Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 51 matches
- 2009
- Haider Abbas, Louise Yngström, Ahmed Hemani:
Adaptability infrastructure for bridging IT security evaluation and options theory. SIN 2009: 39-45 - Iftikhar Ahmad, Azween B. Abdullah, Abdullah Sharaf Alghamdi:
Application of artificial neural network in detection of DOS attacks. SIN 2009: 229-234 - Serif Bahtiyar, Murat Cihan, Mehmet Ufuk Çaglayan:
An architectural approach for assessing system trust based on security policy specifications and security mechanisms. SIN 2009: 71-74 - Alexandr S. Basan, Lyudmila K. Babenko, Oleg B. Makarevich:
A model of mandatory access for current database management systems. SIN 2009: 67-70 - Elisa Bertino:
Assured information sharing: concepts and issues. SIN 2009: 19-20 - Kemal Bicakci:
Pushing the limits of one-time signatures. SIN 2009: 249-257 - Riccardo Bresciani, Andrew Butterfield:
Weakening the Dolev-Yao model through probability. SIN 2009: 293-297 - Francesco Buccafurri, Gianluca Caminiti, Gianluca Lax:
Fortifying the dalì attack on digital signature. SIN 2009: 278-287 - Erdal Cayirci:
Deployed sensor networks and their security challenges in practice. SIN 2009: 104 - Erdal Cayirci, Son Thanh Nguyen, Chunming Rong:
Secure many to many routing for wireless sensor and actuator networks. SIN 2009: 172-178 - Çagdas Cirit, Feza Buzluca:
A UML profile for role-based access control. SIN 2009: 83-92 - Gökhan Dalkiliç, Devrim Sipahi, Mehmet Hilal Özcanhan:
A simple yet effective spam blocking method. SIN 2009: 179-185 - Mahdi Dashtbozorgi, Mohammad Abdollahi Azgomi:
A scalable multi-core aware software architecture for high-performance network monitoring. SIN 2009: 117-122 - Moussa Amir Ehsan, Morteza Amini, Rasool Jalili:
A semantic-based access control mechanism using semantic technologies. SIN 2009: 258-267 - Atilla Elçi, Behnam Rahnama:
AWGN based seed for random noise generator in ParseKey+. SIN 2009: 244-248 - Jorge L. Hernandez-Ardieta, Ana Isabel González-Tablas Ferreres, Benjamín Ramos, Arturo Ribagorda:
Extended electronic signature policies. SIN 2009: 268-277 - Sorin Alexander Huss:
Embedded systems for IT security applications: properties and design considerations. SIN 2009: 138-142 - Sari Haj Hussein:
The hush cryptosystem. SIN 2009: 105-110 - Tomi O. Kelo, Jukka A. Koskinen:
Modeling network security competence for certification. SIN 2009: 30-38 - Jukka A. Koskinen, Tomi O. Kelo:
Pure e-learning course in information security. SIN 2009: 8-13 - Anna Kostina, Natalia G. Miloslavskaya, Alexander I. Tolstoy:
Information security incident management process. SIN 2009: 93-97 - Vladimir Kotenko, Alexey Evseev, Stas Kotenko, Konstantin E. Rumyantsev:
New approach to evaluate the effectiveness of the audio information protection for determining the identity of virtual speech images. SIN 2009: 235-239 - Vadim D. Kotov, Vladimir I. Vasilyev:
Artificial immune system based intrusion detection system. SIN 2009: 207-212 - Feodor Kulishov:
DFA-based and SIMD NFA-based regular expression matching on cell BE for fast network traffic filtering. SIN 2009: 123-127 - Naveen Kumar, Shrikant Ojha, Kritika Jain, Sangeeta Lal:
BEAN: a lightweight stream cipher. SIN 2009: 168-171 - Andrey P. Kurilo, Natalia G. Miloslavskaya, Svetlana Tolstaya:
Ensuring information security controls for the Russian banking organizations. SIN 2009: 56-60 - Vijay Laxmi, Mudassar N. Khan, Sarath S. Kumar, Manoj Singh Gaur:
Buyer seller watermarking protocol for digital rights management. SIN 2009: 298-301 - Lie Liu, Chun Yuan:
Trace and revoke systems with short ciphertexts. SIN 2009: 61-66 - Sumi M., Ebrahim A. Soujeri, Rahim Rajan, Harikrishnan A. I.:
Design of a zigbee-based RFID network for industry applications. SIN 2009: 111-116 - Ahmed Y. Mahmoud, Alexander G. Chefranov:
Hill cipher modification based on eigenvalues HCM-EE. SIN 2009: 164-167
skipping 21 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-02 20:06 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint