Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 37 matches
- 2023
- Mahmoud M. Badr, Mohamed M. E. A. Mahmoud, Mohammed J. Abdulaal, Abdulah Jeza Aljohani, Fawaz Alsolami, Abdullah Saeed Balamash:
A Novel Evasion Attack Against Global Electricity Theft Detectors and a Countermeasure. IEEE Internet Things J. 10(12): 11038-11053 (2023) - 2022
- N. Suriya, S. Vijay Shankar:
A novel ensembling of deep learning based intrusion detection system and scroll chaotic countermeasures for electric vehicle charging system. J. Intell. Fuzzy Syst. 43(4): 4789-4801 (2022) - Tianhong Xu, Cheng Gongye, Yunsi Fei:
Protected ECC Still Leaks: A Novel Differential-Bit Side-channel Power Attack on ECDH and Countermeasures. ACM Great Lakes Symposium on VLSI 2022: 9-14 - 2021
- Rui Yang, Tian-Jie Cao, Xiu-Qing Chen, Feng-Rong Zhang:
A novel and universal GAN-based countermeasure to recover adversarial examples to benign examples. Comput. Secur. 111: 102457 (2021) - Suvidha Rupesh Kumar, B. Bharathi:
A Novel Approach Towards Generalization of Countermeasure for Spoofing Attack on ASV Systems. Circuits Syst. Signal Process. 40(2): 872-889 (2021) - Yuqiao Zhang, Ayush Jain, Pinchen Cui, Ziqi Zhou, Ujjwal Guin:
A novel topology-guided attack and its countermeasure towards secure logic locking. J. Cryptogr. Eng. 11(3): 213-226 (2021) - Juncheng Chen, Jun-Sheng Ng, Kwen-Siong Chong, Zhiping Lin, Bah-Hwee Gwee:
A Novel Normalized Variance-Based Differential Power Analysis Against Masking Countermeasures. IEEE Trans. Inf. Forensics Secur. 16: 3767-3779 (2021) - Haoyu Gao, Leixiao Li, Hao Lin, Jianxiong Wan, Dan Deng, Jie Li:
DECH: A Novel Attack Pattern of Cloud Environment and Its Countermeasures. CSP 2021: 117-122 - Abderrahmane Mayouche, Wallace A. Martins, Christos G. Tsinos, Symeon Chatzinotas, Björn E. Ottersten:
A Novel Learning-based Hard Decoding Scheme and Symbol-Level Precoding Countermeasures. WCNC 2021: 1-6 - 2020
- Sangyub Lee, Sung Min Cho, Heeseok Kim, Seokhie Hong:
A Combined Single Trace Attack on Global Shuffling Long Integer Multiplication and its Novel Countermeasure. IEEE Access 8: 5244-5255 (2020) - Reza Fotohi, Somayyeh Firoozi Bari:
A novel countermeasure technique to protect WSN against denial-of-sleep attacks using firefly and Hopfield neural network (HNN) algorithms. J. Supercomput. 76(9): 6860-6886 (2020) - Anubhab Baksi, Vinay B. Y. Kumar, Banashri Karmakar, Shivam Bhasin, Dhiman Saha, Anupam Chattopadhyay:
A Novel Duplication Based Countermeasure to Statistical Ineffective Fault Analysis. ACISP 2020: 525-542 - Petr Moucha, Stanislav Jerábek, Martin Novotný:
Novel Dummy Rounds Schemes as a DPA Countermeasure in PRESENT Cipher. DDECS 2020: 1-4 - Petr Moucha, Stanislav Jerábek, Martin Novotný:
Novel Controller for Dummy Rounds Scheme DPA Countermeasure. DSD 2020: 281-284 - Wei Cai, Gaopeng Gou, Peipei Fu, Minghao Jiang, Zhen Li, Gang Xiong:
JumpEstimate: a Novel Black-box Countermeasure to Website Fingerprint Attack Based on Decision-boundary Confusion. ISCC 2020: 1-7 - Reza Fotohi, Somayyeh Firoozi Bari:
A novel countermeasure technique to protect WSN against denial-of-sleep attacks using firefly and Hopfield neural network (HNN) algorithms. CoRR abs/2001.05358 (2020) - Yuqiao Zhang, Ayush Jain, Pinchen Cui, Ziqi Zhou, Ujjwal Guin:
A Novel Topology-Guided Attack and Its Countermeasure Towards Secure Logic Locking. CoRR abs/2006.05930 (2020) - Anubhab Baksi, Vinay B. Y. Kumar, Banashri Karmakar, Shivam Bhasin, Dhiman Saha, Anupam Chattopadhyay:
A Novel Duplication Based Countermeasure To Statistical Ineffective Fault Analysis. IACR Cryptol. ePrint Arch. 2020: 1268 (2020) - 2019
- Jayesh Popat, Usha Mehta:
Statistical security analysis of AES with X-tolerant response compactor against all types of test infrastructure attacks with/without novel unified countermeasure. IET Circuits Devices Syst. 13(8): 1117-1124 (2019) - Fadele Ayotunde Alaba, Mazliza Othman, Ibrahim Abaker Targio Hashem, Ibrar Yaqoob, Muhammad Imran, Muhammad Shoaib:
A novel countermeasure technique for reactive jamming attack in internet of things. Multim. Tools Appl. 78(21): 29899-29920 (2019) - Eduard Marin, Nicola Bucciol, Mauro Conti:
An In-depth Look Into SDN Topology Discovery Mechanisms: Novel Attacks and Practical Countermeasures. CCS 2019: 1101-1114 - Kervins Nicolas, Yi Wang:
A novel double spending attack countermeasure in blockchain. UEMCON 2019: 383-388 - 2018
- Faran Awais Butt, Ijaz Haider Naqvi, Usman Riaz:
Hybrid Phased-MIMO Radar: A Novel Approach With Optimal Performance Under Electronic Countermeasures. IEEE Commun. Lett. 22(6): 1184-1187 (2018) - Qi Zhang, Azzedine Boukerche:
A Novel Infrastructure-Based Worm Spreading Countermeasure for Vehicular Networks. IEEE Trans. Intell. Transp. Syst. 19(7): 2188-2203 (2018) - Jayesh Popat, Usha Mehta:
A Novel Countermeasure Against Differential Scan Attack in AES Algorithm. VDAT 2018: 297-309 - 2017
- Yoo-Seung Won, Aesun Park, Dong-Guk Han:
Novel Leakage Against Realistic Masking and Shuffling Countermeasures - Case Study on PRINCE and SEED. ICISC 2017: 139-154 - 2016
- Nahid Farhady Ghalaty:
Fault Attacks on Cryptosystems: Novel Threat Models, Countermeasures and Evaluation Metrics. Virginia Tech, Blacksburg, VA, USA, 2016 - Noriyuki Miura, Zakaria Najm, Wei He, Shivam Bhasin, Xuan Thuy Ngo, Makoto Nagata, Jean-Luc Danger:
PLL to the rescue: a novel EM fault countermeasure. DAC 2016: 90:1-90:6 - Yonghui Xin, Yang Li, Wei Wang, Weiyuan Li, Xin Chen:
A Novel Interest Flooding Attacks Detection and Countermeasure Scheme in NDN. GLOBECOM 2016: 1-7 - Benedict Bender, Benjamin Fabian, Stefan Lessmann, Johannes Haupt:
E-Mail Tracking: Status Quo and Novel Countermeasures. ICIS 2016
skipping 7 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-25 19:16 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint