Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 159 matches
- 2024
- Maximilian Walter:
Context-based Access Control and Attack Modelling and Analysis. Karlsruhe Institute of Technology, Germany, 2024 - Matteo Iaiani, Riccardo Sorichetti, Alessandro Tugnoli, Valerio Cozzani:
Modelling standoff distances to prevent escalation in shooting attacks to tanks storing hazardous materials. Reliab. Eng. Syst. Saf. 241: 109689 (2024) - Esma Uflaz, Sukru Ilke Sezer, Ahmet Lutfi Tunçel, Muhammet Aydin, Emre Akyuz, Özcan Arslan:
Quantifying potential cyber-attack risks in maritime transportation under Dempster-Shafer theory FMECA and rule-based Bayesian network modelling. Reliab. Eng. Syst. Saf. 243: 109825 (2024) - Merwa Mehmood, Zubair A. Baig, Naeem Syed:
Securing Industrial Control Systems (ICS) Through Attack Modelling and Rule-Based Learning. COMSNETS 2024: 598-602 - Tetiana A. Vakaliuk, Yelyzaveta Trokoz, Oleksandra Pokotylo, Viacheslav Osadchyi, Viktoriia Bolotina:
Emulation and Detection of ARP Attacks in GNS3 Environment: Modelling and Development of a Defense Strategy (short paper). CPITS 2024: 376-383 - Giovanna Broccia, Maurice H. ter Beek, Alberto Lluch-Lafuente, Paola Spoletini, Alessio Ferrari:
Assessing the Understandability and Acceptance of Attack-Defense Trees for Modelling Security Requirements. REFSQ 2024: 39-56 - 2023
- Zhe Li, Jin Liu, Yibo Dong, Jiaqi Ren, Weili Li:
Modelling and Research on Intuitionistic Fuzzy Goal-Based Attack and Defence Game for Infrastructure Networks. Entropy 25(11): 1558 (2023) - Prabal Pratap Singh, Deepu Philip:
Modelling & Analysis of High Impact Terrorist Attacks in India & Its Neighbors. ISPRS Int. J. Geo Inf. 12(4): 162 (2023) - Murtala Bello Aliyu, Ali Audu Baidu, Bala Ma'aji Abdulhamid, Mohammed Olanrewaju Ibrahim, Fu'ad Muhammad Mukhtar:
Assessing the impact of escalating attacks on soft targets by criminal gang: A modelling viewpoint using bifurcation analysis. Math. Comput. Simul. 212: 122-137 (2023) - Noor Syahirah Nordin, Mohd Arfian Ismail:
A hybridization of butterfly optimization algorithm and harmony search for fuzzy modelling in phishing attack detection. Neural Comput. Appl. 35(7): 5501-5512 (2023) - Godlove Suila Kuaban, Erol Gelenbe, Tadeusz Czachórski, Piotr Czekalski, Julius Kewir Tangka:
Modelling of the Energy Depletion Process and Battery Depletion Attacks for Battery-Powered Internet of Things (IoT) Devices. Sensors 23(13): 6183 (2023) - Rose George Kunthara, V. R. Josna, K. Neethu, Rekha K. James, John Jose:
Modelling and Impact Analysis of Antipode Attack in Bufferless On-Chip Networks. SN Comput. Sci. 4(3): 284 (2023) - Alpesh Bhudia, Anna Cartwright, Edward J. Cartwright, Darren Hurley-Smith, Julio C. Hernandez-Castro:
Game Theoretic Modelling of a Ransom and Extortion Attack on Ethereum Validators. ARES 2023: 105:1-105:11 - Dmitry Levshun, Andrey Chechulin:
Vulnerability Categorization for Fast Multistep Attack Modelling. FRUCT 2023: 169-175 - Owen Millwood, Hongming Fei, Prosanta Gope, Oguz Narli, Meltem Kurt Pehlivanoglu, Elif Bilge Kavun, Biplab Sikdar:
A Privacy-Preserving Protocol Level Approach to Prevent Machine Learning Modelling Attacks on PUFs in the Presence of Semi-Honest Verifiers. HOST 2023: 326-336 - V. R. Josna, Rose George Kunthara, Rekha K. James, John Jose:
Modelling and Impact Analysis of Push Back Attack in 3D Bufferless Network on Chip. MCSoC 2023: 426-432 - Francesco Sanna Passino, Anastasia Mantziou, Daniyar Ghani, Philip Thiede, Ross Bevington, Nicholas A. Heard:
Unsupervised attack pattern detection in honeypot data using Bayesian topic modelling. CoRR abs/2301.02505 (2023) - Alpesh Bhudia, Anna Cartwright, Edward J. Cartwright, Darren Hurley-Smith, Julio C. Hernandez-Castro:
Game Theoretic Modelling of a Ransom and Extortion Attack on Ethereum Validators. CoRR abs/2308.00590 (2023) - Marwa Salayma, Emil C. Lupu:
Threat Modelling in Internet of Things (IoT) Environment Using Dynamic Attack Graphs. CoRR abs/2310.01689 (2023) - Sagar Babu Mitikiri, K. Victor Sam Moses Babu, Divyanshi Dwivedi, Vedantham Lakshmi Srinivas, Pratyush Chakraborty, Pradeep Kumar Yemula, Mayukha Pal:
Modelling of the Electric Vehicle Charging Infrastructure as Cyber Physical Power Systems: A Review on Components, Standards, Vulnerabilities and Attacks. CoRR abs/2311.08656 (2023) - 2022
- Khizar Hameed, Saurabh Garg, Muhammad Bilal Amin, Byeong Kang:
Towards a formal modelling, analysis and verification of a clone node attack detection scheme in the internet of things. Comput. Networks 204: 108702 (2022) - Nitin Naik, Paul Grace, Paul Jenkins, Kshirasagar Naik, Jingping Song:
An evaluation of potential attack surfaces based on attack tree modelling and risk matrix applied to self-sovereign identity. Comput. Secur. 120: 102808 (2022) - Misbah Shafi, Rakesh Kumar Jha:
Artificial Dust Based Attack Modelling: A Threat to the Security of Next Generation WCN. IEEE Trans. Netw. Sci. Eng. 9(6): 4001-4016 (2022) - Pheeha Machaka, Olasupo Ajayi, Ferdinand Kahenga, Antoine B. Bagula, Kyandoghere Kyamakya:
Modelling DDoS Attacks in IoT Networks Using Machine Learning. AFRICATEK 2022: 161-175 - Aria Kosari, Peter Popov, Rajkumar Roy:
Modelling Safety of Connected and Autonomous Vehicles (CAVs) under Cyber-Attacks on Perception and Safety Monitors. DESSERT 2022: 1-7 - Anna Sztyber, Zuzanna Górecka, Jan Maciej Kóscielny, Michal Syfert:
Controller Modelling as a Tool for Cyber-Attacks Detection. DPS 2022: 100-111 - Nimit Kapadia, Satoshi Kai, Minako Toba:
Development of a Rapid Response framework for ICS to distinguish between Failures and Cyber-attacks through Petri-Net scenario modelling. SICE 2022: 205-209 - Jichao Bi, Shibo He, Fengji Luo, Jiming Chen, Da-Wen Huang, Mingyang Sun:
Differential Game Approach for Modelling and Defense of False Data Injection Attacks Targeting Energy Metering Systems. TrustCom 2022: 97-104 - Zach Smith, Hugo Jonker, Sjouke Mauw, Hyunwoo Lee:
Modelling Agent-Skipping Attacks in Message Forwarding Protocols. CoRR abs/2201.08686 (2022) - Misbah Shafi, Rakesh Kumar Jha:
Artificial Dust Based Attack Modelling: A Threat to the Security of Next Generation WCN. CoRR abs/2207.06683 (2022)
skipping 129 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-23 12:20 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint