Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 25 matches
- 2015
- Siamak Aram, Ikramullah Khosa, Eros Pasero:
Conserving Energy Through Neural Prediction of Sensed Data. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6(1): 74-97 (2015) - Fabrizio Baiardi, Federico Tonelli, Alessandro Bertolini, Roberto Bertolotti:
Selecting Countermeasures for ICT Systems Before They are Attacked. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6(2): 58-77 (2015) - Giuseppe Cicotti, Luigi Coppolino, Salvatore D'Antonio, Luigi Romano:
Runtime Model Checking for SLA Compliance Monitoring and QoS Prediction. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6(2): 4-20 (2015) - Andrey Fedorchenko, Igor V. Kotenko, Andrey Chechulin:
Integrated Repository of Security Information for Network Security Evaluation. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6(2): 41-57 (2015) - Gaurang Gavai, Kumar Sricharan, Dave Gunning, John Hanley, Mudita Singhal, Rob Rolleston:
Supervised and Unsupervised methods to detect Insider Threat from Enterprise Social and Online Activity Data. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6(4): 47-63 (2015) - Nam Ky Giang, Janggwan Im, Daeyoung Kim, Markus Jung, Wolfgang Kastner:
Integrating the EPCIS and Building Automation System into the Internet of Things: a Lightweight and Interoperable Approach. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6(1): 56-73 (2015) - David Guillén Jiménez, Franck Le Gall:
Testing a Commercial Sensor Platform for Wideband Applications based on the 802.15.4 standard. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6(1): 24-36 (2015) - Igor V. Kotenko:
Guest Editorial: Security in Distributed and Network-Based Computing. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6(2): 1-3 (2015) - Gökhan Kul, Shambhu J. Upadhyaya:
Towards a Cyber Ontology for Insider Threats in the Financial Sector. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6(4): 64-85 (2015) - Sehrish Malik, Jong-Hyouk Lee:
Privacy Enhancing Factors in People-Nearby Applications. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6(2): 113-121 (2015) - Andrew Stephen McGough, Budi Arief, Carl Gamble, David Wall, John Brennan, John S. Fitzgerald, Aad P. A. van Moorsel, Sujeewa Alwis, Georgios Theodoropoulos, Ed Ruck-Keene:
Ben-ware: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6(4): 3-46 (2015) - Lewis Nkenyereye, Bayu Adhi Tama, Youngho Park, Kyung Hyune Rhee:
A Fine-Grained Privacy Preserving Protocol over Attribute Based Access Control for VANETs. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6(2): 98-112 (2015) - Jonghwa Park, Hyojung Kim, Younsik Jeong, Seong-je Cho, Sangchul Han, Minkyu Park:
Effects of Code Obfuscation on Android App Similarity Analysis. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6(4): 86-98 (2015) - Boris Pokric, Srdjan Krco, Dejan Drajic, Maja Pokric, Vladimir Rajs, Zivorad Mihajlovic, Petar Knezevic, Dejan Jovanovic:
Augmented Reality Enabled IoT Services for Environmental Monitoring Utilising Serious Gaming Concept. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6(1): 37-55 (2015) - Bahman Rashidi, Carol J. Fung:
A Survey of Android Security Threats and Defenses. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6(3): 3-35 (2015) - N. Renugadevi, C. Mala:
Improved Group Key Agreement for Emergency Cognitive Radio Mobile Ad hoc Networks. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6(3): 73-86 (2015) - Roland Rieke, Maria Zhdanova, Jürgen Repp:
Security Compliance Tracking of Processes in Networked Cooperating Systems. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6(2): 21-40 (2015) - Tomás Robles, Ramón Alcarria, Diego Martín de Andrés, Mariano Navarro de la Cruz, Rodrigo Calero, Sofía Iglesias, Manuel López:
An IoT based reference architecture for smart water management processes. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6(1): 4-23 (2015) - José Santa, Pedro J. Fernández, Fernando Pereñíguez-Garcia, Antonio F. Skarmeta:
Real Experience with IPv6 Communications in Highways. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6(3): 36-53 (2015) - Vishal Sharma, Rajesh Kumar, Neeraj Rathore:
Topological Broadcasting Using Parameter Sensitivity-Based Logical Proximity Graphs in Coordinated Ground-Flying Ad Hoc Networks. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6(3): 54-72 (2015) - Antonio F. Skarmeta, María Victoria Moreno Cano, Antonio Iera:
Guest Editorial: Smart Things, Big Data Technology and Ubiquitous Computing solutions for the future Internet of Things. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6(1): 1-3 (2015) - Anastasia Skovoroda, Dennis Gamayunov:
Securing mobile devices: malware mitigation methods. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6(2): 78-97 (2015) - Carlos Vazquez, Ram Krishnan, Eugene John:
Time Series Forecasting of Cloud Data Center Workloads for Dynamic Resource Provisioning. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6(3): 87-110 (2015) - Ilsun You:
Editorial. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6(3): 1-2 (2015) - Ilsun You:
Editorial. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6(4): 1-2 (2015)
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-04 04:23 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint