Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 56 matches
- 2017
- Balaji Arun, Sebastiano Peluso, Roberto Palmieri, Giuliano Losa, Binoy Ravindran:
Speeding up Consensus by Chasing Fast Decisions. DSN 2017: 49-60 - Marcus Brandenburger, Christian Cachin, Matthias Lorenz, Rüdiger Kapitza:
Rollback and Forking Detection for Trusted Execution Environments Using Lightweight Collective Memory. DSN 2017: 157-168 - Zhili Chen, Lin Chen, Hong Zhong:
Towards Secure and Verifiable Database-Driven Spectrum Sharing. DSN 2017: 285-296 - Ping Chen, Jun Xu, Zhisheng Hu, Xinyu Xing, Minghui Zhu, Bing Mao, Peng Liu:
What You See is Not What You Get! Thwarting Just-in-Time ROP with Chameleon. DSN 2017: 451-462 - Laurent Chuat, Adrian Perrig, Yih-Chun Hu:
Deadline-Aware Multipath Communication: An Optimization Problem. DSN 2017: 487-498 - Marcello Cinque, Raffaele Della Corte, Antonio Pecchia:
Entropy-Based Security Analytics: Measurements from a Critical Information System. DSN 2017: 379-390 - Paulo R. Coelho, Nicolas Schiper, Fernando Pedone:
Fast Atomic Multicast. DSN 2017: 37-48 - Guido Lena Cota, Sonia Ben Mokhtar, Gabriele Gianini, Ernesto Damiani, Julia Lawall, Gilles Muller, Lionel Brunie:
Analysing Selfishness Flooding with SEINE. DSN 2017: 603-614 - Sisi Duan, Michael K. Reiter, Haibin Zhang:
Secure Causal Atomic Broadcast, Revisited. DSN 2017: 61-72 - Daniel D. Dunn, Samuel A. Mitchell, Imran Sajjad, Ryan M. Gerdes, Rajnikant Sharma, Ming Li:
Regular: Attacker-Induced Traffic Flow Instability in a Stream of Semi-Automated Vehicles. DSN 2017: 499-510 - Birhanu Eshete, V. N. Venkatakrishnan:
DynaMiner: Leveraging Offline Infection Analytics for On-the-Wire Malware Detection. DSN 2017: 463-474 - Jingyao Fan, Qinghua Li, Guohong Cao:
Privacy Disclosure through Smart Meters: Reactive Power Based Attack and Defense. DSN 2017: 13-24 - Cheng Feng, Tingting Li, Deeph Chana:
Multi-level Anomaly Detection in Industrial Control Systems via Package Signatures and LSTM Networks. DSN 2017: 261-272 - Bernardo Ferreira, João Leitão, Henrique João L. Domingos:
Multimodal Indexable Encryption for Mobile Cloud-Based Applications. DSN 2017: 213-224 - Xing Gao, Zhongshu Gu, Mehmet Kayaalp, Dimitrios Pendarakis, Haining Wang:
ContainerLeaks: Emerging Security Threats of Information Leakages in Container Clouds. DSN 2017: 237-248 - Jinyu Gu, Zhichao Hua, Yubin Xia, Haibo Chen, Binyu Zang, Haibing Guan, Jinming Li:
Secure Live Migration of SGX Enclaves on Untrusted Cloud. DSN 2017: 225-236 - Yacong Gu, Kun Sun, Purui Su, Qi Li, Yemian Lu, Lingyun Ying, Dengguo Feng:
JGRE: An Analysis of JNI Global Reference Exhaustion Vulnerabilities in Android. DSN 2017: 427-438 - Rachid Guerraoui, Anne-Marie Kermarrec, Rhicheek Patra, Mahammad Valiyev, Jingjing Wang:
I Know Nothing about You But Here is What You Might Like. DSN 2017: 439-450 - William H. Hawkins, Jason D. Hiser, Michele Co, Anh Nguyen-Tuong, Jack W. Davidson:
Zipr: Efficient Static Binary Rewriting for Security. DSN 2017: 559-566 - Md. Endadul Hoque, Omar Chowdhury, Sze Yiu Chau, Cristina Nita-Rotaru, Ninghui Li:
Analyzing Operational Behavior of Stateful Protocol Implementations for Detecting Semantic Bugs. DSN 2017: 627-638 - Amin Jadidi, Mohammad Arjomand, Mohammad Khavari Tavana, David R. Kaeli, Mahmut T. Kandemir, Chita R. Das:
Exploring the Potential for Collaborative Data Compression and Hard-Error Tolerance in PCM Memories. DSN 2017: 85-96 - Jinyuan Jia, Binghui Wang, Neil Zhenqiang Gong:
Random Walk Based Fake Account Detection in Online Social Networks. DSN 2017: 273-284 - Amit Klein, Haya Schulmann, Michael Waidner:
Counting in the Dark: DNS Caches Discovery and Enumeration in the Internet. DSN 2017: 367-378 - Benjamin Kollenda, Enes Göktas, Tim Blazytko, Philipp Koppe, Robert Gawlik, Radhesh Krishnan Konoth, Cristiano Giuffrida, Herbert Bos, Thorsten Holz:
Towards Automated Discovery of Crash-Resistant Primitives in Binary Executables. DSN 2017: 189-200 - Jinkyu Koo, Xiaojun Lin, Saurabh Bagchi:
RL-BLH: Learning-Based Battery Control for Cost Savings and Privacy Preservation for Smart Meters. DSN 2017: 519-530 - Varun Badrinath Krishna, Michael J. Rausch, Benjamin E. Ujcich, Indranil Gupta, William H. Sanders:
REMAX: Reachability-Maximizing P2P Detection of Erroneous Readings in Wireless Sensor Networks. DSN 2017: 321-332 - Julia Lawall, Gilles Muller:
JMake: Dependable Compilation for Kernel Janitors. DSN 2017: 357-366 - Seunghyeon Lee, Jinwoo Kim, Seungwon Shin, Phillip A. Porras, Vinod Yegneswaran:
Athena: A Framework for Scalable Anomaly Detection in Software-Defined Networks. DSN 2017: 249-260 - Wei-Han Lee, Ruby B. Lee:
Implicit Smartphone User Authentication with Sensors and Contextual Machine Learning. DSN 2017: 297-308 - Wei-Han Lee, Ruby B. Lee:
Sensor-Based Implicit Authentication of Smartphone Users. DSN 2017: 309-320
skipping 26 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-19 05:27 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint