![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 41 matches
- 2016
- Mansour Ahmadi, Dmitry Ulyanov, Stanislav Semenov, Mikhail Trofimov, Giorgio Giacinto
:
Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification. CODASPY 2016: 183-194 - Mahdi Alizadeh, Nicola Zannone
:
Risk-based Analysis of Business Process Executions. CODASPY 2016: 130-132 - Yoshinori Aono, Takuya Hayashi
, Le Trieu Phong, Lihua Wang:
Scalable and Secure Logistic Regression via Homomorphic Encryption. CODASPY 2016: 142-144 - Musard Balliu, Benjamin Liebe, Daniel Schoepe, Andrei Sabelfeld:
JSLINQ: Building Secure Applications across Tiers. CODASPY 2016: 307-318 - Zhenquan Cai, Roland H. C. Yap:
Inferring the Detection Logic and Evaluating the Effectiveness of Android Anti-Virus Apps. CODASPY 2016: 172-182 - Yue Chen, Zhi Wang, David B. Whalley, Long Lu:
Remix: On-demand Live Randomization. CODASPY 2016: 50-61 - Nick Christoulakis, George Christou, Elias Athanasopoulos, Sotiris Ioannidis:
HCFI: Hardware-enforced Control-Flow Integrity. CODASPY 2016: 38-49 - Carlo Combi
, Luca Viganò
, Matteo Zavatteri
:
Security Constraints in Temporal Role-Based Access-Controlled Workflows. CODASPY 2016: 207-218 - Jason Crampton, James Sellwood:
ARPPM: Administration in the RPPM Model. CODASPY 2016: 219-230 - Judicael Briand Djoko, Brandon Jennings, Adam J. Lee
:
TPRIVEXEC: Private Execution in Virtual Memory. CODASPY 2016: 285-294 - Alexandru Ionut Egner, Duc Luu, Jerry den Hartog, Nicola Zannone
:
An Authorization Service for Collaborative Situation Awareness. CODASPY 2016: 136-138 - Ameni Ben Fadhel, Domenico Bianculli
, Lionel C. Briand, Benjamin Hourte:
A Model-driven Approach to Representing and Checking RBAC Contextual Policies. CODASPY 2016: 243-253 - Daren Fadolalkarim, Asmaa Sallam, Elisa Bertino:
PANDDE: Provenance-based ANomaly Detection of Data Exfiltration. CODASPY 2016: 267-276 - Xing Gao, Dachuan Liu, Daiping Liu, Haining Wang:
On Energy Security of Smartphones. CODASPY 2016: 148-150 - Aisha I. Ali-Gombe, Irfan Ahmed
, Golden G. Richard III
, Vassil Roussev:
AspectDroid: Android App Analysis System. CODASPY 2016: 145-147 - Gustavo Grieco, Guillermo Luis Grinblat, Lucas C. Uzal, Sanjay Rawat, Josselin Feist, Laurent Mounier:
Toward Large-Scale Vulnerability Discovery using Machine Learning. CODASPY 2016: 85-96 - Yufei Gu, Zhiqiang Lin:
Derandomizing Kernel Address Space Layout for Memory Introspection and Forensics. CODASPY 2016: 62-72 - Johannes Hoffmann, Teemu Rytilahti, Davide Maiorca
, Marcel Winandy, Giorgio Giacinto
, Thorsten Holz
:
Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation. CODASPY 2016: 139-141 - Sushama Karumanchi, Jingwei Li
, Anna Cinzia Squicciarini
:
Efficient Network Path Verification for Policy-routedQueries. CODASPY 2016: 319-328 - John Knight:
DIVERSITY. CODASPY 2016: 151 - Taous Madi, Suryadipta Majumdar, Yushun Wang, Yosr Jarraya, Makan Pourzandi, Lingyu Wang:
Auditing Security Compliance of the Virtualized Infrastructure in the Cloud: Application to OpenStack. CODASPY 2016: 195-206 - John Maheswaran, Daniel Jackowitz, Ennan Zhai, David Isaac Wolinsky, Bryan Ford
:
Building Privacy-Preserving Cryptographic Credentials from Federated Online Identities. CODASPY 2016: 3-13 - Eduard Marin
, Dave Singelée, Bohan Yang, Ingrid Verbauwhede
, Bart Preneel
:
On the Feasibility of Cryptography for a Wireless Insulin Pump System. CODASPY 2016: 113-120 - Mihai Maruseac, Gabriel Ghinita:
Privacy-Preserving Mining of Sequential Association Rules from Provenance Workflows. CODASPY 2016: 127-129 - Iberia Medeiros
, Miguel Beatriz, Nuno Ferreira Neves
, Miguel Correia
:
Hacking the DBMS to Prevent Injection Attacks. CODASPY 2016: 295-306 - Manar Mohamed, Babins Shrestha, Nitesh Saxena:
SMASheD: Sniffing and Manipulating Android Sensor Data. CODASPY 2016: 152-159 - Maliheh Monshizadeh, Prasad Naldurg, V. N. Venkatakrishnan:
Patching Logic Vulnerabilities for Web Applications using LogicPatcher. CODASPY 2016: 73-84 - Anita Nikolich:
SDN Research Challenges and Opportunities. CODASPY 2016: 254 - Navid Pustchi, Farhan Patwa, Ravi S. Sandhu:
Multi Cloud IaaS with Domain Trust in OpenStack. CODASPY 2016: 121-123 - Syed Zain R. Rizvi, Philip W. L. Fong:
Interoperability of Relationship- and Role-Based Access Control. CODASPY 2016: 231-242
skipping 11 more matches
loading more results
failed to load more results, please try again later
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-24 02:18 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint