Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 156 matches
- 2023
- Srinivas Vivek:
Attack on "A Privacy-Preserving Online Ride-Hailing System Without Involving a Third Trusted Server". ARES 2023: 59:1-59:3 - Gabriele Costa, Silvia de Francisci, Serenella Valiani, Paolo Prinetto:
Why Mary Can Hack: Effectively Introducing High School Girls to Cybersecurity. ARES 2023: 71:1-71:8 - Daniel Fischer, Clemens Sauerwein, Martin Werchan, Dirk Stelzer:
An Exploratory Study on the Use of Threat Intelligence Sharing Platforms in Germany, Austria and Switzerland. ARES 2023: 30:1-30:7 - Marwan Abbas-Escribano, Hervé Debar:
An Improved Honeypot Model for Attack Detection and Analysis. ARES 2023: 142:1-142:10 - Daniel Gómez Aguado, Marta Irene García Cid, Laura Ortiz Martín, Vicente Martín Ayuso:
Simulated environment for multiparty quantum digital signature across the network. ARES 2023: 61:1-61:10 - Alperen Aksoy, Dogan Kesdogan:
Effect of Group Based Synchronization on User Anonymity in Mix Networks. ARES 2023: 146:1-146:9 - David Allison, Paul Smith, Kieran McLaughlin:
Digital Twin-Enhanced Incident Response for Cyber-Physical Systems. ARES 2023: 28:1-28:10 - Abdullah Alshaya, Adam Kardorff, Christian Facundus, Ibrahim M. Baggili, Golden G. Richard III:
Memory Forensics of the OpenDaylight Software-Defined Networking (SDN) Controller. ARES 2023: 152:1-152:8 - Cosimo Anglano, Massimo Canonico, Andrea Cepollina, Davide Freggiaro, Alderico Gallo, Marco Guazzone:
Enabling the forensic study of application-level encrypted data in Android via a Frida-based decryption framework. ARES 2023: 155:1-155:10 - David Lopes Antunes, Salvador Llopis Sánchez:
The Age of fighting machines: the use of cyber deception for Adversarial Artificial Intelligence in Cyber Defence. ARES 2023: 39:1-39:6 - Dimitrios Christos Asimopoulos, Panagiotis I. Radoglou-Grammatikis, Ioannis Makris, Valeri M. Mladenov, Konstantinos E. Psannis, Sotirios K. Goudos, Panagiotis G. Sarigiannidis:
Breaching the Defense: Investigating FGSM and CTGAN Adversarial Attacks on IEC 60870-5-104 AI-enabled Intrusion Detection Systems. ARES 2023: 52:1-52:8 - Mariia Bakhtina, Kin Long Leung, Raimundas Matulevicius, Ahmed Awad, Petr Svenda:
A Decentralised Public Key Infrastructure for X-Road. ARES 2023: 128:1-128:8 - Michail Bampatsikos, Ilias Politis, Vaios Bolgouras, Christos Xenakis:
Multi-Attribute Decision Making-based Trust Score Calculation in Trust Management in IoT. ARES 2023: 94:1-94:8 - Mario Barbareschi, Salvatore Barone, Valentina Casola, Salvatore Della Torca, Daniele Lombardi:
Automatic Test Generation to Improve Scrum for Safety Agile Methodology. ARES 2023: 137:1-137:6 - Manuel Barbosa, André Cirne, Luís Esquível:
Rogue key and impersonation attacks on FIDO2: From theory to practice. ARES 2023: 14:1-14:11 - Martin Bedoya, Sara Palacios Chavarro, Daniel Díaz López, Pantaleone Nespoli, Estefania Laverde, Sebastián Suárez:
Securing cloud-based military systems with Security Chaos Engineering and Artificial Intelligence. ARES 2023: 38:1-38:9 - Meriem Benyahya, Teri Lenard, Anastasija Collen, Niels Alexander Nijdam:
A Systematic Review of Threat Analysis and Risk Assessment Methodologies for Connected and Automated Vehicles. ARES 2023: 99:1-99:10 - Alpesh Bhudia, Anna Cartwright, Edward J. Cartwright, Darren Hurley-Smith, Julio C. Hernandez-Castro:
Game Theoretic Modelling of a Ransom and Extortion Attack on Ethereum Validators. ARES 2023: 105:1-105:11 - Dipkamal Bhusal, Rosalyn Shin, Ajay Ashok Shewale, Monish Kumar Manikya Veerabhadran, Michael Clifford, Sara Rampazzi, Nidhi Rastogi:
SoK: Modeling Explainability in Security Analytics for Interpretability, Trustworthiness, and Usability. ARES 2023: 35:1-35:12 - Stefano Bistarelli, Michele Ceccarelli, Chiara Luchini, Ivan Mercanti, Francesco Santini:
A Survey of Steganography Tools at Layers 2-4 and HTTP. ARES 2023: 81:1-81:9 - Olivier Blazy, Céline Chevalier, Guillaume Renaut, Thomas Ricosset, Éric Sageloli, Hugo Senet:
Efficient Implementation of a Post-Quantum Anonymous Credential Protocol. ARES 2023: 24:1-24:11 - Vaios Bolgouras, Kostantinos Papadamou, Ioana Stroinea, Michail Papadakis, George Gugulea, Michael Sirivianos, Christos Xenakis:
Enabling Qualified Anonymity for Enhanced User Privacy in the Digital Era. ARES 2023: 95:1-95:8 - Yazan Boshmaf, Isuranga Perera, Udesh Kumarasinghe, Sajitha Liyanage, Husam Al Jawaheri:
Dizzy: Large-Scale Crawling and Analysis of Onion Services. ARES 2023: 9:1-9:11 - Jelle Bouma, Hugo Jonker, Vincent van der Meer, Eddy Van Den Aker:
Reconstructing Timelines: From NTFS Timestamps to File Histories. ARES 2023: 154:1-154:9 - Francesco G. Caccavale, Huu Nghia Nguyen, Ana R. Cavalli, Edgardo Montes de Oca, Wissam Mallouli:
HTTP/2 Attacks Generation using 5Greplay. ARES 2023: 138:1-138:7 - Pasquale Caporaso, Giuseppe Bianchi, Francesco Quaglia:
JITScanner: Just-in-Time Executable Page Check in the Linux Operating System. ARES 2023: 78:1-78:8 - Gianpietro Castiglione, Giampaolo Bella, Daniele Francesco Santamaria:
Towards Grammatical Tagging for the Legal Language of Cybersecurity. ARES 2023: 82:1-82:9 - Marta Catillo, Andrea Del Vecchio, Antonio Pecchia, Umberto Villano:
A Case Study with CICIDS2017 on the Robustness of Machine Learning against Adversarial Attacks in Intrusion Detection. ARES 2023: 74:1-74:8 - Riccardo Cestaro, Mauro Conti, Elonora Mancini, Federico Turrin:
OpenScope-sec: An ADS-B Simulator to Support the Security Research. ARES 2023: 116:1-116:6 - Axel Charpentier, Christopher Neal, Nora Boulahia-Cuppens, Frédéric Cuppens, Reda Yaich:
Real-Time Defensive Strategy Selection via Deep Reinforcement Learning. ARES 2023: 15:1-15:11
skipping 126 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-31 15:37 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint