Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 57 matches
- 2023
- Peter Zsolt Revesz:
A Generalization of the Chomsky-Halle Phonetic Representation using Real Numbers for Robust Speech Recognition in Noisy Environments. IDEAS 2023: 156-160 - José Miguel Moreno, Srdjan Matic, Narseo Vallina-Rodriguez, Juan Tapiador:
Your Code is 0000: An Analysis of the Disposable Phone Numbers Ecosystem. TMA 2023: 1-10 - José Miguel Moreno, Srdjan Matic, Narseo Vallina-Rodriguez, Juan Tapiador:
Your Code is 0000: An Analysis of the Disposable Phone Numbers Ecosystem. CoRR abs/2306.14497 (2023) - 2022
- Saki Saito, Mariko I. Ito, Takaaki Ohnishi:
Fluctuations in the Number of Stores by Industry During the COVID-19 Pandemic Based on Japanese Phone Book Entries. Rev. Socionetwork Strateg. 16(2): 545-557 (2022) - 2021
- Allison McDonald, Carlo Sugatan, Tamy Guberek, Florian Schaub:
The Annoying, the Disturbing, and the Weird: Challenges with Phone Numbers as Identifiers and Phone Number Recycling. CHI 2021: 559:1-559:14 - Khaled Lounnas, Mourad Abbas, Mohamed Lichouri:
Towards Phone Number Recognition For Code Switched Algerian Dialect. ICNLSP 2021: 35-39 - Alexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, Christian Weinert:
AirCollect: efficiently recovering hashed phone numbers leaked via Apple AirDrop. WISEC 2021: 371-373 - Alexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, Christian Weinert:
DEMO: AirCollect: Efficiently Recovering Hashed Phone Numbers Leaked via Apple AirDrop. IACR Cryptol. ePrint Arch. 2021: 893 (2021) - 2020
- Nicolai Krüger, Agnis Stibe, Frank Teuteberg:
The Black Mirror: What Your Mobile Phone Number Reveals About You. BIS 2020: 18-32 - Yanan Cheng, Han Wang, Zhaoxin Zhang, Ning Li:
Characterizing the Security Threats of Disposable Phone Numbers. FCS 2020: 491-507 - 2019
- Cetin Kalburan, Selcuk Burak Hasiloglu, Ahmet Bardakci:
Does a difference in the number of response categories change the results for ACSI in the mobile phone sector? Int. J. Mob. Commun. 17(6): 746-759 (2019) - Chuan Yu, Shuhui Chen, Zhiping Cai:
LTE Phone Number Catcher: A Practical Attack against Mobile Privacy. Secur. Commun. Networks 2019: 7425235:1-7425235:10 (2019) - Qingqing Chang, Shenghui Su:
Mobile Phone Number Privacy Scheme Based on Lightweight Hash Mapping. ICCNS 2019: 34-39 - Clive R. Poole, Sacha Nacar:
Will the Phone Number Disappear? ICT 2019: 275-279 - 2018
- Pan Wang, Xuejiao Chen, Feng Ye, Zhixin Sun:
A Smart Automated Signature Extraction Scheme for Mobile Phone Number in Human-Centered Smart Home Systems. IEEE Access 6: 30483-30490 (2018) - Hongzhou Yue, Huaping Guo, Xingpo Ma:
Breaking Users' Mobile Phone Number Based on Geographical Location: A Case Study with YY. Inf. 9(8): 200 (2018) - Anette Østbø Sørensen, Johannes Bjelland, Heidi Bull-Berg, Andreas Dypvik Landmark, Muhammad Mohsin Akhtar, Nils O. E. Olsson:
Use of mobile phone data for analysis of number of train travellers. J. Rail Transp. Plan. Manag. 8(2): 123-144 (2018) - Payas Gupta, Roberto Perdisci, Mustaque Ahamad:
Towards Measuring the Role of Phone Numbers in Twitter-Advertised Spam. AsiaCCS 2018: 285-296 - Srishti Gupta, Dhruv Kuchhal, Payas Gupta, Mustaque Ahamad, Manish Gupta, Ponnurangam Kumaraguru:
Under the Shadow of Sunshine: Characterizing Spam Campaigns Abusing Phone Numbers Across Online Social Networks. WebSci 2018: 67-76 - Srishti Gupta, Dhruv Kuchhal, Payas Gupta, Mustaque Ahamad, Manish Gupta, Ponnurangam Kumaraguru:
Under the Shadow of Sunshine: Characterizing Spam Campaigns Abusing Phone Numbers Across Online Social Networks. CoRR abs/1804.00451 (2018) - 2017
- Jinwoo Kim, Kuyju Kim, Junsung Cho, Hyoungshick Kim, Sebastian Schrittwieser:
Hello, Facebook! Here Is the Stalkers' Paradise!: Design and Analysis of Enumeration Attack Using Phone Numbers on Facebook. ISPEC 2017: 663-677 - 2016
- Ting-Yi Chang, Cheng-Jung Tsai, Wang-Jui Tsai, Chun-Cheng Peng, Han-Sing Wu:
A changeable personal identification number-based keystroke dynamics authentication system on smart phones. Secur. Commun. Networks 9(15): 2674-2685 (2016) - Srishti Gupta:
Emerging threats abusing phone numbers exploiting cross-platform features. ASONAM 2016: 1339-1341 - Srishti Gupta, Payas Gupta, Mustaque Ahamad, Ponnurangam Kumaraguru:
Exploiting Phone Numbers and Cross-Application Features in Targeted Mobile Attacks. SPSM@CCS 2016: 73-82 - Jing Li, Jingyuan Wang, Zhang Xiong:
Wavelet-Based Stacked Denoising Autoencoders for Cell Phone Base Station User Number Prediction. iThings/GreenCom/CPSCom/SmartData 2016: 833-838 - 2015
- Eunhyun Kim, Kyungwon Park, Hyoungshick Kim, Jaeseung Song:
Design and analysis of enumeration attacks on finding friends with phone numbers: A case study with KakaoTalk. Comput. Secur. 52: 267-275 (2015) - Taehwan Kim, Joongmin Choi, Jungsun Kim:
Phone Number Extraction and Area Code Mining in Mobile Web Browsing for Smart Phones. Intell. Autom. Soft Comput. 21(4): 623-631 (2015) - T. Rahul, Ritanjali Majhi:
Development and performance evaluation of nonlinear and robust adaptive models for prediction of number of customers of mobile phone service providers. Int. J. Bus. Inf. Syst. 19(1): 1-18 (2015) - Wooguil Pak, Youngrok Cha, Sunki Yeo:
Detecting and tracing leaked private phone number data in Android smartphones. ICOIN 2015: 503-508 - Srishti Gupta, Payas Gupta, Mustaque Ahamad, Ponnurangam Kumaraguru:
Abusing Phone Numbers and Cross-Application Features for Crafting Targeted Attacks. CoRR abs/1512.07330 (2015)
skipping 27 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-25 01:19 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint