default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
Likely matches
- Annual ACM Conference on Computer and Communications Security (CCS)
- ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (GIS)
- Annual International Conference on Mobile Computing and Networking (MobiCom)
- IEEE International Conference on Distributed Computing Systems (ICDCS)
- International Conference on Image Analysis and Processing (ICIAP)
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 2,654 matches
- 2024
- Amulya Sreejith, K. Shanti Swarup:
Cyber-Security for Smart Grid Control - Vulnerability Assessment, Attack Detection, and Mitigation. Springer 2024, ISBN 978-981-97-1301-1, pp. 3-132 - Michael Rodler:
Software (In)Security of Smart Contracts and Trusted Enclaves. University of Duisburg-Essen, Germany, 2024 - Maneo Ntseliseng Ramahlosi, Adeyinka Akanbi:
Application of Blockchain in Managing Security Challenges Confronting the Adoption of 4IR in Smart Environments. Adv. Artif. Intell. Mach. Learn. 4(2): 2276-2289 (2024) - Sidra Abbas, Imen Bouazzi, Stephen Ojo, Gabriel Avelino R. Sampedro, Ahmad S. Almadhor, Abdullah Al Hejaili, Zuzana Stolicna:
Improving Smart Grids Security: An Active Learning Approach for Smart Grid-Based Energy Theft Detection. IEEE Access 12: 1706-1717 (2024) - Majed Mohammed Aborokbah:
A Novel Intrusion Detection Model for Enhancing Security in Smart City. IEEE Access 12: 107431-107444 (2024) - Fahad F. Alruwaili, Manal Abdullah Alohali, Nouf Aljaffan, Asma Alhashmi, Ahmed Mahmud, Mohammed Assiri:
A Decentralized Approach to Smart Home Security: Blockchain With Red-Tailed Hawk-Enabled Deep Learning. IEEE Access 12: 14146-14156 (2024) - Giovanni Battista Gaggero, Alessandro Armellin, Giancarlo Portomauro, Mario Marchese:
Industrial Control System-Anomaly Detection Dataset (ICS-ADD) for Cyber-Physical Security Monitoring in Smart Industry Environments. IEEE Access 12: 64140-64149 (2024) - Premanand Pralhad Ghadekar, Manas Ranjan Pradhan, Debabrata Swain, Biswaranjan Acharya:
EmoSecure: Enhancing Smart Home Security With FisherFace Emotion Recognition and Biometric Access Control. IEEE Access 12: 93133-93144 (2024) - Mohsen Khalaf, Abdelrahman Ayad, Mosaddek Hossain Kamal Tushar, Marthe Kassouf, Deepa Kundur:
A Survey on Cyber-Physical Security of Active Distribution Networks in Smart Grids. IEEE Access 12: 29414-29444 (2024) - Soonbeom Kwon, Hwansoo Lee:
Willingness to Pay for Smart Car Security. IEEE Access 12: 33867-33875 (2024) - Arunkumar Muniswamy, R. Rathi:
A Detailed Review on Enhancing the Security in Internet of Things-Based Smart City Environment Using Machine Learning Algorithms. IEEE Access 12: 120389-120413 (2024) - Ghazaleh Sarbishaei, Amir Masoud Aminian-Modarres, Farahnaz Jowshan, Fateme Zahra Khakzad, Hasti Mokhtari:
Smart Home Security: An Efficient Multi-Factor Authentication Protocol. IEEE Access 12: 106253-106272 (2024) - Sankaramoorthy Muthubalaji, Naresh Kumar Muniyaraj, Sarvade Pedda Venkata Subba Rao, Kavitha Thandapani, Pasupuleti Rama Mohan, Thangam Somasundaram, Yousef Farhaoui:
An Intelligent Big Data Security Framework Based on AEFS-KENN Algorithms for the Detection of Cyber-Attacks from Smart Grid Systems. Big Data Min. Anal. 7(2): 399-418 (2024) - Pengfei Yang:
Electric vehicle based smart cloud model cyber security analysis using fuzzy machine learning with blockchain technique. Comput. Electr. Eng. 115: 109111 (2024) - Zhuang Yang:
Renewable energy management in smart grid with cloud security analysis using multi agent machine learning model. Comput. Electr. Eng. 116: 109177 (2024) - Tao Hai, Arindam Sarkar, Muammer Aksoy, Rahul Karmakar, Sarbajit Manna, Amrita Prasad:
Elevating security and disease forecasting in smart healthcare through artificial neural synchronized federated learning. Clust. Comput. 27(6): 7889-7914 (2024) - Kamta Nath Mishra, Vandana Bhattacharjee, Shashwat Saket, Shivam P. Mishra:
Security provisions in smart edge computing devices using blockchain and machine learning algorithms: a novel approach. Clust. Comput. 27(1): 27-52 (2024) - Mouaad Mohy-Eddine, Azidine Guezzaz, Said Benkirane, Mourade Azrour:
Malicious detection model with artificial neural network in IoT-based smart farming security. Clust. Comput. 27(6): 7307-7322 (2024) - Edgar Batista, Pablo López-Aguilar, Agusti Solanas:
Smart Health in the 6G Era: Bringing Security to Future Smart Health Services. IEEE Commun. Mag. 62(6): 74-80 (2024) - Ashley Allen, Alexios Mylonas, Stilianos Vidalis, Dimitris Gritzalis:
Smart homes under siege: Assessing the robustness of physical security against wireless network attacks. Comput. Secur. 139: 103687 (2024) - Yu Cao, Ang Yang, Hanning Li, Qingcheng Zeng, Jing Gao:
A comprehensive knowledge map for AI improving security management of cyber-physical system enabled smart manufacturing. Comput. Secur. 137: 103650 (2024) - Yusuf Mothanna, Wael Elmedany, Mustafa Hammad, Riadh Ksantini, Mhd Saeed Sharif:
Adopting security practices in software development process: Security testing framework for sustainable smart cities. Comput. Secur. 144: 103985 (2024) - Hema Shekhawat, Daya Sagar Gupta:
A survey on lattice-based security and authentication schemes for smart-grid networks in the post-quantum era. Concurr. Comput. Pract. Exp. 36(14) (2024) - Oleksandr Kuznetsov, Nikolay Poluyanenko, Emanuele Frontoni, Sergey Kandiy:
Enhancing Smart Communication Security: A Novel Cost Function for Efficient S-Box Generation in Symmetric Key Cryptography. Cryptogr. 8(2): 17 (2024) - Youssef Yamout, Tashaffi Samin Yeasar, Shahrear Iqbal, Mohammad Zulkernine:
Beyond Smart Homes: An In-Depth Analysis of Smart Aging Care System Security. ACM Comput. Surv. 56(2): 45:1-45:35 (2024) - Batoul Achaal, Mehdi Adda, Maxime Berger, Hussein Ibrahim, Ali Awde:
Study of smart grid cyber-security, examining architectures, communication networks, cyber-attacks, countermeasure techniques, and challenges. Cybersecur. 7(1): 10 (2024) - Pankaj Sharma, Lalit Kumar Awasthi:
Unveiling the hidden dangers: Security risks and forensic analysis of smart bulbs. Forensic Sci. Int. Digit. Investig. 50: 301794 (2024) - Tengyun Jiao, Zhiyu Xu, Minfeng Qi, Sheng Wen, Yang Xiang, Gary Nan:
A Survey of Ethereum Smart Contract Security: Attacks and Detection. Distributed Ledger Technol. Res. Pract. 3(3): 23:1-23:28 (2024) - Retraction Note: Hybrid traffic security shaping scheme combining TAS and CQSF of time-sensitive networks in smart grid. EURASIP J. Wirel. Commun. Netw. 2024(1): 25 (2024)
- Nasour Bagheri, Ygal Bendavid, Masoumeh Safkhani, Samad Rostampour:
Smart Grid Security: A PUF-Based Authentication and Key Agreement Protocol. Future Internet 16(1): 9 (2024)
skipping 2,624 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-27 09:32 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint