Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 62 matches
- 2012
- Kuinam J. Kim, Seong-Jin Ahn:
Proceedings of the International Conference on IT Convergence and Security, ICITCS 2011, Suwon, Korea, December 14-16, 2011. Lecture Notes in Electrical Engineering 120, Springer 2012, ISBN 978-94-007-2910-0 [contents] - 2011
- Hyochang Ahn, Yong-Hwan Lee, Han-Jin Cho, Sang-Burm Rhee, June-Hwan Lee:
A RSSI-Based Approach for Localization of Wireless Sensor Network in Indoor. ICITCS 2011: 123-127 - Mohamed Ahmed Mohamed Ali, Mohd Aizaini Maarof:
Malware Detection Techniques Using Artificial Immune System. ICITCS 2011: 575-587 - Muhammad Arshad Awan, Abdul Sattar, Cheong Ghil Kim, Chung-Pyo Hong, Shin-Dug Kim:
Semantic Search and Retrieval System for Learning Objects. ICITCS 2011: 129-143 - Su-Jin Baek, Jung-Soo Han, Young-Jae Song:
Security Threat Modeling and Requirement Analysis Method Based on Goal-Scenario. ICITCS 2011: 419-423 - Su-Jin Baek, Jong-Won Ko, Gui-Jung Kim, Jung-Soo Han, Young-Jae Song:
Goal-Heuristic Analysis Method for an Adaptive Process Mining. ICITCS 2011: 409-418 - Sang-Jin Cha, Gahee Kim, Chol-Hee Jang, GeunSik Jo:
An Effective Learning Method in Art Using Virtual Reality and Ontology. ICITCS 2011: 425-434 - ByungRae Cha, JaeHyun Seo, JongWon Kim:
Design of Attribute-Based Access Control in Cloud Computing Environment. ICITCS 2011: 41-50 - In-Pyo Cho, So-Hyang Ko, Hoon-Mo Yang, Cheong-Ghil Kim, Shin-Dug Kim:
A Dynamic Buffer Management of Hybrid Solid State Disk for Media Applications. ICITCS 2011: 267-279 - Gi-Hwan Cho, Seung-Ah Lee:
A Secure Service Framework for Handling Security Critical Data on the Public Cloud. ICITCS 2011: 3-12 - Hun Choi, Yoo-Jung Choi, Ki-Mun Kim:
The Understanding of Building Trust Model on Smartphone Application: Focusing on Users' Motivation. ICITCS 2011: 13-20 - Inhwan Choi, Dongkun Shin:
Wear Leveling for PCM Using Hot Data Identification. ICITCS 2011: 145-149 - Kyung-Yong Chung, Kee-Wook Rim, Jung-Hyun Lee:
Performance Sensibility Influence of Recommended Makeup Styles. ICITCS 2011: 445-454 - André van Cleeff, Trajce Dimkov, Wolter Pieters, Roel J. Wieringa:
Realizing Security Requirements with Physical Properties: A Case Study on Paper Voting. ICITCS 2011: 51-67 - Kyoung-Soo Han, Kyoung-Yong Chung, Eul Gyu Im:
A Study on Instruction Substitution Analysis of Metamorphic Malware. ICITCS 2011: 595-599 - Kyoung-Soo Han, Eul Gyu Im:
A Survey on P2P Botnet Detection. ICITCS 2011: 589-593 - Kyoung-Soo Han, In-Kyoung Kim, Eul Gyu Im:
Detection Methods for Malware Variant Using API Call Related Graphs. ICITCS 2011: 607-611 - Kyoung-Soo Han, In-Kyoung Kim, Eul Gyu Im:
Malware Classification Methods Using API Sequence Characteristics. ICITCS 2011: 613-626 - Chung-Pyo Hong, Muhammad Arshad Awan, Cheong-Ghil Kim, Shin-Dug Kim:
An Efficient Live Stream Community Management Scheme for the Mobile. ICITCS 2011: 281-293 - Yi-Chang Hsu, Jing-Jang Hwang:
Controlling Decryption of Personal Health Records in the Cloud. ICITCS 2011: 69-79 - Hyun Yoo, Hoill Jung, Kyung-Yong Chung:
Development of Pain Prescription Decision Systems for Nursing Intervention. ICITCS 2011: 435-444 - Eul Gyu Im, Kyoung-Soo Han:
An Analysis of Malware Attached in Spam. ICITCS 2011: 601-605 - Young-Joon Jang, Dongkun Shin:
HARD: Host-Level Address Remapping Driver for Solid-State Disk. ICITCS 2011: 163-168 - Sun-Moon Jo, Kyung-Yong Chung:
Access Control Mechanism for XML Document. ICITCS 2011: 81-90 - Sung-Kwan Kang, Kyung-Yong Chung, Kee-Wook Rim, Jung-Hyun Lee:
Development of Real-Time Gesture Recognition System Using Visual Interaction. ICITCS 2011: 295-306 - Abdul Raouf Khan:
Architecture of Image Encryption Hardware Using Two Dimensional Cellular Automata. ICITCS 2011: 307-315 - Sung-Ho Kim:
Development of Real-Time Location-Based Multimedia Style Slop Information Retrieval System. ICITCS 2011: 331-335 - Hyun-Jun Kim:
Affective Social Network. ICITCS 2011: 455-461 - Hyun-Jun Kim:
Discovering Knowledge Flow in Social Network. ICITCS 2011: 469-477 - Sunhoe Kim:
Fuel Cell System Control Algorithm for Stable Operation of Residential Fuel Cell System. ICITCS 2011: 557-560
skipping 32 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-05 03:33 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint