Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/sesa/sesa3.bht:"
@article{DBLP:journals/sesa/AlmajedMSJZ16, author = {Najlaa Almajed and Leandros A. Maglaras and Fran{\c{c}}ois Siewe and Helge Janicke and Pooneh Bagheri Zadeh}, title = {Prevention of crime in {B2C} E-Commerce: How E-Retailers/Banks protect themselves from Criminal Sctivities}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {3}, number = {7}, pages = {e4}, year = {2016}, url = {https://doi.org/10.4108/eai.8-12-2016.151727}, doi = {10.4108/EAI.8-12-2016.151727}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/AlmajedMSJZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/CaseyMKMM16, author = {William Casey and Parisa Memarmoshrefi and Ansgar Kellner and Jose Andre Morales and Bud Mishra}, title = {Identity Deception and Game Deterrence via Signaling Games}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {3}, number = {9}, pages = {e3}, year = {2016}, url = {https://doi.org/10.4108/eai.3-12-2015.2262519}, doi = {10.4108/EAI.3-12-2015.2262519}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/CaseyMKMM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/Chatzikonstantinou16, author = {Alexia Chatzikonstantinou and Christoforos Ntantogian and Georgios Karopoulos and Christos Xenakis}, title = {Evaluation of Cryptography Usage in Android Applications}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {3}, number = {9}, pages = {e4}, year = {2016}, url = {https://doi.org/10.4108/eai.3-12-2015.2262471}, doi = {10.4108/EAI.3-12-2015.2262471}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/Chatzikonstantinou16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/CurzonBTC16, author = {Paul Curzon and Ann Blandford and Harold Thimbleby and Anna Louise Cox}, title = {Safer Interactive Medical Device Design: Insights from the {CHI+MED} Project}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {3}, number = {9}, pages = {e1}, year = {2016}, url = {https://doi.org/10.4108/eai.14-10-2015.2261752}, doi = {10.4108/EAI.14-10-2015.2261752}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/CurzonBTC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/DurHM16, author = {Umut Mert Dur and Robert Hammond and Thayer Morrill}, title = {The Secure Boston Mechanism}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {3}, number = {10}, pages = {e5}, year = {2016}, url = {https://doi.org/10.4108/eai.8-8-2015.2260861}, doi = {10.4108/EAI.8-8-2015.2260861}, timestamp = {Mon, 23 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/DurHM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/JanickeJM16, author = {Helge Janicke and Kevin I. Jones and Leandros A. Maglaras}, title = {Security, Privacy and Trust in Cyber Physical Systems}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {3}, number = {7}, pages = {e1}, year = {2016}, url = {https://doi.org/10.4108/eai.8-12-2016.151724}, doi = {10.4108/EAI.8-12-2016.151724}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/JanickeJM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/JavaidNSA16, author = {Ahmad Y. Javaid and Quamar Niyaz and Weiqing Sun and Mansoor Alam}, title = {A Deep Learning Approach for Network Intrusion Detection System}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {3}, number = {9}, pages = {e2}, year = {2016}, url = {https://doi.org/10.4108/eai.3-12-2015.2262516}, doi = {10.4108/EAI.3-12-2015.2262516}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/JavaidNSA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/KeefeS16, author = {Ken Keefe and William H. Sanders}, title = {Reliability Analysis with Dynamic Reliability Block Diagrams in the M{\"{o}}bius Modeling Tool}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {3}, number = {10}, pages = {e3}, year = {2016}, url = {https://doi.org/10.4108/eai.14-12-2015.2262723}, doi = {10.4108/EAI.14-12-2015.2262723}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/KeefeS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/MandalG16, author = {Kalikinkar Mandal and Guang Gong}, title = {Filtering Nonlinear Feedback Shift Registers using Welch-Gong Transformations for Securing {RFID} Applications}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {3}, number = {7}, pages = {e3}, year = {2016}, url = {https://doi.org/10.4108/eai.8-12-2016.151726}, doi = {10.4108/EAI.8-12-2016.151726}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/MandalG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/NoguchiIY16, author = {Wataru Noguchi and Hiroyuki Iizuka and Masahito Yamamoto}, title = {Proposing Multimodal Integration Model Using {LSTM} and Autoencoder}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {3}, number = {10}, pages = {e1}, year = {2016}, url = {https://doi.org/10.4108/eai.3-12-2015.2262505}, doi = {10.4108/EAI.3-12-2015.2262505}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/NoguchiIY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/RayABG16, author = {Apala Ray and Johan {\AA}kerberg and Mats Bj{\"{o}}rkman and Mikael Gidlund}, title = {Assessing Security, Capacity and Reachability of a Heterogeneous Industrial Network during Planning Phase}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {3}, number = {7}, pages = {e5}, year = {2016}, url = {https://doi.org/10.4108/eai.8-12-2016.151728}, doi = {10.4108/EAI.8-12-2016.151728}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/RayABG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/RossiIM16, author = {Gian{-}Luca Dei Rossi and Mauro Iacono and Andrea Marin}, title = {Evaluating the impact of eDoS attacks to cloud facilities}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {3}, number = {10}, pages = {e2}, year = {2016}, url = {https://doi.org/10.4108/eai.14-12-2015.2262650}, doi = {10.4108/EAI.14-12-2015.2262650}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/RossiIM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/Rowe16, author = {Neil C. Rowe}, title = {Identifying forensically uninteresting files in a large corpus}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {3}, number = {7}, pages = {e2}, year = {2016}, url = {https://doi.org/10.4108/eai.8-12-2016.151725}, doi = {10.4108/EAI.8-12-2016.151725}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/Rowe16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/ZhangMAH16, author = {Hang Zhang and Parisa Memarmoshrefi and Fatemeh Ashrafi and Dieter Hogrefe}, title = {Investigating the Learning Phase of an Autonomous Authentication in Mobile Ad-hoc Networks}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {3}, number = {9}, pages = {e5}, year = {2016}, url = {https://doi.org/10.4108/eai.3-12-2015.2262465}, doi = {10.4108/EAI.3-12-2015.2262465}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/ZhangMAH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/ZhaoK16, author = {Jianing Zhao and Peter Kemper}, title = {Protecting Encryption Keys in Mobile Systems Against Memory Errors}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {3}, number = {10}, pages = {e4}, year = {2016}, url = {https://doi.org/10.4108/eai.14-12-2015.2262698}, doi = {10.4108/EAI.14-12-2015.2262698}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/ZhaoK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/AhmatMB15, author = {Daouda Ahmat and Damien Magoni and Tegawend{\'{e}} F. Bissyand{\'{e}}}, title = {End-to-End Key Exchange through Disjoint Paths in {P2P} Networks}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {2}, number = {3}, pages = {e3}, year = {2015}, url = {https://doi.org/10.4108/sesa.2.3.e3}, doi = {10.4108/SESA.2.3.E3}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/AhmatMB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/ElashryMS15, author = {Ibrahim F. Elashry and Yi Mu and Willy Susilo}, title = {Mediated Encryption: Analysis and Design}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {2}, number = {3}, pages = {e2}, year = {2015}, url = {https://doi.org/10.4108/sesa.2.3.e2}, doi = {10.4108/SESA.2.3.E2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/ElashryMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/FanMG15, author = {Xinxin Fan and Kalikinkar Mandal and Guang Gong}, title = {{WG-8:} {A} Lightweight Stream Cipher for Resource-Constrained Smart Devices}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {2}, number = {3}, pages = {e4}, year = {2015}, url = {https://doi.org/10.4108/sesa.2.3.e4}, doi = {10.4108/SESA.2.3.E4}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/FanMG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/MaglarasJ15, author = {Leandros A. Maglaras and Jianmin Jiang}, title = {A novel intrusion detection method based on {OCSVM} and K-means recursive clustering}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {2}, number = {3}, pages = {e5}, year = {2015}, url = {https://doi.org/10.4108/sesa.2.3.e5}, doi = {10.4108/SESA.2.3.E5}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/MaglarasJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/StrackxAAP15, author = {Raoul Strackx and Pieter Agten and Niels Avonds and Frank Piessens}, title = {Salus: Kernel Support for Secure Process Compartments}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {2}, number = {3}, pages = {e1}, year = {2015}, url = {https://doi.org/10.4108/sesa.2.3.e1}, doi = {10.4108/SESA.2.3.E1}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/StrackxAAP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.