Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 107 matches
- 2022
- Steven Furnell, Paolo Mori, Edgar R. Weippl, Olivier Camp:
Information Systems Security and Privacy - 6th International Conference, ICISSP 2020, Valletta, Malta, February 25-27, 2020, Revised Selected Papers. Communications in Computer and Information Science 1545, Springer 2022, ISBN 978-3-030-94899-3 [contents] - 2020
- Masahiro Ishii, Satoshi Matsuura, Kento Mori, Masahiko Tomoishi, Yong Jin, Yoshiaki Kitaguchi:
A Study of Classification of Texts into Categories of Cybersecurity Incident and Attack with Topic Models. ICISSP 2020: 639-646 - Agnes Åkerlund, Christine Große:
Integration of Data Envelopment Analysis in Business Process Models: A Novel Approach to Measure Information Security. ICISSP 2020: 281-288 - Rafael Almeida, Pedro Vieira-Marques, Ana Ferreira:
Patients to Mobilize Their Data: Secure and Flexible mHealth Delegation. ICISSP 2020: 552-560 - Mohammad Anagreh, Eero Vainikko, Peeter Laud:
Speeding Up the Computation of Elliptic Curve Scalar Multiplication based on CRT and DRM. ICISSP 2020: 176-184 - Budi Arief, Andy Periam, Orçun Çetin, Julio C. Hernandez-Castro:
Using Eyetracker to Find Ways to Mitigate Ransomware. ICISSP 2020: 448-456 - Mauro Barni:
Backdooring Deep Learning Architectures: Threats and (some) Opportunities. ICISSP 2020: 15-16 - Cinzia Bernardeschi, Gianluca Dini, Maurizio Palmieri, Francesco Racciatti:
Analysis of Security Attacks in Wireless Sensor Networks: From UPPAAL to Castalia. ICISSP 2020: 815-824 - Aymen Boudguiga, Oana Stan, Hichem Sedjelmaci, Sergiu Carpov:
Homomorphic Encryption at Work for Private Analysis of Security Logs. ICISSP 2020: 515-523 - William Bowditch, Will Abramson, William J. Buchanan, Nikolaos Pitropakis, Adam J. Hall:
Privacy-preserving Surveillance Methods using Homomorphic Encryption. ICISSP 2020: 240-248 - Vanessa Bracamonte, Seira Hidano, Welderufael B. Tesfay, Shinsaku Kiyomoto:
Evaluating the Effect of Justification and Confidence Information on User Perception of a Privacy Policy Summarization Tool. ICISSP 2020: 142-151 - Vanessa Bracamonte, Seira Hidano, Welderufael B. Tesfay, Shinsaku Kiyomoto:
Effects of Explanatory Information on Privacy Policy Summarization Tool Perception. ICISSP (Revised Selected Papers) 2020: 156-177 - Lorenzo Bracciale, Pierpaolo Loreti, Emanuele Raso, Maurizio Naldi, Giuseppe Bianchi:
CoProtect: Collaborative Management of Cryptographic Keys for Data Security in Cloud Systems. ICISSP 2020: 361-368 - Siri Bromander, Morton Swimmer, Martin Eian, Geir Skjotskift, Fredrik Borg:
Modeling Cyber Threat Intelligence. ICISSP 2020: 273-280 - Clemens Brunner, Fabian Knirsch, Andreas Unterweger, Dominik Engel:
A Comparison of Blockchain-based PKI Implementations. ICISSP 2020: 333-340 - Simona Buchovecká, Róbert Lórencz, Jirí Bucek, Filip Kodýtek:
Lightweight Authentication and Secure Communication Suitable for IoT Devices. ICISSP 2020: 75-83 - Simona Buchovecká, Róbert Lórencz, Jirí Bucek, Filip Kodýtek:
Symmetric and Asymmetric Schemes for Lightweight Secure Communication. ICISSP (Revised Selected Papers) 2020: 97-114 - Ismail Butun, Alexios Lekidis, Daniel Ricardo dos Santos:
Security and Privacy in Smart Grids: Challenges, Current Solutions and Future Opportunities. ICISSP 2020: 733-741 - Orestis Christou, Nikolaos Pitropakis, Pavlos Papadopoulos, Sean McKeown, William J. Buchanan:
Phishing URL Detection Through Top-level Domain Analysis: A Descriptive Approach. ICISSP 2020: 289-298 - Ge Chu, Alexei Lisitsa:
Ontology-based Automation of Penetration Testing. ICISSP 2020: 713-720 - Madalina G. Ciobanu, Fausto Fasano, Fabio Martinelli, Francesco Mercaldo, Antonella Santone:
Accidental Sensitive Data Leaks Prevention via Formal Verification. ICISSP 2020: 825-834 - Christian Colombo, Mark Vella:
Towards a Comprehensive Solution for Secure Cryptographic Protocol Execution based on Runtime Verification. ICISSP 2020: 765-774 - Jesse Daniels, Sajal Bhatia:
Legislation and the Negative Impact on Cybersecurity in Healthcare. ICISSP 2020: 691-697 - Said Daoudagh, Francesca Lonetti, Eda Marchetti:
Assessing Testing Strategies for Access Control Systems: A Controlled Experiment. ICISSP 2020: 107-118 - Hervé Debar, Razvan Beuran, Yasuo Tan:
A Quantitative Study of Vulnerabilities in the Internet of Medical Things. ICISSP 2020: 164-175 - Maxence Delong, Baptiste David, Eric Filiol:
Detection of Crawler Traps: Formalization and Implementation Defeating Protection on Internet and on the TOR Network. ICISSP 2020: 775-783 - Aïda Diop, Maryline Laurent, Jean Leneutre, Jacques Traoré:
CoRA: A Scalable Collective Remote Attestation Protocol for Sensor Networks. ICISSP 2020: 84-95 - Simone Facchini, Giacomo Giorgi, Andrea Saracino, Gianluca Dini:
Multi-level Distributed Intrusion Detection System for an IoT based Smart Home Environment. ICISSP 2020: 705-712 - Fausto Fasano, Fabio Martinelli, Francesco Mercaldo, Antonella Santone:
Android Run-time Permission Exploitation User Awareness by Means of Formal Methods. ICISSP 2020: 804-814 - Eduardo Magalhães De Lacerda Filho, Vinícius P. Gonçalves:
Achieving Privacy, Security, and Interoperability among Biometric Networks using Symmetric Encryption. ICISSP 2020: 481-489
skipping 77 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-28 16:47 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint