Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 38 matches
- 2024
- Wenjin Jin:
Security and privacy of digital economic risk assessment system based on cloud computing and blockchain. Soft Comput. 28(3): 2753-2768 (2024) - Daria Korobenko, Anastasija Nikiforova, Rajesh Sharma:
Towards a Privacy and Security-Aware Framework for Ethical AI: Guiding the Development and Assessment of AI Systems. CoRR abs/2403.08624 (2024) - 2023
- Caroline Baltzer, Stefano Bonacina:
Enhancing Women's Health: An Assessment of Data Privacy and Security of Menopause FemTech Applications. EFMI-STC 2023: 155-159 - Dmytro Proskurin, Sergiy Gnatyuk, Tetiana Okhrimenko, Maksim Iavich:
ML-Based Cryptographic Keys Quality Assessment for 5G / 6G Networks Privacy and Security. IDAACS 2023: 1025-1030 - 2022
- Johannes K. Becker:
IoT security and privacy assessment using software-defined radios. Boston University, USA, 2022 - Mahshid Sadeghpour, Arathi Arakala, Stephen A. Davis, Kathy J. Horadam:
GRETINA: A Large-Scale High-Quality Generated Retinal Image Dataset for Security and Privacy Assessment. IVCNZ 2022: 373-387 - Nazar Waheed, Muhammad Ikram, Saad Sajid Hashmi, Xiangjian He, Priyadarsi Nanda:
An Empirical Assessment of Security and Privacy Risks of Web-Based Chatbots. WISE 2022: 325-339 - Nazar Waheed, Muhammad Ikram, Saad Sajid Hashmi, Xiangjian He, Priyadarsi Nanda:
An Empirical Assessment of Security and Privacy Risks of Web based-Chatbots. CoRR abs/2205.08252 (2022) - 2021
- Dimitrios Papamartzivanos, Sofia-Anna Menesidou, Panagiotis Gouvas, Thanassis Giannetsos:
A Perfect Match: Converging and Automating Privacy and Security Impact Assessment On-the-Fly. Future Internet 13(2): 30 (2021) - Rui Chen, Dan J. Kim, H. Raghav Rao:
A study of social networking site use from a three-pronged security and privacy threat assessment perspective. Inf. Manag. 58(5): 103486 (2021) - Ming Yang, Tao Zhang, Tilei Gao, Di Zhang, Di Yang:
The Assessment Method of Mobile privacy security Based on AHP and Risk Matrix. CSSE 2021: 257-261 - (Withdrawn) Security and Privacy Risk Assessment of Energy Big Data in Cloud Environment. Comput. Intell. Neurosci. 2021: 2398460:1-2398460:11 (2021)
- 2020
- Olufunso Stephen Olorunsola, Francisca Nonyelum Ogwueleka, Abraham E. Evwiekpaefe:
Assessment of privacy and security perception of biometric technology case study of Kaduna state tertiary academic institutions. Secur. Priv. 3(5) (2020) - Tahreem Yaqoob, Haider Abbas, Narmeen Shafqat:
Integrated Security, Safety, and Privacy Risk Assessment Framework for Medical Devices. IEEE J. Biomed. Health Informatics 24(6): 1752-1761 (2020) - Tao Zhang, Kun Zhao, Ming Yang, Tilei Gao, Wanyu Xie:
Research on Privacy Security Risk Assessment Method of Mobile Commerce Based on Information Entropy and Markov. Wirel. Commun. Mob. Comput. 2020: 8888296:1-8888296:11 (2020) - Adrian Cartagena, Gerald Rimmer, Thomas van Dalsen, Lanier A. Watkins, William H. Robinson, Aviel D. Rubin:
Privacy Violating Opensource Intelligence Threat Evaluation Framework: A Security Assessment Framework For Critical Infrastructure Owners. CCWC 2020: 494-499 - Ryôichi Sasaki:
Risk Assessment Method for Balancing Safety, Security, and Privacy in Medical IoT Systems with Remote Maintenance Function. QRS Companion 2020: 190-197 - 2019
- Aniket Gulhane, Akhil Vyas, Reshmi Mitra, Roland Oruche, Gabriela Hoefer, Samaikya Valluripally, Prasad Calyam, Khaza Anuarul Hoque:
Security, Privacy and Safety Risk Assessment for Virtual Reality Learning Environment Applications. CCNC 2019: 1-9 - Emilio Tissato Nakamura, Sérgio Luis Ribeiro:
A Privacy, Security, Safety, Resilience and Reliability Focused Risk Assessment In a Health IoT System : Results from OCARIoT Project. GIoTS 2019: 1-6 - Laurens Sion, Dimitri Van Landuyt, Kim Wuyts, Wouter Joosen:
Privacy Risk Assessment for Data Subject-Aware Threat Modeling. IEEE Symposium on Security and Privacy Workshops 2019: 64-71 - 2018
- Hazirah Bee bt Yusof Ali, Lili Marziana bt Abdullah, Mira Kartiwi, Azlin Nordin:
Risk Assessment for Big Data in Cloud: Security, Privacy and Trust. AICCC 2018: 63-67 - Emilio Tissato Nakamura, Sérgio Luis Ribeiro:
A Privacy, Security, Safety, Resilience and Reliability Focused Risk Assessment Methodology for IIoT Systems Steps to Build and Use Secure IIoT Systems. GIoTS 2018: 1-6 - Laurens Sion, Dimitri Van Landuyt, Koen Yskout, Wouter Joosen:
SPARTA: Security & Privacy Architecture Through Risk-Driven Threat Assessment. ICSA Companion 2018: 89-92 - Roberto Carbone, Silvio Ranise, Giada Sciarretta:
Design and Security Assessment of Usable Multi-factor Authentication and Single Sign-On Solutions for Mobile Applications - A Workshop Experience Report. Privacy and Identity Management 2018: 51-66 - Aniket Gulhane, Akhil Vyas, Reshmi Mitra, Roland Oruche, Gabriela Hoefer, Samaikya Valluripally, Prasad Calyam, Khaza Anuarul Hoque:
Security, Privacy and Safety Risk Assessment for Virtual Reality Learning Environment Applications. CoRR abs/1811.12476 (2018) - 2017
- Sara Bahamou, Driss El Ouadghiri, Jean-Marie Bonnin:
When Game Theories Meets Security and Privacy Related Risk Assessment of Vehicular Networks (VANET). J. Mobile Multimedia 12(3&4): 213-224 (2017) - Javan Mnjama, Greg Foster, Barry Irwin:
A privacy and security threat assessment framework for consumer health wearables. ISSA 2017: 66-73 - Faisal Alsubaei, Abdullah Abuhussein, Sajjan G. Shiva:
Security and Privacy in the Internet of Medical Things: Taxonomy and Risk Assessment. LCN Workshops 2017: 112-120 - Fariborz Farahmand, Joshua Ripple, Mikhail J. Atallah, Robin L. Dillon-Merrill:
Security and privacy risks in electronic communications: A user's assessment. UEMCON 2017: 412-417 - 2016
- Qi Alfred Chen, Eric Osterweil, Matthew Thomas, Zhuoqing Morley Mao:
MitM Attack by Name Collision: Cause Analysis and Vulnerability Assessment in the New gTLD Era. IEEE Symposium on Security and Privacy 2016: 675-690
skipping 8 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-22 08:03 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint