Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 29 matches
- 2011
- Faraz Ahmed, M. Zubair Rafique, Muhammad Abulaish:
A Data Mining Framework for Securing 3G Core Network from GTP Fuzzing Attacks. ICISS 2011: 280-293 - Prithu Banerjee, Mahasweta Mitra, Ferdous A. Barbhuiya, Sandip Chakraborty, Sukumar Nandi:
An Efficient Decentralized Rekeying Scheme to Secure Hierarchical Geographic Multicast Routing in Wireless Sensor Networks. ICISS 2011: 294-308 - Atanu Basu, Indranil Sengupta, Jamuna Kanta Sing:
Secured Cloud Storage Scheme Using ECC Based Key Management in User Hierarchy. ICISS 2011: 175-189 - Pieter Burghouwt, Marcel E. M. Spruit, Henk J. Sips:
Towards Detection of Botnet Communication through Social Media by Monitoring User Activity. ICISS 2011: 131-143 - Lorenzo Cavallaro, R. Sekar:
Taint-Enhanced Anomaly Detection. ICISS 2011: 160-174 - Apurba Das, Subhamoy Maitra, Goutam Paul, Santanu Sarkar:
Some Combinatorial Results towards State Recovery Attack on RC4. ICISS 2011: 204-214 - Anupam Datta, Jeremiah Blocki, Nicolas Christin, Henry DeYoung, Deepak Garg, Limin Jia, Dilsun Kirli Kaynar, Arunesh Sinha:
Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms. ICISS 2011: 1-27 - William Enck:
Defending Users against Smartphone Apps: Techniques and Future Directions. ICISS 2011: 49-70 - Olga Gadyatskaya, Eduardo Lostal, Fabio Massacci:
Load Time Security Verification. ICISS 2011: 250-264 - Dimitris Geneiatakis, Georgios Portokalidis, Angelos D. Keromytis:
A Multilayer Overlay Network Architecture for Enhancing IP Services Availability against DoS. ICISS 2011: 322-336 - Vipul Goyal:
Secure Composition of Cryptographic Protocols. ICISS 2011: 71 - Indivar Gupta, P. K. Saxena:
Distributed Signcryption from Pairings. ICISS 2011: 215-234 - Puneet Gupta, Scott D. Stoller, Zhongyuan Xu:
Abductive Analysis of Administrative Policies in Rule-Based Access Control. ICISS 2011: 116-130 - Yan Huang, Chih-Hao Shen, David Evans, Jonathan Katz, Abhi Shelat:
Efficient Secure Computation with Garbled Circuits. ICISS 2011: 28-48 - Mathieu Jaume, Valérie Viet Triem Tong, Ludovic Mé:
Flow Based Interpretation of Access Control: Detection of Illegal Information Flows. ICISS 2011: 72-86 - Ram Krishnan, Ravi S. Sandhu:
Authorization Policy Specification and Enforcement for Group-Centric Secure Information Sharing. ICISS 2011: 102-115 - Winfried E. Kühnhauser, Anja Pölck:
Towards Access Control Model Engineering. ICISS 2011: 379-382 - Federico Maggi, Andrea Bellini, Guido Salvaneschi, Stefano Zanero:
Finding Non-trivial Malware Naming Inconsistencies. ICISS 2011: 144-159 - Tanusha S. Nadkarni, Radhesh Mohandas, Alwyn R. Pais:
IFrandbox - Client Side Protection from Malicious Injected Iframes. ICISS 2011: 383-386 - Ruchira Naskar, Rajat Subhra Chakraborty:
Reversible Image Watermarking through Coordinate Logic Operation Based Prediction. ICISS 2011: 190-203 - Morteza Noferesti, Mohammad Ali Hadavi, Rasool Jalili:
A Signature-Based Approach of Correctness Assurance in Data Outsourcing Scenarios. ICISS 2011: 374-378 - Harini Ragavan, Brajendra Panda:
Mitigation of Malicious Modifications by Insiders in Databases. ICISS 2011: 337-351 - Anuj Shanker Saxena, Mayank Pundir, Vikram Goyal, Debajyoti Bera:
Preserving Location Privacy for Continuous Queries on Known Route. ICISS 2011: 265-279 - Christian A. Schneider, Jonas Pfoh, Claudia Eckert:
A Universal Semantic Bridge for Virtual Machine Introspection. ICISS 2011: 370-373 - Filippo Del Tedesco, Sebastian Hunt, David Sands:
A Semantic Hierarchy for Erasure Policies. ICISS 2011: 352-369 - Julien A. Thomas, Frédéric Cuppens, Nora Cuppens-Boulahia:
Consistency Policies for Dynamic Information Systems with Declassification Flows. ICISS 2011: 87-101 - Meilof Veeningen, Benne de Weger, Nicola Zannone:
Formal Privacy Analysis of Communication Protocols for Identity Management. ICISS 2011: 235-249 - Ravi Shankar Yadav, Praveen Likhar, M. Keshava Rao:
SecWEM: A Security Solution for Web Based E-mail. ICISS 2011: 309-321 - Sushil Jajodia, Chandan Mazumdar:
Information Systems Security - 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings. Lecture Notes in Computer Science 7093, Springer 2011, ISBN 978-3-642-25559-5 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-20 01:36 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint