Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 30 matches
- 2024
- Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens-Boulahia, Costas Lambrinoudakis, Joaquín García-Alfaro, Guillermo Navarro-Arribas, Pantaleone Nespoli, Christos Kalloniatis, John Mylopoulos, Annie I. Antón, Stefanos Gritzalis:
Computer Security. ESORICS 2023 International Workshops - CyberICS, DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part I. Lecture Notes in Computer Science 14398, Springer 2024, ISBN 978-3-031-54203-9 [contents] - 2023
- Bernard Asare, Paula Branco, Iluju Kiringa, Tet Hin Yeap:
AddShare: A Privacy-Preserving Approach for Federated Learning. ESORICS Workshops (1) 2023: 299-309 - Lennart Bader, Eric Wagner, Martin Henze, Martin Serror:
METRICS: A Methodology for Evaluating and Testing the Resilience of Industrial Control Systems to Cyberattacks. ESORICS Workshops (1) 2023: 25-45 - Massimiliano Baldo, Tommaso Bianchi, Mauro Conti, Alessio Trevisan, Federico Turrin:
HoneyEVSE: An Honeypot to Emulate Electric Vehicle Supply Equipments. ESORICS Workshops (1) 2023: 145-159 - Carolin Brunn, Saskia Nuñez von Voigt, Florian Tschorsch:
Analyzing Continuous Ks-Anonymization for Smart Meter Data. ESORICS Workshops (1) 2023: 272-282 - Michal Choras, Aleksandra Pawlicka, Dagmara Jaroszewska-Choras, Marek Pawlicki:
Not Only Security and Privacy: The Evolving Ethical and Legal Challenges of E-Commerce. ESORICS Workshops (1) 2023: 167-181 - Francesco D'Amato, Luca Zanolini:
A Simple Single Slot Finality Protocol for Ethereum. ESORICS Workshops (1) 2023: 376-393 - Cristòfol Daudén-Esmel, Jordi Castellà-Roca, Alexandre Viejo, Eduard Josep Bel-Ribes:
PrivacySmart: Automatic and Transparent Management of Privacy Policies. ESORICS Workshops (1) 2023: 216-231 - Cihan Eryonucu, Panos Papadimitratos:
Security and Privacy for Mobile Crowdsensing: Improving User Relevance and Privacy. ESORICS Workshops (1) 2023: 474-493 - Thrasyvoulos Giannakopoulos, Konstantinos N. Maliatsos:
On the Usage of NLP on CVE Descriptions for Calculating Risk. ESORICS Workshops (1) 2023: 104-123 - Florent Guépin, Matthieu Meeus, Ana-Maria Cretu, Yves-Alexandre de Montjoye:
Synthetic Is All You Need: Removing the Auxiliary Data Assumption for Membership Inference Attacks Against Synthetic Data. ESORICS Workshops (1) 2023: 182-198 - Sargam Gupta, Vicenç Torra:
Differentially Private Traffic Flow Prediction Using Transformers: A Federated Approach. ESORICS Workshops (1) 2023: 260-271 - Vincent Happersberger, Frank-Walter Jäkel, Thomas Knothe, Yvonne-Anne Pignolet, Stefan Schmid:
Comparison of Ethereum Smart Contract Analysis and Verification Methods. ESORICS Workshops (1) 2023: 344-358 - Michela Iezzi, Carsten Maple, Andrea Leonetti:
Towards Real-World Private Computations with Homomorphic Encryption: Current Solutions and Open Challenges. ESORICS Workshops (1) 2023: 283-298 - Vincent Jacquot, Benoit Donnet:
Chaussette: A Symbolic Verification of Bitcoin Scripts. ESORICS Workshops (1) 2023: 359-375 - Konstantinos Kontogeorgopoulos, Kyriakos Kritikos:
Overview of Social Engineering Protection and Prevention Methods. ESORICS Workshops (1) 2023: 64-83 - Saloni Kwatra, Ayush K. Varshney, Vicenç Torra:
Integrally Private Model Selection for Support Vector Machine. ESORICS Workshops (1) 2023: 249-259 - Björn Leander, Aida Causevic, Hans Hansson, Tomas Lindström:
Evaluation of an OPC UA-Based Access Control Enforcement Architecture. ESORICS Workshops (1) 2023: 124-144 - Jens Leicht, Marvin Wagner, Maritta Heisel:
Creating Privacy Policies from Data-Flow Diagrams. ESORICS Workshops (1) 2023: 433-453 - Charmaine Ndolo, Florian Tschorsch:
On the (Not So) Surprising Impact of Multi-Path Payments on Performance And Privacy in the Lightning Network. ESORICS Workshops (1) 2023: 411-427 - Mohammad Sadegh Nourbakhsh, Feng Hao, Arshad Jhumka:
Transaction Fee Mechanism for Order-Sensitive Blockchain-Based Applications. ESORICS Workshops (1) 2023: 327-343 - Bahareh Parhizkari, Antonio Ken Iannillo, Christof Ferreira Torres, Sebastian Banescu, Joseph Jiaqi Xu, Radu State:
Timely Identification of Victim Addresses in DeFi Attacks. ESORICS Workshops (1) 2023: 394-410 - Mario Raciti, Giampaolo Bella:
Up-to-Date Threat Modelling for Soft Privacy on Smart Cars. ESORICS Workshops (1) 2023: 454-473 - Abdelrahman Ragab, Mohammad Mannan, Amr M. Youssef:
Try On, Spied On?: Privacy Analysis of Virtual Try-On Websites and Android Apps. ESORICS Workshops (1) 2023: 232-248 - Bruno Rodrigues, Ivone Amorim, Ivan Silva, Alexandra Mendes:
Patient-Centric Health Data Sovereignty: An Approach Using Proxy Re-Encryption. ESORICS Workshops (1) 2023: 199-215 - Susanne Barkhald Sandberg, Aida Akbarzadeh, Vasileios Gkioulos:
Effects of Organizational Cyber Security Culture Across the Energy Sector Supply Chain. ESORICS Workshops (1) 2023: 5-24 - Stavros Simou, Aikaterini-Georgia Mavroeidi, Christos Kalloniatis:
Review on Privacy and Trust Methodologies in Cloud Computing. ESORICS Workshops (1) 2023: 494-505 - Teodor Sommestad, Henrik Karlzén, Hanna Kvist, Hanna Gustafsson:
Skade - A Challenge Management System for Cyber Threat Hunting. ESORICS Workshops (1) 2023: 84-103 - Karl Jonatan Due Vatn, Georgios Kavallieratos, Sokratis K. Katsikas:
Threat Analysis in Dairy Farming 4.0. ESORICS Workshops (1) 2023: 46-63 - Amir Zarei, Staal Amund Vinterbo:
Secure Multiparty Sampling of a Biased Coin for Differential Privacy. ESORICS Workshops (1) 2023: 310-320
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-06 09:43 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint