![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 60 matches
- 2022
- Ananthapadmanabhan A, Krishnashree Achuthan:
Threat Modeling and Threat Intelligence System for Cloud using Splunk. ISDFS 2022: 1-6 - Muhammad R. Ahmed, Thirein Myo, Badar Al Baroomi:
Outlier detection to Secure Wireless Sensor Networks Based on iForest. ISDFS 2022: 1-6 - Basheer Al-Duwairi, Ahmed S. Shatnawi, Hala Jaradat, Afnan Al-Musa, Hamzah Al-Awadat:
On the Digital Forensics of Social Networking Web-based Applications. ISDFS 2022: 1-6 - Mohamed Alji, Khalid Chougdali
:
Automatic Forensic Imaging of a Virtual USB Device with Emulated User Interaction. ISDFS 2022: 1-4 - Rami Alnafrani, Duminda Wijesekera:
AIFIS: Artificial Intelligence (AI)-Based Forensic Investigative System. ISDFS 2022: 1-6 - Rami Alnafrani, Duminda Wijesekera:
An Automated Framework for Generating Attack Graphs Using Known Security Threats. ISDFS 2022: 1-6 - Filipe Alves, Nuno Mateus Coelho, Manuela Cruz-Cunha:
ChevroCrypto - Security & Cryptography Broker. ISDFS 2022: 1-5 - Ana Rita Antunes
, Miguel V. P. R. Meneses, Joaquim Gonçalves, Ana Cristina Braga
:
An Intelligent System to Detect Drowsiness at the Wheel. ISDFS 2022: 1-6 - Süleyman Muhammed Arikan:
Technical and Legal Strategic Approaches Protecting the Privacy of Personal Data in Cloud-Based Big Data Applications. ISDFS 2022: 1-7 - Sevinç Ay, Songül Karabatak, Murat Karabatak:
The Relationship between Teacher Candidates' Technology Usage and Online Learning Readiness. ISDFS 2022: 1-6 - Habiba Bouijij, Amine Berqia, Hamadou Saliah-Hassane:
Phishing URL classification using Extra-Tree and DNN. ISDFS 2022: 1-6 - Aytug Boyaci, Hasan Hüseyin Balik, Fikret Ata:
Energy-Aware Routing Architecture for Wireless Sensor Networks. ISDFS 2022: 1-5 - Ali Burak Can, Ismail Burak Parlak
, Tankut Acarman:
A New Method of Automatic Content Analysis in Disaster Management. ISDFS 2022: 1-5 - Narendrapurapu Surya Chandu, Narayanan Subramanian:
Countering Steganographic Security with CNN. ISDFS 2022: 1-6 - P. V. Sai Charan, P. Mohan Anand, Sandeep K. Shukla, Naveen Selvan, Hrushikesh Chunduri:
DOTMUG: A Threat Model for Target Specific APT Attacks-Misusing Google Teachable Machine. ISDFS 2022: 1-8 - Nuno Mateus Coelho, Manuela Cruz-Cunha:
Serverless Service Architectures and Security Minimals. ISDFS 2022: 1-6 - Pelin Dinçoglu, Hüseyin Aygün:
Comparison of Forecasting Algorithms on Retail Data. ISDFS 2022: 1-4 - Arda Surya Editya, Tohari Ahmad
, Hudan Studiawan:
Direction Estimation of Drone Collision Using Optical Flow for Forensic Investigation. ISDFS 2022: 1-6 - Rui Fernandes
, Nuno Lopes
:
Network Intrusion Detection Packet Classification with the HIKARI-2021 Dataset: a study on ML Algorithms. ISDFS 2022: 1-5 - Mustafa Gördesli, Asaf Varol:
Comparing Interservice Communications of Microservices for E-Commerce Industry. ISDFS 2022: 1-4 - Yuri G. Gordienko, Oleksandr Rokovyi, Oleg Alienin, Sergii G. Stirenko:
Context-Aware Data Augmentation for Efficient Object Detection by UAV Surveillance. ISDFS 2022: 1-6 - Sai Dheeraj Gummadi
, Anirban Ghosh
, Yeswanth Vootla:
Transfer Learning based Classification of Plasmodium Falciparum Parasitic Blood Smear Images. ISDFS 2022: 1-5 - Khushi Gupta
, Ashar Neyaz, Narasimha K. Shashidhar, Cihan Varol
:
Digital Forensics Lab Design: A framework. ISDFS 2022: 1-6 - Norshima Humaidi, Saif Hussein Abdallah Alghazo:
Procedural Information Security Countermeasure Awareness and Cybersecurity Protection Motivation in Enhancing Employee's Cybersecurity Protective Behaviour. ISDFS 2022: 1-10 - Andrew Johnson, Richard Ward:
'Unified Side-Channel Attack - Model' (USCA-M): An Extension with Biometrics Side-Channel Type. ISDFS 2022: 1-5 - Ihsan Riza Kara, Asaf Varol:
Detection of Network Anomalies with Machine Learning Methods. ISDFS 2022: 1-6 - Songül Karabatak, Sevinç Ay, Murat Karabatak:
The Relationship between Nomophobia and Perceived Socialization in the Online Learning Environment. ISDFS 2022: 1-8 - Serkan Karakus
, Mustafa Kaya
, Seda Arslan Tuncer, M. Taha Bahsi, Merve Açikoglu:
A Deep Learning Based Fast Face Detection and Recognition Algorithm for Forensic Analysis. ISDFS 2022: 1-6 - Mohd Maaz Khan, Irfan Mabood Khan, Omar Farooq
:
Deep Learning based Lightweight Model for Seizure Detection using Spectrogram Images. ISDFS 2022: 1-6 - Harun Emre Kiran, Akif Akgul, Oktay Yildiz:
A New Chaos-Based Lightweight Encryption Mechanism for Microcomputers. ISDFS 2022: 1-5
skipping 30 more matches
loading more results
failed to load more results, please try again later
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-19 07:17 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint