
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 757 matches
- 2021
- Zhi Zhang:
Software-only Rowhammer Attacks and Countermeasures. University of New South Wales, Sydney, Australia, 2021 - Zainab Alkhalil, Chaminda T. E. R. Hewage, Liqaa Nawaf, Imtiaz A. Khan:
Phishing Attacks: A Recent Comprehensive Study and a New Anatomy. Frontiers Comput. Sci. 3: 563060 (2021) - Shuyang Tang, Jilai Zheng, Yao Deng, Qinxiang Cao:
Resisting newborn attacks via shared Proof-of-Space. J. Parallel Distributed Comput. 150: 85-95 (2021) - Johannes Tobisch, Anita Aghaie, Georg T. Becker:
Combining Optimization Objectives: New Modeling Attacks on Strong PUFs. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(2): 357-389 (2021) - Dan Zhang
, Gang Feng
:
A New Switched System Approach to Leader-Follower Consensus of Heterogeneous Linear Multiagent Systems With DoS Attack. IEEE Trans. Syst. Man Cybern. Syst. 51(2): 1258-1266 (2021) - Abdellah Nabou
, My Driss Laanaoui, Mohammed Ouzzif:
New MPR Computation for Securing OLSR Routing Protocol Against Single Black Hole Attack. Wirel. Pers. Commun. 117(2): 525-544 (2021) - Tiago Heinrich
, Rafael R. Obelheiro
, Carlos Alberto Maziero
:
New Kids on the DRDoS Block: Characterizing Multiprotocol and Carpet Bombing Attacks. PAM 2021: 269-283 - Tianxiang Chen, Elie Khoury:
Spoofprint: A New Paradigm for Spoofing Attacks Detection. SLT 2021: 538-543 - Jinyong Chen, Reiner Dojen, Anca Jurcut:
Detection and Prevention of New Attacks for ID-based Authentication Protocols. CoRR abs/2101.12604 (2021) - Harishma Boyapally, Urbi Chatterjee, Debdeep Mukhopadhyay:
On the Validity of Spoofing Attack Against Safe is the New Smart. IACR Cryptol. ePrint Arch. 2021: 395 (2021) - 2020
- Liang Tan, Yue Pan, Jing Wu
, Jianguo Zhou, Hao Jiang
, Yuchuan Deng
:
A New Framework for DDoS Attack Detection and Defense in SDN Environment. IEEE Access 8: 161908-161919 (2020) - Gerard Wawrzyniak, Imed El Fray
:
New XML Signature Scheme That is Resistant to Some Attacks. IEEE Access 8: 35815-35831 (2020) - Sung-Hyun Yoon
, Min-Sung Koh, Jae-Han Park, Ha-Jin Yu
:
A New Replay Attack Against Automatic Speaker Verification Systems. IEEE Access 8: 36080-36088 (2020) - Mohiuddin Ahmed, Al-Sakib Khan Pathan
:
False data injection attack (FDIA): an overview and new metrics for fair evaluation of its countermeasure. Complex Adapt. Syst. Model. 8: 4 (2020) - Chang Song, Hsin-Pai Cheng, Huanrui Yang, Sicheng Li, Chunpeng Wu, Qing Wu, Hai Li:
Adversarial Attack: A New Threat to Smart Devices and How to Defend It. IEEE Consumer Electron. Mag. 9(4): 49-55 (2020) - Soodeh Hosseini, Behnam Mohammad Hasani Zade:
New hybrid method for attack detection using combination of evolutionary algorithms, SVM, and ANN. Comput. Networks 173: 107168 (2020) - Maninder Pal Singh
, Abhinav Bhandari:
New-flow based DDoS attacks in SDN: Taxonomy, rationales, and research challenges. Comput. Commun. 154: 509-527 (2020) - Jiangfeng Xian, Huafeng Wu, Xiaojun Mei
, Yuanyuan Zhang, Huixing Chen, Jun Wang
:
NMTLAT: A New robust mobile Multi-Target Localization and Tracking Scheme in marine search and rescue wireless sensor networks under Byzantine attack. Comput. Commun. 160: 623-635 (2020) - Javier Galbally
:
A new Foe in biometrics: A narrative review of side-channel attacks. Comput. Secur. 96: 101902 (2020) - Carlos Javier Hernández-Castro, Shujun Li
, María D. R.-Moreno
:
All about uncertainties and traps: Statistical oracle-based attacks on a new CAPTCHA protection against oracle attacks. Comput. Secur. 92: 101758 (2020) - Luca Allodi
, Tzouliano Chotza, Ekaterina Panina, Nicola Zannone:
The Need for New Antiphishing Measures Against Spear-Phishing Attacks. IEEE Secur. Priv. 18(2): 23-34 (2020) - Parinaz Mahdion, Hadi Soleimany
, Pouya Habibi, Farokhlagha Moazami:
New single-trace side-channel attacks on a specific class of Elgamal cryptosystem. IET Inf. Secur. 14(2): 151-156 (2020) - Khalid M. Hosny, Ameer El-Sayed Gouda, Ehab R. Mohamed:
New Detection Mechanism for Distributed Denial of Service Attacks in Software Defined Networks. Int. J. Sociotechnology Knowl. Dev. 12(2): 1-30 (2020) - Vijaypal Singh Rathor
, Bharat Garg, G. K. Sharma:
New lightweight Anti-SAT block design and obfuscation technique to thwart removal attack. Integr. 75: 178-188 (2020) - T. D. Wilson:
Review of: Buchanan, Ben The hacker and the state. Cyber attacks the new normal of geopolitics. Cambridge, MA: Harvard University Press, 2020. Inf. Res. 25(1) (2020) - Hui Qi, Fengyuan Ye:
Contrastive Analysis of Discursive Constructions in Terrorist Attack Reports between Chinese and British Newspapers: Case Study of Reports on Beijing and Barcelona Terrorist Attacks. J. Quant. Linguistics 27(4): 361-378 (2020) - Milad Jafari Barani
, Peyman Ayubi
, Milad Yousefi Valandar
, Behzad Yosefnezhad Irani:
A blind video watermarking algorithm robust to lossy video compression attacks based on generalized Newton complex map and contourlet transform. Multim. Tools Appl. 79(3-4): 2127-2159 (2020) - Amir Hamzah Abd Ghafar
, Muhammad Rezal Kamel Ariffin
, Muhammad Asyraf Asbullah
:
A New LSB Attack on Special-Structured RSA Primes. Symmetry 12(5): 838 (2020) - Shiwen Sun, Xiaoxiao Liu, Li Wang, Chengyi Xia
:
New Link Attack Strategies of Complex Networks Based on k-Core Decomposition. IEEE Trans. Circuits Syst. 67-II(12): 3157-3161 (2020) - Benjamin D. Horne, Jeppe Nørregaard, Sibel Adali:
Robust Fake News Detection Over Time and Attack. ACM Trans. Intell. Syst. Technol. 11(1): 7:1-7:23 (2020)
skipping 727 more matches
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
retrieved on 2021-04-13 19:33 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint