![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 31 matches
- 2019
- Enjian Bai, Fangyuan Qin, Sijing Chen:
Effective Scrambling Scheme for Physical Layer Security. ICCNS 2019: 92-96 - Qingqing Chang, Shenghui Su:
Mobile Phone Number Privacy Scheme Based on Lightweight Hash Mapping. ICCNS 2019: 34-39 - Yanyan Chen, Wenxian Han:
Research on Automatically Switched Optical Network Security Based on Quantum Key Distribution. ICCNS 2019: 75-78 - Biqiong Chen, Yanhua Liu, Shijin Li, Xiaoling Gao:
Attack Intent Analysis Method Based on Attack Path Graph. ICCNS 2019: 97-102 - Rui Dai, Chuan Gao, Bo Lang, Lixia Yang, Hongyu Liu, Shaojie Chen
:
SSL Malicious Traffic Detection Based On Multi-view Features. ICCNS 2019: 40-46 - Phan The Duy, Le Duy An, Van-Hau Pham:
Mitigating Flow Table Overloading Attack with Controller-based Flow Filtering Strategy in SDN. ICCNS 2019: 154-158 - Xiaoling Gao, Yanhua Liu, Yanbin Qiu, Huajun Liu:
A Comprehensive Assessment Method of Asset Importance for Key Asset Protection. ICCNS 2019: 79-83 - Qipeng He, Cong Dai, Rong Si, Jianwen Lin:
Research on Improvement of Wireless Sensor Network Location Algorithm Based on DV-Hop. ICCNS 2019: 149-153 - Hua Jiang, Jinpo Fan, Gang Zhang, Ronglei Hu:
Design and Implementation of Integrated Access VPN Gateway. ICCNS 2019: 128-132 - Bin Kong, Zhangpu Liu, Guangming Zhou, Xiaoyan Yu:
A Method of Detecting the Abnormal Encrypted Traffic Based on Machine Learning and Behavior Characteristics. ICCNS 2019: 47-50 - Fanyu Kong, Guoqiang Yang, Huiyi Liu, Yali Jiang, Chengyu Hu, Dashui Zhou:
Fault-injection Attack and Improvement of a CRT-RSA Exponentiation Algorithm. ICCNS 2019: 123-127 - Yu Kun:
Deep Security Analysis of DCS for Ship's Nuclear Power System based on Improved DEMATEL. ICCNS 2019: 103-108 - Han Li, Chonglin Gu, Yi Chen, Wenye Li:
An Efficient, Secure and Reliable Search Scheme for Dynamic Updates with Blockchain. ICCNS 2019: 51-57 - Zijie Lin, Liangliang Gao, Xuexian Hu, Yuxuan Zhang, Wenfen Liu:
Differentially Private Graph Clustering Algorithm Based on Structure Similarity. ICCNS 2019: 63-68 - Bo Liu, Honghe Ge, Jinfu Chen, Qihao Bao:
An Automatic Testing Platform for Object-oriented Software based on Code Coverage. ICCNS 2019: 20-24 - Huajun Liu, Zhanghui Liu, Yanhua Liu, Xiaoling Gao:
Abnormal Network Traffic Detection based on Leaf Node Density Ratio. ICCNS 2019: 69-74 - Jiaxin Liu, Xuerong Yue, Zhibin Chen:
A Note on Polynomial-time Solvability for Edge Packing on Graphs. ICCNS 2019: 118-122 - Yingying Qi, Wenli Shang, Xiaojun He:
A Combined Prediction Method of Industrial Internet Security Situation Based on Time Series. ICCNS 2019: 84-91 - Xin Song, Xue Huang, Haijun Qian:
Power Allocation Based on Geometric Programming for Non-orthogonal Multiple Access Heterogeneous Networks. ICCNS 2019: 137-141 - Yucheng Wang, Daohua Zhu, Qing Wu, Yajuan Guo, Chonghai Yang, Wenjiang Feng:
Wireless Signal Identification in 230MHz Band Based on Interference Cleaning and Convolutional Neural Network. ICCNS 2019: 133-136 - Xinli Xiong, Linru Ma, Chao Cui:
Simulation Environment of Evaluation and Optimization for Moving Target Defense: A SimPy Approach. ICCNS 2019: 114-117 - Kaige Yang, Shenghui Su:
Secure Email Login Based on Lightweight Asymmetric Identities. ICCNS 2019: 25-29 - Ping Yang, Hui Shu, Xiaobing Xiong, Fei Kang:
Semantic-based Malware Behavior Description: Past and Future. ICCNS 2019: 11-19 - Wu-Chuan Yang, Lien-Yuan Ting:
Embedded Authentication and Blockchain in Micro-course. ICCNS 2019: 58-62 - Chen Yang, Wei Yan:
Location Privacy Protection Scheme Based on Location Services. ICCNS 2019: 30-33 - Wen Yang, Meijuan Yin, Xiaonan Liu, Can Wang, Shunran Duan:
Multi-source Landmark Fusion based on Machine Learning. ICCNS 2019: 142-148 - Xuerong Yue, Jiji Gao, Zhibin Chen:
A Polynomial Time Algorithm for Scheduling on Processing Time Constraints. ICCNS 2019: 109-113 - Zufa Zhang, Jianqiang Dai, Lingling Zhao, Songling Qin:
A Web Services Testing Approach based on Difference Measurement and Adaptive Random Testing. ICCNS 2019: 1-5 - Jianing Zhang, Xingtao Zhuang, Yunfang Chen:
Android Malware Detection Combined with Static and Dynamic Analysis. ICCNS 2019: 6-10 - Kaihang Zhou, Lei Shi, Jiahua Wei, Yang Xue, Jie Tang:
Deterministic Controlled Remote State Preparation of Arbitrary Real-parameter Multi-qubit States via Three-qubit Entangled States. ICCNS 2019: 159-163
skipping 1 more match
loading more results
failed to load more results, please try again later
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-21 10:37 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint