![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 205 matches
- 2017
- An Braeken
, Sergey Bezzateev, Abdellah Touhafi
, Natalia Voloshina
:
HEPPA: Highly Efficient Privacy Preserving Authentication for ITS. MMM-ACNS 2017: 260-271 - Alexander Branitskiy, Igor V. Kotenko
:
Network Anomaly Detection Based on an Ensemble of Adaptive Binary Classifiers. MMM-ACNS 2017: 143-157 - Matthew Davis, Emrah Korkmaz, Andrey M. Dolgikh, Victor A. Skormin:
Resident Security System for Government/Industry Owned Computers. MMM-ACNS 2017: 185-194 - Qi Dong, Zekun Yang, Yu Chen, Xiaohua Li, Kai Zeng:
Anomaly Detection in Cognitive Radio Networks Exploiting Singular Spectrum Analysis. MMM-ACNS 2017: 247-259 - Steven Drager, Janusz Zalewski:
A Novel and Unifying View of Trustworthiness in Cyberphysical Systems. MMM-ACNS 2017: 327-338 - Vasileios Gkioulos, Stephen D. Wolthusen:
Security Requirements for the Deployment of Services Across Tactical SOA. MMM-ACNS 2017: 115-127 - Janusz Górski
, Katarzyna Lukasiewicz:
Meeting Requirements Imposed by Secure Software Development Standards and Still Remaining Agile. MMM-ACNS 2017: 3-15 - Alexander A. Grusho
:
Data Mining and Information Security. MMM-ACNS 2017: 28-33 - Alexander A. Grusho
, Nick A. Grusho
, Michael I. Zabezhailo, Alexander Zatsarinny
, Elena E. Timonina
:
Information Security of SDN on the Basis of Meta Data. MMM-ACNS 2017: 339-347 - Andrew Hutchison:
Adapting Enterprise Security Approaches for Evolving Cloud Processing and Networking Models. MMM-ACNS 2017: 16-27 - Omar Iraqi
, Hanan El Bakkali:
Toward Third-Party Immune Applications. MMM-ACNS 2017: 348-359 - Maxim Kolomeec
, Gustavo Gonzalez Granadillo, Elena Doynikova
, Andrey Chechulin
, Igor V. Kotenko
, Hervé Debar
:
Choosing Models for Security Metrics Visualization. MMM-ACNS 2017: 75-87 - Jerzy Konorski
, Karol Rydzewski:
Nodal Cooperation Equilibrium Analysis in Multi-hop Wireless Ad Hoc Networks with a Reputation System. MMM-ACNS 2017: 131-142 - Anton Kopeikin, Arnur G. Tokhtabayev, Nurlan Tashatov
, Dina Satybaldina
:
tLab: A System Enabling Malware Clustering Based on Suspicious Activity Trees. MMM-ACNS 2017: 195-210 - Emrah Korkmaz, Matthew Davis, Andrey M. Dolgikh, Victor A. Skormin:
Detection and Mitigation of Time Delay Injection Attacks on Industrial Control Systems with PLCs. MMM-ACNS 2017: 62-74 - Valery I. Korzhik, Ivan Fedyanin, Artur Godlewski, Guillermo Morales-Luna:
Steganalysis Based on Statistical Properties of the Encrypted Messages. MMM-ACNS 2017: 288-298 - Laurens Lemaire, Jan Vossaert, Bart De Decker, Vincent Naessens:
Extending FAST-CPS for the Analysis of Data Flows in Cyber-Physical Systems. MMM-ACNS 2017: 37-49 - Vasileios Mavroeidis, Mathew Nicho
:
Quick Response Code Secure: A Cryptographically Secure Anti-Phishing Tool for QR Code Attacks. MMM-ACNS 2017: 313-324 - Roberto Metere
, Changyu Dong:
Automated Cryptographic Analysis of the Pedersen Commitment Scheme. MMM-ACNS 2017: 275-287 - Stig Fr. Mjølsnes
, Ruxandra F. Olimid
:
Easy 4G/LTE IMSI Catchers for Non-Programmers. MMM-ACNS 2017: 235-246 - Deeraj Nagothu, Andrey M. Dolgikh:
iCrawl: A Visual High Interaction Web Crawler. MMM-ACNS 2017: 91-103 - Marcin Niemiec
, Maciej Francikiewicz:
Security Assessment of Cryptographic Algorithms. MMM-ACNS 2017: 299-312 - Evgenia Novikova
, Ivan Murenin
:
Visualization-Driven Approach to Anomaly Detection in the Movement of Critical Infrastructure. MMM-ACNS 2017: 50-61 - Hubert Ostap
, Ryszard Antkiewicz
:
A Concept of Clustering-Based Method for Botnet Detection. MMM-ACNS 2017: 223-234 - Leonard J. Popyack, Jay Biernat:
Race Condition Faults in Multi-core Systems. MMM-ACNS 2017: 104-114 - Albert Sitek, Zbigniew Kotulski
:
Cardholder's Reputation System for Contextual Risk Management in Payment Transactions. MMM-ACNS 2017: 158-170 - Nanda Kumar Thanigaivelan, Ethiopia Nigussie, Seppo Virtanen
, Jouni Isoaho:
Towards Self-aware Approach for Mobile Devices Security. MMM-ACNS 2017: 171-182 - Arnur G. Tokhtabayev, Anton Kopeikin, Nurlan Tashatov
, Dina Satybaldina
:
Malware Analysis and Detection via Activity Trees in User-Dependent Environment. MMM-ACNS 2017: 211-222 - Jacek Rak, John Bay, Igor V. Kotenko, Leonard J. Popyack, Victor A. Skormin, Krzysztof Szczypiorski
:
Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings. Lecture Notes in Computer Science 10446, Springer 2017, ISBN 978-3-319-65126-2 [contents] - 2012
- Tigran Avanesov, Yannick Chevalier, Michaël Rusinowitch, Mathieu Turuani:
Towards the Orchestration of Secured Services under Non-disclosure Policies. MMM-ACNS 2012: 130-145
skipping 175 more matches
loading more results
failed to load more results, please try again later
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-08-11 10:13 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint