Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 237 matches
- 2024
- Emmanuel Song Shombot, Gilles Dusserre, Robert Bestak, Nasir Baba Ahmed:
An application for predicting phishing attacks: A case of implementing a support vector machine learning model. Cyber Secur. Appl. 2: 100036 (2024) - Laurie A. Williams:
Narrowing the Software Supply Chain Attack Vectors: The SSDF Is Wonderful but not Enough. IEEE Secur. Priv. 22(2): 4-7 (2024) - Israt Jahan Mouri, Muhammad Ridowan, Muhammad Abdullah Adnan:
Data Poisoning Attacks and Mitigation Strategies on Federated Support Vector Machines. SN Comput. Sci. 5(2): 241 (2024) - Ariel R. Ril, Daniel Dalalana Bertoglio, Avelino F. Zorzo:
Shadow Blade: A tool to interact with attack vectors. CoRR abs/2401.01960 (2024) - Kseniia Kuvshinova, Olga Tsymboi, Ivan V. Oseledets:
Sparse and Transferable Universal Singular Vectors Attack. CoRR abs/2401.14031 (2024) - 2023
- Ahmad Alomari, Sathish A. P. Kumar:
DEQSVC: Dimensionality Reduction and Encoding Technique for Quantum Support Vector Classifier Approach to Detect DDoS Attacks. IEEE Access 11: 110570-110581 (2023) - Ahmed A. Shafee, Mohamed M. E. A. Mahmoud, Gautam Srivastava, Mostafa M. Fouda, Maazen Alsabaan, Mohamed I. Ibrahem:
Detection of Distributed Denial of Charge (DDoC) Attacks Using Deep Neural Networks With Vector Embedding. IEEE Access 11: 75381-75397 (2023) - Bhargavi Goparaju, Bandla Sreenivasa Rao:
A DDoS Attack Detection using PCA Dimensionality Reduction and Support Vector Machine. Int. J. Commun. Networks Inf. Secur. 14(1s): 1-8 (2023) - Sumarga Kumar Sah Tyagi, Rahul Yadav, Deepak Kumar Jain, Yicheng Tu, Weizhe Zhang:
Paired Swarm Optimized Relational Vector Learning for FDI Attack Detection in IoT-Aided Smart Grid. IEEE Internet Things J. 10(21): 18708-18717 (2023) - Israt Jahan Mouri, Muhammad Ridowan, Muhammad Abdullah Adnan:
Towards Poisoning of Federated Support Vector Machines with Data Poisoning Attacks. CLOSER 2023: 24-33 - Nafisa Anjum, Nazmus Sakib, Juan Rodriguez Cardenas, Corey Brookins, Ava Norouzinia, Asia Shavers, Miranda Dominguez, Marie Nassif, Hossain Shahriar:
Uncovering Software Supply Chains Vulnerability: A Review of Attack Vectors, Stakeholders, and Regulatory Frameworks. COMPSAC 2023: 1816-1821 - Khaled Alotaibi, Rafat Rob, Dana Nour, Doaa Zamzami:
Detecting Subspace Malicious Vectors Attack Against Smart Grid Using Sequence-Alignment Method. CSR 2023: 367-372 - Antian Wang, Bingyin Zhao, Weihang Tan, Yingjie Lao:
NNTesting: Neural Network Fault Attacks Detection Using Gradient-Based Test Vector Generation. DAC 2023: 1-6 - Zheng Zhang, Wei Song:
A New Reconstruction Attack: User Latent Vector Leakage in Federated Recommendation. DASFAA (2) 2023: 97-112 - Marcin Aftowicz, Ievgen Kabin, Zoya Dyka, Peter Langendörfer:
Non-Profiled Semi-Supervised Horizontal Attack Against Elliptic Curve Scalar Multiplication Using Support Vector Machines. DSD 2023: 708-713 - Md Minhaz Chowdhury, Nafiz Rifat, Shadman Latif, Mostofa Ahsan, Md Saifur Rahman, Rahul Gomes:
ChatGPT: The Curious Case of Attack Vectors' Supply Chain Management Improvement. eIT 2023: 499-504 - Zhixuan Zhang, Jun Wu, Jipeng Gan, Ze Chen, Jin Shen:
Support Vector Machine Process Against Probabilistic Byzantine Attack for Cooperative Spectrum Sensing in CRNs. ICMLT 2023: 269-276 - C. Lee, D. Seok, D. Shim, R. Park:
Modified kNN Classifier in the Output Vector Space for Robust Performance Against Adversarial Attack. ICPRAM 2023: 443-449 - Seth Barrett, Bradley Boswell, Gokila Dorai:
Exploring the Vulnerabilities of IoT Devices: A Comprehensive Analysis of Mirai and Bashlite Attack Vectors. IOTSMS 2023: 125-132 - Fritz Haas, Martin Stellmacher, Michael Pätzold, Ahmed Hussein, Elmar Matthes:
Adversarial Attacks on Deep Learning Visual Object Detectors: Optimization and Evaluation of Physical Attack Vectors using YOLOv4. IV 2023: 1-6 - Haiming Zhu, Shoichi Kamada, Momonari Kudo, Tsuyoshi Takagi:
Improved Hybrid Attack via Error-Splitting Method for Finding Quinary Short Lattice Vectors. IWSEC 2023: 117-136 - Sayinath Karuppanan, Samira Mirbagher Ajorpaz:
An Attack on The Speculative Vectorization: Leakage from Higher Dimensional Speculation. CoRR abs/2302.01131 (2023) - Anuj Rai, Somnath Dey, Pradeep Patidar, Prakhar Rai:
MoSFPAD: An end-to-end Ensemble of MobileNet and Support Vector Classifier for Fingerprint Presentation Attack Detection. CoRR abs/2303.01465 (2023) - Victor Steinborn, Antonis Maronikolakis, Hinrich Schütze:
Politeness Stereotypes and Attack Vectors: Gender Stereotypes in Japanese and Korean Language Models. CoRR abs/2306.09752 (2023) - Suman Rath, Tapadhir Das, Shamik Sengupta:
Improvise, Adapt, Overcome: Dynamic Resiliency Against Unknown Attack Vectors in Microgrid Cybersecurity Games. CoRR abs/2306.15106 (2023) - Rupok Chowdhury Protik:
Updated Standard for Secure Satellite Communications: Analysis of Satellites, Attack Vectors, Existing Standards, and Enterprise and Security Architectures. CoRR abs/2310.19105 (2023) - Sulthana Shams, Douglas J. Leith:
Attack Detection Using Item Vector Shift in Matrix Factorisation Recommenders. CoRR abs/2312.00512 (2023) - 2022
- N. G. Bhuvaneswari Amma:
A vector convolutional deep autonomous learning classifier for detection of cyber attacks. Clust. Comput. 25(5): 3447-3458 (2022) - J. Britto Dennis, M. Shanmuga Priya:
Deep belief network and support vector machine fusion for distributed denial of service and economical denial of service attack detection in cloud. Concurr. Comput. Pract. Exp. 34(1) (2022) - Sumathi Sokkalingam, Rajesh Ramakrishnan:
An intelligent intrusion detection system for distributed denial of service attacks: A support vector machine with hybrid optimization algorithm based approach. Concurr. Comput. Pract. Exp. 34(27) (2022)
skipping 207 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-25 14:36 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint