Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 106 matches
- 2020
- Wojciech Wodo, Damian Stygar:
Security of Digital Banking Systems in Poland: Users Study 2019. ICISSP 2020: 221-231 - Paolo Mori, Steven Furnell, Olivier Camp:
Information Systems Security and Privacy - 5th International Conference, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers. Communications in Computer and Information Science 1221, Springer 2020, ISBN 978-3-030-49442-1 [contents] - 2019
- Partha Sarathi Roy, Kirill Morozov, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi:
Security Analysis and Efficient Implementation of Code-based Signature Schemes. ICISSP 2019: 213-220 - Carlos Moreno, Sebastian Fischmeister:
Sender Authentication for Automotive In-Vehicle Networks through Dual Analog Measurements to Determine the Location of the Transmitter. ICISSP 2019: 596-605 - Gaurav Sharma, Soultana Ellinidou, Tristan Vanspouwen, Théo Rigas, Jean-Michel Dricot, Olivier Markowitch:
Identity-based TLS for Cloud of Chips. ICISSP 2019: 44-54 - Gulsum Akkuzu, Benjamin Aziz, Mo Adda:
Fuzzy Logic Decision based Collaborative Privacy Management Framework for Online Social Networks. ICISSP 2019: 674-684 - Wassnaa Al-Mawee, Paul J. Bonamy, Steve Carr, Jean Mayo:
Maia: A Language for Mandatory Integrity Controls of Structured Data. ICISSP 2019: 257-265 - Mouiad Al-Wahah, Csilla Farkas:
Monotonic and Non-monotonic Context Delegation. ICISSP 2019: 449-460 - Maryam Almarwani, Boris Konev, Alexei Lisitsa:
Flexible Access Control and Confidentiality over Encrypted Data for Document-based Database. ICISSP 2019: 606-614 - Maryam Almarwani, Boris Konev, Alexei Lisitsa:
Fine-Grained Access Control for Querying Over Encrypted Document-Oriented Database. ICISSP (Revised Selected Papers) 2019: 403-425 - Saud Alotaibi, Abdulrahman Alruban, Steven Furnell, Nathan L. Clarke:
A Novel Behaviour Profiling Approach to Continuous Authentication for Mobile Applications. ICISSP 2019: 246-251 - Mohammad Anagreh, Eero Vainikko, Peeter Laud:
Accelerate Performance for Elliptic Curve Scalar Multiplication based on NAF by Parallel Computing. ICISSP 2019: 238-245 - Daniel Augot, Hervé Chabanne, William George:
Practical Solutions to Save Bitcoins Applied to an Identity System Proposal. ICISSP 2019: 511-518 - Pierre-Marie Bajan, Christophe Kiennert, Hervé Debar:
Methodology of a Network Simulation in the Context of an Evaluation: Application to an IDS. ICISSP 2019: 378-388 - Cesare Bartolini, Antonello Calabrò, Eda Marchetti:
Enhancing Business Process Modelling with Data Protection Compliance: An Ontology-based Proposal. ICISSP 2019: 421-428 - Ilan Ben-Bassat, Erez Rokah:
Locality-Sensitive Hashing for Efficient Web Application Security Testing. ICISSP 2019: 193-204 - Cinzia Bernardeschi, Andrea Domenici, Maurizio Palmieri:
Modeling and Simulation of Attacks on Cyber-physical Systems. ICISSP 2019: 700-708 - Niket Bhodia, Pratikkumar Prajapati, Fabio Di Troia, Mark Stamp:
Transfer Learning for Image-based Malware Classification. ICISSP 2019: 719-726 - Mary K. Bispham, Ioannis Agrafiotis, Michael Goldsmith:
Nonsense Attacks on Google Assistant and Missense Attacks on Amazon Alexa. ICISSP 2019: 75-87 - Mary K. Bispham, Ioannis Agrafiotis, Michael Goldsmith:
Attack and Defence Modelling for Attacks via the Speech Interface. ICISSP 2019: 519-527 - Mary K. Bispham, Ioannis Agrafiotis, Michael Goldsmith:
The Security of the Speech Interface: A Modelling Framework and Proposals for New Defence Mechanisms. ICISSP (Revised Selected Papers) 2019: 288-316 - Mary K. Bispham, Alastair Janse van Rensburg, Ioannis Agrafiotis, Michael Goldsmith:
Black-Box Attacks via the Speech Interface Using Linguistically Crafted Input. ICISSP (Revised Selected Papers) 2019: 93-120 - Bernhards Blumbergs:
Remote Exploit Development for Cyber Red Team Computer Network Operations Targeting Industrial Control Systems. ICISSP 2019: 88-99 - Chiara Bodei, Letterio Galletta:
Tracking Data Trajectories in IoT. ICISSP 2019: 572-579 - Chiara Bodei, Letterio Galletta:
Analysing the Provenance of IoT Data. ICISSP (Revised Selected Papers) 2019: 358-381 - Vanessa Bracamonte, Seira Hidano, Welderufael B. Tesfay, Shinsaku Kiyomoto:
Evaluating Privacy Policy Summarization: An Experimental Study among Japanese Users. ICISSP 2019: 370-377 - Vanessa Bracamonte, Seira Hidano, Welderufael B. Tesfay, Shinsaku Kiyomoto:
User Study of the Effectiveness of a Privacy Policy Summarization Tool. ICISSP (Revised Selected Papers) 2019: 186-206 - Clemens Brunner, Fabian Knirsch, Dominik Engel:
SPROOF: A Platform for Issuing and Verifying Documents in a Public Blockchain. ICISSP 2019: 15-25 - Clemens Brunner, Fabian Knirsch, Dominik Engel:
SPROOF: A Decentralized Platform for Attribute-Based Authentication. ICISSP (Revised Selected Papers) 2019: 1-23 - Bill Buchanan:
Building the Future: Tokenization, Blockchain and Citizen-focused Systems. ICISSP 2019: 5
skipping 76 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-28 15:28 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint