Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 51 matches
- 2023
- Yizheng Chen, Zhoujie Ding, Lamya Alowain, Xinyun Chen, David A. Wagner:
DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection. RAID 2023: 654-668 - Marco Abbadini, Dario Facchinetti, Gianluca Oldani, Matthew Rossi, Stefano Paraboschi:
NatiSand: Native Code Sandboxing for JavaScript Runtimes. RAID 2023: 639-653 - Md Tanvirul Alam, Dipkamal Bhusal, Youngja Park, Nidhi Rastogi:
Looking Beyond IoCs: Automatically Extracting Attack Patterns from External CTI. RAID 2023: 92-108 - Marco Alecci, Luca Attanasio, Alessandro Brighente, Mauro Conti, Eleonora Losiouk, Hideki Ochiai, Federico Turrin:
Beware of Pickpockets: A Practical Attack against Blocking Cards. RAID 2023: 195-206 - Marco Alecci, Mauro Conti, Francesco Marchiori, Luca Martinelli, Luca Pajola:
Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability. RAID 2023: 315-329 - Arwa Abdulkarim Al Alsadi, Kaichi Sameshima, Katsunari Yoshioka, Michel van Eeten, Carlos Hernandez Gañán:
Bin there, target that: Analyzing the target selection of IoT vulnerabilities in malware binaries. RAID 2023: 513-526 - Md Sakib Anwar, Chaoshun Zuo, Carter Yagemann, Zhiqiang Lin:
Extracting Threat Intelligence From Cheat Binaries For Anti-Cheating. RAID 2023: 17-31 - Supraja Baskaran, Lianying Zhao, Mohammad Mannan, Amr M. Youssef:
Measuring the Leakage and Exploitability of Authentication Secrets in Super-apps: The WeChat Case. RAID 2023: 727-743 - Erick Bauman, Jun Duan, Kevin W. Hamlen, Zhiqiang Lin:
Renewable Just-In-Time Control-Flow Integrity. RAID 2023: 580-594 - Connor Bolton, Yan Long, Jun Han, Josiah D. Hester, Kevin Fu:
Characterizing and Mitigating Touchtone Eavesdropping in Smartphone Motion Sensors. RAID 2023: 164-178 - Nicholas Boucher, Luca Pajola, Ilia Shumailov, Ross J. Anderson, Mauro Conti:
Boosting Big Brother: Attacking Search Engines with Encodings. RAID 2023: 700-713 - Joshua Bundt, Michael Davinroy, Ioannis Agadakos, Alina Oprea, William K. Robertson:
Black-box Attacks Against Neural Binary Function Detection. RAID 2023: 1-16 - Andrei Bytes, Prashant Hari Narayan Rajput, Constantine Doumanidis, Michail Maniatakos, Jianying Zhou, Nils Ole Tippenhauer:
FieldFuzz: In Situ Blackbox Fuzzing of Proprietary Industrial Automation Runtimes via the Network. RAID 2023: 499-512 - Xabier Sáez de Cámara, Jose Luis Flores, Cristóbal Arellano, Aitor Urbieta, Urko Zurutuza:
Federated Explainability for Network Anomaly Characterization. RAID 2023: 346-365 - Tong Cao, Xin Li:
Temporary Block Withholding Attacks on Filecoin's Expected Consensus. RAID 2023: 109-122 - Bocheng Chen, Guangjing Wang, Hanqing Guo, Yuanda Wang, Qiben Yan:
Understanding Multi-Turn Toxic Behaviors in Open-Domain Chatbots. RAID 2023: 282-296 - Jingting Chen, Feng Li, Qingfang Chen, Ping Li, Lili Xu, Wei Huo:
EBugDec: Detecting Inconsistency Bugs caused by RFC Evolution in Protocol Implementations. RAID 2023: 412-425 - Zeyu Chen, Daiping Liu, Jidong Xiao, Haining Wang:
All Use-After-Free Vulnerabilities Are Not Created Equal: An Empirical Study on Their Characteristics and Detectability. RAID 2023: 623-638 - Abdullahi Chowdhury, Hung X. Nguyen:
CoZure: Context Free Grammar Co-Pilot Tool for Finding New Lateral Movements in Azure Active Directory. RAID 2023: 426-439 - Arthur Drichel, Ulrike Meyer:
False Sense of Security: Leveraging XAI to Analyze the Reasoning and True Performance of Context-less DGA Classifiers. RAID 2023: 330-345 - Alexander J. Gaidis, Joao Moreira, Ke Sun, Alyssa Milburn, Vaggelis Atlidakis, Vasileios P. Kemerlis:
FineIBT: Fine-grain Control-flow Enforcement with Indirect Branch Tracking. RAID 2023: 527-546 - Hanqing Guo, Guangjing Wang, Yuanda Wang, Bocheng Chen, Qiben Yan, Li Xiao:
PhantomSound: Black-Box, Query-Efficient Audio Adversarial Attack via Split-Second Phoneme Injection. RAID 2023: 366-380 - Eric Gustafson, Paul Grosen, Nilo Redini, Saagar Jha, Andrea Continella, Ruoyu Wang, Kevin Fu, Sara Rampazzi, Christopher Kruegel, Giovanni Vigna:
Shimware: Toward Practical Security Retrofitting for Monolithic Firmware Images. RAID 2023: 32-45 - Zijun Hang, Yuliang Lu, Yongjie Wang, Yi Xie:
Flow-MAE: Leveraging Masked AutoEncoder for Accurate, Efficient and Robust Malicious Traffic Classification. RAID 2023: 297-314 - Qiuye He, Song Fang:
Phantom-CSI Attacks against Wireless Liveness Detection. RAID 2023: 440-454 - Mathé Hertogh, Manuel Wiesinger, Sebastian Österlund, Marius Muench, Nadav Amit, Herbert Bos, Cristiano Giuffrida:
Quarantine: Mitigating Transient Execution Attacks with Physical Domain Isolation. RAID 2023: 207-221 - Yuhei Kawakoya, Shu Akabane, Makoto Iwamura, Takeshi Okamoto:
Xunpack: Cross-Architecture Unpacking for Linux IoT Malware. RAID 2023: 471-484 - Hyunjun Kim, Yungi Cho, Younghan Lee, Ho Bae, Yunheung Paek:
Exploring Clustered Federated Learning's Vulnerability against Property Inference Attack. RAID 2023: 236-249 - Taeyoung Kim, Seonhye Park, Hyoungshick Kim:
Why Johnny Can't Use Secure Docker Images: Investigating the Usability Challenges in Using Docker Image Vulnerability Scanners through Heuristic Evaluation. RAID 2023: 669-685 - Isaiah J. King, Xiaokui Shu, Jiyong Jang, Kevin Eykholt, Taesung Lee, H. Howie Huang:
EdgeTorrent: Real-time Temporal Graph Representations for Intrusion Detection. RAID 2023: 77-91
skipping 21 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-13 03:10 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint