![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
EAI Endorsed Transactions on Security and Safety, Volume 4
Volume 4, Number 11, December 2017
- Zheng Tan, Cheng Wang, Xiaoling Fu, Jipeng Cui, Changjun Jiang, Weili Han:
Re-identification of Vehicular Location-Based Metadata. e1 - Yongfeng Li, Jinbin Ouyang, Bing Mao, Kai Ma, Shanqing Guo:
Data Flow Analysis on Android Platform with Fragment Lifecycle Modeling and Callbacks. e2 - Nicolas Van Balen, Christopher T. Ball, Haining Wang:
Analysis of Targeted Mouse Movements for Gender Classification. e3 - Subramaniyam Kannan, Paul Wood, Somali Chaterji, Saurabh Bagchi, Larry Deatrick, Patricia Beane:
MAAT: Multi-Stage Attack Attribution in Enterprise Systems using Software Defined Networks. e4 - Nicolae Paladi, Christian Gehrmann:
Bootstrapping trust in software defined networks. e5
Volume 4, Number 12, December 2017
- Sencun Zhu, Kevin I. Jones, Leandros A. Maglaras:
Vulnerability Analysis, Intrusion Detection and Privacy Preservation of Modern Communication Systems. e1 - Quamar Niyaz, Weiqing Sun, Ahmad Y. Javaid:
A Deep Learning Based DDoS Detection System in Software-Defined Networking (SDN). e2 - Qi Dong, Zekun Yang, Yu Chen, Xiaohua Li, Kai Zeng:
Exploration of Singular Spectrum Analysis for Online Anomaly Detection in CRNs. e3 - Leixiao Cheng, Quanshui Wu, Yunlei Zhao:
Compact lossy and all-but-one trapdoor functions from lattice. e4 - Cristian Liviu Leca
:
Overview of Romania 802.11Wireless Security & Statistics. e5
Volume 4, Number 13, January 2018
- Sencun Zhu, Kevin I. Jones, Leandros A. Maglaras:
Defence Mechanisms for Public Systems. e1 - Mohammad Karami, An Wang, Songqing Chen:
Attribution of Economic Denial of Sustainability Attacks in Public Clouds. e2 - Xiaoyan Sun, Jun Dai
, Anoop Singhal, Peng Liu:
Probabilistic Inference of the Stealthy Bridges between Enterprise Networks in Cloud. e3 - Chu Huang, Sencun Zhu, Yi Yang:
An Evaluation Framework for Moving Target Defense Based on Analytic Hierarchy Process. e4 - Lei Xu, Lin Chen, Zhimin Gao, Shouhuai Xu, Weidong Shi:
Efficient Public Blockchain Client for Lightweight Users. e5
Volume 4, Number 14, May 2018
- Leandros Maglaras, George Drivas, Kleanthis Noou, Stylianos Rallis:
NIS directive: The case of Greece. e1 - Kaiqi Xiong:
The performance analysis of public key cryptography-based authentication. e2 - Zheng Wang, Shui Yu, Scott Rose:
An On-Demand Defense Scheme Against DNS Cache Poisoning Attacks. e3 - Le Guan, Sadegh Farhang, Yu Pu, Pinyao Guo, Jens Grossklags, Peng Liu:
VaultIME: Regaining User Control for Password Managers through Auto-correction. e4 - Ebrima N. Ceesay, K. Myers, Paul A. Watters
:
Human-centered strategies for cyber-physical systems security. e5
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.