Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 243 matches
- 2020
- Abigail Akosua Addobea, Jun Hou, Qianmu Li:
MHCOOS: An Offline-Online Certificateless Signature Scheme for M-Health Devices. Secur. Commun. Networks 2020: 7085623:1-7085623:12 (2020) - Shazia Afzal, Muhammad Yousaf, Humaira Afzal, Nawaf Alharbe, Muhammad Rafiq Mufti:
Cryptographic Strength Evaluation of Key Schedule Algorithms. Secur. Commun. Networks 2020: 3189601:1-3189601:9 (2020) - Arshad Ahmad, Chong Feng, Muzammil Khan, Asif Khan, Ayaz Ullah, Shah Nazir, Adnan Tahir:
A Systematic Literature Review on Using Machine Learning Algorithms for Software Requirements Identification on Stack Overflow. Secur. Commun. Networks 2020: 8830683:1-8830683:19 (2020) - Arshad Ahmad, Ayaz Ullah, Chong Feng, Muzammil Khan, Shahzad Ashraf, Muhammad Adnan, Shah Nazir, Habib Ullah Khan:
Towards an Improved Energy Efficient and End-to-End Secure Protocol for IoT Healthcare Applications. Secur. Commun. Networks 2020: 8867792:1-8867792:10 (2020) - Marwan Ali Albahar, Muhammad Binsawad:
Deep Autoencoders and Feedforward Networks Based on a New Regularization for Anomaly Detection. Secur. Commun. Networks 2020: 7086367:1-7086367:9 (2020) - Randa Aljably, Yuan Tian, Mznah Al-Rodhaan:
Preserving Privacy in Multimedia Social Networks Using Machine Learning Anomaly Detection. Secur. Commun. Networks 2020: 5874935:1-5874935:14 (2020) - Bandar Almaslukh:
An Efficient and Effective Approach for Flooding Attack Detection in Optical Burst Switching Networks. Secur. Commun. Networks 2020: 8840058:1-8840058:11 (2020) - Hussain M. J. Almohri, Mohammad Al-Mutawa, Mahmoud Alawadh, Karim O. Elish:
A Client Bootstrapping Protocol for DoS Attack Mitigation on Entry Point Services in the Cloud. Secur. Commun. Networks 2020: 8873258:1-8873258:12 (2020) - Bora Aslan, Füsun Yavuzer Aslan, M. Tolga Sakalli:
Energy Consumption Analysis of Lightweight Cryptographic Algorithms That Can Be Used in the Security of Internet of Things Applications. Secur. Commun. Networks 2020: 8837671:1-8837671:15 (2020) - Ömer Aslan, Refik Samet, Ömer Özgür Tanriöver:
Using a Subtractive Center Behavioral Model to Detect Malware. Secur. Commun. Networks 2020: 7501894:1-7501894:17 (2020) - Ijaz Ahmad Awan, Muhammad Shiraz, Muhammad Usman Hashmi, Qaisar Shaheen, Rizwan Akhtar, Allah Ditta:
Secure Framework Enhancing AES Algorithm in Cloud Computing. Secur. Commun. Networks 2020: 8863345:1-8863345:16 (2020) - Seyed Amir Hosseini Beghaeiraveri, Mohammad Izadi, Mohsen Rezvani:
Broadcast Complexity and Adaptive Adversaries in Verifiable Secret Sharing. Secur. Commun. Networks 2020: 9428457:1-9428457:10 (2020) - Piotr Bialczak, Wojciech Mazurczyk:
Characterizing Anomalies in Malware-Generated HTTP Traffic. Secur. Commun. Networks 2020: 8848863:1-8848863:26 (2020) - Trevor J. Bihl, Todd J. Paciencia, Kenneth W. Bauer Jr., Michael A. Temple:
Cyber-Physical Security with RF Fingerprint Classification through Distance Measure Extensions of Generalized Relevance Learning Vector Quantization. Secur. Commun. Networks 2020: 3909763:1-3909763:12 (2020) - Anchit Bijalwan:
Botnet Forensic Analysis Using Machine Learning. Secur. Commun. Networks 2020: 9302318:1-9302318:9 (2020) - Jie Cai, Han Jiang, Hao Wang, Qiuliang Xu:
Lattice-Based Linearly Homomorphic Signature Scheme over F 2. Secur. Commun. Networks 2020: 8857815:1-8857815:7 (2020) - María-Dolores Cano, Antonio Cañavate-Sanchez:
Preserving Data Privacy in the Internet of Medical Things Using Dual Signature ECDSA. Secur. Commun. Networks 2020: 4960964:1-4960964:9 (2020) - Xuefei Cao, Lanjun Dang, Yingzi Luan, Wei You:
A Certificateless Noninteractive Key Exchange Protocol with Provable Security. Secur. Commun. Networks 2020: 8862476:1-8862476:8 (2020) - Xuefei Cao, Yulong Fu, Bo Chen:
Packet-Based Intrusion Detection Using Bayesian Topic Models in Mobile Edge Computing. Secur. Commun. Networks 2020: 8860418:1-8860418:12 (2020) - Jun Chen, Shize Guo, Xin Ma, Haiying Li, Jinhong Guo, Ming Chen, Zhisong Pan:
SLAM: A Malware Detection Method Based on Sliding Local Attention Mechanism. Secur. Commun. Networks 2020: 6724513:1-6724513:11 (2020) - Jiong Chen, Kun He, Jing Chen, Yingying Fang, Ruiying Du:
PowerPrint: Identifying Smartphones through Power Consumption of the Battery. Secur. Commun. Networks 2020: 3893106:1-3893106:13 (2020) - Fu Chen, Peng Liu, Jianming Zhu, Sheng Gao, Yanmei Zhang, Meijiao Duan, Youwei Wang, Kai Hwang:
Improving Topic-Based Data Exchanges among IoT Devices. Secur. Commun. Networks 2020: 8884924:1-8884924:14 (2020) - Yunfang Chen, Li Wang, Dehao Qi, Tinghuai Ma, Wei Zhang:
Community Detection Based on DeepWalk Model in Large-Scale Networks. Secur. Commun. Networks 2020: 8845942:1-8845942:13 (2020) - Jianyu Chen, Xiaofeng Wang, Leiting Tao, Yuan Liu:
High-Performance Routing Emulation Technologies Based on a Cloud Platform. Secur. Commun. Networks 2020: 8825749:1-8825749:17 (2020) - Leixiao Cheng, Fei Meng, Xianmeng Meng, Qixin Zhang:
AKC-Based Revocable ABE Schemes from LWE Assumption. Secur. Commun. Networks 2020: 8834872:1-8834872:16 (2020) - Wenzhi Cheng, Wei Ou, Xiangdong Yin, Wanqin Yan, Dingwan Liu, Chunyan Liu:
A Privacy-Protection Model for Patients. Secur. Commun. Networks 2020: 6647562:1-6647562:12 (2020) - Shu-Chuan Chu, Lili Chen, Sachin Kumar, Saru Kumari, Joel J. P. C. Rodrigues, Chien-Ming Chen:
Decentralized Private Information Sharing Protocol on Social Networks. Secur. Commun. Networks 2020: 7137480:1-7137480:12 (2020) - Hua Dai, Xuelong Dai, Xiao Li, Xun Yi, Fu Xiao, Geng Yang:
A Multibranch Search Tree-Based Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data. Secur. Commun. Networks 2020: 7307315:1-7307315:15 (2020) - Pengpeng Ding, Jinguo Li, Liangliang Wang, Mi Wen, Yuyao Guan:
HYBRID-CNN: An Efficient Scheme for Abnormal Flow Detection in the SDN-Based Smart Grid. Secur. Commun. Networks 2020: 8850550:1-8850550:20 (2020) - Xingting Dong, Yanhua Zhang, Baocang Wang, Jiangshan Chen:
Server-Aided Revocable Attribute-Based Encryption from Lattices. Secur. Commun. Networks 2020: 1460531:1-1460531:13 (2020)
skipping 213 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-08-24 17:30 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint