default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 109 matches
- 2010
- A. A. Adekunle, S. R. Woodhead:
Zone Based Systems Design Framework for the Realisation of Efficient Block Cipher Based Message Authentication Code Algorithms. ARES 2010: 216-221 - Mansoor Ahmed, Amin Anjomshoaa, Muhammad Asfand-e-yar, A Min Tjoa, Abid Khan:
Towards an Ontology-Based Solution for Managing License Agreement Using Semantic Desktop. ARES 2010: 309-314 - Laila El Aimani, Yona Raekow:
Reselling Digital Content. ARES 2010: 391-396 - Esma Aïmeur, Sébastien Gambs, Ai Ho:
Towards a Privacy-Enhanced Social Networking Site. ARES 2010: 172-179 - Ziyad S. Al-Salloum, Stephen D. Wolthusen:
Security and Performance Aspects of an Agent-Based Link-Layer Vulnerability Discovery Mechanism. ARES 2010: 549-554 - Jorge Blasco Alís, Agustín Orfila, Arturo Ribagorda:
Improving Network Intrusion Detection by Means of Domain-Aware Genetic Programming. ARES 2010: 327-332 - Juhani Anttila, Jorma Kajava:
Challenging IS and ISM Standardization for Business Benefits. ARES 2010: 416-421 - Yudistira Asnar, Paolo Giorgini:
Multi-dimensional Uncertainty Analysis in Secure and Dependable Domain. ARES 2010: 148-155 - Jocelyn Aubert, Thomas Schaberreiter, Christophe Incoul, Djamel Khadraoui, Benjamin Gâteau:
Risk-Based Methodology for Real-Time Security Monitoring of Interdependent Services in Critical Infrastructures. ARES 2010: 262-267 - Stefan Axelsson:
Using Normalized Compression Distance for Classifying File Fragments. ARES 2010: 641-646 - Benjamin Aziz, Alvaro Arenas, Giovanni Cortese, Bruno Crispo, Silvio Causetti:
A Secure and Scalable Grid-Based Content Management System. ARES 2010: 404-409 - Egil Trygve Baadshaug, Gencer Erdogan, Per Håkon Meland:
Security Modeling and Tool Support Advantages. ARES 2010: 537-542 - Dejan Baca:
Identifying Security Relevant Warnings from Static Code Analysis Tools through Code Tainting. ARES 2010: 386-390 - Somayeh Bahramnejad, Hamid R. Zarandi:
An Adaptive Redundancy Oriented Method to Tolerate Soft Errors in SRAM-Based FPGAs Using Unused Resources. ARES 2010: 119-124 - Steffen Bartsch:
Supporting Authorization Policy Modification in Agile Development of Web Applications. ARES 2010: 495-500 - Fatima-Zohra Benhamida, Yacine Challal:
FaT2D: Fault Tolerant Directed Diffusion for Wireless Sensor Networks. ARES 2010: 112-118 - Maximilian Bielecki, Gerald Quirchmayr:
A Prototype for Support of Computer Forensic Analysis Combined with the Expected Knowledge Level of an Attacker to More Efficiently Achieve Investigation Results. ARES 2010: 696-701 - Natasha Bodorik, Nur Zincir-Heywood:
One Size Fits None: The Importance of Detector Parameterization. ARES 2010: 487-494 - Martin Boldt, Anton Borg, Bengt Carlsson:
On the Simulation of a Software Reputation System. ARES 2010: 333-340 - Ines Brosso, Alessandro La Neve, Graça Bressan, Wilson Vicente Ruggiero:
A Continuous Authentication System Based on User Behavior Analysis. ARES 2010: 380-385 - Achim D. Brucker, Dieter Hutter:
Information Flow in Disaster Management Systems. ARES 2010: 156-163 - Gerardo Canfora, Bice Cavallo:
A Probabilistic Approach for On-Line Sum-Auditing. ARES 2010: 303-308 - Hao Chen, John A. Clark, Siraj A. Shaikh, Howard Chivers, Philip Nobles:
Optimising IDS Sensor Placement. ARES 2010: 315-320 - Kassidy P. Clark, Martijn Warnier, Frances M. T. Brazier, Thomas B. Quillinan:
Secure Monitoring of Service Level Agreements. ARES 2010: 454-461 - Jordan Crain, Lukasz Opyrchal, Atul Prakash:
Fighting Phishing with Trusted Email. ARES 2010: 462-467 - Huning Dai, Christian Murphy, Gail E. Kaiser:
Configuration Fuzzing for Software Vulnerability Detection. ARES 2010: 525-530 - Yun Ding, Karsten Klein:
Model-Driven Application-Level Encryption for the Privacy of E-health Data. ARES 2010: 341-346 - Stefan Durbeck, Christoph Fritsch, Günther Pernul, Rolf Schillinger:
A Semantic Security Architecture for Web Services. ARES 2010: 222-227 - Yehia Elrakaiby, Frédéric Cuppens, Nora Cuppens-Boulahia:
From Contextual Permission to Dynamic Pre-obligation: An Integrated Approach. ARES 2010: 70-78 - Gregory Epiphaniou, Carsten Maple, Paul Sant, Matthew Reeve:
Affects of Queuing Mechanisms on RTP Traffic: Comparative Analysis of Jitter, End-to-End Delay and Packet Loss. ARES 2010: 33-40
skipping 79 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-19 05:41 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint