Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 35 matches
- 2023
- Jörg Keller, Carina Heßeling:
Improving Covert Channel Bandwidth by Variable-Length Exponent Re-Coding in Floating-Point Representations. EICC 2023: 125-128 - Georgios Agrafiotis, Eftychia Makri, Antonios Lalas, Konstantinos Votis, Dimitrios Tzovaras, Nikolaos Tsampieris:
A Deep Learning-based Malware Traffic Classifier for 5G Networks Employing Protocol-Agnostic and PCAP-to-Embeddings Techniques. EICC 2023: 193-194 - Sidra Aslam, Ala Altaweel, Ibrahim Kamel:
Exposed-mode of Wormhole Attack in Opportunistic Mobile Networks: Impact Study and Analysis. EICC 2023: 19-25 - Martin Atzmueller, Sophia Sylvester, Rushed Kanawati:
Exploratory and Explanation-Aware Network Intrusion Profiling using Subgroup Discovery and Complex Network Analysis. EICC 2023: 153-158 - Umit Cali, Ferhat Özgür Çatak, Zsolt György Balogh, Rita Maria Ugarelli, Martin Gilje Jaatun:
Cyber-physical Hardening of the Digital Water Infrastructure. EICC 2023: 181-188 - Umit Cali, Marthe Fogstad Dynge, Ahmed Idries, Sambeet Mishra, Ivanko Dmytro, Naser Hashemipour, Murat Kuzlu:
Digital Energy Platforms Considering Digital Privacy and Security by Design Principles. EICC 2023: 167-173 - Umit Cali, Murat Kuzlu, Onur Elma, Osman Gazi Gucluturk, Ahmet Kilic, Ferhat Özgür Çatak:
Cybersecurity and Digital Privacy Aspects of V2X in the EV Charging Structure. EICC 2023: 174-180 - Elvira Castillo-Fernández, Jesús Esteban Díaz Verdejo, Rafael M. Estepa-Alonso, Antonio Jose Estepa Alonso, Javier Muñoz-Calle, Germán Madinabeitia:
Multistep Cyberattacks Detection using a Flexible Multilevel System for Alerts and Events Correlation. EICC 2023: 1-6 - Chia-Mei Chen, Fang-Hsuan Hsu, Jenq-Neng Hwang:
Useful Cyber Threat Intelligence Relation Retrieval Using Transfer Learning. EICC 2023: 42-46 - Matteo Curcio:
Cybercrime and Video Games: Exploring children's safety in the gaming environment. EICC 2023: 144-148 - Venkata Satya Sai Ajay Daliparthi, Nurul Momen, Kurt Tutschku, Miguel de Prado:
ViSDM: A Liquid Democracy based Visual Data Marketplace for Sovereign Crowdsourcing Data Collection. EICC 2023: 108-115 - Robin Duraz, David Espes, Julien Francq, Sandrine Vaton:
Cyber Informedness: A New Metric using CVSS to Increase Trust in Intrusion Detection Systems. EICC 2023: 53-58 - Vahiny Gnanasekaran, Katrien De Moor:
Usability, Security, and Privacy Recommendations for Mobile Parental Control. EICC 2023: 138-143 - Petra Grd, Ena Barcic, Igor Tomicic, Bogdan Okresa Duric:
Analysing the Impact of Gender Classification on Age Estimation. EICC 2023: 134-137 - Mordechai Guri:
CLOUDOSCOPE: Detecting Anti-Forensic Malware using Public Cloud Environments. EICC 2023: 100-107 - Peter Hamm, Sebastian Pape, David Harborth:
Acceptance Factors and Obstacles for Cryptocurrency Adoption. EICC 2023: 26-33 - Kris Heid, Vincent Andrae, Jens Heider:
Towards detecting device fingerprinting on iOS with API function hooking. EICC 2023: 78-84 - Johanna Henrich, Andreas Heinemann, Martin Stiemerling, Fabian Seidl:
Crypto-agile Design and Testbed for QKD-Networks. EICC 2023: 191-192 - Patrick Himler, Max Landauer, Florian Skopik, Markus Wurzenberger:
Towards Detecting Anomalies in Log-Event Sequences with Deep Learning: Open Research Challenges. EICC 2023: 71-77 - Sascha Löbner, Christian Gartner, Frédéric Tronnier:
Privacy Preserving Data Analysis with the Encode, Shuffle, Analyse Architecture in Vehicular Data Sharing. EICC 2023: 85-91 - Anze Mihelic, Igor Bernik, Simon Vrhovec:
Older adults and tablet computers: Adoption and the role of perceived threat of cyber attacks. EICC 2023: 189-190 - Lasse Nitz, Avikarsha Mandal:
DGA Detection Using Similarity-Preserving Bloom Encodings. EICC 2023: 116-120 - Omer Said Ozturk, Emre Ekmekcioglu, Orçun Çetin, Budi Arief, Julio C. Hernandez-Castro:
New Tricks to Old Codes: Can AI Chatbots Replace Static Code Analysis Tools? EICC 2023: 13-18 - Fariborz Lohrabi Pour, Dong Sam Ha:
Effect of Power Conversion Efficiency of the RF Energy Harvester on the Security and Data Rate of the Self-Sustainable IoT Devices. EICC 2023: 121-124 - Venkata Sai Charan Putrevu, Hrushikesh Chunduri, Mohan Anand Putrevu, Sandeep K. Shukla:
A Framework for Advanced Persistent Threat Attribution using Zachman Ontology. EICC 2023: 34-41 - Farzana Quayyum:
Collaboration between parents and children to raise cybersecurity awareness. EICC 2023: 149-152 - Ciaran Reilly, Stephen O'Shaughnessy, Christina Thorpe:
Robustness of Image-Based Malware Classification Models trained with Generative Adversarial Networks. EICC 2023: 92-99 - Agustín Walabonso Lara Romero, Juan Antonio Ternero Muñiz, Rafael M. Estepa-Alonso, Antonio Jose Estepa Alonso, Fernando Ruiz Robles, Jesús Esteban Díaz Verdejo:
HTTP Cyberattacks Detection through Automatic Signature Generation in multi-site IoT Deployments. EICC 2023: 65-70 - Yashovardhan Sharma, Simon Birnbach, Ivan Martinovic:
RADAR: A TTP-based Extensible, Explainable, and Effective System for Network Traffic Analysis and Malware Detection. EICC 2023: 159-166 - Alvhild Skjelvik, Arnstein Vestad:
Digital safety alarms - Exploring the understandings of the cybersecurity practice in Norwegian municipalities. EICC 2023: 129-133
skipping 5 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-09 04:07 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint