Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 86 matches
- 2013
- Robert Koch, Mario Golling, Gabi Dreo Rodosek:
An architecture for supervising COTS products. CNS 2013: 403-404 - Robert Koch, Mario Golling, Gabi Dreo Rodosek:
Attracting sophisticated attacks to secure systems: A new honeypot architecture. CNS 2013: 409-410 - Aditi Gupta, Michael S. Kirkpatrick, Elisa Bertino:
A secure architecture design based on application isolation, code minimization and randomization. CNS 2013: 423-429 - Massimiliano Albanese, Alessandra De Benedictis, Sushil Jajodia, Kun Sun:
A moving target defense mechanism for MANETs based on identity virtualization. CNS 2013: 278-286 - Mohammed Noraden Alsaleh, Saeed Al-Haj, Ehab Al-Shaer:
Objective metrics for firewall security: A holistic view. CNS 2013: 470-477 - Michael Atighetchi, Nathaniel Soule, Partha P. Pal, Joseph P. Loyall, Asher Sinclair, Robert Grant:
Safe configuration of TLS connections. CNS 2013: 415-422 - Mansurul Bhuiyan, Aziz Mohaisen, Yannis Labrou, Mohammad Al Hasan:
Characterization of the dynamics and interactions of domain names and name server. CNS 2013: 387-388 - Khalid Zaman Bijon, Ram Krishnan, Ravi S. Sandhu:
A framework for risk-aware role based access control. CNS 2013: 462-469 - Christian Callegari, Alessandro Casella, Stefano Giordano, Michele Pagano, Teresa Pepe:
Sketch-based multidimensional IDS: A new approach for network anomaly detection. CNS 2013: 350-358 - Zhigang Chen, Xin Hu, Xiaoen Ju, Kang G. Shin:
LISA: Location information ScrAmbler for privacy protection on smartphones. CNS 2013: 296-304 - Ray-Guang Cheng, Po-Yao Tsai, Ping-Chen Lin, Chia-Liang Lian, Tse-Han Liu, Hsien-Cheng Chou, Shiao-Li Tsao, Shanchieh Jay Yang:
Design and implementation of a Skype Protocol Analyzer. CNS 2013: 375-376 - Sunghyun Choi, Kang G. Shin:
Secure cooperative spectrum sensing in cognitive radio networks using interference signatures. CNS 2013: 19-27 - Christian S. Collberg, Aaron Gibson, Sam Martin, Nitin Shinde, Amir Herzberg, Haya Schulmann:
Provenance of exposure: Identifying sources of leaked documents. CNS 2013: 367-368 - Christian Doerr:
Challenge tracing and mitigation under partial information and uncertainty. CNS 2013: 446-453 - Haitao Du, Shanchieh Jay Yang:
Sequential modeling for obfuscated network attack action sequences. CNS 2013: 389-390 - Qi Duan, Ehab Al-Shaer, Jafar Haadi Jafarian:
Efficient Random Route Mutation considering flow and network constraints. CNS 2013: 260-268 - Juan A. Elices, Fernando Pérez-González:
Locating Tor hidden services through an interval-based traffic-correlation attack. CNS 2013: 385-386 - William M. Fitzgerald, Simon N. Foley:
Avoiding inconsistencies in the Security Content Automation Protocol. CNS 2013: 454-461 - Jérôme François, Radu State, Thomas Engel:
Aggregated representations and metrics for scalable flow analysis. CNS 2013: 478-482 - Kyle Guan, Peter J. Winzer, Emina Soljanin, Antonia M. Tulino:
On the secrecy capacity of the space-division multiplexed fiber optical communication systems. CNS 2013: 207-214 - Linke Guo, Chi Zhang, Yuguang Fang:
Privacy-preserving revocable content sharing in geosocial networks. CNS 2013: 118-126 - Jason Gustafson, Jun Li:
Leveraging the crowds to disrupt phishing. CNS 2013: 82-90 - Youngjune Gwon, Siamak Dastangoo, Carl Fossa, H. T. Kung:
Competing Mobile Network Game: Embracing antijamming and jamming strategies with reinforcement learning. CNS 2013: 28-36 - Thomas R. Halford, Thomas A. Courtade, Keith M. Chugg:
Energy-efficient, secure group key agreement for ad hoc networks. CNS 2013: 181-188 - Qiyi Han, Lin Yu, Rui Zhang, Hong Wen, Yuanpeng Xie, Xiping Zhu, Yixin Jiang, Xiaobin Guo:
A P2P recommended trust nodes selection algorithm based on topological potential. CNS 2013: 395-396 - Xiaofan He, Huaiyu Dai, Peng Ning:
Dynamic adaptive anti-jamming via controlled mobility. CNS 2013: 1-9 - Amir Herzberg, Haya Schulmann:
Fragmentation Considered Poisonous, or: One-domain-to-rule-them-all.org. CNS 2013: 224-232 - Amir Herzberg, Haya Schulmann:
DNSSEC: Security and availability challenges. CNS 2013: 365-366 - Shun-Wen Hsiao, Yi-Ning Chen, Yeali S. Sun, Meng Chang Chen:
A cooperative botnet profiling and detection in virtualized environment. CNS 2013: 154-162 - Kekai Hu, Harikrishnan Chandrikakutty, Russell Tessier, Tilman Wolf:
Scalable hardware monitors to protect network processors from data plane attacks. CNS 2013: 314-322
skipping 56 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-25 18:47 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint