default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 19 matches
- 2023
- Slim Kallel, Mohamed Jmaiel, Mohammad Zulkernine, Ahmed Hadj Kacem, Frédéric Cuppens, Nora Cuppens:
Risks and Security of Internet and Systems - 17th International Conference, CRiSIS 2022, Sousse, Tunisia, December 7-9, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13857, Springer 2023, ISBN 978-3-031-31107-9 [contents] - 2022
- Johannes Beckert, Teo Blazevic, Alexander Dobhan:
IoT Security Within Small and Medium-Sized Manufacturing Companies. CRiSIS 2022: 185-190 - Racem Bougacha, Régine Laleau, Philippe Bon, Simon Collart Dutilleul, Rahma Ben Ayed:
Modeling Train Systems: From High-Level Architecture Graphical Models to Formal Specifications. CRiSIS 2022: 153-168 - Maher Boughdiri, Takoua Abdellatif, Tesnim Abdellatif:
Blockchain Survey for Security and Privacy in the e-Health Ecosystem. CRiSIS 2022: 69-84 - Liang Chen, Cheng Zeng, Stilianos Vidalis:
An Incentive Mechanism for Managing Obligation Delegation. CRiSIS 2022: 191-206 - Bastien Drouot, Valery Monthe, Sylvain Guérin, Joël Champeau:
Security Analysis: From Model to System Analysis. CRiSIS 2022: 133-152 - Tarek Frikha, Jalel Ktari, Habib Hamam:
Blockchain Olive Oil Supply Chain. CRiSIS 2022: 101-113 - Salah Gontara, Amine Boufaied, Ouajdi Korbaa:
Impact of EIP-1559 on Transactions in the Ethereum Blockchain and Its Rollups. CRiSIS 2022: 114-126 - Mohamed Amin Hammami, Mariam Lahami, Afef Jmal Maâlej:
Towards a Dynamic Testing Approach for Checking the Correctness of Ethereum Smart Contracts. CRiSIS 2022: 85-100 - Kris Heid, Jens Heider:
Context Correlation for Automated Dynamic Android App Analysis to Improve Impact Rating of Privacy and Security Flaws. CRiSIS 2022: 1-17 - Randy Kuang, Maria Perepechaenko, Ryan Toth, Michel Barbeau:
Benchmark Performance of the Multivariate Polynomial Public Key Encapsulation Mechanism. CRiSIS 2022: 239-255 - Maxime Lanvin, Pierre-François Gimenez, Yufei Han, Frédéric Majorczyk, Ludovic Mé, Eric Totel:
Errors in the CICIDS2017 Dataset and the Significant Differences in Detection Performances It Makes. CRiSIS 2022: 18-33 - Rawya Mars, Saoussen Cheikhrouhou, Slim Kallel, Mohamed Sellami, Ahmed Hadj Kacem:
Towards a Secure Cross-Blockchain Smart Contract Architecture. CRiSIS 2022: 127-132 - Ahmed Burhan Mohammed, Lamia Chaari Fourati, Ahmed Fakhrudeen:
A Comparative Study of Attribute Selection Algorithms on Intrusion Detection System in UAVs: A Case Study of UKM-IDS20 Dataset. CRiSIS 2022: 34-46 - Charles-Henry Bertrand Van Ouytsel, Christophe Crochet, Khanh-Huu-The Dam, Axel Legay:
Tool Paper - SEMA: Symbolic Execution Toolchain for Malware Analysis. CRiSIS 2022: 62-68 - Abdel Mlak Said, Aymen Yahyaoui, Takoua Abdellatif:
PRIAH: Private Alerts in Healthcare. CRiSIS 2022: 47-61 - Hannes Salin:
Pseudonym Swapping with Secure Accumulators and Double Diffie-Hellman Rounds in Cooperative Intelligent Transport Systems. CRiSIS 2022: 223-238 - Benjamin Somers, Fabien Dagnat, Jean-Christophe Bach:
How IT Infrastructures Break: Better Modeling for Better Risk Management. CRiSIS 2022: 169-184 - Rahma Trabelsi, Ghofrane Fersi, Mohamed Jmaiel:
Virtual Private Network Blockchain-based Dynamic Access Control Solution for Inter-organisational Large Scale IoT Networks. CRiSIS 2022: 207-222
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-19 02:05 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint