default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 998 matches
- 2020
- Saad Al-Ahmari, Karen Renaud, Inah Omoronyia:
Implement a Model for Describing and Maximising Security Knowledge Sharing. ICITST 2020: 1-4 - Mohammad Al-Fawa'reh, Amal Saif, Mousa Tayseer Jafar, Ammar Elhassan:
Malware Detection by Eating a Whole APK. ICITST 2020: 1-7 - Harris Anthonio, Yvonne Hwei-Syn Kam:
A Shoulder-Surfing Resistant Colour Image-based Authentication Method Using Human Vision Perception with Spatial Frequency. ICITST 2020: 1-5 - Felix Larbi Aryeh, Boniface Kayode Alese:
A Multi-layer Stack Ensemble Approach to Improve Intrusion Detection System's Prediction Accuracy. ICITST 2020: 1-6 - Zein Ashi, Laila Aburashed, Mohammad Al-Fawa'reh, Malik Qasaimeh:
Fast and Reliable DDoS Detection using Dimensionality Reduction and Machine Learning. ICITST 2020: 1-10 - Esau Bermudez, Djamel Fawzi Hadj Sadok:
Energy Consumption of a LoRaWAN Network using Jarvis Algorithm. ICITST 2020: 1-6 - Wai Kok Chan, Ji-Jian Chin, Vik Tor Goh:
Evolution of Bitcoin Addresses from Security Perspectives. ICITST 2020: 1-6 - Luca Deri, Daniele Sartiano:
Monitoring IoT Encrypted Traffic with Deep Packet Inspection and Statistical Analysis. ICITST 2020: 1-6 - Fethi Dridi, Safwan El Assad, Carinelle Atamech, Wajih El Hadj Youssef, Mohsen Machhout:
Design and Implementation on FPGA Board of a Chaos-based Stream Cipher. ICITST 2020: 1-5 - Sook-Yan Hue, Nor Haniza Sarmin, Eddie Shahril Ismail, Ji-Jian Chin:
Easy Simple Factoring-based Digital Signature Scheme. ICITST 2020: 1-4 - Dhruva Hunusekattte:
Smart Parking With Automated Billing System. ICITST 2020: 1-5 - Raadhesh Kannan, Ji-Jian Chin, Xiaoning Guo:
Adversarial Evasion Noise Attacks Against TensorFlow Object Detection API. ICITST 2020: 1-4 - Song-Kyoo Amang Kim:
Toward Compact Data from Big Data. ICITST 2020: 1-5 - Jong-Jin Kim, Sang-Gil Lee, Cheol-Hoon Lee:
Real-Time supports on Tablet PC Platforms. ICITST 2020: 1-7 - Kitty Kioskli, Nineta Polemi:
Measuring Psychosocial and Behavioural Factors Improves Attack Potential Estimates. ICITST 2020: 1-4 - Satoshi Kosakatani, Tetsutaro Uehara, Songpon Teerakanok:
Japan's Act on Wiretapping for Criminal Investigation: How the system is implemented and how it should be. ICITST 2020: 1-6 - Huangxiaolie Liu, Dong Zhang, Huijun Chen:
Towards robust classification detection for adversarial examples. ICITST 2020: 1-7 - Loreen Mahmoud, Raja Praveen:
Network Security Evaluation Using Deep Neural Network. ICITST 2020: 1-4 - Mohammad Masum, Hossain Shahriar:
TL-NID: Deep Neural Network with Transfer Learning for Network Intrusion Detection. ICITST 2020: 1-7 - May Medhat, Menna Essa, Hend Faisal, Samir G. Sayed:
YARAMON: A Memory-based Detection Framework for Ransomware Families. ICITST 2020: 1-6 - Khalid Mohamed, Suleiman Ali, Soilahoudini Ali, Ilyas Kassim:
Performance Evaluation of RPL and DODAG Formations for IoTs Applications. ICITST 2020: 1-7 - Tabisa Ncubukezi, Laban Mwansa, François Rocaries:
A Review of the Current Cyber Hygiene in Small and Medium-sized Businesses. ICITST 2020: 1-6 - Ezekiel Uzor Okike, Gofaone Mogapi:
A Pedagogic Analysis of Information Systems Security Measures in Online Services. ICITST 2020: 1-6 - Zongchao Qiao, Ina Taralova, Safwan El Assad:
A Reliable Encryption Oriented Pseudo-chaotic Number Generator Using a Key Space Expandable Strategy. ICITST 2020: 1-5 - Ali Raya, K. Mariyappn:
Security and Performance of Elliptic Curve Cryptography in Resource-limited Environments: A Comparative Study. ICITST 2020: 1-8 - Fabian Schillinger, Christian Schindelhauer:
Partitioned Private User Storages in End-to-End Encrypted Online Social Networks. ICITST 2020: 1-8 - Chunxiao Yang, Ina Taralova, Jean-Jacques Loiseau, Safwan El Assad:
A Stream Cipher Based on Fractional Pseudo Chaotic Random Number Generator. ICITST 2020: 1-6 - 15th International Conference for Internet Technology and Secured Transactions, ICITST 2020, London, United Kingdom, December 8-10, 2020. IEEE 2020, ISBN 978-1-913572-21-1 [contents]
- 2017
- Omotayo Kayode Abatan, Manoj S. Maharaj:
Change management and the integration of information technology: Research notes from selected African universities. ICITST 2017: 167-172 - Nabil Abdoun, Safwan El Assad, Khodor Hammoud, Rima Assaf, Mohamad Khalil, Olivier Déforges:
New keyed chaotic neural network hash function based on sponge construction. ICITST 2017: 35-38
skipping 968 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-18 11:20 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint