Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 206 matches
- 2022
- Charles Beumier, Thibault Debatty:
Attack Detection in SS7. MCSS 2022: 11-20 - Wojciech Chmiel, Stanislaw Jedrusik, Piotr Kadluczka, Joanna Kwiecien, Zbigniew Mikrut, Dariusz Palka, Michal Turek:
Integration of Image Analysis Component with Industrial Workflow Management System. MCSS 2022: 80-93 - Consuelo Assunta Colabuono, Douglas Wiemer, Maria Vittoria Marabello, Domenico Lofù, Marco Pappalardo, Piotr Bogacki, Andrzej Dziech, Jan Derkacz, Luis Angel Galindo Sánchez, Ewa Konieczna, Maya Bojilova, Giuseppe Chechile, Riccardo Feletto, Marco Dri, Massimo Zamagni, Emanuele Sansebastiano, Grégory Depaix, Cyril Ceresola, Bernard Opic, Massimo Ravenna, Marco Quartullo, Andrea Guarino, Paolo Modica, Raniero Rapone, Massimiliano Tarquini, Stefano Armenia:
Approach to Sector-Specific Cybersecurity Schemes: Key Elements and Security Problem Definition. MCSS 2022: 104-117 - Abel Gonzalez-Garcia, Luis Angel Galindo Sánchez:
Technology and Police: A Way to Create Predicting Policing. MCSS 2022: 118-125 - Vyacheslav Kharchenko, Oleg Illiashenko, Herman Fesenko, Ievgen Babeshko:
AI Cybersecurity Assurance for Autonomous Transport Systems: Scenario, Model, and IMECA-Based Analysis. MCSS 2022: 66-79 - Mikolaj Leszczuk, Lucjan Janowski, Jakub Nawala, Atanas Boev:
Method for Assessing Objective Video Quality for Automatic License Plate Recognition Tasks. MCSS 2022: 153-166 - Nhat-Tien Nguyen, Hong-Nhu Nguyen, Miroslav Voznák:
Secrecy Performance of Scenario with Multiple Antennas Cooperative Satellite Networks. MCSS 2022: 1-10 - Marcin Niemiec, Salvatore Marco Pappalardo, Maya Bozhilova, Nikolai T. Stoianov, Andrzej Dziech, Burkhard Stiller:
Multi-sector Risk Management Framework for Analysis Cybersecurity Challenges and Opportunities. MCSS 2022: 49-65 - Tiago Pinto, Tânia Rocha, Arsénio Reis, Zita Vale:
Clustering-Based Filtering of Big Data to Improve Forecasting Effectiveness and Efficiency. MCSS 2022: 144-152 - Tânia Rocha, Diana Carvalho, Pedro Letra, Arsénio Reis, João Barroso:
BCI: Technologies and Applications Review and Toolkit Proposal. MCSS 2022: 126-143 - Harri Ruoslahti, Ilkka Tikanmäki:
E-Skills in Cybersecurity. MCSS 2022: 36-48 - Milosz Stypinski, Marcin Niemiec:
Impact of Nonbinary Input Vectors on Security of Tree Parity Machine. MCSS 2022: 94-103 - Paloma de La Vallée, Georgios Iosifidis, Andrea Rossi, Marco Dri, Wim Mees:
Sector-Specific Training - A Federated Maritime Scenario. MCSS 2022: 21-35 - Andrzej Dziech, Wim Mees, Marcin Niemiec:
Multimedia Communications, Services and Security - 11th International Conference, MCSS 2022, Kraków, Poland, November 3-4, 2022, Proceedings. Communications in Computer and Information Science 1689, Springer 2022, ISBN 978-3-031-20214-8 [contents] - 2020
- Rouhollah Kian Ara, Andrzej Matiolanski:
Crowd Density Estimation Based on Face Detection Under Significant Occlusions and Head Pose Variations. MCSS 2020: 209-222 - Giovanni Artale, Christof Brandauer, Giuseppe Caravello, Antonio Cataliotti, Valentina Cosentino, Dario Di Cara, Salvatore Guaiana, Nicola Panzavecchia, Stefano Salsano, Giovanni Tinè:
A Resilient Distributed Measurement System for Smart Grid Application. MCSS 2020: 139-153 - Aritz Badiola, Amaia Méndez Zorrilla, Begonya Garcia-Zapirain Soto, Michal Grega, Mikolaj Leszczuk, Kamel Smaïli:
Evaluation of Improved Components of AMIS Project for Speech Recognition, Machine Translation and Video/Audio/Text Summarization. MCSS 2020: 320-331 - Remigiusz Baran, Andrzej Zeja:
A VCA-Based Approach to Enhance Learning Data Sets for Object Classification. MCSS 2020: 292-306 - Wojciech Chmiel, Jan Derkacz, Andrzej Dziech, Stanislaw Jedrusik, Piotr Kadluczka, Boguslaw Laskowski, Zbigniew Mikrut, Dariusz Palka, Piotr Rajchel, Iwona Skalna, Michal Turek:
Workflow Management System with Automatic Correction. MCSS 2020: 182-195 - Sebastian Cygert, Andrzej Czyzewski:
Evaluating Calibration and Robustness of Pedestrian Detectors. MCSS 2020: 98-111 - Kristian Dokic, Tomislav Mesic, Mirko Cobovic:
Analysis of Available Microcontroller Computing Resources for the Application of Some Cryptographic Hash Functions on Different Internet of Things Platforms. MCSS 2020: 168-181 - Pawel Donath, Michal Grega, Piotr Guzik, Jakub Król, Andrzej Matiolanski, Krzysztof Rusek:
Dangerous Tool Detection for CCTV Systems. MCSS 2020: 238-251 - Andrzej Dziech, Piotr Bogacki, Jan Derkacz:
A Novel Watermark Method for Image Protection Based on Periodic Haar Piecewise-Linear Transform. MCSS 2020: 67-77 - Miguel Ángel Campos Gaviño, David Larrabeiti López:
Toward Court-Admissible Sensor Systems to Fight Domestic Violence. MCSS 2020: 278-291 - Andrey G. Ivanov, Nikolai T. Stoianov:
New Approach of Solving Congruence Equation System. MCSS 2020: 16-24 - Kamil Kawa, Mikolaj Leszczuk, Atanas Boev:
Survey on the State-Of-The-Art Methods for Objective Video Quality Assessment in Recognition Tasks. MCSS 2020: 332-350 - Maciej Mencner, Marcin Niemiec:
Impact of Bloom Filters on Security and Efficiency of SecaaS Services. MCSS 2020: 154-167 - Hoang-Sy Nguyen, N. X. Huy Nguyen, Q.-P. Ma, Jakub Jalowiczor, Miroslav Voznák:
Symbol Error Probability of Secondary User in Underlay Cognitive Radio Networks with Adaptive Transmit Power Constraint. MCSS 2020: 307-319 - Salvatore Marco Pappalardo, Marcin Niemiec, Maya Bozhilova, Nikolai T. Stoianov, Andrzej Dziech, Burkhard Stiller:
Multi-sector Assessment Framework - a New Approach to Analyse Cybersecurity Challenges and Opportunities. MCSS 2020: 1-15 - Oleksandr Potii, Yurii Tsyplinskyi, Oleg Illiashenko, Vyacheslav Kharchenko:
Criticality Assessment of Critical Information Infrastructure Objects: A Category Based Methodology and Ukrainian Experience. MCSS 2020: 78-97
skipping 176 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-19 14:00 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint