseyin Dogan, Alexios Mylonas, Eylem Thron:
Identifying Safety and Human Factors Issues in Rail Using IRIS and CAIRIS. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 98-107 - Ahmed Amro, Vasileios Gkioulos, Sokratis K. Katsikas:
Connect and Protect: Requirements for Maritime Autonomous Surface Ship in Urban Passenger Transportation. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 69-85 - Myrsini Athinaiou, Haralambos Mouratidis, Theo Fotis, Michalis Pavlidis:
A Conceptual Redesign of a Modelling Language for Cyber Resiliency of Healthcare Systems. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 140-158 - Deepak Kumar Dalai:
A Basic Theory of Lightweight Hierarchical Key Predistribution Scheme. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 325-340 - Vasiliki Diamantopoulou, Aggeliki Tsohou, Maria Karyda:
From ISO/IEC 27002: 2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 238-257 - Zafeiroula Georgiopoulou, Eleni-Laskarina Makri, Costas Lambrinoudakis:
GDPR Compliance: Proposed Technical and Organizational Measures for Cloud Providers. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 181-194 - Damjan Gogic, Bojan Jelacic, Imre Lendák:
Simulation-Based Evaluation of DDoS Against Smart Grid SCADAs. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 86-97 - Ali Hariri, Nicolas Giannelos, Budi Arief:
Selective Forwarding Attack on IoT Home Security Kits. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 360-373 - Mohammad Heydari, Alexios Mylonas, Vasilis Katos, Emili Balaguer-Ballester, Amna Altaf, Vahid Heydari Fami Tafreshi:
Uncertainty-Aware Authentication Model for IoT. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 224-237 - Philokypros P. Ioulianou, Vassilios G. Vassilakis:
Denial-of-Service Attacks and Countermeasures in the RPL-Based Internet of Things. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 374-390 - Jonguk Kim, Jeong-Han Yun, HyoungChun Kim:
Anomaly Detection for Industrial Control Systems Using Sequence-to-Sequence Neural Networks. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 3-18 - Dimitri Van Landuyt, Laurens Sion, Emiel Vandeloo, Wouter Joosen:
On the Applicability of Security and Privacy Threat Modeling for Blockchain Applications. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 195-203 - Hugh D. Lester, Martin J. Miller:
Discrete Event Simulation of Jail Operations in Pursuit of Organizational Culture Change. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 307-322 - Eleni-Laskarina Makri, Zafeiroula Georgiopoulou, Costas Lambrinoudakis:
A Proposed Privacy Impact Assessment Method Using Metrics Based on Organizational Characteristics. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 122-139 - Evgenia Novikova, Mikhail Bestuzhev, Igor V. Kotenko:
Anomaly Detection in the HVAC System Operation by a RadViz Based Visualization-Driven Approach. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 402-418 - Kohei Nozawa, Kento Hasegawa, Seira Hidano, Shinsaku Kiyomoto, Kazuo Hashimoto, Nozomu Togawa:
Adversarial Examples for Hardware-Trojan Detection at Gate-Level Netlists. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 341-359 - Thanos Papaioannou, Aggeliki Tsohou, Maria Karyda:
Shaping Digital Identities in Social Networks: Data Elements and the Role of Privacy Concerns. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 159-180 - Sebastian Pape, Jelena Stankovic:
An Insight into Decisive Factors in Cloud Provider Selection with a Focus on Security. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 287-306 - Nikolaos Pitropakis, Marios Logothetis, Gennady L. Andrienko, Jason Stefanatos, Eirini Karapistoli, Costas Lambrinoudakis:
Towards the Creation of a Threat Intelligence Framework for Maritime Infrastructures. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 53-68 - Athanasios Rizos, Daniel Bastos, Andrea Saracino, Fabio Martinelli:
Distributed UCON in CoAP and MQTT Protocols. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 35-52 - Mariana Segovia, Ana Rosa Cavalli, Nora Cuppens, Jose Rubio-Hernan, Joaquín García-Alfaro:
Reflective Attenuation of Cyber-Physical Attacks. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 19-34 - Dennis Tatang, Tim Suurland, Thorsten Holz:
Study of DNS Rebinding Attacks on Smart Home Devices. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 391-401 - Aggeliki Tsohou, Manos Magkos, Haralambos Mouratidis, George Chrysoloras, Luca Piras, Michalis Pavlidis, Julien Debussche, Marco Rotoloni, Beatriz Gallego-Nicasio Crespo:
Privacy, Security, Legal and Technology Acceptance Requirements for a GDPR Compliance Platform. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 204-223 - Jan Willemson:
How Not to Use a Privacy-Preserving Computation Platform: Case Study of a Voting Application. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 111-121 - Jan Zibuschka:
Analysis of Automation Potentials in Privacy Impact Assessment Processes. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 279-286
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-30 21:42 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint