Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 38 matches
- 2019
- Daiki Chiba, Ayako Akiyama Hasegawa, Takashi Koide, Yuta Sawabe, Shigeki Goto, Mitsuaki Akiyama:
DomainScouter: Understanding the Risks of Deceptive IDNs. RAID 2019: 413-426 - Ahmed Abdo, Sakib Md. Bin Malek, Zhiyun Qian, Qi Zhu, Matthew J. Barth, Nael B. Abu-Ghazaleh:
Application level attacks on Connected Vehicle Protocols. RAID 2019: 459-471 - Aisha I. Ali-Gombe, Sneha Sudhakaran, Andrew Case, Golden G. Richard III:
DroidScraper: A Tool for Android In-Memory Object Recovery and Reconstruction. RAID 2019: 547-559 - Erman Ayday, Emre Yilmaz, Arif Yilmaz:
Robust Optimization-Based Watermarking Scheme for Sequential Data. RAID 2019: 323-336 - Kimia Zamiri Azar, Farnoud Farahmand, Hadi Mardani Kamali, Shervin Roshanisefat, Houman Homayoun, William Diehl, Kris Gaj, Avesta Sasan:
COMA: Communication and Obfuscation Management Architecture. RAID 2019: 181-195 - Timothy Barron, Najmeh Miramirkhani, Nick Nikiforakis:
Now You See It, Now You Don't: A Large-scale Analysis of Early Domain Deletions. RAID 2019: 383-397 - Jiahao Cao, Zijie Yang, Kun Sun, Qi Li, Mingwei Xu, Peiyi Han:
Fingerprinting SDN Applications via Encrypted Control Traffic. RAID 2019: 501-515 - Zhen Cheng, Xinrui Hou, Runhuai Li, Yajin Zhou, Xiapu Luo, Jinku Li, Kui Ren:
Towards a First Step to Understand the Cryptocurrency Stealing Attack on Ethereum. RAID 2019: 47-60 - Key-whan Chung, Xiao Li, Peicheng Tang, Zeran Zhu, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer, Thenkurussi Kesavadas:
Smart Malware that Uses Leaked Control Data of Robotic Applications: The Case of Raven-II Surgical Robots. RAID 2019: 337-351 - Ali Davanian, Zhenxiao Qi, Yu Qu, Heng Yin:
DECAF++: Elastic Whole-System Dynamic Taint Analysis. RAID 2019: 31-45 - Wenrui Diao, Yue Zhang, Li Zhang, Zhou Li, Fenghao Xu, Xiaorui Pan, Xiangyu Liu, Jian Weng, Kehuan Zhang, XiaoFeng Wang:
Kindness is a Risky Business: On the Usage of the Accessibility APIs in Android. RAID 2019: 261-275 - Yue Duan, Lian Gao, Jie Hu, Heng Yin:
Automatic Generation of Non-intrusive Updates for Third-Party Libraries in Android Applications. RAID 2019: 277-292 - Rukayat Ayomide Erinfolami, Anh Quach, Aravind Prakash:
On Design Inference from Binaries Compiled using Modern C++ Defenses. RAID 2019: 15-30 - Hamid Reza Ghaeini, Matthew Chan, Raad Bahmani, Ferdinand Brasser, Luis Garcia, Jianying Zhou, Ahmad-Reza Sadeghi, Nils Ole Tippenhauer, Saman A. Zonouz:
PAtt: Physics-based Attestation of Control Systems. RAID 2019: 165-180 - Vincent Ghiëtte, Harm Griffioen, Christian Doerr:
Fingerprinting Tooling used for SSH Compromisation Attempts. RAID 2019: 61-71 - Eric Gustafson, Marius Muench, Chad Spensky, Nilo Redini, Aravind Machiry, Yanick Fratantonio, Davide Balzarotti, Aurélien Francillon, Yung Ryn Choe, Christopher Kruegel, Giovanni Vigna:
Toward the Analysis of Embedded Firmware through Automated Re-hosting. RAID 2019: 135-150 - Alfonso Iacovazzi, Daniel Frassinelli, Yuval Elovici:
The DUSTER Attack: Tor Onion Service Attribution Based on Flow Watermarking with Track Hiding. RAID 2019: 213-225 - Amin Kharraz, Brandon L. Daley, Graham Z. Baker, William Robertson, Engin Kirda:
USBESAFE: An End-Point Solution to Protect Against USB-Based Attacks. RAID 2019: 89-103 - Richard Li, Min Du, David Johnson, Robert Ricci, Jacobus E. van der Merwe, Eric Eide:
Fluorescence: Detecting Kernel-Resident Malware in Clouds. RAID 2019: 367-382 - Chih-Yuan Lin, Simin Nadjm-Tehrani:
Timing Patterns and Correlations in Spontaneous SCADA Traffic for Anomaly Detection. RAID 2019: 73-88 - Wu Luo, Qingni Shen, Yutang Xia, Zhonghai Wu:
Container-IMA: A privacy-preserving Integrity Measurement Architecture for Containers. RAID 2019: 487-500 - Dario Nisi, Antonio Bianchi, Yanick Fratantonio:
Exploring Syscall-Based Semantics Reconstruction of Android Applications. RAID 2019: 517-531 - Abdulhakim Sabur, Ankur Chowdhary, Dijiang Huang, Myong H. Kang, Anya Kim, Alexander Velazquez:
S3: A DFW-based Scalable Security State Analysis Framework for Large-Scale Data Center Networks. RAID 2019: 473-485 - Nir Sivan, Ron Bitton, Asaf Shabtai:
Analysis of Location Data Leakage in the Internet Traffic of Android-based Mobile Devices. RAID 2019: 243-260 - Konstantinos Solomos, Panagiotis Ilia, Sotiris Ioannidis, Nicolas Kourtellis:
TALON: An Automated Framework for Cross-Device Tracking Detection. RAID 2019: 227-241 - Wei Song, Peng Liu:
Dynamically Finding Minimal Eviction Sets Can Be Quicker Than You Think for Side-Channel Attacks against the LLC. RAID 2019: 427-442 - Xiaoqing Sun, Mingkai Tong, Jiahai Yang, Xinran Liu, Heng Liu:
HinDom: A Robust Malicious Domain Detection System based on Heterogeneous Information Network with Transductive Classification. RAID 2019: 399-412 - Flavio Toffalini, Eleonora Losiouk, Andrea Biondo, Jianying Zhou, Mauro Conti:
ScaRR: Scalable Runtime Remote Attestation for Complex Systems. RAID 2019: 121-134 - Shruti Tople, Yaoqi Jia, Prateek Saxena:
PRO-ORAM: Practical Read-Only Oblivious RAM. RAID 2019: 197-211 - Jinghan Wang, Yue Duan, Wei Song, Heng Yin, Chengyu Song:
Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing. RAID 2019: 1-15
skipping 8 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-24 14:25 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint