Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 76 matches
- 2015
- Giovanni Agosta, Alessio Antonini, Alessandro Barenghi, Dario Galeri, Gerardo Pelosi:
Cyber-security analysis and evaluation for smart home management solutions. ICCST 2015: 1-6 - Ramon Blanco-Gonzalo, Raul Sánchez-Reillo, Rodrigo Ros-Gomez, Belen Fernandez-Saavedra:
User acceptance of planar semiconductor fingerprint sensors. ICCST 2015: 31-36 - Tossapon Boongoen, Natthakan Iam-on:
Discovering identity in intelligence data using weighted link based similarities: A case study of Thailand. ICCST 2015: 327-332 - Moisés Díaz Cabrera, Miguel A. Ferrer, Giuseppe Pirlo, Giuliano Giannico, Patricia Henríquez, Donato Impedovo:
Off-line signature stability by optical flow: Feasibility study of predicting the verifier performance. ICCST 2015: 341-345 - Moisés Díaz Cabrera, Patricia Henríquez, Miguel A. Ferrer, Jesús B. Alonso, Giuseppe Pirlo, Donato Impedovo:
Novel method for early bearing fault detection based on dynamic stability measure. ICCST 2015: 43-47 - Cristina Carmona-Duarte, Jaime Calvo-Gallego, Blas-Pablo Dorta-Naranjo, Miguel Angel Ferrer-Ballester:
Efficient detection algorithm for non-coherent high-resolution radar in sea clutter. ICCST 2015: 421-426 - Yao-Tang Chang, Yih-Chuan Lin:
The scrambling cryptography implemented with chaotic sequence trigger optical switch algorithm in WDM passive optical network. ICCST 2015: 259-262 - Hau-Ming Chang, Shu-Chiung Lin, Patrick S. Chen, Yu-Hsuan Hung:
A verification protocol of mobile payment based on signature recognition. ICCST 2015: 379-384 - Shwu-Jing Chang, Kuan-Hung Yeh, Guan-Dun Peng, Shih-Ming Chang, Chung-Hao Huang:
From Safety to security - Pattern and anomaly detections in maritime trajectories. ICCST 2015: 415-419 - Adrian R. Chavez, William M. S. Stout, Sean Peisert:
Techniques for the dynamic randomization of network attributes. ICCST 2015: 1-6 - Pin-Jui Chen, Yen-Wen Chen:
Implementation of SDN based network intrusion detection and prevention system. ICCST 2015: 141-146 - Tse-Shih Chen, Ming-Fen Lin, Tzi-cker Chiueh, Cheng-Hsin Chang, Wei-Heng Tai:
An intelligent surveillance video analysis service in cloud environment. ICCST 2015: 1-6 - Meng-Yi Chen, Chang-En Pu, Fang-Chin Wu, Huei-Yu Lai, Chin-Wen Ho:
Rapidly mutating Y-STRs population data in Taiwan and haplotype probability estimation for forensic purposes. ICCST 2015: 395-402 - Sih-Huei Chen, Andri Santoso, Yuan-Shan Lee, Jia-Ching Wang:
Latent dirichlet allocation based blog analysis for criminal intention detection system. ICCST 2015: 73-76 - Tzi-cker Chiueh, E. J. Chang, Robert Huang, Hogan Lee, Vernon Sung, M. H. Chiang:
Security considerations in ITRI cloud OS. ICCST 2015: 107-112 - Hui-Hao Chou, Sheng-De Wang:
An adaptive network intrusion detection approach for the cloud environment. ICCST 2015: 1-6 - Yi Ming Dai, Keh Shiou Liu:
TACSA: A web-service based system for coastal surveillance and situational awareness. ICCST 2015: 409-413 - Shaw-Shiun Deng, Hui-Zhen Gu, Chen-Wei Ku:
The design of battle field correlation tracks. ICCST 2015: 175-180 - Antoniu L. Fantana, Selvakumar Ramachandran, Christian H. Schunck, Maurizio Talamo:
Movement based biometric authentication with smartphones. ICCST 2015: 235-239 - Marcos Faúndez-Zanuy, Enric Sesa-Nogueras, Stefano Marinozzi:
Speaker identification experiments under gender De-identification. ICCST 2015: 1-6 - Belen Fernandez-Saavedra, Raul Sánchez-Reillo, Carlos Sanchez-Redondo, Ramon Blanco-Gonzalo:
Testing of biometric systems integrated in mobile devices. ICCST 2015: 321-326 - Aufaclav Zatu Kusuma Frisky, Chien-Yao Wang, Andri Santoso, Jia-Ching Wang:
Lip-based visual speech recognition system. ICCST 2015: 315-319 - Fabio Garzia, Lorenzo Nesbitt, Roberto Cusani:
Adaptive genetic controller for the dynamic optmization of network traffic of integrated security systems. ICCST 2015: 1-6 - Nicole Hättenschwiler, Stefan Michel, Milena Kuhn, Sandrina Ritzmann, Adrian Schwaninger:
A first exploratory study on the relevance of everyday object knowledge and training for increasing efficiency in airport security X-ray screening. ICCST 2015: 25-30 - Kai-Fung Hong, Chien-Chih Chen, Yu-Ting Chiu, Kuo-Sen Chou:
Scalable command and control detection in log data through UF-ICF analysis. ICCST 2015: 293-298 - Chih-Hung Hsieh, Wei-Chieh Chao, Pei-Wen Liu, Chao-Wen Li:
Cyber security risk assessment using an interpretable evolutionary fuzzy scoring system. ICCST 2015: 153-158 - Cheng-Ta Hsieh, Kuo-Chin Fan, Chin-Chuan Han:
Personal re-identification using rank-based manifold ranking. ICCST 2015: 391-394 - Ho-Hsing Hsieh, Chi-Yao Hsu, Po-Yu Ke, Guang-Sheen Liu, Chih-Ping Lin:
Appling Lidar-based obstacle detection and wireless image transmission system for improving safety at level crossings. ICCST 2015: 363-367 - Chih-Hung Hsieh, Chia-Min Lai, Ching-Hao Mao, Tien-Cheu Kao, Kuo-Chen Lee:
AD2: Anomaly detection on active directory log data for insider threat monitoring. ICCST 2015: 287-292 - Yi-Zeng Hsieh, Mu-Chun Su, Addison Y. S. Su, Wu-Rong Shih, Jen-Chih Yu, Chien-Yeh Huang:
The computational rules extractor in the detection of tax evasion. ICCST 2015: 181-184
skipping 46 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-05 21:25 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint