


Остановите войну!
for scientists:


default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 66 matches
- 2022
- Sarah M. Coyne
, Adam A. Rogers
, Jane Shawcroft
, Peter Reschke
, Rachel Barr
, Emilie J. Davis, Hailey G. Holmgren
, Sarah Domoff:
Meltdowns and media: Moment-to-moment fluctuations in young children's media use transitions and the role of children's mood states. Comput. Hum. Behav. 136: 107360 (2022) - Yueqiang Cheng, Zhi Zhang
, Yansong Gao, Zhaofeng Chen, Shengjian Guo, Qifei Zhang, Rui Mei
, Surya Nepal
, Yang Xiang
:
Meltdown-type attacks are still feasible in the wall of kernel page-Table isolation. Comput. Secur. 113: 102556 (2022) - Fatima Al-Rammah, Marwa Masmoudi, Salma Kammoun Jarraya:
CNN-LSTM Based Approach for Analyzing and Detecting Stereotypical Motor Movements of Autistic Children in Pre-Meltdown Crisis. AICCSA 2022: 1-8 - LouAnne Boyd, Espen Garner, Ian Kim, Gianna Valencia:
Cognality VR: Exploring a Mobile VR App with Multiple Stakeholders to Reduce Meltdowns in Autistic Children. CHI Extended Abstracts 2022: 239:1-239:7 - Chien-Hsiang Lin, Yi-Pei Su, Yean-Ru Chen, Yu-Ting Chou, Sao-Jie Chen:
Empirical Study of Proposed Meltdown Attack Implementation on BOOM v3. MWSCAS 2022: 1-4 - Zelong Li, Akhilesh Tyagi:
Transient State Signaling for Spectre/Meltdown Transient Cache Side-channel Prevention. SECRYPT 2022: 655-660 - Zhongkai Tong, Ziyuan Zhu, Yusha Zhang, Yuxin Liu, Dan Meng:
Attack detection based on machine learning algorithms for different variants of Spectre attacks and different Meltdown attack implementations. CoRR abs/2208.14062 (2022) - 2021
- Vikas Khullar
, Harjit Pal Singh, Manju Bala:
Meltdown/Tantrum Detection System for Individuals with Autism Spectrum Disorder. Appl. Artif. Intell. 35(15): 1708-1732 (2021) - Yusong Tan, Baozi Chen, Liehuang Zhu, Qingbo Wu, Peng Zou, Yuanzhang Li:
On-demand cut off the covert channel to mitigate meltdown. Sci. China Inf. Sci. 64(9) (2021) - Daniel Genkin, Yuval Yarom:
Whack-a-Meltdown: Microarchitectural Security Games [Systems Attacks and Defenses]. IEEE Secur. Priv. 19(1): 95-98 (2021) - Salma Kammoun Jarraya, Marwa Masmoudi
, Mohamed Hammami:
A comparative study of Autistic Children Emotion recognition based on Spatio-Temporal and Deep analysis of facial expressions features during a Meltdown Crisis. Multim. Tools Appl. 80(1): 83-125 (2021) - Benedict Herzog, Stefan Reif, Julian Preis, Wolfgang Schröder-Preikschat, Timo Hönig:
The Price of Meltdown and Spectre: Energy Overhead of Mitigations at Operating System Level. EuroSec@EuroSys 2021: 8-14 - Zhixin Pan, Prabhat Mishra:
Automated Detection of Spectre and Meltdown Attacks Using Explainable Machine Learning. HOST 2021: 24-34 - Hoyong Jeong, Dohyun Ryu, Junbeom Hur:
Neural Network Stealing via Meltdown. ICOIN 2021: 36-38 - Nadav Amit
, Michael Wei, Dan Tsafrir:
Dealing with (some of) the fallout from meltdown. SYSTOR 2021: 13:1-13:6 - Seokmin Lee, Taehun Kim, Youngjoo Shin:
Quantitative Analysis on Attack Capacity in Meltdown-Type Attacks. WISA 2021: 218-228 - 2020
- Salma Kammoun Jarraya
, Marwa Masmoudi
, Mohamed Hammami
:
Compound Emotion Recognition of Autistic Children During Meltdown Crisis Based on Deep Spatio-Temporal Analysis of Facial Geometric Features. IEEE Access 8: 69311-69326 (2020) - Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg, Raoul Strackx:
Meltdown: reading kernel memory from user space. Commun. ACM 63(6): 46-56 (2020) - Taha Atahan Akyildiz, Can Berk Guzgeren, Cemal Yilmaz
, Erkay Savas:
MeltdownDetector: A runtime approach for detecting meltdown attacks. Future Gener. Comput. Syst. 112: 136-147 (2020) - Bilal Ali Ahmad:
Real time Detection of Spectre and Meltdown Attacks Using Machine Learning. CoRR abs/2006.01442 (2020) - 2019
- Taehyun Kim
, Youngjoo Shin
:
Reinforcing Meltdown Attack by Using a Return Stack Buffer. IEEE Access 7: 186065-186077 (2019) - Verónica G. Vergara Larrea
, Michael J. Brim
, Wayne Joubert, Swen Boehm
, Matthew B. Baker, Oscar R. Hernandez, Sarp Oral
, James Simmons, Don Maxwell:
Are we witnessing the spectre of an HPC meltdown? Concurr. Comput. Pract. Exp. 31(16) (2019) - Ahmad Yaser Alhaddad
, John-John Cabibihan
, Andrea Bonarini
:
Head Impact Severity Measures for Small Social Robots Thrown During Meltdown in Autism. Int. J. Soc. Robotics 11(2): 255-270 (2019) - Mark D. Hill, Jon Masters, Parthasarathy Ranganathan, Paul Turner, John L. Hennessy:
On the Spectre and Meltdown Processor Security Vulnerabilities. IEEE Micro 39(2): 9-19 (2019) - Claudio Canella, Daniel Genkin, Lukas Giner, Daniel Gruss, Moritz Lipp, Marina Minkin, Daniel Moghimi, Frank Piessens, Michael Schwarz, Berk Sunar, Jo Van Bulck
, Yuval Yarom:
Fallout: Leaking Data on Meltdown-resistant CPUs. CCS 2019: 769-784 - Taehyun Kim, Youngjoo Shin
:
High Efficiency, Low-noise Meltdown Attack by using a Return Stack Buffer. AsiaCCS 2019: 688-690 - Khaled N. Khasawneh, Esmaeil Mohammadian Koruyeh, Chengyu Song
, Dmitry Evtyushkin, Dmitry Ponomarev, Nael B. Abu-Ghazaleh
:
SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free Speculation. DAC 2019: 60 - Andrew Johnson, Ross Davies:
Speculative Execution Attack Methodologies (SEAM): An overview and component modelling of Spectre, Meltdown and Foreshadow attack methods. ISDFS 2019: 1-6 - Marwa Masmoudi, Salma Kammoun Jarraya, Mohamed Hammami:
MeltdownCrisis: Dataset of Autistic Children During Meltdown Crisis. SITIS 2019: 239-246 - Gnanambikai Krishnakumar, Chester Rebeiro:
MSMPX: Microarchitectural Extensions for Meltdown Safe Memory Protection. SoCC 2019: 432-437
skipping 36 more matches
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2023-03-24 14:24 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint