Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 30 matches
- 2016
- Camilo Albarracin, Brayan S. Reyes Daza, Octavio J. Salcedo Parra:
Information and Identity Theft Without ARP Spoofing in LAN Environments. FDSE 2016: 164-171 - Loïc Bontemps, Van Loi Cao, James McDermott, Nhien-An Le-Khac:
Collective Anomaly Detection Based on Long Short-Term Memory Recurrent Neural Networks. FDSE 2016: 141-152 - Andrzej Chmielewski, Maciej Brzozowski:
Immune Approach to the Protection of IoT Devices. FDSE 2016: 75-92 - Minh-Tuan Dang, Tuan A. Nguyen:
Using Graph Database for Evidence Correlation on Android Smartphones. FDSE 2016: 209-216 - Thanh-Nghi Do, Minh-Thu Tran-Nguyen:
Incremental Parallel Support Vector Machines for Classifying Large-Scale Multi-class Image Datasets. FDSE 2016: 20-39 - Dirk Draheim:
The Present and Future of Large-Scale Systems Modeling and Engineering. FDSE 2016: 355-370 - Sigrid Felt, Ingmar Pappel, Ingrid Pappel:
An Overview of Digital Signing and the Influencing Factors in Estonian Local Governments. FDSE 2016: 371-384 - Ana Fernandes, Henrique Vicente, Margarida Figueiredo, Mariana Neves, José Neves:
An Evaluative Model to Assess the Organizational Efficiency in Training Corporations. FDSE 2016: 415-428 - Duong Ngoc Hieu, Thai Tieu Minh, Trinh Van Quang, Bui Xuan Giang, Tran Van Hoai:
A Machine Learning-Based Approach for Predicting the Execution Time of CFD Applications on Cloud Computing Environment. FDSE 2016: 40-52 - Markus Jäger, Trong Nhan Phan, Christian Huber, Josef Küng:
Incorporating Trust, Certainty and Importance of Information into Knowledge Processing Systems - An Approach. FDSE 2016: 3-19 - Jan Kubovy, Christian Huber, Markus Jäger, Josef Küng:
A Secure Token-Based Communication for Authentication and Authorization Servers. FDSE 2016: 237-250 - Khanh Le, Toan Nguyen, Thanh Cao, Thang H. Bui, Tho Quan:
Heuristic-Guided Verification for Fast Congestion Detection on Wireless Sensor Networks. FDSE 2016: 105-116 - Raimundas Matulevicius, Alex Norta, Chibozur Udokwu, Rein Nõukas:
Security Risk Management in the Aviation Turnaround Sector. FDSE 2016: 119-140 - Nadia Metoui, Michele Bezzi, Alessandro Armando:
Trust and Risk-Based Access Control for Privacy Preserving Threat Detection Systems. FDSE 2016: 285-304 - Trung-Viet Nguyen, Lam-Son Lê, Khuong Nguyen-An:
Aggregating Service Level Agreements in Services Bundling: A Semiring-Based Approach. FDSE 2016: 385-399 - Thanh Tien Nguyen, Nguyen Hoang Nam Pham, Que Nguyet Tran Thi:
An Enhancement of the Rew-XAC Model for Workflow Data Access Control in Healthcare. FDSE 2016: 251-263 - Vu Thanh Nguyen, Cao Ngoc Tuan, Ly Tan Dung, Vo Minh Hai, Toan Tan Nguyen:
Computer Virus Detection Method Using Feature Extraction of Specific Malicious Opcode Sets Combine with aiNet and Danger Theory. FDSE 2016: 199-208 - Nguyen Hoang Nam Pham, Thanh Tien Nguyen, Kim Tuyen Le Thi:
A Supporting Automatically Mechanism for Data Owner Preventing Personal Privacy from Colluding Attack on Online Social Networks. FDSE 2016: 317-328 - Trong Nhan Phan, Markus Jäger, Stefan Nadschläger, Pablo Gómez-Pérez, Christian Huber, Josef Küng, Cong An Nguyen:
TLCSim: A Large-Scale Two-Level Clustering Similarity Search with MapReduce. FDSE 2016: 53-71 - Phu H. Phung, Quang Tran Minh:
DASSR: A Distributed Authentication Scheme for Secure Routing in Wireless Ad-hoc Networks. FDSE 2016: 219-236 - Sapana Rani, Dileep Kumar Koshley, Raju Halder:
A Watermarking Framework for Outsourced and Distributed Relational Databases. FDSE 2016: 175-188 - Faiza Sadi, T. Van Ut, Nguyen Huynh Tuong, Ameur Soukhal:
Non-disjoint Multi-agent Scheduling Problem on Identical Parallel Processors. FDSE 2016: 400-414 - Vo-Que Son, Ta Tri Nghia, Nguyen Ho Ba Hai, Nguyen Binh Phuong:
Implementation and Performance Evaluation of Vehicle-Moving Based Routing Protocol in VANET. FDSE 2016: 93-104 - Chien D. C. Ta, Tuoi Phan Thi:
Automatic Extraction of Semantic Relations from Text Documents. FDSE 2016: 344-351 - Huynh Thanh-Tai, Huu-Hoa Nguyen, Nguyen Thai-Nghe:
A Semantic Approach in Recommender Systems. FDSE 2016: 331-343 - Que Nguyet Tran Thi, Tran The Si, Tran Khanh Dang:
Fine Grained Attribute Based Access Control Model for Privacy Protection. FDSE 2016: 305-316 - Bao An Tran, Viet-Hong Tran:
A Novel Encryption Mechanism for Door Lock to Resist Jam-and-Relay Attack. FDSE 2016: 153-163 - Quynh Chi Truong, Tran Khanh Dang, Trung Ha:
Face Quality Measure for Face Authentication. FDSE 2016: 189-198 - Anh Tuan Truong, Silvio Ranise:
ASASPXL: New Clother for Analysing ARBAC Policies. FDSE 2016: 267-284 - Tran Khanh Dang, Roland R. Wagner, Josef Küng, Nam Thoai, Makoto Takizawa, Erich J. Neuhold:
Future Data and Security Engineering - Third International Conference, FDSE 2016, Can Tho City, Vietnam, November 23-25, 2016, Proceedings. Lecture Notes in Computer Science 10018, 2016, ISBN 978-3-319-48056-5 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-28 07:39 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint