Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 19 matches
- 2019
- Akka Zemmari, Mohamed Mosbah, Nora Cuppens-Boulahia, Frédéric Cuppens:
Risks and Security of Internet and Systems - 13th International Conference, CRiSIS 2018, Arcachon, France, October 16-18, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11391, Springer 2019, ISBN 978-3-030-12142-6 [contents] - 2018
- Wafa Abdelghani, Corinne Amel Zayani, Ikram Amous, Florence Sèdes:
Trust Evaluation Model for Attack Detection in Social Internet of Things. CRiSIS 2018: 48-64 - Eman Salem Alashwali, Pawel Szalachowski:
DSTC: DNS-Based Strict TLS Configurations. CRiSIS 2018: 93-109 - Samet Aytaç, Orhan Ermis, Mehmet Ufuk Çaglayan, Fatih Alagöz:
Authenticated Quality of Service Aware Routing in Software Defined Networks. CRiSIS 2018: 110-127 - Alberto Bartoli, Andrea De Lorenzo, Eric Medvet, Fabiano Tarlao:
Personalized, Browser-Based Visual Phishing Detection Based on Deep Learning. CRiSIS 2018: 80-85 - Lyes Bayou, David Espes, Nora Cuppens-Boulahia, Frédéric Cuppens:
A Prediction-Based Method for False Data Injection Attacks Detection in Industrial Control Systems. CRiSIS 2018: 35-40 - Anis Bkakria, Aimilia Tasidou, Nora Cuppens-Boulahia, Frédéric Cuppens, Fatma Bouattour, Feten Ben Fredj:
Optimal Distribution of Privacy Budget in Differential Privacy. CRiSIS 2018: 222-236 - Hervé Chabanne, Julien Keuffer, Emmanuel Prouff:
Outsourcing Signatures of Confidential Documents. CRiSIS 2018: 41-47 - Damien Crémilleux, Christophe Bidan, Frédéric Majorczyk, Nicolas Prigent:
Enhancing Collaboration Between Security Analysts in Security Operations Centers. CRiSIS 2018: 136-142 - Sourya Joyee De, Abdessamad Imine:
On Consent in Online Social Networks: Privacy Impacts and Research Directions (Short Paper). CRiSIS 2018: 128-135 - Khaoula Es-Salhi, David Espes, Nora Cuppens:
RIICS: Risk Based IICS Segmentation Method. CRiSIS 2018: 143-157 - Ivan Marco Lobe Kome, Nora Cuppens-Boulahia, Frédéric Cuppens, Vincent Frey:
A Certificate-Less Key Exchange Protocol for IoT. CRiSIS 2018: 65-79 - Karim Lounis, Mohammad Zulkernine:
Connection Dumping Vulnerability Affecting Bluetooth Availability. CRiSIS 2018: 188-204 - Pal-Stefan Murvay, Bogdan Groza:
Practical Security Exploits of the FlexRay In-Vehicle Communication Protocol. CRiSIS 2018: 172-187 - Shweta Saharan, Vijay Laxmi, Manoj Singh Gaur, Akka Zemmari:
Privacy Preserving Data Offloading Based on Transformation. CRiSIS 2018: 86-92 - Manel Smine, Nora Cuppens, Frédéric Cuppens:
Effectiveness and Impact Measurements of a Diversification Based Moving Target Defense. CRiSIS 2018: 158-171 - Fabien Patrick Viertel, Fabian Kortum, Leif Wagner, Kurt Schneider:
Are Third-Party Libraries Secure? A Software Library Checker for Java. CRiSIS 2018: 18-34 - Vetle Volden-Freberg, Gencer Erdogan:
An Empirical Study on the Comprehensibility of Graphical Security Risk Models Based on Sequence Diagrams. CRiSIS 2018: 1-17 - Roman Wirtz, Maritta Heisel:
A Systematic Method to Describe and Identify Security Threats Based on Functional Requirements. CRiSIS 2018: 205-221
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-08 03:30 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint