Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 161 matches
- 2021
- Jörg Keller:
Chaotic Pseudo Random Number Generators: A Case Study on Replication Study Challenges. ARES 2021: 94:1-94:4 - Mahmoud Abdallah, Nhien-An Le-Khac, Hamed Z. Jahromi, Anca Delia Jurcut:
A Hybrid CNN-LSTM Based Approach for Anomaly Detection Systems in SDNs. ARES 2021: 34:1-34:7 - Iván García Aguilar, Antonio Muñoz Gallego:
A Threat Model Analysis of a Mobile Agent-based system on Raspberry Pi. ARES 2021: 111:1-111:10 - Abdulrahman Alhazmi, Nalin A. G. Arachchilage:
A Serious Game Design Framework for Software Developers to Put GDPR into Practice. ARES 2021: 64:1-64:6 - Shurook S. Almohamade, John A. Clark, James Law:
Continuous User Authentication for Human-Robot Collaboration. ARES 2021: 115:1-115:9 - Mads Schaarup Andersen:
Towards the Design of a Privacy-preserving Attribute Based Credentials-based Digital ID in Denmark - Usefulness, Barriers, and Recommendations. ARES 2021: 130:1-130:8 - Cosimo Anglano, Massimo Canonico, Laura Giordano, Marco Guazzone, Daniele Theseider Dupré:
User action representation and automated reasoning for the forensic analysis of mobile devices. ARES 2021: 45:1-45:7 - Mónica P. Arenas, Hüseyin Demirci, Gabriele Lenzini:
Cholesteric Spherical Reflectors as Physical Unclonable Identifiers in Anti-counterfeiting. ARES 2021: 2:1-2:11 - Louise Axon, Arnau Erola, Alastair Janse van Rensburg, Jason R. C. Nurse, Michael Goldsmith, Sadie Creese:
Practitioners' Views on Cybersecurity Control Adoption and Effectiveness. ARES 2021: 91:1-91:10 - Enrico Bacis, Dario Facchinetti, Marco Guarnieri, Marco Rosa, Matthew Rossi, Stefano Paraboschi:
I Told You Tomorrow: Practical Time-Locked Secrets using Smart Contracts. ARES 2021: 17:1-17:10 - Mariia Bakhtina, Raimundas Matulevicius:
Information Security Analysis in the Passenger-Autonomous Vehicle Interaction. ARES 2021: 151:1-151:10 - Tyler Balon, Krikor Herlopian, Ibrahim M. Baggili, Cinthya Grajeda-Mendez:
Forensic Artifact Finder (ForensicAF): An Approach & Tool for Leveraging Crowd-Sourced Curated Forensic Artifacts. ARES 2021: 43:1-43:10 - Michail Bampatsikos, Ilias Politis, Christos Xenakis, Stelios C. A. Thomopoulos:
Solving the cold start problem in Trust Management in IoT. ARES 2021: 128:1-128:9 - Stefania Bartoletti, Giuseppe Bianchi, Danilo Orlando, Ivan Palamà, Nicola Blefari-Melazzi:
Location Security under Reference Signals' Spoofing Attacks: Threat Model and Bounds. ARES 2021: 155:1-155:5 - Tim Bender, Rolf Huesmann, Andreas Heinemann:
Software Development Processes for ADs, SMCs and OSCs supporting Usability, Security, and Privacy Goals - an Overview. ARES 2021: 62:1-62:6 - Giorgio Bernardinetti, Stefano Iafrate, Giuseppe Bianchi:
Nautilus: A Tool For Automated Deployment And Sharing Of Cyber Range Scenarios. ARES 2021: 146:1-146:7 - Slim Bettaieb, Loïc Bidoux, Olivier Blazy, Baptiste Cottier, David Pointcheval:
Secure Decision Forest Evaluation. ARES 2021: 24:1-24:12 - Alpesh Bhudia, Daniel O'Keeffe, Daniele Sgandurra, Darren Hurley-Smith:
RansomClave: Ransomware Key Management using SGX. ARES 2021: 58:1-58:10 - Stefano Bistarelli, Emanuele Bosimini, Francesco Santini:
A Medium-Interaction Emulation and Monitoring System for Operational Technology. ARES 2021: 118:1-118:7 - Panagiotis Bountakas, Konstantinos Koutroumpouchos, Christos Xenakis:
A Comparison of Natural Language Processing and Machine Learning Methods for Phishing Email Detection. ARES 2021: 127:1-127:12 - Antoine Boutet, Sonia Ben Mokhtar:
Uniqueness Assessment of Human Mobility on Multi-Sensor Datasets. ARES 2021: 96:1-96:10 - Carolina Adaros Boye, Paul Kearney, Mark B. Josephs, Hans Ulmer:
An Indicators-of-Risk Library for Industrial Network Security. ARES 2021: 134:1-134:9 - Fabian Brenner, Florian Platzer, Martin Steinebach:
Discovery of Single-Vendor Marketplace Operators in the Tor-Network. ARES 2021: 76:1-76:10 - Rosangela Casolare, Giovanni Ciaramella, Fabio Martinelli, Francesco Mercaldo, Antonella Santone:
SteælErgon: A Framework for Injecting Colluding Malicious Payload in Android Applications. ARES 2021: 51:1-51:7 - Marcos Cavalcanti, Pedro R. M. Inácio, Mário M. Freire:
Performance Evaluation of Container-Level Anomaly-Based Intrusion Detection Systems for Multi-Tenant Applications Using Machine Learning Algorithms. ARES 2021: 109:1-109:9 - Ankur Chattopadhyay, Robert Ruska Jr., Levi Pfantz:
Determining the Robustness of Privacy Enhancing DeID Against the ReID Adversary: An Experimental Study. ARES 2021: 124:1-124:11 - Ons Chikhaoui, Ryma Abassi, Aida Ben Chehida Douss, Sihem Guemara El Fatmi:
Formal Validation of a Security Mechanism against the RSU Compromise Attack. ARES 2021: 54:1-54:8 - Ons Chikhaoui, Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi:
Formal Validation of Credibility and Accuracy Assessment of Safety Messages in VANETs. ARES 2021: 52:1-52:7 - Rupa Chiramdasu, Gautam Srivastava, Sweta Bhattacharya, Praveen Kumar Reddy Maddikunta, Thippa Reddy Gadekallu:
A Machine Learning Driven Threat Intelligence System for Malicious URL Detection. ARES 2021: 154:1-154:7 - Joo Yeon Cho, Andrew Sergeev:
Secure Open Fronthaul Interface for 5G Networks. ARES 2021: 107:1-107:6
skipping 131 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-03 18:00 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint