Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 49 matches
- 2015
- Yongzheng Zhang, Tao Xu, Yipeng Wang, Jianliang Sun, Xiaoyu Zhang:
A Markov Random Field Approach to Automated Protocol Signature Inference. SecureComm 2015: 459-476 - Ala' F. A. Aburumman, Wei Jye Seo, Md. Rafiqul Islam, Muhammad Khurram Khan, Kim-Kwang Raymond Choo:
A Secure Cross-Domain SIP Solution for Mobile Ad Hoc Network Using Dynamic Clustering. SecureComm 2015: 649-664 - Mohsen Alimomeni, Reihaneh Safavi-Naini:
How to Prevent to Delegate Authentication. SecureComm 2015: 477-499 - Ahmad Atamli-Reineh, Andrew P. Martin:
Securing Application with Software Partitioning: A Case Study Using SGX. SecureComm 2015: 605-621 - Chanwoo Bae, Jesung Jung, Jaehyun Nam, Seungwon Shin:
POSTER: A Collaborative Approach on Behavior-Based Android Malware Detection. SecureComm 2015: 594-597 - Yoann Bertrand, Mireille Blay-Fornarino, Karima Boudaoud, Michel Riveill:
Generation of Transmission Control Rules Compliant with Existing Access Control Policies. SecureComm 2015: 438-455 - Kai Cao, Yunchun Li, Hailong Yang, Jiqiang Tang, Xiaoxiang Zou:
POSTER: An Online Prefix-Preserving IP Address Anonymization Algorithm for Passive Measurement Systems. SecureComm 2015: 581-584 - Yueqiang Cheng, Qing Li, Miao Yu, Xuhua Ding, Qingni Shen:
SuperCall: A Secure Interface for Isolated Execution Environment to Dynamically Use External Services. SecureComm 2015: 193-211 - Mozammel Chowdhury, Junbin Gao, Morshed U. Chowdhury:
Image Spam Classification Using Neural Network. SecureComm 2015: 622-632 - Mozammel Chowdhury, Junbin Gao, Rafiqul Islam:
Human Surveillance System for Security Application. SecureComm 2015: 711-724 - Carlos Garcia Cordero, Emmanouil Vasilomanolakis, Max Mühlhäuser, Mathias Fischer:
Community-Based Collaborative Intrusion Detection. SecureComm 2015: 665-681 - Stefan Craß, Gerson Joskowicz, Eva Kühn:
A Decentralized Access Control Model for Dynamic Collaboration of Autonomous Peers. SecureComm 2015: 519-537 - Priyabrat Dash, Chris Perkins, Ryan M. Gerdes:
Remote Activation of Hardware Trojans via a Covert Temperature Channel. SecureComm 2015: 294-310 - Xuejie Ding, Wei-qing Huang, Meng Zhang, Jianlin Zhao:
POSTER: A Security Adaptive Steganography System Applied on Digital Audio. SecureComm 2015: 567-571 - André Ebert, Chadly Marouane, Benno Rott, Martin Werner:
KeyPocket - Improving Security and Usability for Provider Independent Login Architectures with Mobile Devices. SecureComm 2015: 41-57 - Karim Emara, Wolfgang Woerndl, Johann H. Schlichter:
POSTER: Context-Adaptive User-Centric Privacy Scheme for VANET. SecureComm 2015: 590-593 - Yuejian Fang, Zilong Wen, Qingni Shen, Yahui Yang, Zhonghai Wu:
POSTER: Ciphertext-Policy Attribute-Based Encryption Method with Secure Decryption Key Generation and Outsourcing Decryption of ABE Ciphertexts. SecureComm 2015: 585-589 - Vitaly Ford, Ambareen Siraj:
POSTER: Reliable and Efficient Protection of Consumer Privacy in Advanced Metering Infrastructure. SecureComm 2015: 563-566 - Hugo Gascon, Christian Wressnegger, Fabian Yamaguchi, Daniel Arp, Konrad Rieck:
Pulsar: Stateful Black-Box Fuzzing of Proprietary Network Protocols. SecureComm 2015: 330-347 - Jinkun Geng, Daren Ye, Ping Luo, Pin Lv:
A Novel Clustering Algorithm for Database Anomaly Detection. SecureComm 2015: 682-696 - Gustavo Gonzalez Granadillo, Joaquín García-Alfaro, Hervé Debar:
Using a 3D Geometrical Model to Improve Accuracy in the Evaluation and Selection of Countermeasures Against Complex Cyber Attacks. SecureComm 2015: 538-555 - Chunqiang Hu, Xiuzhen Cheng, Zhi Tian, Jiguo Yu, Kemal Akkaya, Limin Sun:
An Attribute-Based Signcryption Scheme to Secure Attribute-Defined Multicast Communications. SecureComm 2015: 418-437 - M. Arif Khan, Rafiqul Islam:
Secrecy Rate Based User Selection Algorithms for Massive MIMO Wireless Networks. SecureComm 2015: 697-710 - Dae Wook Kim, Junjie Zhang:
You Are How You Query: Deriving Behavioral Fingerprints from DNS Traffic. SecureComm 2015: 348-366 - Song Li, Hai-Xin Duan, Zhiliang Wang, Xing Li:
Route Leaks Identification by Detecting Routing Loops. SecureComm 2015: 313-329 - Yongfeng Li, Tong Shen, Xin Sun, Xuerui Pan, Bing Mao:
Detection, Classification and Characterization of Android Malware Using API Data Dependency. SecureComm 2015: 23-40 - Yongbo Li, Fan Yao, Tian Lan, Guru Venkataramani:
POSTER: Semantics-Aware Rule Recommendation and Enforcement for Event Paths. SecureComm 2015: 572-576 - Hong Liu, Hongmin Li, Eugene Y. Vasserman:
Practicality of Using Side-Channel Analysis for Software Integrity Checking of Embedded Systems. SecureComm 2015: 277-293 - Khandakar Rabbi, Quazi Mamun:
An Effective t-way Test Data Generation Strategy. SecureComm 2015: 633-648 - Vaibhav Rastogi, Zhengyang Qu, Jedidiah McClurg, Yinzhi Cao, Yan Chen:
Uranine: Real-time Privacy Leakage Monitoring without System Modification for Android. SecureComm 2015: 256-276
skipping 19 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-25 13:15 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint