


Остановите войну!
for scientists:


default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Venue search results
Likely matches
- Conference on Computer and Communications Security (CCS)
- International Journal of Critical Infrastructure Protection
- Annual Computer Security Applications Conference (ACSAC)
- International Conference on Informatics for Environmental Protection (EnviroInfo)
- International Conference on Critical Infrastructure Protection (ICCIP)
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 14,829 matches
- 2023
- Juan Carlos Bernal-Romero
, Juan Manuel Ramírez-Cortés
, Jose de Jesus Rangel-Magdaleno
, Pilar Gómez-Gil
, Hayde Peregrina-Barreto, Israel Cruz-Vega
:
A Review on Protection and Cancelable Techniques in Biometric Systems. IEEE Access 11: 8531-8568 (2023) - Jaehoon Jeong, Hyungeun Kim, Jaehyun Park, Jongshin Shin
, Jinho Jeong
:
Compact and Broadband ESD Protection I/O Pad Using Pad-Stacked Inductor. IEEE Access 11: 11422-11429 (2023) - Qinghua Lai
, Zhe Zhang, Kanjun Zhang
, Xianggen Yin
, Yongxin Chen:
Research on Pilot Protection for Tie Line of Renewable Energy Sources. IEEE Access 11: 1613-1628 (2023) - Alberto Pascual
, Jesús Acero
, Sergio Llorente
, Claudio Carretero
, José M. Burdio
:
Self-Adaptive Overtemperature Protection Materials for Safety-Centric Domestic Induction Heating Applications. IEEE Access 11: 1193-1201 (2023) - Husam S. Samkari
, Brian K. Johnson
:
Time-Domain Protection Scheme for Microgrids With Aggregated Inverter-Based Distributed Energy Resources. IEEE Access 11: 13232-13242 (2023) - Nan Sun
, Chang-Tsun Li
, Hin Chan, Md Zahidul Islam
, Md. Rafiqul Islam
, Warren Armstrong
:
On the Development of a Protection Profile Module for Encryption Key Management Components. IEEE Access 11: 9113-9121 (2023) - Abdolmajid Yolmeh, Melike Baykal-Gürsoy
, Vicki M. Bier:
A decomposable resource allocation model with generalized overarching protections. Ann. Oper. Res. 320(1): 493-507 (2023) - Wenyu Li, Ronghua Shi, Jian Dong
:
Harris hawks optimizer based on the novice protection tournament for numerical and engineering optimization problems. Appl. Intell. 53(6): 6133-6158 (2023) - Peikun Ni, Jianming Zhu
, Guoqing Wang:
Misinformation influence minimization by entity protection on multi-social networks. Appl. Intell. 53(6): 6401-6420 (2023) - Ivan Dimov, Venelin Todorov
, Slavi G. Georgiev
:
A Super-Convergent Stochastic Method Based on the Sobol Sequence for Multidimensional Sensitivity Analysis in Environmental Protection. Axioms 12(2): 146 (2023) - Radi Romansky
:
Mathematical Model Investigation of a Technological Structure for Personal Data Protection. Axioms 12(2): 102 (2023) - Ralf De Wolf
, Marijn B. Martens, Mariek Vanden Abeele, Lieven De Marez:
Predicting Teens' Privacy Management and Attitude Toward Data Protection on Social Media. Cyberpsychology Behav. Soc. Netw. 26(3): 153-160 (2023) - Yu Tang, Yiqing Fu, Qiwei Guo, Huasheng Huang, Zhiping Tan, Shaoming Luo:
Numerical simulation of the spatial and temporal distributions of the downwash airflow and spray field of a co-axial eight-rotor plant protection UAV in hover. Comput. Electron. Agric. 206: 107634 (2023) - Pablo Benlloch-Caballero
, Qi Wang, Jose M. Alcaraz Calero:
Distributed dual-layer autonomous closed loops for self-protection of 5G/6G IoT networks from distributed denial of service attacks. Comput. Networks 222: 109526 (2023) - Chengzong Peng
, Danyang Zheng, Yihan Zhong, Xiaojun Cao:
Off-site protection against service function forwarder failures in NFV. Comput. Networks 221: 109510 (2023) - Naurin Farooq Khan
, Naveed Ikram, Hajra Murtaza
, Mehwish Javed:
Evaluating protection motivation based cybersecurity awareness training on Kirkpatrick's Model. Comput. Secur. 125: 103049 (2023) - Obi Ogbanufe
, Robert E. Crossler
, David Biros:
The valued coexistence of protection motivation and stewardship in information security behaviors. Comput. Secur. 124: 102960 (2023) - Saba Khanum
, Khurram Mustafa:
A systematic literature review on sensitive data protection in blockchain applications. Concurr. Comput. Pract. Exp. 35(1) (2023) - Junguo Liao
, Haifeng Wang
, June Wu:
A multikey fully homomorphic encryption privacy protection protocol based on blockchain for edge computing system. Concurr. Comput. Pract. Exp. 35(4) (2023) - Ya-Nan Cao, Yujue Wang, Yong Ding, Zhenwei Guo, Qianhong Wu, Hai Liang:
Blockchain-empowered security and privacy protection technologies for smart grid. Comput. Stand. Interfaces 85: 103708 (2023) - Wafaa N. Al-Sharu, Majdi K. Qabalin
, Muawya Naser, Omar A. Saraerh:
A Secure Framework for Blockchain Transactions Protection. Comput. Syst. Sci. Eng. 45(2): 1095-1111 (2023) - Eslam Hamouda, Mohamed M. Ezz, Ayman Mohamed Mostafa, Murtada Khalafallah Elbashir, Meshrif Alruily, Mayada Tarek:
Innovative Hetero-Associative Memory Encoder (HAMTE) for Palmprint Template Protection. Comput. Syst. Sci. Eng. 46(1): 619-636 (2023) - Yuming Huang, Luo Jiaohong, Ma Zhenguo, Tang Bing, Zhang Keqi, Jianyong Zhang:
On Combined PSO-SVM Models in Fault Prediction of Relay Protection Equipment. Circuits Syst. Signal Process. 42(2): 875-891 (2023) - Aimin Yang, Zezhong Ma, Chunying Zhang, Yang Han, Zhibin Hu, Wei Zhang, Xiangdong Huang, Yafeng Wu:
Review on application progress of federated learning model and security hazard protection. Digit. Commun. Networks 9(1): 146-158 (2023) - Tao Zhang
, Fahim Rahman, Mark M. Tehranipoor, Farimah Farahmandi:
FPGA-Chain: Enabling Holistic Protection of FPGA Supply Chain With Blockchain Technology. IEEE Des. Test 40(2): 127-136 (2023) - Wojciech Wiewiórowski, Juhan Lepassaar:
Pairing up Cybersecurity and Data Protection efforts: EDPS and ENISA sign Memorandum of Understanding. Datenschutz und Datensicherheit (dud) 47(2): 68 (2023) - Samarth Godara, Durga Toshniwal, Ram Swaroop Bana, Deepak Singh, Jatin Bedi, Rajender Parsad, Jai Prakash Singh Dabas, Abimanyu Jhajhria, Shruti Godara, Raju Kumar
, Sudeep Marwaha:
AgrIntel: Spatio-temporal profiling of nationwide plant-protection problems using helpline data. Eng. Appl. Artif. Intell. 117(Part): 105555 (2023) - Zhenpeng Liu
, Dewei Miao, Ruilin Li, Yi Liu, Xiaofei Li:
Cache-Based Privacy Protection Scheme for Continuous Location Query. Entropy 25(2): 201 (2023) - Yi-Lun Pan
, Jun-Cheng Chen, Ja-Ling Wu
:
Towards a Controllable and Reversible Privacy Protection System for Facial Images through Enhanced Multi-Factor Modifier Networks. Entropy 25(2): 272 (2023) - Shuyuan Qiu, Dechang Pi, Yanxue Wang, Yufei Liu:
Novel trajectory privacy protection method against prediction attacks. Expert Syst. Appl. 213(Part): 118870 (2023)
skipping 14,799 more matches
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2023-04-01 12:30 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint