default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
Likely matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 234 matches
- 2024
- Laurent Patrice, Ramadhani Saidi Sinde, Judith Leo:
A Novel Mechanism for Detection of Address Resolution Protocol Spoofing Attacks in Large-Scale Software-Defined Networks. IEEE Access 12: 80255-80265 (2024) - Saravanan Selvam, Uma Maheswari Balasubramanian:
UASDAC: An Unsupervised Adaptive Scalable DDoS Attack Classification in Large-Scale IoT Network Under Concept Drift. IEEE Access 12: 64701-64716 (2024) - Saravanan Selvam, Uma Maheswari Balasubramanian:
An Adaptive Scalable Data Pipeline for Multiclass Attack Classification in Large-Scale IoT Networks. Big Data Min. Anal. 7(2): 500-511 (2024) - Beibei Li, Wei Hu:
A multi-node attack scheme based on community partitioning in large scale infrastructure networks. Comput. Networks 245: 110386 (2024) - Jun Wu, Mingyuan Dai, Xuyang Teng, Chao Wu, Meilin He, Haoyu Liang, Hao Chen, Ye Jin, Weiwei Cao:
Less sample-cooperative spectrum sensing against large-scale Byzantine attack in cognitive wireless sensor networks. Trans. Emerg. Telecommun. Technol. 35(7) (2024) - Mohamad Ramadan, Farzaneh Abdollahi:
A Hierarchical approach for isolating sensor faults from un-stealthy attacks in large-scale systems. J. Frankl. Inst. 361(9): 106840 (2024) - Jiamin Hu, Xiaofan Yang, Lu-Xing Yang:
A Framework for Detecting False Data Injection Attacks in Large-Scale Wireless Sensor Networks. Sensors 24(5): 1643 (2024) - Yuan-Yuan Li, Yuan-Xin Li:
Adaptive Decentralized Fuzzy Resilient Control for Large-Scale Nonlinear Systems Against Stochastic Disturbances and DoS Attacks. IEEE Trans. Fuzzy Syst. 32(3): 1494-1503 (2024) - Jipeng Zhao, Guang-Hong Yang:
Reinforcement-Learning-Based Fuzzy Adaptive Finite-Time Optimal Resilient Control for Large-Scale Nonlinear Systems Under False Data Injection Attacks. IEEE Trans. Fuzzy Syst. 32(4): 2483-2495 (2024) - Yuhan Suo, Senchun Chai, Runqi Chai, Zhong-Hua Pang, Yuanqing Xia, Guo-Ping Liu:
Security Defense of Large-Scale Networks Under False Data Injection Attacks: An Attack Detection Scheduling Approach. IEEE Trans. Inf. Forensics Secur. 19: 1908-1921 (2024) - Sizhang Li, Jing Xu, Peng Liu, Xue Li, Puming Wang, Xin Jin, Shaowen Yao:
Truncated Lanczos-TSVD: An Effective Dimensionality Reduction Algorithm for Detecting DDoS Attacks in Large-Scale Networks. IEEE Trans. Netw. Sci. Eng. 11(5): 4689-4703 (2024) - Md Toufiq Hasan Anik, Jean-Luc Danger, Sylvain Guilley, Naghmeh Karimi:
On the Resiliency of Protected Masked S-Boxes Against Template Attack in the Presence of Temperature and Aging Misalignments. IEEE Trans. Very Large Scale Integr. Syst. 32(5): 911-924 (2024) - Wenrui Liu, Jiafeng Cheng, Nengyuan Sun, Heng Sha, Zunxian Fu, Zhaokang Peng, Chunyang Wang, Caiban Sun, Pengliang Kong, Yunfeng Zhao, Yaoqiang Wang, Weize Yu:
A 128-Gbps Pipelined SM4 Circuit With Dual DPA Attack Countermeasures. IEEE Trans. Very Large Scale Integr. Syst. 32(6): 1164-1168 (2024) - Md Rafid Muttaki, Md Habibur Rahman, Akshay Kulkarni, Mark M. Tehranipoor, Farimah Farahmandi:
FTC: A Universal Framework for Fault-Injection Attack Detection and Prevention. IEEE Trans. Very Large Scale Integr. Syst. 32(7): 1311-1324 (2024) - Amit Mazumder Shuvo, Tao Zhang, Farimah Farahmandi, Mark M. Tehranipoor:
FLAT: Layout-Aware and Security Property-Assisted Timing Fault-Injection Attack Assessment. IEEE Trans. Very Large Scale Integr. Syst. 32(6): 1150-1163 (2024) - Christopher Vega, Patanjali SLPSK, Swarup Bhunia:
IOLock: An Input/Output Locking Scheme for Protection Against Reverse Engineering Attacks. IEEE Trans. Very Large Scale Integr. Syst. 32(2): 347-360 (2024) - Mohit Dilip Makwana, Vedant Thakkar, Debanshu Das, Rajesh Kumar:
Simulating Cyber-Attack Scenarios by Discovering Petri-Nets from Large-Scale Event Logs. COMSNETS 2024: 49-54 - Jianfu Zhang, Yan Hong, Dawei Cheng, Liqing Zhang, Qibin Zhao:
Hierarchical Attacks on Large-Scale Graph Neural Networks. ICASSP 2024: 7635-7639 - Pol Labarbarie, Adrien Chan-Hon-Tong, Stéphane Herbin, Milad Leyli-Abadi:
Optimal transport based adversarial patch to leverage large scale attack transferability. ICLR 2024 - Joshua C. Zhao, Atul Sharma, Ahmed Roushdy Elkordy, Yahya H. Ezzeldin, Salman Avestimehr, Saurabh Bagchi:
Loki: Large-scale Data Reconstruction Attack against Federated Learning through Model Manipulation. SP 2024: 1287-1305 - Thijs Heijligenberg, David Rupprecht, Katharina Kohls:
The attacks aren't alright: Large-Scale Simulation of Fake Base Station Attacks and Detections. CSET @ USENIX Security Symposium 2024: 54-64 - 2023
- Clément Boin:
Détection d'attaques DDoS dans le contexte d'un fournisseur cloud de grande envergure. (DDoS attack detection in the context of a large-scale cloud service provider). Lille University, France, 2023 - Bor-Sen Chen, Po-Chun Chao:
Robust Decentralized H∞ Attack-Tolerant Observer-Based Team Formation Network Control of Large-Scale Quadrotor UAVs: HJIE-Reinforcement Learning-Based Deep Neural Network Method. IEEE Access 11: 65810-65833 (2023) - Bor-Sen Chen, Hung-Yu Lin:
Decentralized H∞ Observer-Based Attack-Tolerant Formation Tracking Network Control of Large-Scale LEO Satellites via HJIE-Reinforced Deep Learning Approach. IEEE Access 11: 17165-17196 (2023) - Noah L. Schrick, Peter J. Hawrylak:
State Space Explosion Mitigation for Large-Scale Attack and Compliance Graphs Using Synchronous Exploit Firing. IEEE Open J. Comput. Soc. 4: 147-157 (2023) - Ruchi Garg, Tarun Gulati, Sumit Kumar:
Wormhole attack detection and recovery for secure range free localization in large-scale wireless sensor networks. Peer Peer Netw. Appl. 16(6): 2833-2849 (2023) - Euclides Carlos Pinto Neto, Sajjad Dadkhah, Raphael Ferreira, Alireza Zohourian, Rongxing Lu, Ali A. Ghorbani:
CICIoT2023: A Real-Time Dataset and Benchmark for Large-Scale Attacks in IoT Environment. Sensors 23(13): 5941 (2023) - Guofu Zhang, Lulu Zheng, Zhaopin Su, Yifei Zeng, Guoquan Wang:
M-Sequences and Sliding Window Based Audio Watermarking Robust Against Large-Scale Cropping Attacks. IEEE Trans. Inf. Forensics Secur. 18: 1182-1195 (2023) - Jintang Li, Tao Xie, Liang Chen, Fenfang Xie, Xiangnan He, Zibin Zheng:
Adversarial Attack on Large Scale Graph. IEEE Trans. Knowl. Data Eng. 35(1): 82-95 (2023) - Jing Xu, Xue Li, Puming Wang, Xin Jin, Shaowen Yao:
Multi-Modal Noise-Robust DDoS Attack Detection Architecture in Large-Scale Networks Based on Tensor SVD. IEEE Trans. Netw. Sci. Eng. 10(1): 152-165 (2023)
skipping 204 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-22 10:18 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint