Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 25 matches
- 2015
- Alaa Eddien Abdallah, Emad Eddien Abdallah, Mohammad Bsoul, Ahmad Al-Khasawneh, Lina Amer:
A blind 3D watermarking technique using spherical coordinates and skewness measure. Int. J. Secur. Networks 10(1): 1-8 (2015) - Arshi Agrawal, Mark Stamp:
Masquerade detection on GUI-based Windows systems. Int. J. Secur. Networks 10(1): 32-41 (2015) - Giuseppe Ateniese, Luigi V. Mancini, Angelo Spognardi, Antonio Villani, Domenico Vitali, Giovanni Felici:
Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers. Int. J. Secur. Networks 10(3): 137-150 (2015) - Rajiv Bagai, Bin Tang, Ahsan A. Khan, Abdus Samad:
A system-wide anonymity metric with message multiplicities. Int. J. Secur. Networks 10(1): 20-31 (2015) - Mohammed Amin Benamara, Huixian Li:
Secure of personal health records shared in cloud computing using cipher-text attribute based encryption. Int. J. Secur. Networks 10(3): 183-190 (2015) - Jingcheng Gao, Yang Xiao, Sneha Rao, Fnu Shalini:
Security tests and attack experimentations of ProtoGENI. Int. J. Secur. Networks 10(3): 151-169 (2015) - Zuhua Guo, Lixin Xu:
Research of security structure model for web application systems based on the relational database. Int. J. Secur. Networks 10(4): 207-213 (2015) - Jian Huang:
Research on optimisation and application of improved fuzzy neural network control algorithm. Int. J. Secur. Networks 10(4): 255-260 (2015) - Jongdeug Kim, Taehyun Jeon:
Efficient resource allocation for mobile instant messaging service in wireless network. Int. J. Secur. Networks 10(1): 48-55 (2015) - Yki Kortesniemi, Timo Kiravuo, Mikko Särelä, Hannu H. Kari:
Chain reduction of authorisation certificates. Int. J. Secur. Networks 10(2): 107-123 (2015) - N. M. Saravana Kumar, S. Lavanya:
A novel scheme for secure group communication in multicast network. Int. J. Secur. Networks 10(2): 65-75 (2015) - Jared Lee, Thomas H. Austin, Mark Stamp:
Compression-based analysis of metamorphic malware. Int. J. Secur. Networks 10(2): 124-136 (2015) - Ki Young Lee, Aleum Kim, Ye Eun Jeon, Jeong-Joon Kim, Yong Soon Im, Gyoo-Seok Choi, Sang-Bong Park, Yun Sik Lim, Jeong Jin Kang:
Spatio-temporal XACML: the expansion of XACML for access control. Int. J. Secur. Networks 10(1): 56-63 (2015) - Vivens Ndatinya, Zhifeng Xiao, Vasudeva Rao Manepalli, Ke Meng, Yang Xiao:
Network forensics analysis using Wireshark. Int. J. Secur. Networks 10(2): 91-106 (2015) - Jai-Pil Oh, Dong Ho Kim:
System architecture and platform design for terrestrial ultra-high definition (UHD) broadcasting service. Int. J. Secur. Networks 10(2): 76-83 (2015) - Inkyoo Park, Jongjin Park, Gyoo-Seok Choi:
Using Bayesian posterior probability in confidence of attributes for feature selection. Int. J. Secur. Networks 10(2): 84-90 (2015) - Bhawana Rudra, O. P. Vyas:
Understanding and mitigating security and authentication issues in service oriented network architecture. Int. J. Secur. Networks 10(1): 9-19 (2015) - Mohamed Sarrab:
Bytecode instrumentation mechanism for monitoring mobile application information flow. Int. J. Secur. Networks 10(3): 191-206 (2015) - Fnu Shalini, Yang Xiao, Bo Sun:
ProtoGENI experiments. Int. J. Secur. Networks 10(4): 239-254 (2015) - Jiyoung Shin, Eric Chan-Tin, Praveenkumar Khethavath:
Accurate geolocation using network coordinates. Int. J. Secur. Networks 10(3): 170-182 (2015) - Myungseok Song, Jun-Dong Cho, Jongpil Jeong:
Random-walk mobility management scheme for sensor-based mobile networks. Int. J. Secur. Networks 10(4): 261-270 (2015) - Tong Wang, Xinlin Zhao, Yucai Zhou:
Community detection in social network using shuffled frog-leaping optimisation. Int. J. Secur. Networks 10(4): 222-227 (2015) - Alex Ming Hui Wong, Dae-Ki Kang:
Game layout and artificial intelligence implementation in mobile 3D tower defence game. Int. J. Secur. Networks 10(1): 42-47 (2015) - Zhiming Zhang, Fuying Wu, Changgen Jiang, Jiangang Deng:
An efficient detection scheme of node replication attacks for wireless sensor networks. Int. J. Secur. Networks 10(4): 228-238 (2015) - Yucai Zhou, Tong Wang, Xinlin Zhao:
A hybrid recommendation algorithm based on time factor. Int. J. Secur. Networks 10(4): 214-221 (2015)
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-01 06:27 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint