Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 110 matches
- 2024
- Zhenshi Sun, Dayong Huang, Siyuan Li, Haokun Yang, Chengwei Zhao:
High-Efficiency Positioning of Vibration Intrusions for Long-Distance Perimeter Security Monitoring Based on Time-Frequency Variation Envelopes. IEEE Trans. Instrum. Meas. 73: 1-11 (2024) - Abdullah Konak, Simon Delattre, Michael Bartolacci:
Wireless Signal Prediction using Deep Learning Models for WiFi Positioning and Security Concerns. HICSS 2024: 5691-5699 - 2023
- Yerkezhan Sartayeva, Henry C. B. Chan:
A survey on indoor positioning security and privacy. Comput. Secur. 131: 103293 (2023) - Raúl Casanova Marqués, Joaquín Torres-Sospedra, Jan Hajny, Michael Gould:
Maximizing privacy and security of collaborative indoor positioning using zero-knowledge proofs. Internet Things 22: 100801 (2023) - Natalie Leesakul, Charles Morisset:
Position Paper: The role of law in achieving privacy and security measures in smart buildings from the GDPR context. EuroS&P Workshops 2023: 619-626 - Srdjan Capkun:
On Location Privacy and Security of Positioning in Modern Systems. IoTBDS 2023: 7 - Marius Leon Hammann, Martin Steinebach, Huajian Liu, Niklas Bunzel:
Predicting positions of flipped bits in robust image hashes. Media Watermarking, Security, and Forensics 2023: 375-1 - Frank Stajano:
Sleepwalking into Disaster? Requirements Engineering for Digital Cash (Position Paper). Security Protocols Workshop 2023: 3-19 - 2022
- V. N. Senthil Kumaran, G. Ananthi:
Artificial Noise Aided Polar Code with Optimal Jamming Position for Physical Layer Security in Mondrian Loss Integrated Rayleigh Wireless Relay Channel. Ad Hoc Sens. Wirel. Networks 51(1-3): 205-234 (2022) - Changju Zhu, Maozhong Song, Xiaoyu Dang, Qiuming Zhu:
Position-sensitivity security transmission with orbital angular momentum directional modulation based on frequency diverse array. Trans. Emerg. Telecommun. Technol. 33(7) (2022) - Liang Zhu, Liping Yu, Zengyu Cai, Xiaowei Liu, Jianwei Zhang:
K -Anonymous Based Anti-Positioning Security Strategy in Mobile Networks. J. Inf. Sci. Eng. 38(1): 121-138 (2022) - Zujany Salazar, Ana Rosa Cavalli, Wissam Mallouli, Filip Sebek, Fatiha Zaïdi, Monika Ewa Rakoczy:
Monitoring Approaches for Security and Safety Analysis: Application to a Load Position System. ICST Workshops 2022: 40-48 - Jegan Purushothaman, Ethan Thompson, AbdelRahman Abdou:
Position Paper: Certificate Root Stores - An Area of Unity or Disparity? CSET @ USENIX Security Symposium 2022: 105-110 - 2021
- Andrey Silva:
Security Improvements for Connected Vehicles Position-Based Routing. Int. J. Commun. Networks Inf. Secur. 13(3) (2021) - Andrey Silva:
Security Improvements for Connected Vehicles Position-Based Routing. Int. J. Commun. Networks Inf. Secur. 13(3) (2021) - Ting Wang, Xiangjun Ji, Aiguo Song, Kurosh Madani, Amine Chohra, Huimin Lu, Ramon Monero:
Output-Bounded and RBFNN-Based Position Tracking and Adaptive Force Control for Security Tele-Surgery. ACM Trans. Multim. Comput. Commun. Appl. 17(2s): 61:1-61:15 (2021) - Xiangyu Liu, Lei Guo, Xuetao Wei:
Indoor Visible Light Applications for Communication, Positioning, and Security. Wirel. Commun. Mob. Comput. 2021: 1730655:1-1730655:10 (2021) - Stéphanie Lebrun, Stéphane Kaloustian, Raphaël Rollier, Colin Barschel:
GNSS Positioning Security: Automatic Anomaly Detection on Reference Stations. CRITIS 2021: 60-76 - Yu-qing Yang, Weiwei Miao, Zeng Zeng:
The Application of Beidou and Ultra-Broadband Positioning Technology in the Power Security Protection System. ICBDS 2021: 171-182 - Ajith M. Kamath:
Signal Rich Art: Object Placement, Object Position Modulation and Other Advances. Media Watermarking, Security, and Forensics 2021 - Martin Steinebach:
A Close Look at Robust Hash Flip Positions. Media Watermarking, Security, and Forensics 2021 - Haoran Tao, Ning Ding, Tianhui Huang, Kehan Yu, Dongsheng Qian, Yan Luo, Yuyin Ma:
Security Association Model: Interdisciplinary Application of 5G Positioning Technology and Social Network. MobiSec 2021: 408-419 - 2020
- Elisa Bertino:
Security of cellular networks position paper. CCF Trans. Netw. 3(2): 93-96 (2020) - Lorenzo De Carli, Antonio Mignano:
Network Security for Home IoT Devices Must Involve the User: A Position Paper. FPS 2020: 20-28 - Bingsen Xia, Zhaozheng Zhou, Zhanghuang Zhang, Yang Li, Jia Yu:
Indoor and Outdoor Fusion Positioning and Security Technology Based on Beidou Satellite. ICBDS 2020: 153-164 - M. Monjirul Kabir, Nasimul Hasan, Md Khalid Hassan Tahmid, Tanjil Ahmed Ovi, Victor Stany Rozario:
Enhancing Smartphone Lock Security using Vibration Enabled Randomly Positioned Numbers. ICCA 2020: 44:1-44:7 - 2019
- Karpura Dheepan:
Security enhancement and certificate revocation in MANET using position and energy based monitoring. Int. Arab J. Inf. Technol. 16(1): 88-97 (2019) - Mouna S. Chebli, Heba Mohammad, Khalifa Al Amer:
An Overview of Wireless Indoor Positioning Systems: Techniques, Security, and Countermeasures. IDCS 2019: 223-233 - Gregory C. Lewin:
Cyber-Physical System Security: Position Spoofing in a Class Project on Autonomous Vehicles. RiE 2019: 428-438 - Simon N. Foley, Vivien M. Rooney:
Social Constructionism in Security Protocols - A Position on Human Experience, Psychology and Security. Security Protocols Workshop 2019: 69-81
skipping 80 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-24 16:10 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint