Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 200 matches
- 2010
- Ali Ahmed, Ning Zhang:
An Access Control Architecture for Context-Risk-Aware Access Control: Architectural Design and Performance Evaluation. SECURWARE 2010: 251-260 - Dongkyun Ahn, Gyungho Lee:
Prospect of Fine Grain Dynamic Memory Access Control with Profiling. SECURWARE 2010: 69-74 - Francesco Beritelli, Salvatore Casale, Rosario Grasso, Andrea Spadaccini:
Performance Evaluation of SNR Estimation Methods in Forensic Speaker Recognition. SECURWARE 2010: 88-92 - Francesco Beritelli, Andrea Spadaccini:
A Statistical Approach to Biometric Identity Verification Based on Heart Sounds. SECURWARE 2010: 93-96 - Danilo Valeros Bernardo, Doan Hoang:
Protecting Next Generation High Speed Network Protocol - UDT through Generic Security Service Application Program Interface - GSS-API. SECURWARE 2010: 266-272 - Mathieu Blanc, Jérémy Briffaut, Thibault Coullet, Maxime Fonda, Christian Toinard:
Protection of a Shared HPC Cluster. SECURWARE 2010: 273-279 - Wolfgang Boehmer:
Analysis of Strongly and Weakly Coupled Management Systems in Information Security. SECURWARE 2010: 109-116 - Praveen Bommannavar, Nicholas Bambos:
Patch Scheduling for Risk Exposure Mitigation under Service Disruption Constraints. SECURWARE 2010: 176-181 - Ravishankar Borgaonkar:
An Analysis of the Asprox Botnet. SECURWARE 2010: 148-153 - Ahlem Bouchahda, Nhan Le Thanh, Adel Bouhoula, Faten Labbene:
RBAC+: Dynamic Access Control for RBAC-Administered Web-Based Databases. SECURWARE 2010: 135-140 - Homam El-Taj, Omar Abouabdalla, Ahmed M. Manasrah, Ahmed Al-Madi, Muhammad Imran Sarwar, Sureswaran Ramadass:
Forthcoming Aggregating Intrusion Detection System Alerts Framework. SECURWARE 2010: 40-44 - Pierluigi Failla:
Heuristic Search in Encrypted Graphs. SECURWARE 2010: 82-87 - Rainer Falk, Hans-Joachim Hof:
Industrial Sensor Network Security Architecture. SECURWARE 2010: 97-102 - Anders Fongen:
Identity Management without Revocation. SECURWARE 2010: 75-81 - Daniel Hartung, Christoph Busch:
Biometric Transaction Authentication Protocol. SECURWARE 2010: 207-215 - Sarosh Hashmi, John Brooke:
Towards Sybil Resistant Authentication in Mobile Ad Hoc Networks. SECURWARE 2010: 17-24 - Hiroto Kakiuchi, Takao Kawamura, Toshihiko Sasama, Kazunori Sugahara:
Detection Methods Improving Reliability of Automatic Human Tracking System. SECURWARE 2010: 240-246 - Abdel Alim Kamal, Amr M. Youssef:
Applications of SAT Solvers to AES Key Recovery from Decayed Key Schedule Images. SECURWARE 2010: 216-220 - Cagatay Karabat, Mehmet Keskinöz:
Blind Detectors in Spread Spectrum Watermarking for Interference Reduction. SECURWARE 2010: 103-108 - Bilal Khan, Muhammad Khurram Khan, Maqsood Mahmud, Khaled Alghathbar:
Security Analysis of Firewall Rule Sets in Computer Networks. SECURWARE 2010: 51-56 - Cynthia Y. Lester:
Shifting the Paradigm: Training Undergraduate Students in Software Security. SECURWARE 2010: 117-122 - Pierre de Leusse, Theo Dimitrakos:
SOA-Based Security Governance Middleware. SECURWARE 2010: 57-62 - Tewfiq El Maliki, Jean-Marc Seigneur:
A Security Adaptation Reference Monitor (SARM) for Highly Dynamic Wireless Environments. SECURWARE 2010: 63-68 - S. Hasan Mirjalili, Arjen K. Lenstra:
Towards a Structural Secure Design Process. SECURWARE 2010: 280-286 - Thomas C. Ormerod, Lingyu Wang, Mourad Debbabi, Amr M. Youssef, Hamad Binsalleeh, Amine Boukhtouta, Prosenjit Sinha:
Defaming Botnet Toolkits: A Bottom-Up Approach to Mitigating the Threat. SECURWARE 2010: 195-200 - Boulares Ouchenne, Ousmane Koné:
A Security Control Architecture for SOAP-Based Services. SECURWARE 2010: 261-265 - Francisco José Bellido Outeiriño, Pedro Canales Aranda, José Luis de la Cruz Fernández, Benito Pérez Jarauta:
Universal Bluetooth Access Control and Security System for e-Keys Enviroments. SECURWARE 2010: 247-250 - Tamás Paulik, Ádám Máté Földes, Gábor György Gulyás:
BlogCrypt: Private Content Publishing on the Web. SECURWARE 2010: 123-128 - Kun Peng, Feng Bao:
A Shuffling Scheme with Strict and Strong Security. SECURWARE 2010: 201-206 - Jonas Pfoh, Christian A. Schneider, Claudia Eckert:
Exploiting the x86 Architecture to Derive Virtual Machine State Information. SECURWARE 2010: 166-175
skipping 170 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-25 19:37 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint