Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 78 matches
- 2021
- Zheng Yang, Sridhar Adepu, Jianying Zhou:
Opportunities and Challenges in Securing Critical Infrastructures Through Cryptography. IEEE Secur. Priv. 19(5): 57-65 (2021) - Bob Blakley, Lorrie Faith Cranor:
A Discussion of Public Health, Trust, and Privacy With Susan Landau. IEEE Secur. Priv. 19(5): 9-15 (2021) - Wajeeha Ahmad, David D. Clark:
A Systems Approach Toward Addressing Anonymous Abuses: Technical and Policy Considerations. IEEE Secur. Priv. 19(2): 38-47 (2021) - Sameed Ali, Prashant Anantharaman, Zephyr Lucas, Sean W. Smith:
What We Have Here Is Failure to Validate: Summer of LangSec. IEEE Secur. Priv. 19(3): 17-23 (2021) - Suzan Ali, Mounir Elgharabawy, Quentin Duchaussoy, Mohammad Mannan, Amr M. Youssef:
Parental Controls: Safer Internet Solutions or New Pitfalls? IEEE Secur. Priv. 19(6): 36-46 (2021) - Guy Amit, Asaf Shabtai, Yuval Elovici:
A Self-Healing Mechanism for Internet of Things Devices. IEEE Secur. Priv. 19(1): 44-53 (2021) - Steven M. Bellovin:
The Law and Lawful Hacking. IEEE Secur. Priv. 19(4): 76 (2021) - Raz Ben-Netanel, Ben Nassi, Adi Shamir, Yuval Elovici:
Detecting Spying Drones. IEEE Secur. Priv. 19(1): 65-73 (2021) - Josh Benaloh, Kammi Foote, Philip B. Stark, Vanessa Teague, Dan S. Wallach:
VAULT-Style Risk-Limiting Audits and the Inyo County Pilot. IEEE Secur. Priv. 19(4): 8-18 (2021) - Terry Benzel:
Research and Industry Partnerships in Cybersecurity and Privacy Research: New Frontiers or Fueling the Tech Sector? IEEE Secur. Priv. 19(5): 4-7 (2021) - Elisa Bertino:
Attacks on Artificial Intelligence [Last Word]. IEEE Secur. Priv. 19(1): 103-104 (2021) - Elisa Bertino:
Zero Trust Architecture: Does It Help? IEEE Secur. Priv. 19(5): 95-96 (2021) - Bob Blakley, Lorrie Faith Cranor:
A Discussion of Election Security, Cryptography, and Exceptional Access With Michael Alan Specter. IEEE Secur. Priv. 19(6): 15-22 (2021) - Francois Boechat, Gabriel Ribas, Lucas Senos, Miguel Angelo Bicudo, Mateus Schulz Nogueira, Leandro Pfleger de Aguiar, Daniel Sadoc Menasché:
Is Vulnerability Report Confidence Redundant? Pitfalls Using Temporal Risk Scores. IEEE Secur. Priv. 19(4): 44-53 (2021) - Lelio Campanile, Mauro Iacono, Alexander H. Levis, Fiammetta Marulli, Michele Mastroianni:
Privacy Regulations, Smart Roads, Blockchain, and Liability Insurance: Putting Technologies to Work. IEEE Secur. Priv. 19(1): 34-43 (2021) - Emiliano De Cristofaro:
A Critical Overview of Privacy in Machine Learning. IEEE Secur. Priv. 19(4): 19-27 (2021) - Robert K. Cunningham, Anita D. Carleton, Tom Longstaff, Forrest J. Shull, Deborah A. Frincke:
A Research Road Map for Building Secure and Resilient Software-Intensive Systems. IEEE Secur. Priv. 19(6): 8-14 (2021) - Sauvik Das, W. Keith Edwards, DeBrae Kennedy-Mayo, Peter Swire, Yuxi Wu:
Privacy for the People? Exploring Collective Action as a Mechanism to Shift Power to Consumers in End-User Privacy. IEEE Secur. Priv. 19(5): 66-70 (2021) - Shuwen Deng, Wenjie Xiong, Jakub Szefer:
Understanding the Insecurity of Processor Caches Due to Cache Timing-Based Vulnerabilities. IEEE Secur. Priv. 19(3): 42-49 (2021) - Amy Dettmer, Hamed Okhravi, Kevin Perry, Nabil Schear, Richard Shay, Mary Ellen Zurko, Paula J. Donovan:
Lessons Learned From Designing a Security Architecture for Real-World Government Agencies. IEEE Secur. Priv. 19(4): 28-36 (2021) - Nicola Dragoni, Alberto Lluch-Lafuente, Fabio Massacci, Anders Schlichtkrull:
Are We Preparing Students to Build Security In? A Survey of European Cybersecurity in Higher Education Programs [Education]. IEEE Secur. Priv. 19(1): 81-88 (2021) - Mahmoud Said Elsayed, Nhien-An Le-Khac, Anca Delia Jurcut:
Dealing With COVID-19 Network Traffic Spikes [Cybercrime and Forensics]. IEEE Secur. Priv. 19(1): 90-94 (2021) - Fariborz Farahmand, Jens Grossklags, Jelena Mirkovic, Bill Newhouse:
Integrating Cybersecurity and Artificial Intelligence Research in Engineering and Computer Science Education. IEEE Secur. Priv. 19(6): 104-110 (2021) - Daniel E. Geer Jr.:
Auto-Update Considered Harmful. IEEE Secur. Priv. 19(2): 79-80 (2021) - Daniel E. Geer Jr.:
Convergence. IEEE Secur. Priv. 19(6): 123-124 (2021) - Daniel Genkin, Yuval Yarom:
Whack-a-Meltdown: Microarchitectural Security Games [Systems Attacks and Defenses]. IEEE Secur. Priv. 19(1): 95-98 (2021) - Assane Gueye, Carlos E. C. Galhardo, Irena Bojanova, Peter Mell:
A Decade of Reoccurring Software Weaknesses. IEEE Secur. Priv. 19(6): 74-82 (2021) - Julie M. Haney, Wayne G. Lutters, Jody L. Jacobs:
Cybersecurity Advocates: Force Multipliers in Security Behavior Change. IEEE Secur. Priv. 19(4): 54-59 (2021) - Amir Herzberg, Hemi Leibowitz, Kent E. Seamons, Elham Vaziripour, Justin Wu, Daniel Zappala:
Secure Messaging Authentication Ceremonies Are Broken. IEEE Secur. Priv. 19(2): 29-37 (2021) - Siam U. Hussain, M. Sadegh Riazi, Farinaz Koushanfar:
The Fusion of Secure Function Evaluation and Logic Synthesis. IEEE Secur. Priv. 19(2): 48-55 (2021)
skipping 48 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-25 19:02 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint