Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 30 matches
- 2014
- Ioannis Agrafiotis, Philip A. Legg, Michael Goldsmith, Sadie Creese:
Towards a User and Role-based Sequential Behavioural Analysis Tool for Insider Threat Detection. J. Internet Serv. Inf. Secur. 4(4): 127-137 (2014) - Ram B. Basnet, Andrew H. Sung:
Learning to Detect Phishing Webpages. J. Internet Serv. Inf. Secur. 4(3): 21-39 (2014) - Jakub Breier:
Asset Valuation Method for Dependent Entities. J. Internet Serv. Inf. Secur. 4(3): 72-81 (2014) - Hsing-Chung Chen, Hui-Kai Su:
A Cooperative Trust Bit-Map Routing Protocol Using the GA Algorithm for Reducing the Damages from the InTs in WANETs. J. Internet Serv. Inf. Secur. 4(4): 52-70 (2014) - Mi-Young Cho, Young-Sook Jeong:
Face Recognition Performance Comparison of Fake Faces with Real Faces in Relation to Lighting. J. Internet Serv. Inf. Secur. 4(4): 82-90 (2014) - In Kyeom Cho, TaeGuen Kim, Yu Jin Shim, Haeryong Park, Bomin Choi, Eul Gyu Im:
Malware Similarity Analysis using API Sequence Alignments. J. Internet Serv. Inf. Secur. 4(4): 103-114 (2014) - Hiroshi Fujinoki, Christopher A. Chelmecki, David M. Henry:
Fail-Safe Security Architecture to Prevent Privacy Leaks from E-commerce Servers. J. Internet Serv. Inf. Secur. 4(2): 38-54 (2014) - Nan Guo, Jia Wang, Tianhan Gao, Kangbin Yim:
Privacy-Preserving Predicate Proof of Attributes with CL-Anonymous Credential. J. Internet Serv. Inf. Secur. 4(1): 37-46 (2014) - JaeCheol Ha, YongJe Choi, Dooho Choi, Hoonjae Lee:
Power Analysis Attacks on the Right-to-Left Square-Always Exponentiation Algorithm. J. Internet Serv. Inf. Secur. 4(4): 38-51 (2014) - Tomoyuki Ishida, Kazuhiro Takahagi, Akira Sakuraba, Noriki Uchida, Yoshitaka Shibata:
The Real-time Disaster Damage Information Sharing System for Information Acquiring in Large-scale Natural Disaster. J. Internet Serv. Inf. Secur. 4(3): 40-58 (2014) - Dongjin Kim, Seong-je Cho, Sangchul Han, Minkyu Park, Ilsun You:
Open Source Software Detection using Function-level Static Software Birthmark. J. Internet Serv. Inf. Secur. 4(4): 25-37 (2014) - Taerim Lee, Hun Kim, Kyung Hyune Rhee, Sang-Uk Shin:
Performance of Distributed Text Processing System Using Hadoop. J. Internet Serv. Inf. Secur. 4(1): 12-24 (2014) - Philip A. Legg, Oliver Buckley, Michael Goldsmith, Sadie Creese:
Visual Analytics of E-mail Sociolinguistics for User Behavioural Analysis. J. Internet Serv. Inf. Secur. 4(4): 1-13 (2014) - Fang-Yie Leu, Yi-Ting Hsiao:
A Grid System Detecting Internal Malicious Behaviors at System Call Level. J. Internet Serv. Inf. Secur. 4(4): 14-24 (2014) - Jingwei Li, Jin Li, Xiaofeng Chen, Zheli Liu, Chunfu Jia:
MobiShare+: Security Improved System for Location Sharing in Mobile Online Social Networks. J. Internet Serv. Inf. Secur. 4(1): 25-36 (2014) - Keying Li, Jianfeng Wang, Yinghui Zhang, Hua Ma:
Key Policy Attribute-based Proxy Re-encryption and RCCA Secure Scheme. J. Internet Serv. Inf. Secur. 4(2): 70-82 (2014) - Lidia Ogiela, Marek R. Ogiela:
Towards Cognitive Cryptography. J. Internet Serv. Inf. Secur. 4(1): 58-63 (2014) - Sangho Park, Jihyun Bang, Mirim Ahn, Woomin Lee, Taekyoung Kwon:
A Method for Hiding Link Layer Addresses Using Bloom Filter in Wireless Sensor Networks. J. Internet Serv. Inf. Secur. 4(4): 71-81 (2014) - Su-Wan Park, Jeong Hyun Yi:
Multiple Device Login Attacks and Countermeasures of Mobile VoIP Apps on Android. J. Internet Serv. Inf. Secur. 4(4): 115-126 (2014) - Wolter Pieters, Zofia Lukszo, Dina Hadziosmanovic, Jan van den Berg:
Reconciling Malicious and Accidental Risk in Cyber Security. J. Internet Serv. Inf. Secur. 4(2): 4-26 (2014) - Shunya Sakamoto, Kenji Okuda, Ryo Nakatsuka, Toshihiro Yamauchi:
DroidTrack: Tracking and Visualizing Information Diffusion for Preventing Information Leakage on Android. J. Internet Serv. Inf. Secur. 4(2): 55-69 (2014) - Kunwar Singh, C. Pandu Rangan, A. K. Banerjee:
Lattice Based Universal Re-encryption for Mixnet. J. Internet Serv. Inf. Secur. 4(1): 1-11 (2014) - Kunwar Singh, C. Pandu Rangan, A. K. Banerjee:
Guest Editorial: Special Issue on Cyber Security Protections and Applications. J. Internet Serv. Inf. Secur. 4(2): 1-3 (2014) - Mye M. Sohn, Saerom Kang, Hyun Jung Lee:
Integrated Data Model Development Framework for the Architecture Descriptions. J. Internet Serv. Inf. Secur. 4(4): 91-102 (2014) - Satoshi Tanaka, Takanori Yasuda, Kouichi Sakurai:
Fast Evaluation of Multivariate Quadratic Polynomials over GF(232) using Grahpics Processing Units. J. Internet Serv. Inf. Secur. 4(3): 1-20 (2014) - ChanChamnab Than, SangYong Han:
Improving Recommender Systems by Incorporating Similarity, Trust and Reputation. J. Internet Serv. Inf. Secur. 4(1): 64-76 (2014) - Kun-Lin Tsai, Fang-Yie Leu, Tien-Han Wu, Shin-shiuan Chiou, Yu-Wei Liu, Han-Yun Liu:
A Secure ECC-based Electronic Medical Record System. J. Internet Serv. Inf. Secur. 4(1): 47-57 (2014) - Revisiting the BAN-Modified Andrew Secure RPC Protocol. J. Internet Serv. Inf. Secur. 4(3): 82-96 (2014)
- Zhifeng Xiao, Yun Wang:
Leveraging Mobile Agents for Log Analysis in Data Center Networks. J. Internet Serv. Inf. Secur. 4(3): 59-71 (2014) - Jun Ye, Yong Ding, Xing-zhong Xiong, Shu-Lin Wu:
Dynamic Model for Anonymity Measurement Based on Information Entropy. J. Internet Serv. Inf. Secur. 4(2): 27-37 (2014)
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-07 07:34 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint