Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 44 matches
- 2022
- Hassan Ali, Muhammad Suleman Khan, Ala I. Al-Fuqaha, Junaid Qadir:
Tamp-X: Attacking explainable natural language classifiers through tampered activations. Comput. Secur. 120: 102791 (2022) - Pedro H. Barros, Eduarda T. C. Chagas, Leonardo B. Oliveira, Fabiane Queiroz, Heitor S. Ramos:
Malware-SMELL: A zero-shot learning strategy for detecting zero-day vulnerabilities. Comput. Secur. 120: 102785 (2022) - Richard L. Baskerville, Jongwoo Kim, Carl Stucke:
The cybersecurity risk estimation engine: A tool for possibility based risk analysis. Comput. Secur. 120: 102752 (2022) - Craig Beaman, Michael Redbourne, J. Darren Mummery, Saqib Hakak:
Fuzzing vulnerability discovery techniques: Survey, challenges and future directions. Comput. Secur. 120: 102813 (2022) - Oliver Buckley, Duncan Hodges, Jonathan Windle, Sally Earl:
CLICKA: Collecting and leveraging identity cues with keystroke dynamics. Comput. Secur. 120: 102780 (2022) - Rajasekhar Chaganti, Vinayakumar Ravi, Tuan D. Pham:
Deep learning based cross architecture internet of things malware detection and classification. Comput. Secur. 120: 102779 (2022) - El Balmany Chawki, Zakariae Tbatou, Ahmed Asimi, Mohamed Bamarouf:
Secure Virtual Machine Image Storage Process into a Trusted Zone-based Cloud Storage. Comput. Secur. 120: 102815 (2022) - Li Chen, Cong Tang, Junjiang He, Hui Zhao, Xiaolong Lan, Tao Li:
XSS adversarial example attacks based on deep reinforcement learning. Comput. Secur. 120: 102831 (2022) - Xuyang Chen, Xiaolu Zhang, Michael Elliot, Xiaoyin Wang, Feng Wang:
Fix the leaking tap: A survey of Trigger-Action Programming (TAP) security issues, detection techniques and solutions. Comput. Secur. 120: 102812 (2022) - Pietro Colombo, Elena Ferrari, Engin Deniz Tümer:
Efficient ABAC based information sharing within MQTT environments under emergencies. Comput. Secur. 120: 102829 (2022) - Lei Cui, Jiancong Cui, Zhiyu Hao, Lun Li, Zhenquan Ding, Yongji Liu:
An empirical study of vulnerability discovery methods over the past ten years. Comput. Secur. 120: 102817 (2022) - Yansong Dong, Long Tang, Cong Tian, Bin Yu, Zhenhua Duan:
Improving transferability of adversarial examples by saliency distribution and data augmentation. Comput. Secur. 120: 102811 (2022) - Steven Furnell:
Assessing website password practices - Unchanged after fifteen years? Comput. Secur. 120: 102790 (2022) - Hemangi Goswami, Hiten Choudhury:
Remote Registration and Group Authentication of IoT Devices in 5G Cellular Network. Comput. Secur. 120: 102806 (2022) - Kathrin Grosse, Taesung Lee, Battista Biggio, Youngja Park, Michael Backes, Ian M. Molloy:
Backdoor smoothing: Demystifying backdoor attacks on deep neural networks. Comput. Secur. 120: 102814 (2022) - Alejandro Guerra-Manzanares, Marcin Luckner, Hayretdin Bahsi:
Concept drift and cross-device behavior: Challenges and implications for effective android malware detection. Comput. Secur. 120: 102757 (2022) - Jorge L. Guerra, Carlos Adrián Catania, Eduardo E. Veas:
Datasets are not enough: Challenges in labeling network traffic. Comput. Secur. 120: 102810 (2022) - Mohamed Hammad, Nabil M. Hewahi, Wael Elmedany:
MMM-RF: A novel high accuracy multinomial mixture model for network intrusion detection systems. Comput. Secur. 120: 102777 (2022) - Shuai Jiang, Cai Fu, Yekui Qian, Shuai He, Jianqiang Lv, Lansheng Han:
IFAttn: Binary code similarity analysis based on interpretable features with attention. Comput. Secur. 120: 102804 (2022) - Hyeonseong Jo, Yongjae Lee, Seungwon Shin:
Vulcan: Automatic extraction and analysis of cyber threat intelligence from unstructured text. Comput. Secur. 120: 102763 (2022) - Naurin Farooq Khan, Amber Yaqoob, Muhammad Saud Khan, Naveed Ikram:
The cybersecurity behavioral research: A tertiary study. Comput. Secur. 120: 102826 (2022) - Jae-Yeol Kim, Hyuk-Yoon Kwon:
Threat classification model for security information event management focusing on model efficiency. Comput. Secur. 120: 102789 (2022) - Rajesh Kumar, Siddharth Sharma, Chirag Vachhani, Nitish Yadav:
What changed in the cyber-security after COVID-19? Comput. Secur. 120: 102821 (2022) - Yong-Gang Li, Yeh-Ching Chung, Yu Bao, Yi Lu, Shanqing Guo, Guoyuan Lin:
KPointer: Keep the code pointers on the stack point to the right code. Comput. Secur. 120: 102781 (2022) - Jianbing Liang, Shuhui Chen, Ziling Wei, Shuang Zhao, Wei Zhao:
HAGDetector: Heterogeneous DGA domain name detection model. Comput. Secur. 120: 102803 (2022) - Milton V. M. Lima, Ricardo Lima, Fernando Lins, Michel S. Bonfim:
Beholder - A CEP-based intrusion detection and prevention systems for IoT environments. Comput. Secur. 120: 102824 (2022) - Imran Makhdoom, Mehran Abolhasan, Justin Lipman:
A comprehensive survey of covert communication techniques, limitations and future challenges. Comput. Secur. 120: 102784 (2022) - Alok Mishra, Yehia Ibrahim Alzoubi, Memoona Javeria Anwar, Asif Qumer Gill:
Attributes impacting cybersecurity policy development: An evidence from seven nations. Comput. Secur. 120: 102820 (2022) - Hardhik Mohanty, Arousha Haghighian Roudsari, Arash Habibi Lashkari:
Robust stacking ensemble model for darknet traffic classification under adversarial settings. Comput. Secur. 120: 102830 (2022) - Nitin Naik, Paul Grace, Paul Jenkins, Kshirasagar Naik, Jingping Song:
An evaluation of potential attack surfaces based on attack tree modelling and risk matrix applied to self-sovereign identity. Comput. Secur. 120: 102808 (2022)
skipping 14 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-04 17:20 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint