Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 346 matches
- 2024
- Javad Ebrahimnejad, Alireza Naghsh, Hossein Pourghasem:
A robust watermarking approach against high-density salt and pepper noise (RWSPN) to enhance medical image security. IET Image Process. 18(1): 116-128 (2024) - Sven Peldszus, Jens Bürger, Jan Jürjens:
UMLsecRT: Reactive Security Monitoring of Java Applications With Round-Trip Engineering. IEEE Trans. Software Eng. 50(1): 16-47 (2024) - 2023
- Malte Mues:
The integration of multi-color taint-analysis with dynamic symbolic execution for Java web application security analysis. Technical University of Dortmund, Germany, 2023 - Saeed Javanmardi, Mohammad Shojafar, Reza Mohammadi, Mamoun Alazab, Antonio Caruso:
An SDN perspective IoT-Fog security: A survey. Comput. Networks 229: 109732 (2023) - Mohammad Mahdi Modiri, Mahmoud Salmasizadeh, Javad Mohajeri, Babak Hossein Khalaj:
Two protocols for improving security during the authentication and key agreement procedure in the 3GPP networks. Comput. Commun. 211: 286-301 (2023) - Xuan Wang, Yaojie Li, Hanieh Javadi Khasraghi, Cherie Courseault Trumbach:
The mediating role of security anxiety in internet threat avoidance behavior. Comput. Secur. 134: 103429 (2023) - Turki Ali Alghamdi, Nadeem Javaid:
A comprehensive survey on security, privacy and authentication in blockchain. Int. J. Web Grid Serv. 19(3): 259-286 (2023) - Arun Kumar Sangaiah, Amir Javadpour, Pedro Pinto:
Towards data security assessments using an IDS security model for cyber-physical smart cities. Inf. Sci. 648: 119530 (2023) - Simon Schneider, Riccardo Scandariato:
Automatic extraction of security-rich dataflow diagrams for microservice applications written in Java. J. Syst. Softw. 202: 111722 (2023) - Kushal Babel, Mojan Javaheripi, Yan Ji, Mahimna Kelkar, Farinaz Koushanfar, Ari Juels:
Lanturn: Measuring Economic Security of Smart Contracts Through Adaptive Learning. CCS 2023: 1212-1226 - Jeremy Rack, Cristian-Alexandru Staicu:
Jack-in-the-box: An Empirical Study of JavaScript Bundling on the Web and its Security Implications. CCS 2023: 3198-3212 - Mehzabien Iqbal, Ahmad Y. Javaid:
IEEE CNS 23 Poster: Cooperative Omnidirectional Beamformation for THz Band Phy-Security. CNS 2023: 1-2 - Sofiane Takarabt, Javad Bahrami, Mohammad Ebrahimabadi, Sylvain Guilley, Naghmeh Karimi:
Security Order of Gate-Level Masking Schemes. HOST 2023: 57-67 - Bruno Gonçalves de Oliveira, André Takeshi Endo, Silvia Regina Vergilio:
Characterizing Security-Related Commits of JavaScript Engines. ICEIS (2) 2023: 86-97 - Masudul Hasan Masud Bhuiyan, Adithya Srinivas Parthasarathy, Nikos Vasilakis, Michael Pradel, Cristian-Alexandru Staicu:
SecBench.js: An Executable Security Benchmark Suite for Server-Side JavaScript. ICSE 2023: 1059-1070 - Timothée Riom, Alexandre Bartel:
An In-Depth Analysis of Android's Java Class Library: its Evolution and Security Impact. SecDev 2023: 133-144 - Kaixuan Li, Sen Chen, Lingling Fan, Ruitao Feng, Han Liu, Chengwei Liu, Yang Liu, Yixiang Chen:
Comparison and Evaluation on Static Application Security Testing (SAST) Tools for Java. ESEC/SIGSOFT FSE 2023: 921-933 - Agus Harya Maulana, I. G. P. Ari Suyasa, Erwan Kurniawan:
Analysis of the Demilitarized Zone Implementation in Java Madura Bali Electrical Systems to Increase the Level of IT/OT Cyber Security With the Dual DMZ Firewall Architecture Method. SmartNets 2023: 1-6 - Junjie Wang, Zhiyi Zhang, Shuang Liu, Xiaoning Du, Junjie Chen:
FuzzJIT: Oracle-Enhanced Fuzzing for JavaScript Engine JIT Compiler. USENIX Security Symposium 2023: 1865-1882 - Abdullah AlHamdan, Cristian-Alexandru Staicu:
SandDriller: A Fully-Automated Approach for Testing Language-Based JavaScript Sandboxes. USENIX Security Symposium 2023: 3457-3474 - Javad Bahrami, Mohammad Ebrahimabadi, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi:
Special Session: Security Verification & Testing for SR-Latch TRNGs. VTS 2023: 1-10 - Simon Schneider, Riccardo Scandariato:
Automatic Extraction of Security-Rich Dataflow Diagrams for Microservice Applications written in Java. CoRR abs/2304.12769 (2023) - Hussein Sharadga, Javad Mohammadi, Constance Crozier, Kyri Baker:
Optimizing Multi-Timestep Security-Constrained Optimal Power Flow for Large Power Grids. CoRR abs/2311.15175 (2023) - Aishwarya Seth, Saikath Bhattacharya, Sarah Elder, Nusrat Zahan, Laurie A. Williams:
Comparing Effectiveness and Efficiency of Interactive Application Security Testing (IAST) and Runtime Application Self-Protection (RASP) Tools in a Large Java-based System. CoRR abs/2312.17726 (2023) - Kushal Babel, Mojan Javaheripi, Yan Ji, Mahimna Kelkar, Farinaz Koushanfar, Ari Juels:
Lanturn: Measuring Economic Security of Smart Contracts Through Adaptive Learning. IACR Cryptol. ePrint Arch. 2023: 1338 (2023) - 2022
- Riantini Virtriana, Akhmad Riqqi, Tania Septi Anggraini, Kamal Nur Fauzan, Kalingga Titon Nur Ihsan, Fatwa Cahya Mustika, Deni Suwardhi, Agung Budi Harto, Anjar Dimara Sakti, Albertus Deliar, Budhy Soeksmantono, Ketut Wikantika:
Development of Spatial Model for Food Security Prediction Using Remote Sensing Data in West Java, Indonesia. ISPRS Int. J. Geo Inf. 11(5): 284 (2022) - Alejandro Mazuera-Rozo, Camilo Escobar-Velásquez, Juan Espitia-Acero, David Vega-Guzmán, Catia Trubiani, Mario Linares-Vásquez, Gabriele Bavota:
Taxonomy of security weaknesses in Java and Kotlin Android apps. J. Syst. Softw. 187: 111233 (2022) - Susana Lima, Ricardo Morla, João Routar:
JavaScript&Me, A Tool to Support Research into Code Transformation and Browser Security. CIKM 2022: 4224-4228 - Tao Hou, Shengping Bi, Mingkui Wei, Tao Wang, Zhuo Lu, Yao Liu:
When Third-Party JavaScript Meets Cache: Explosively Amplifying Security Risks on the Internet. CNS 2022: 290-298 - Andrea Stefanoni, Sarunas Girdzijauskas, Christina Jenkins, Zekarias T. Kefato, Licia Sbattella, Vincenzo Scotti, Emil Wåreus:
Detecting Security Patches in Java Projects Using NLP Technology. ICNLSP 2022: 50-56
skipping 316 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-23 16:24 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint