Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 288 matches
- 2024
- Vlad-Octavian Bolocan, Mihaela Secareanu, Elena Sava, Cosmin Medar, Loredana Sabina Cornelia Manolescu, Alexandru-Stefan Catalin Rascu, Maria Glencora Costache, George Daniel Radavoi, Robert-Andrei Dobran, Viorel Jinga:
Correction: Bolocan et al. Convolutional Neural Network Model for Segmentation and Classification of Clear Cell Renal Cell Carcinoma Based on Multiphase CT Images. J. Imaging 2023, 9, 280. J. Imaging 10(2): 35 (2024) - Rodolfo Reda, Dario Di Nardo, Alessio Zanza, Valentina Bellanova, Rosemary Abbagnale, Francesco Pagnoni, Maurilio D'Angelo, Ajinkya M. Pawar, Massimo Galli, Luca Testarelli:
Upper First and Second Molar Pulp Chamber Endodontic Anatomy Evaluation According to a Recent Classification: A Cone Beam Computed Tomography Study. J. Imaging 10(1): 9 (2024) - Chunpeng Ge, Moti Yung:
Information Security and Cryptology - 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part I. Lecture Notes in Computer Science 14526, Springer 2024, ISBN 978-981-97-0941-0 [contents] - Chunpeng Ge, Moti Yung:
Information Security and Cryptology - 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part II. Lecture Notes in Computer Science 14527, Springer 2024, ISBN 978-981-97-0944-1 [contents] - Romain Wacquez, Naofumi Homma:
Constructive Side-Channel Analysis and Secure Design - 15th International Workshop, COSADE 2024, Gardanne, France, April 9-10, 2024, Proceedings. Lecture Notes in Computer Science 14595, Springer 2024, ISBN 978-3-031-57542-6 [contents] - 2023
- Anastassia Gharib, Mohamed Ibnkahla:
Heterogeneous Cluster-Based Information-Centric Sensor Networks With User Security Satisfaction. IEEE Internet Things J. 10(9, May 1): 8123-8139 (2023) - Elmehdi Illi, Marwa K. Qaraqe, Faissal El Bouanani, Saif M. Al-Kuwari:
On the Physical-Layer Security of a Dual-Hop UAV-Based Network in the Presence of Per-Hop Eavesdropping and Imperfect CSI. IEEE Internet Things J. 10(9, May 1): 7850-7867 (2023) - Redouane Niboucha, Sabra Ben Saad, Adlen Ksentini, Yacine Challal:
Zero-Touch Security Management for mMTC Network Slices: DDoS Attack Detection and Mitigation. IEEE Internet Things J. 10(9, May 1): 7800-7812 (2023) - Juan Ospina, Venkatesh Venkataramanan, Charalambos Konstantinou:
CPES-QSM: A Quantitative Method Toward the Secure Operation of Cyber-Physical Energy Systems. IEEE Internet Things J. 10(9, May 1): 7577-7590 (2023) - Fangyuan Si, Ning Zhang, Yi Wang, Peng-Yong Kong, Wenjie Qiao:
Distributed Optimization for Integrated Energy Systems With Secure Multiparty Computation. IEEE Internet Things J. 10(9, May 1): 7655-7666 (2023) - Fei Tong, Xing Chen, Cheng Huang, Yujian Zhang, Xuemin Shen:
Blockchain-Assisted Secure Intra/Inter-Domain Authorization and Authentication for Internet of Things. IEEE Internet Things J. 10(9, May 1): 7761-7773 (2023) - Quanzhen Duan, Dameng Kong, Chenxi Lin, Shengming Huang, Zhen Meng, Yuemin Ding:
A Switched-Capacitor, Integrator-Multiplexing, Second-Order Delta-Sigma Modulator Featuring a Single Differential Difference Amplifier for Portable EEG Application. J. Circuits Syst. Comput. 32(9): 2350155:1-2350155:10 (2023) - Friedrich Wiemer, Alexander Zeh:
Enabling Secure Communication for Automotive Endpoint-ECUs through Lightweight-Cryptography. CSCS 2023: 9:1-9:10 - Ana L. N. Fred, Carlo Sansone, Kurosh Madani:
Deep Learning Theory and Applications - First International Conference, DeLTA 2020, Virtual Event, July 8-10, 2020, and Second International Conference, DeLTA 2021, Virtual Event, July 7-9, 2021, Revised Selected Papers. Communications in Computer and Information Science 1854, Springer 2023, ISBN 978-3-031-37319-0 [contents] - 2022
- Daniel Fernando Santos, Helbert E. Espitia:
Secure Medical Image Transmission Scheme Using Lorenz's Attractor Applied in Computer Aided Diagnosis for the Detection of Eye Melanoma. Comput. 10(9): 158 (2022) - Fahimeh Fazel, Jamshid Abouei, Muhammad Jaseemuddin, Alagan Anpalagan, Konstantinos N. Plataniotis:
Secure Throughput Optimization for Cache-Enabled Multi-UAVs Networks. IEEE Internet Things J. 9(10): 7783-7801 (2022) - Cong Gao, Geng Wang, Weisong Shi, Zhongmin Wang, Yanping Chen:
Autonomous Driving Security: State of the Art and Challenges. IEEE Internet Things J. 9(10): 7572-7595 (2022) - Samayveer Singh, Aridaman Singh Nandan, Aruna Malik, Rajeev Kumar, Lalit Kumar Awasthi, Neeraj Kumar:
A GA-Based Sustainable and Secure Green Data Communication Method Using IoT-Enabled WSN in Healthcare. IEEE Internet Things J. 9(10): 7481-7490 (2022) - Priyanka Billawa, Anusha Bambhore Tukaram, Nicolás E. Díaz Ferreyra, Jan-Philipp Steghöfer, Riccardo Scandariato, Georg Simhandl:
SoK: Security of Microservice Applications: A Practitioners' Perspective on Challenges and Best Practices. ARES 2022: 9:1-9:10 - Patrick Drew McDaniel:
Sustainability is a Security Problem. CCS 2022: 9-10 - Patrick Wachter, Stephan Kleber:
Analysis of the DoIP Protocol for Security Vulnerabilities. CSCS 2022: 9:1-9:10 - 2021
- Shaobo Huang, Jinsong Gui, Tian Wang, Xiong Li:
Joint mobile vehicle-UAV scheme for secure data collection in a smart city. Ann. des Télécommunications 76(9-10): 559-580 (2021) - Negalign Wake Hundera, Chuanjie Jin, Muhammad Umar Aftab, Dagmawit Mesfin, Sachin Kumar:
Secure outsourced attribute-based signcryption for cloud-based Internet of Vehicles in a smart city. Ann. des Télécommunications 76(9-10): 605-616 (2021) - Norou Diawara, Sarah Ferguson, Melva R. Grant, Kumer Das:
Novel Statistical Analysis in the Context of a Comprehensive Needs Assessment for Secondary STEM Recruitment. Comput. 9(10): 105 (2021) - Michail Feidakis, Christos Chatzigeorgiou, Christina Karamperi, Lazaros Giannakos, Vasileios-Rafail Xefteris, Dimos Ntioudis, Athina Tsanousa, Dimitrios G. Kogias, Charalampos Z. Patrikakis, Georgios Meditskos, Georgios Gorgogetas, Stefanos Vrochidis, Ioannis Kompatsiaris:
Smart Interconnected Infrastructures for Security and Protection: The DESMOS Project. Comput. 10(9): 116 (2021) - Rebecca Guiney, Elettra Santucci, Samuel Valman, Adam Booth, Andrew Birley, Ian Haynes, Stuart H. Marsh, Jon P. Mills:
Integration and Analysis of Multi-Modal Geospatial Secondary Data to Inform Management of at-Risk Archaeological Sites. ISPRS Int. J. Geo Inf. 10(9): 575 (2021) - Muhammad Kamran, Jinhu Bian, Ainong Li, Guangbin Lei, Xi Nan, Yuan Jin:
Investigating Eco-Environmental Vulnerability for China-Pakistan Economic Corridor Key Sector Punjab Using Multi-Sources Geo-Information. ISPRS Int. J. Geo Inf. 10(9): 625 (2021) - Alex Kirk:
A network with nowhere to hide. Netw. Secur. 2021(10): 7-9 (2021) - Martin Thompson:
CISOs should work closely with their ITAM colleagues. Netw. Secur. 2021(10): 9-12 (2021) - Xiaoyan Hu, Liang Jin, Kaizhi Huang, Xiaoli Sun, You Zhou, Jinghua Qu:
Intelligent Reflecting Surface-Assisted Secret Key Generation With Discrete Phase Shifts in Static Environment. IEEE Wirel. Commun. Lett. 10(9): 1867-1870 (2021)
skipping 258 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-25 22:53 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint