Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 90 matches
- 2020
- Michael Schwarz, Moritz Lipp, Claudio Canella, Robert Schilling, Florian Kargl, Daniel Gruss:
ConTExT: A Generic Approach for Mitigating Spectre. NDSS 2020 - Tianhao Wang, Milan Lopuhaä-Zwakenberg, Zitao Li, Boris Skoric, Ninghui Li:
Locally Differentially Private Frequency Estimation with Consistency. NDSS 2020 - Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Tatsuya Mori:
Melting Pot of Origins: Compromising the Intermediary Web Services that Rehost Websites. NDSS 2020 - Ting Chen, Rong Cao, Ting Li, Xiapu Luo, Guofei Gu, Yufei Zhang, Zhou Liao, Hang Zhu, Gang Chen, Zheyuan He, Yuxing Tang, Xiaodong Lin, Xiaosong Zhang:
SODA: A Generic Online Detection Framework for Smart Contracts. NDSS 2020 - Daniel Perez, Benjamin Livshits:
Broken Metre: Attacking Resource Metering in EVM. NDSS 2020 - Zhongjie Wang, Shitong Zhu, Yue Cao, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy, Kevin S. Chan, Tracy D. Braun:
SymTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Discovery. NDSS 2020 - Matthew Smith, Martin Strohmeier, Jon Harman, Vincent Lenders, Ivan Martinovic:
A View from the Cockpit: Exploring Pilot Reactions to Attacks on Avionic Systems. NDSS 2020 - Yang Zhang, Mathias Humbert, Bartlomiej Surma, Praveen Manoharan, Jilles Vreeken, Michael Backes:
Towards Plausible Graph Anonymization. NDSS 2020 - Hojjat Aghakhani, Fabio Gritti, Francesco Mecca, Martina Lindorfer, Stefano Ortolani, Davide Balzarotti, Giovanni Vigna, Christopher Kruegel:
When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features. NDSS 2020 - Naif Saleh Almakhdhub, Abraham A. Clements, Saurabh Bagchi, Mathias Payer:
µRAI: Securing Embedded Systems with Return Address Integrity. NDSS 2020 - Venkat Arun, Aniket Kate, Deepak Garg, Peter Druschel, Bobby Bhattacharjee:
Finding Safety in Numbers with Secure Allegation Escrows. NDSS 2020 - Giuseppe Ateniese, Long Chen, Mohammad Etemad, Qiang Tang:
Proof of Storage-Time: Efficiently Checking Continuous Data Availability. NDSS 2020 - Zhongjie Ba, Tianhang Zheng, Xinyu Zhang, Zhan Qin, Baochun Li, Xue Liu, Kui Ren:
Learning-based Practical Smartphone Eavesdropping with Built-in Accelerometer. NDSS 2020 - Alireza Bahramali, Amir Houmansadr, Ramin Soltani, Dennis Goeckel, Don Towsley:
Practical Traffic Analysis Attacks on Secure Messaging Applications. NDSS 2020 - Shivam Bhasin, Anupam Chattopadhyay, Annelie Heuser, Dirmanto Jap, Stjepan Picek, Ritu Ranjan Shrivastwa:
Mind the Portability: A Warriors Guide through Realistic Profiled Side-channel Analysis. NDSS 2020 - George Bissias, Brian Neil Levine:
Bobtail: Improved Blockchain Security with Low-Variance Mining. NDSS 2020 - Laura Blackstone, Seny Kamara, Tarik Moataz:
Revisiting Leakage Abuse Attacks. NDSS 2020 - William Blair, Andrea Mambretti, Sajjad Arshad, Michael Weissbacher, William Robertson, Engin Kirda, Manuel Egele:
HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing. NDSS 2020 - Jonas Böhler, Florian Kerschbaum:
Secure Sublinear Time Differentially Private Median Computation. NDSS 2020 - Jiahao Cao, Renjie Xie, Kun Sun, Qi Li, Guofei Gu, Mingwei Xu:
When Match Fields Do Not Need to Match: Buffered Packets Hijacking in SDN. NDSS 2020 - Harsh Chaudhari, Rahul Rachuri, Ajith Suresh:
Trident: Efficient 4PC Framework for Privacy Preserving Machine Learning. NDSS 2020 - Weikeng Chen, Raluca Ada Popa:
Metal: A Metadata-Hiding File-Sharing System. NDSS 2020 - Tao Chen, Longfei Shangguan, Zhenjiang Li, Kyle Jamieson:
Metamorph: Injecting Inaudible Commands into Over-the-air Voice Controlled Systems. NDSS 2020 - Ioannis Demertzis, Javad Ghareh Chamani, Dimitrios Papadopoulos, Charalampos Papamanthou:
Dynamic Searchable Encryption with Small Client Storage. NDSS 2020 - Aritra Dhar, Enis Ulqinaku, Kari Kostiainen, Srdjan Capkun:
ProtectIOn: Root-of-Trust for IO in Compromised Platforms. NDSS 2020 - Ren Ding, Hong Hu, Wen Xu, Taesoo Kim:
DESENSITIZATION: Privacy-Aware and Attack-Preserving Crash Report. NDSS 2020 - Yue Duan, Xuezixiang Li, Jinghan Wang, Heng Yin:
DeepBinDiff: Learning Program-Wide Code Representations for Binary Diffing. NDSS 2020 - Thijs van Ede, Riccardo Bortolameotti, Andrea Continella, Jingjing Ren, Daniel J. Dubois, Martina Lindorfer, David R. Choffnes, Maarten van Steen, Andreas Peter:
FlowPrint: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic. NDSS 2020 - Parinya Ekparinya, Vincent Gramoli, Guillaume Jourjon:
The Attack of the Clones Against Proof-of-Authority. NDSS 2020 - Paul Forney:
Overcoming the "Evil Twins" Attack: Lessons Learned from the Industrial Battlefield. NDSS 2020
skipping 60 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-24 15:13 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint