Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 59 matches
- 2019
- Bader A. Aldawsari, Bogdan S. Chlebus, Dariusz R. Kowalski:
Broadcasting on Adversarial Multiple Access Channels. NCA 2019: 1-4 - Aliyu Lawal Aliyu, Adel Aneiba, Mohammad N. Patwary:
Secure Communication between Network Applications and Controller in Software Defined Network. NCA 2019: 1-8 - Giovanni Apruzzese, Michele Colajanni, Mirco Marchetti:
Evaluating the effectiveness of Adversarial Attacks against Botnet Detectors. NCA 2019: 1-8 - Hamza Baqa, Nguyen Binh Truong, Noël Crespi, Gyu Myoung Lee, Franck Le Gall:
Semantic Smart Contracts for Blockchain-based Services in the Internet of Things. NCA 2019: 1-5 - Yann Busnel, Christelle Caillouet, David Coudert:
Self-organized UAV-based Supervision and Connectivity: Challenges and Opportunities. NCA 2019: 1-5 - Yann Busnel, Noël Gillet:
A Cost-effective and Lightweight Membership Assessment for Large-scale Data Stream. NCA 2019: 1-8 - Xiaofei Cao, Sanjay Madria:
Efficient Geospatial Data Collection in IoT Networks for Mobile Edge Computing. NCA 2019: 1-10 - Younghun Chae, Natallia Katenka, Lisa Cingiser DiPippo:
An Adaptive Threshold Method for Anomaly-based Intrusion Detection Systems. NCA 2019: 1-4 - Fabien Charmet, Gregory Blanc, Christophe Kiennert:
Optimizing Resource Allocation for Secure SDN-based Virtual Network Migration. NCA 2019: 1-10 - Sudarshan S. Chawathe:
Indoor-Location Classification Using RF Signatures. NCA 2019: 1-4 - Sudarshan S. Chawathe:
Cost-Based Query-Rewriting for DynamoDB: Work in Progress. NCA 2019: 1-3 - Dobrin Dobrev, Dimiter Avresky:
Comparison of SDN Controllers for Constructing Security Functions. NCA 2019: 1-5 - Paulo Ferreira, Andriy Zabolotny, João Barreto:
Bicycle Mode Activity Detection with Bluetooth Low Energy Beacons. NCA 2019: 1-4 - Ricardo Filipe, Jaime Correia, Filipe Araújo, Jorge Cardoso:
Towards Occupation Inference in Non-instrumented Services. NCA 2019: 1-7 - Klaus-Tycho Foerster, Stefan Schmid:
Distributed Consistent Network Updates in SDNs: Local Verification for Global Guarantees. NCA 2019: 1-4 - Yaozhong Ge, Zhe Ding, Maolin Tang, Yu-Chu Tian:
Resource Provisioning for MapReduce Computation in Cloud Container Environment. NCA 2019: 1-4 - Subhankar Ghosal, Sasthi C. Ghosh:
A Randomized Algorithm for Joint Power and Channel Allocation in 5G D2D Communication. NCA 2019: 1-5 - Shankar K. Ghosh, Sasthi C. Ghosh:
$Q$-learning Based Network Selection Mechanism for CRNs with Secrecy Provisioning. NCA 2019: 1-5 - Andreas Grüner, Alexander Mühle, Christoph Meinel:
An Integration Architecture to Enable Service Providers for Self-sovereign Identity. NCA 2019: 1-5 - Romas James Hada, Miao Jin, Ying Xie, Linh Le:
Link Prediction Based Minimum Cost and Balanced Partition of Large Online Social Networks. NCA 2019: 1-9 - Desta Haileselassie Hagos, Paal E. Engelstad, Anis Yazidi:
Classification of Delay-based TCP Algorithms From Passive Traffic Measurements. NCA 2019: 1-10 - M. Reza HoseinyFarahabady, Ali Jannesari, Zahir Tari, Javid Taheri, Albert Y. Zomaya:
Dynamic Control of CPU Cap Allocations in Stream Processing and Data-Flow Platforms. NCA 2019: 1-8 - Yong Jin, Masahiko Tomoishi, Satoshi Matsuura:
A Detection Method Against DNS Cache Poisoning Attacks Using Machine Learning Techniques: Work in Progress. NCA 2019: 1-3 - Marek Klonowski, Dariusz R. Kowalski, Jaroslaw Mirek, Prudence W. H. Wong:
Performing Partially Ordered Sets of Jobs on a MAC in Presence of Adversarial Crashes. NCA 2019: 1-4 - Lukasz Krzywiecki, Patryk Koziel, Nisha Panwar:
Signature Based Authentication for Ephemeral Setup Attacks in Vehicular Sensor Networks. NCA 2019: 1-4 - Asma Lahbib, Khalifa Toumi, Anis Laouiti, Steven Martin:
DRMF: A Distributed Resource Management Framework for Industry 4.0 Environments. NCA 2019: 1-9 - Francis Laniel, Damien Carver, Julien Sopena, Franck Wajsbürt, Jonathan Lejeune, Marc Shapiro:
Highlighting the Container Memory Consolidation Problems in Linux. NCA 2019: 1-4 - Young Choon Lee, Jayden King, Seok-Hee Hong:
Holistic Approach for Studying Resource Failures at Scale. NCA 2019: 1-4 - Junyoung Lee, Seongeun Yoo:
Adaptive Energy Efficient RPL Avoiding Unstable Nodes for Smart Factory. NCA 2019: 1-4 - Cristoffer Leite, João J. C. Gondim, Priscila Solís Barreto, Eduardo Adílio Pelinson Alchieri:
Waste Flooding: A Phishing Retaliation Tool. NCA 2019: 1-8
skipping 29 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-17 01:58 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint