Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 265 matches
- 2020
- Subhra Mazumdar, Prabal Banerjee, Sushmita Ruj:
Time is Money: Countering Griefing Attack in Lightning Network. TrustCom 2020: 1036-1043 - Wenjuan Li, Weizhi Meng, Hui Zhu:
Towards Collaborative Intrusion Detection Enhancement against Insider Attacks with Multi-Level Trust. TrustCom 2020: 1179-1186 - Wei Ren:
A Symmetric Uniform Formula and Sole Index Method for Sieving (Twin) Primes. TrustCom 2020: 1592-1597 - Chen Tian, Yazhe Wang, Peng Liu, Yu Wang, Ruirui Dai, Anyuan Zhou, Zhen Xu:
Prihook: Differentiated context-aware hook placement for different owners' smartphones. TrustCom 2020: 615-622 - Meng Li, Jianbo Gao, Yifei Chen, Jingcheng Zhao, Mamoun Alazab:
Privacy-Preserving Ride-Hailing with Verifiable Order-Linking in Vehicular Networks. TrustCom 2020: 599-606 - Ming Liu, Zhi Xue, Xiangjian He:
A Unified Host-based Intrusion Detection Framework using Spark in Cloud. TrustCom 2020: 97-103 - Syed Ghazanfar Abbas, Muhammad Husnain, Ubaid Ullah Fayyaz, Farrukh Shahzad, Ghalib A. Shah, Kashif Zafar:
IoT-Sphere: A Framework To Secure IoT Devices From Becoming Attack Target And Attack Source. TrustCom 2020: 1402-1409 - Syed Ghazanfar Abbas, Fabiha Hashmat, Ghalib A. Shah:
A Multi-Layer Industrial-IoT Attack Taxonomy: Layers, Dimensions, Techniques and Application. TrustCom 2020: 1820-1825 - Andreas Abraham, Stefan More, Christof Rabensteiner, Felix Hörandner:
Revocable and Offline-Verifiable Self-Sovereign Identities. TrustCom 2020: 1020-1027 - Andreas Aigner, Abdelmajid Khelil:
A Scoring System to efficiently measure Security in Cyber-Physical Systems. TrustCom 2020: 1141-1145 - Andreas Aigner, Abdelmajid Khelil:
A Semantic Model-based Security Engineering Framework for Cyber-Physical Systems. TrustCom 2020: 1826-1833 - Taha Al-Jody, Violeta Holmes, Alexandros Antoniades, Yazan Kazkouzeh:
Bearicade: secure access gateway to High Performance Computing systems. TrustCom 2020: 1420-1427 - Hootan Alavizadeh, Hooman Alavizadeh, Julian Jang-Jaccard:
Cyber Situation Awareness Monitoring and Proactive Response for Enterprises on the Cloud. TrustCom 2020: 1276-1284 - Ahmed Alshehri, Malek Ben Salem, Lei Ding:
Are Smart Home Devices Abandoning IPV Victims? TrustCom 2020: 1368-1375 - Monika Di Angelo, Gernot Salzer:
Assessing the Similarity of Smart Contracts by Clustering their Interfaces. TrustCom 2020: 1910-1919 - Adnan Anwar, S. M. Abu Adnan Abir:
Measurement Unit Placement Against Injection Attacks for the Secured Operation of an IIoT-based Smart Grid. TrustCom 2020: 767-774 - Muhammad Arif, Walter Balzano, Alessandro Fontanella, Silvia Stranieri, Guojun Wang, Xiaofei Xing:
Integration of 5G, VANETs and Blockchain Technology. TrustCom 2020: 2007-2013 - Behzad Asadi, Vijay Varadharajan:
Towards a Robust Classifier: An MDL-Based Method for Generating Adversarial Examples. TrustCom 2020: 793-801 - Muhammad Rizwan Asghar, Steven D. Galbraith, Andrea Lanzi, Giovanni Russello, Lukas Zobernig:
Towards a Theory of Special-Purpose Program Obfuscation. TrustCom 2020: 394-401 - Rawan Baalous, Ronald Poet:
Factors Affecting Users' Disclosure Decisions in Android Runtime Permissions Model. TrustCom 2020: 1113-1118 - Alexandros Bakas, Antonis Michalas:
Multi-Input Functional Encryption: Efficient Applications from Symmetric Primitives. TrustCom 2020: 1105-1112 - Michel Barbeau, Frédéric Cuppens, Nora Cuppens, Romain Dagnas, Joaquín García-Alfaro:
Metrics to Enhance the Resilience of Cyber-Physical Systems. TrustCom 2020: 1167-1172 - Lars Baumgärtner, Alexandra Dmitrienko, Bernd Freisleben, Alexander Gruler, Jonas Höchst, Joshua Kühlberg, Mira Mezini, Richard Mitev, Markus Miettinen, Anel Muhamedagic, Thien Duc Nguyen, Alvar Penning, Dermot Frederik Pustelnik, Filipp Roos, Ahmad-Reza Sadeghi, Michael Schwarz, Christian Uhl:
Mind the GAP: Security & Privacy Risks of Contact Tracing Apps. TrustCom 2020: 458-467 - Kilian Becher, J. A. Gregor Lagodzinski, Thorsten Strufe:
Privacy-Preserving Public Verification of Ethical Cobalt Sourcing. TrustCom 2020: 998-1005 - Rafael Belchior, Benedikt Putz, Günther Pernul, Miguel Correia, André Vasconcelos, Sérgio Guerreiro:
SSIBAC: Self-Sovereign Identity Based Access Control. TrustCom 2020: 1935-1943 - Md. Saiful Islam Bhuiyan, Abdur Razzak, Md. Sadek Ferdous, Mohammad Jabed Morshed Chowdhury, Mohammad Ashraful Hoque, Sasu Tarkoma:
BONIK: A Blockchain Empowered Chatbot for Financial Transactions. TrustCom 2020: 1079-1088 - Paul Black, Iqbal Gondal, Peter Vamplew, Arun Lakhotia:
Identifying Cross-Version Function Similarity Using Contextual Features. TrustCom 2020: 810-818 - Ioana Boureanu, Daniel Migault, Stere Preda, Hyame Assem Alamedine, Sanjay Mishra, Frederic Fieau, Mohammad Mannan:
LURK: Server-Controlled TLS Delegation. TrustCom 2020: 182-193 - Jiajin Cai, Tongxin Li, Can Huang, Xinhui Han:
ReDex: Unpacking Android Packed Apps by Executing Every Method. TrustCom 2020: 337-344 - Defu Cao, Jing Huang, Xuanyu Zhang, Xianhua Liu:
FTCLNet: Convolutional LSTM with Fourier Transform for Vulnerability Detection. TrustCom 2020: 539-546
skipping 235 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-04 03:48 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint