Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/sesa/sesa4.bht:"
@article{DBLP:journals/sesa/CeesayMW18, author = {Ebrima N. Ceesay and K. Myers and Paul A. Watters}, title = {Human-centered strategies for cyber-physical systems security}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {4}, number = {14}, pages = {e5}, year = {2018}, url = {https://doi.org/10.4108/eai.15-5-2018.154773}, doi = {10.4108/EAI.15-5-2018.154773}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/CeesayMW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/GuanFPGGL18, author = {Le Guan and Sadegh Farhang and Yu Pu and Pinyao Guo and Jens Grossklags and Peng Liu}, title = {VaultIME: Regaining User Control for Password Managers through Auto-correction}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {4}, number = {14}, pages = {e4}, year = {2018}, url = {https://doi.org/10.4108/eai.15-5-2018.154772}, doi = {10.4108/EAI.15-5-2018.154772}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/GuanFPGGL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/HuangZY18, author = {Chu Huang and Sencun Zhu and Yi Yang}, title = {An Evaluation Framework for Moving Target Defense Based on Analytic Hierarchy Process}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {4}, number = {13}, pages = {e4}, year = {2018}, url = {https://doi.org/10.4108/eai.4-1-2018.153527}, doi = {10.4108/EAI.4-1-2018.153527}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/HuangZY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/KaramiWC18, author = {Mohammad Karami and An Wang and Songqing Chen}, title = {Attribution of Economic Denial of Sustainability Attacks in Public Clouds}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {4}, number = {13}, pages = {e2}, year = {2018}, url = {https://doi.org/10.4108/eai.4-1-2018.153525}, doi = {10.4108/EAI.4-1-2018.153525}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/KaramiWC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/MaglarasDNR18, author = {Leandros A. Maglaras and George Drivas and Kleanthis Noou and Stylianos Rallis}, title = {{NIS} directive: The case of Greece}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {4}, number = {14}, pages = {e1}, year = {2018}, url = {https://doi.org/10.4108/eai.15-5-2018.154769}, doi = {10.4108/EAI.15-5-2018.154769}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/MaglarasDNR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/SunDSL18, author = {Xiaoyan Sun and Jun Dai and Anoop Singhal and Peng Liu}, title = {Probabilistic Inference of the Stealthy Bridges between Enterprise Networks in Cloud}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {4}, number = {13}, pages = {e3}, year = {2018}, url = {https://doi.org/10.4108/eai.4-1-2018.153526}, doi = {10.4108/EAI.4-1-2018.153526}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/SunDSL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/WangYR18, author = {Zheng Wang and Shui Yu and Scott Rose}, title = {An On-Demand Defense Scheme Against {DNS} Cache Poisoning Attacks}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {4}, number = {14}, pages = {e3}, year = {2018}, url = {https://doi.org/10.4108/eai.15-5-2018.154771}, doi = {10.4108/EAI.15-5-2018.154771}, timestamp = {Wed, 08 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/WangYR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/Xiong18, author = {Kaiqi Xiong}, title = {The performance analysis of public key cryptography-based authentication}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {4}, number = {14}, pages = {e2}, year = {2018}, url = {https://doi.org/10.4108/eai.15-5-2018.154770}, doi = {10.4108/EAI.15-5-2018.154770}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/Xiong18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/XuCGXS18, author = {Lei Xu and Lin Chen and Zhimin Gao and Shouhuai Xu and Weidong Shi}, title = {Efficient Public Blockchain Client for Lightweight Users}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {4}, number = {13}, pages = {e5}, year = {2018}, url = {https://doi.org/10.4108/eai.4-1-2018.153528}, doi = {10.4108/EAI.4-1-2018.153528}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/XuCGXS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/ZhuJM18, author = {Sencun Zhu and Kevin I. Jones and Leandros A. Maglaras}, title = {Defence Mechanisms for Public Systems}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {4}, number = {13}, pages = {e1}, year = {2018}, url = {https://doi.org/10.4108/eai.4-1-2018.153524}, doi = {10.4108/EAI.4-1-2018.153524}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/ZhuJM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/BalenBW17, author = {Nicolas Van Balen and Christopher T. Ball and Haining Wang}, title = {Analysis of Targeted Mouse Movements for Gender Classification}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {4}, number = {11}, pages = {e3}, year = {2017}, url = {https://doi.org/10.4108/eai.7-12-2017.153395}, doi = {10.4108/EAI.7-12-2017.153395}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/BalenBW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/ChengWZ17, author = {Leixiao Cheng and Quanshui Wu and Yunlei Zhao}, title = {Compact lossy and all-but-one trapdoor functions from lattice}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {4}, number = {12}, pages = {e4}, year = {2017}, url = {https://doi.org/10.4108/eai.28-12-2017.153517}, doi = {10.4108/EAI.28-12-2017.153517}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/ChengWZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/DongYCLZ17, author = {Qi Dong and Zekun Yang and Yu Chen and Xiaohua Li and Kai Zeng}, title = {Exploration of Singular Spectrum Analysis for Online Anomaly Detection in CRNs}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {4}, number = {12}, pages = {e3}, year = {2017}, url = {https://doi.org/10.4108/eai.28-12-2017.153516}, doi = {10.4108/EAI.28-12-2017.153516}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/DongYCLZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/KannanWCBDB17, author = {Subramaniyam Kannan and Paul Wood and Somali Chaterji and Saurabh Bagchi and Larry Deatrick and Patricia Beane}, title = {{MAAT:} Multi-Stage Attack Attribution in Enterprise Systems using Software Defined Networks}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {4}, number = {11}, pages = {e4}, year = {2017}, url = {https://doi.org/10.4108/eai.7-12-2017.153396}, doi = {10.4108/EAI.7-12-2017.153396}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/KannanWCBDB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/Leca17, author = {Cristian Liviu Leca}, title = {Overview of Romania 802.11Wireless Security {\&} Statistics}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {4}, number = {12}, pages = {e5}, year = {2017}, url = {https://doi.org/10.4108/eai.28-12-2017.153518}, doi = {10.4108/EAI.28-12-2017.153518}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/Leca17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/LiOMMG17, author = {Yongfeng Li and Jinbin Ouyang and Bing Mao and Kai Ma and Shanqing Guo}, title = {Data Flow Analysis on Android Platform with Fragment Lifecycle Modeling and Callbacks}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {4}, number = {11}, pages = {e2}, year = {2017}, url = {https://doi.org/10.4108/eai.7-12-2017.153394}, doi = {10.4108/EAI.7-12-2017.153394}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/LiOMMG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/NiyazSJ17, author = {Quamar Niyaz and Weiqing Sun and Ahmad Y. Javaid}, title = {A Deep Learning Based DDoS Detection System in Software-Defined Networking {(SDN)}}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {4}, number = {12}, pages = {e2}, year = {2017}, url = {https://doi.org/10.4108/eai.28-12-2017.153515}, doi = {10.4108/EAI.28-12-2017.153515}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/NiyazSJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/PaladiG17, author = {Nicolae Paladi and Christian Gehrmann}, title = {Bootstrapping trust in software defined networks}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {4}, number = {11}, pages = {e5}, year = {2017}, url = {https://doi.org/10.4108/eai.7-12-2017.153397}, doi = {10.4108/EAI.7-12-2017.153397}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/PaladiG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/TanWFCJH17, author = {Zheng Tan and Cheng Wang and Xiaoling Fu and Jipeng Cui and Changjun Jiang and Weili Han}, title = {Re-identification of Vehicular Location-Based Metadata}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {4}, number = {11}, pages = {e1}, year = {2017}, url = {https://doi.org/10.4108/eai.7-12-2017.153393}, doi = {10.4108/EAI.7-12-2017.153393}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/TanWFCJH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/ZhuJM17, author = {Sencun Zhu and Kevin I. Jones and Leandros A. Maglaras}, title = {Vulnerability Analysis, Intrusion Detection and Privacy Preservation of Modern Communication Systems}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {4}, number = {12}, pages = {e1}, year = {2017}, url = {https://doi.org/10.4108/eai.28-12-2017.153514}, doi = {10.4108/EAI.28-12-2017.153514}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/ZhuJM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.