Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 45 matches
- 2014
- Hussain M. J. Almohri, Danfeng Yao, Dennis G. Kafura:
Process Authentication for High System Assurance. IEEE Trans. Dependable Secur. Comput. 11(2): 168-180 (2014) - Nicola Basilico, Nicola Gatti, Mattia Monga, Sabrina Sicari:
Security Games for Node Localization through Verifiable Multilateration. IEEE Trans. Dependable Secur. Comput. 11(1): 72-85 (2014) - Elisa Bertino:
Editorial. IEEE Trans. Dependable Secur. Comput. 11(1): 1 (2014) - Silvio Cesare, Yang Xiang, Wanlei Zhou:
Control Flow-Based Malware VariantDetection. IEEE Trans. Dependable Secur. Comput. 11(4): 307-317 (2014) - Gorrell P. Cheek, Mohamed Shehab:
Human Effects of Enhanced Privacy Management Models. IEEE Trans. Dependable Secur. Comput. 11(2): 142-154 (2014) - Kwantae Cho, Byung-Gil Lee, Dong Hoon Lee:
Low-Priced and Energy-Efficient Detection of Replicas for Wireless Sensor Networks. IEEE Trans. Dependable Secur. Comput. 11(5): 454-466 (2014) - Pietro Colombo, Elena Ferrari:
Enforcing Obligations within RelationalDatabase Management Systems. IEEE Trans. Dependable Secur. Comput. 11(4): 318-331 (2014) - Leandro Fiorin, Mariagiovanna Sami:
Fault-Tolerant Network Interfaces for Networks-on-Chip. IEEE Trans. Dependable Secur. Comput. 11(1): 16-29 (2014) - Christophe Foket, Bjorn De Sutter, Koen De Bosschere:
Pushing Java Type Obfuscation to the Limit. IEEE Trans. Dependable Secur. Comput. 11(6): 553-567 (2014) - José Fonseca, Nuno Seixas, Marco Vieira, Henrique Madeira:
Analysis of Field Data on Web Security Vulnerabilities. IEEE Trans. Dependable Secur. Comput. 11(2): 89-100 (2014) - José Fonseca, Marco Vieira, Henrique Madeira:
Evaluation of Web Security Mechanisms Using Vulnerability & Attack Injection. IEEE Trans. Dependable Secur. Comput. 11(5): 440-453 (2014) - Christopher S. Gates, Jing Chen, Ninghui Li, Robert W. Proctor:
Effective Risk Communication for Android Apps. IEEE Trans. Dependable Secur. Comput. 11(3): 252-265 (2014) - Christopher S. Gates, Ninghui Li, Hao Peng, Bhaskar Pratim Sarma, Yuan Qi, Rahul Potharaju, Cristina Nita-Rotaru, Ian M. Molloy:
Generating Summary Risk Scores for Mobile Applications. IEEE Trans. Dependable Secur. Comput. 11(3): 238-251 (2014) - Puneet Gupta, Scott D. Stoller, Zhongyuan Xu:
Abductive Analysis of Administrative Policies in Rule-Based Access Control. IEEE Trans. Dependable Secur. Comput. 11(5): 412-424 (2014) - Kyuseung Han, Ganghee Lee, Kiyoung Choi:
Software-Level Approaches for Tolerating Transient Faults in a Coarse-GrainedReconfigurable Architecture. IEEE Trans. Dependable Secur. Comput. 11(4): 392-398 (2014) - Hannes Holm:
A Large-Scale Study of the Time Required to Compromise a Computer System. IEEE Trans. Dependable Secur. Comput. 11(1): 2-15 (2014) - Jianzhong Huang, Xiao Qin, Fenghao Zhang, Wei-Shinn Ku, Changsheng Xie:
MFTS: A Multi-Level Fault-Tolerant Archiving Storage with Optimized Maintenance Bandwidth. IEEE Trans. Dependable Secur. Comput. 11(6): 524-537 (2014) - Younho Lee:
Secure Ordered Bucketization. IEEE Trans. Dependable Secur. Comput. 11(3): 292-303 (2014) - Qinghua Li, Guohong Cao, Thomas F. La Porta:
Efficient and Privacy-Aware Data Aggregation in Mobile Sensing. IEEE Trans. Dependable Secur. Comput. 11(2): 115-129 (2014) - Xin Li, Xinyuan Wang, Wentao Chang:
CipherXRay: Exposing Cryptographic Operations and Transient Secrets from Monitored Binary Execution. IEEE Trans. Dependable Secur. Comput. 11(2): 101-114 (2014) - Marc Liberatore, Brian Neil Levine, Clay Shields, Brian Lynn:
Efficient Tagging of Remote Peers during Child Pornography Investigations. IEEE Trans. Dependable Secur. Comput. 11(5): 425-439 (2014) - Wen Ming Liu, Lingyu Wang, Pengsu Cheng, Kui Ren, Shunzhi Zhu, Mourad Debbabi:
PPTP: Privacy-Preserving Traffic Padding in Web-Based Applications. IEEE Trans. Dependable Secur. Comput. 11(6): 538-552 (2014) - Alessio Merlo, Mauro Migliardi, Nicola Gobbo, Francesco Palmieri, Aniello Castiglione:
A Denial of Service Attack to UMTS Networks Using SIM-Less Devices. IEEE Trans. Dependable Secur. Comput. 11(3): 280-291 (2014) - Noman Mohammed, Dima Alhadidi, Benjamin C. M. Fung, Mourad Debbabi:
Secure Two-Party Differentially Private Data Release for Vertically Partitioned Data. IEEE Trans. Dependable Secur. Comput. 11(1): 59-71 (2014) - Lotfi Ben Othmane, Pelin Angin, Harold Weffers, Bharat K. Bhargava:
Extending the Agile Development Process to Develop Acceptably Secure Software. IEEE Trans. Dependable Secur. Comput. 11(6): 497-509 (2014) - Libor Polcak, Jakub Jirasek, Petr Matousek:
Comment on "Remote Physical Device Fingerprinting". IEEE Trans. Dependable Secur. Comput. 11(5): 494-496 (2014) - Yang Qin, Dijiang Huang, Bing Li:
STARS: A Statistical Traffic Pattern Discovery System for MANETs. IEEE Trans. Dependable Secur. Comput. 11(2): 181-192 (2014) - Yogachandran Rahulamathavan, Raphael Chung-Wei Phan, Suresh Veluru, Kanapathippillai Cumanan, Muttukrishnan Rajarajan:
Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud. IEEE Trans. Dependable Secur. Comput. 11(5): 467-479 (2014) - Kizito Salako, Lorenzo Strigini:
When Does "Diversity" in Development Reduce Common Failures? Insights from Probabilistic Modeling. IEEE Trans. Dependable Secur. Comput. 11(2): 193-206 (2014) - Reza Shokri, George Theodorakopoulos, Panos Papadimitratos, Ehsan Kazemi, Jean-Pierre Hubaux:
Hiding in the Mobile Crowd: LocationPrivacy through Collaboration. IEEE Trans. Dependable Secur. Comput. 11(3): 266-279 (2014)
skipping 15 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-01 11:43 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint