Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 972 matches
- 2024
- Soliman Abd Elmonsef Sarhan, Hassan A. Youness, Ayman M. Bahaa El-Din, Ayman Elsayed Taha:
VoIP Network Forensics of Instant Messaging Calls. IEEE Access 12: 9012-9024 (2024) - Alagappan Annamalai, Ramesh Chandra Poonia, Suresh Shanmugasundaram:
Internet of things-based virtual private social networks on a text messaging strategy on mobile platforms. Int. J. Electron. Secur. Digit. Forensics 16(1): 40-62 (2024) - Kiran Shrimant Kakade, T. J. Nagalakshmi, S. Pradeep, B. R. Tapas Bapu:
Network intrusion detection: systematic evaluation using deep learning. Int. J. Electron. Secur. Digit. Forensics 16(2): 190-201 (2024) - Kiran Shrimant Kakade, C. Rajesh, T. Veena, P. Sivakumar:
Security challenges for routing protocols in mobile ad hoc network. Int. J. Electron. Secur. Digit. Forensics 16(3): 344-356 (2024) - P. J. Sathish Kumar, Jency Rubia J, R. Anitha, Sheshang Degadwala:
Dark web data classification using deep neural network. Int. J. Electron. Secur. Digit. Forensics 16(2): 202-212 (2024) - A. Rajasekar, A. Karunakaran, C. Sivakumaran, Sheshang Dipakkumar Degadwala:
An original data encryption technique for communication networks. Int. J. Electron. Secur. Digit. Forensics 16(1): 73-83 (2024) - Saurabh Agarwal, Ki-Hyun Jung:
Image operator forensics and sequence estimation using robust deep neural network. Multim. Tools Appl. 83(16): 47431-47454 (2024) - Muhammad Faraz Hyder, Tasbiha Fatima, Saadia Arshad:
Digital forensics framework for intent-based networking over software-defined networks. Telecommun. Syst. 85(1): 11-27 (2024) - Xiao Cai, Kaibo Shi, Yanbin Sun, Jinde Cao, Shiping Wen, Cheng Qiao, Zhihong Tian:
Stability Analysis of Networked Control Systems Under DoS Attacks and Security Controller Design With Mini-Batch Machine Learning Supervision. IEEE Trans. Inf. Forensics Secur. 19: 3857-3865 (2024) - Zhouyan Deng, Jiajia Liu, Yijie Xun, Junman Qin:
IdentifierIDS: A Practical Voltage-Based Intrusion Detection System for Real In-Vehicle Networks. IEEE Trans. Inf. Forensics Secur. 19: 661-676 (2024) - Hongwei Ding, Yu Sun, Nana Huang, Zhidong Shen, Xiaohui Cui:
TMG-GAN: Generative Adversarial Networks-Based Imbalanced Learning for Network Intrusion Detection. IEEE Trans. Inf. Forensics Secur. 19: 1156-1167 (2024) - Yi Ding, Zi Wang, Zhen Qin, Erqiang Zhou, Guobin Zhu, Zhiguang Qin, Kim-Kwang Raymond Choo:
Backdoor Attack on Deep Learning-Based Medical Image Encryption and Decryption Network. IEEE Trans. Inf. Forensics Secur. 19: 280-292 (2024) - Guanghan Duan, Hongwu Lv, Huiqiang Wang, Guangsheng Feng, Xiaoli Li:
Practical Cyber Attack Detection With Continuous Temporal Graph in Dynamic Network System. IEEE Trans. Inf. Forensics Secur. 19: 4851-4864 (2024) - Xingquan Fu, Guanghui Wen, Mengfei Niu, Wei Xing Zheng:
Distributed Secure Filtering Against Eavesdropping Attacks in SINR-Based Sensor Networks. IEEE Trans. Inf. Forensics Secur. 19: 3483-3494 (2024) - Yunfei Ge, Quanyan Zhu:
GAZETA: GAme-Theoretic ZEro-Trust Authentication for Defense Against Lateral Movement in 5G IoT Networks. IEEE Trans. Inf. Forensics Secur. 19: 540-554 (2024) - Xiongjun Guan, Jianjiang Feng, Jie Zhou:
Phase-Aggregated Dual-Branch Network for Efficient Fingerprint Dense Registration. IEEE Trans. Inf. Forensics Secur. 19: 5712-5724 (2024) - Zhiqing Guo, Zhenhong Jia, Liejun Wang, Dewang Wang, Gaobo Yang, Nikola K. Kasabov:
Constructing New Backbone Networks via Space-Frequency Interactive Convolution for Deepfake Detection. IEEE Trans. Inf. Forensics Secur. 19: 401-413 (2024) - Shuting He, Weihua Chen, Kai Wang, Hao Luo, Fan Wang, Wei Jiang, Henghui Ding:
Region Generation and Assessment Network for Occluded Person Re-Identification. IEEE Trans. Inf. Forensics Secur. 19: 120-132 (2024) - Ying He, Zhili Shen, Jingyu Hua, Qixuan Dong, Jiacheng Niu, Wei Tong, Xu Huang, Chen Li, Sheng Zhong:
Backdoor Attack Against Split Neural Network-Based Vertical Federated Learning. IEEE Trans. Inf. Forensics Secur. 19: 748-763 (2024) - Dongxia Huang, Weiqi Luo, Minglin Liu, Weixuan Tang, Jiwu Huang:
Steganography Embedding Cost Learning With Generative Multi-Adversarial Network. IEEE Trans. Inf. Forensics Secur. 19: 15-29 (2024) - Ju Jia, Siqi Ma, Yang Liu, Lina Wang, Robert H. Deng:
A Causality-Aligned Structure Rationalization Scheme Against Adversarial Biased Perturbations for Graph Neural Networks. IEEE Trans. Inf. Forensics Secur. 19: 59-73 (2024) - Houssem Jmal, Firas Ben Hmida, Nardine Basta, Muhammad Ikram, Mohamed Ali Kâafar, Andy Walker:
SPGNN-API: A Transferable Graph Neural Network for Attack Paths Identification and Autonomous Mitigation. IEEE Trans. Inf. Forensics Secur. 19: 1601-1613 (2024) - Xiaoguo Li, Zixi Huang, Bowen Zhao, Guomin Yang, Tao Xiang, Robert H. Deng:
STDA: Secure Time Series Data Analytics With Practical Efficiency in Wide-Area Network. IEEE Trans. Inf. Forensics Secur. 19: 1440-1454 (2024) - Haozhe Li, Yilin Liao, Zijian Tian, Zhaoran Liu, Jiaqi Liu, Xinggao Liu:
Bidirectional Stackable Recurrent Generative Adversarial Imputation Network for Specific Emitter Missing Data Imputation. IEEE Trans. Inf. Forensics Secur. 19: 2967-2980 (2024) - Guoyuan Lin, Weiqi Luo, Da Luo, Jiwu Huang:
One-Class Neural Network With Directed Statistics Pooling for Spoofing Speech Detection. IEEE Trans. Inf. Forensics Secur. 19: 2581-2593 (2024) - Jinliang Liu, Yanhui Dong, Lijuan Zha, Xiangpeng Xie, Engang Tian:
Reinforcement Learning-Based Tracking Control for Networked Control Systems With DoS Attacks. IEEE Trans. Inf. Forensics Secur. 19: 4188-4197 (2024) - Jian Liu, Jiachen Ke, Jinliang Liu, Xiangpeng Xie, Engang Tian:
Outlier-Resistant Non-Fragile Control of Nonlinear Networked Systems Under DoS Attacks and Multi-Variable Event-Triggered SC Protocol. IEEE Trans. Inf. Forensics Secur. 19: 2609-2622 (2024) - Yang Liu, Guangbo Liang, Xi Wang, Peican Zhu, Zhen Wang:
Diffusion Containment in Complex Networks Through Collective Influence of Connections. IEEE Trans. Inf. Forensics Secur. 19: 1510-1524 (2024) - Renyang Liu, Wei Zhou, Tianwei Zhang, Kangjie Chen, Jun Zhao, Kwok-Yan Lam:
Boosting Black-Box Attack to Deep Neural Networks With Conditional Diffusion Models. IEEE Trans. Inf. Forensics Secur. 19: 5207-5219 (2024) - Yanyan Ni, Zhen Wang, Yingjie Fan, Xia Huang, Hao Shen:
Secure Stabilization of Networked Lur'e Systems Suffering From DoS Attacks: A Resilient Memory-Based Event-Trigger Mechanism. IEEE Trans. Inf. Forensics Secur. 19: 4658-4669 (2024)
skipping 942 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-11 23:06 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint