Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 37 matches
- 2023
- Ali Akram Abdul-Kareem, Waleed Ameen Mahmoud Al-Jawher:
A Hybrid Domain Medical Image Encryption Scheme Using URUK and WAM Chaotic Maps with Wavelet - Fourier Transforms. J. Cyber Secur. Mobil. 12(4): 435-464 (2023) - Ekhlas Abbas Albahrani, Sadeq H. Lafta, Naeem Howrie Ghayad:
A Chaos-Based Encryption Algorithm for Database System. J. Cyber Secur. Mobil. 12(1): 25-54 (2023) - Sahel Alouneh:
A Multi-Path Approach to Protect DNS Against DDoS Attacks. J. Cyber Secur. Mobil. 12(4): 569-588 (2023) - Belal M. Amro, Saeed Salah, Mohammed Moreb:
A Comprehensive Architectural Framework of Moving Target Defenses Against DDoS Attacks. J. Cyber Secur. Mobil. 12(4): 605-628 (2023) - Min Chen:
Camera Network Topology Mapping Based on the Integration of Network Information and Physical Distribution Under the Background of Communication Security. J. Cyber Secur. Mobil. 12(5): 733-756 (2023) - Gaili Du:
Security of Encrypted Images in Network Transmission Based on an Improved Chaos Algorithm. J. Cyber Secur. Mobil. 12(5): 675-696 (2023) - Julija Gavenaite-Sirvydiene, Algita Miecinskiene:
The Assessment of Cyber Security's Significance in the Financial Sector of Lithuania. J. Cyber Secur. Mobil. 12(4): 497-518 (2023) - Vyacheslav Gorev, Alexander Gusev, Valerii Korniienko, Yana I. Shedlovska:
On the Use of the Kolmogorov-Wiener Filter for Heavy-tail Process Prediction. J. Cyber Secur. Mobil. 12(3): 315-338 (2023) - Khaled Mohammed Ali Hassan, Mohamed Ashraf Madkour, Sayed Abd El Hady Nouh:
A Realtime Adaptive Trust Model Based on Artificial Neural Networks for Wireless Sensor Networks. J. Cyber Secur. Mobil. 12(4): 519-546 (2023) - Serhii Ya. Hilgurt, Anatolii Davydenko, Tetyana V. Matovka, Mykhailo P. Prygara:
Tools for Analyzing Signature-Based Hardware Solutions for Cyber Security Systems. J. Cyber Secur. Mobil. 12(3): 339-366 (2023) - Tetiana Hovorushchenko, Yelyzaveta Hnatchuk, Vitaliy Osyadlyi, Mariia Kapustian, Artem Boyarchuk:
Blockchain-Based Medical Decision Support System. J. Cyber Secur. Mobil. 12(3): 253-274 (2023) - Tetiana Hovorushchenko, Olga Pavlova, Mariia Kostiuk:
Method of Increasing the Security of Smart Parking System. J. Cyber Secur. Mobil. 12(3): 297-314 (2023) - Ivan Izonin, Tetiana Hovorushchenko, Peter T. Popov:
Editorial. J. Cyber Secur. Mobil. 12(3): v-x (2023) - Xin Jiang, Huawei Huang, Geyang Pan:
Cryptanalysis of Tropical Encryption Scheme Based on Double Key Exchange. J. Cyber Secur. Mobil. 12(2): 205-220 (2023) - Xiaopeng Kan, Zhihong Zhou, Lihong Yao, Yuxin Zuo:
Research on Anomaly Detection in Vehicular CAN Based on Bi-LSTM. J. Cyber Secur. Mobil. 12(5): 629-652 (2023) - V. N. Hemanth Kollipara, Sai Koushik Kalakota, Sujith Chamarthi, S. Ramani, Preeti Malik, Marimuthu Karuppiah:
Timestamp Based OTP and Enhanced RSA Key Exchange Scheme with SIT Encryption to Secure IoT Devices. J. Cyber Secur. Mobil. 12(1): 77-102 (2023) - Xingfeng Li:
An Evaluation Model for Network Security Based on an Optimized Circular Algorithm. J. Cyber Secur. Mobil. 12(5): 711-732 (2023) - Yujing Lu:
Security and Privacy of Internet of Things: A Review of Challenges and Solutions. J. Cyber Secur. Mobil. 12(6): 813-844 (2023) - Ruslan Orlovskyi, Sergiy Kharytonov, Igor Samoshchenko, Olha Us, Volodymyr Iemelianenko:
Countering Cybercrime Under Martial Law. J. Cyber Secur. Mobil. 12(6): 893-910 (2023) - Florian Platzer, Alexandra Lux:
Inconsistencies in Darknet Researches. J. Cyber Secur. Mobil. 12(2): 187-204 (2023) - Nataliia I. Pravorska:
Additional Detection of Clones Using Locally Sensitive Hashing. J. Cyber Secur. Mobil. 12(3): 367-388 (2023) - Usman Rauf, Fadi Mohsen, Zhiyuan Wei:
A Taxonomic Classification of Insider Threats: Existing Techniques, Future Directions & Recommendations. J. Cyber Secur. Mobil. 12(2): 221-252 (2023) - Fadhil Mohammed Salman, Ahssan Ahmmed Mohammed, Fanar Ali Joda:
Adaptation of the Ant Colony Algorithm to Avoid Congestion in Wireless Mesh Networks. J. Cyber Secur. Mobil. 12(5): 785-812 (2023) - Fadhil Mohammed Salman, Ahssan Ahmmed Mohammed, Ahmed Fakhir Mutar:
Optimization of LEACH Protocol for WSNs in Terms of Energy Efficient and Network Lifetime. J. Cyber Secur. Mobil. 12(3): 275-296 (2023) - Petro Shepita, Lyubov Tupychak, Julia Shepita:
Analysis of Cyber Security Threats of the Printing Enterprise. J. Cyber Secur. Mobil. 12(3): 415-434 (2023) - Nisha P. Shetty, Balachandra Muniyal, Aman Priyanshu, Vedant Rishi Das:
FedBully: A Cross-Device Federated Approach for Privacy Enabled Cyber Bullying Detection using Sentence Encoders. J. Cyber Secur. Mobil. 12(4): 465-496 (2023) - Liubomyr S. Sikora, Nataliia Lysa, Yevhen I. Tsikalo, Olga Fedevych:
System-Information and Cognitive Technologies of Man-Made Infrastructure Cyber Security. J. Cyber Secur. Mobil. 12(3): 389-414 (2023) - Martin Steinebach, Tiberius Berwanger, Huajian Liu:
Image Hashing Robust Against Cropping and Rotation. J. Cyber Secur. Mobil. 12(2): 129-160 (2023) - Mohammed Mujeer Ulla, Deepak S. Sakkari:
Research on Elliptic Curve Crypto System with Bitcoin Curves - SECP256k1, NIST256p, NIST521p and LLL. J. Cyber Secur. Mobil. 12(1): 103-128 (2023) - Ying Xue:
Machine Learning: Research on Detection of Network Security Vulnerabilities by Extracting and Matching Features. J. Cyber Secur. Mobil. 12(5): 697-710 (2023)
skipping 7 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-31 20:17 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint