Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 60 matches
- 2017
- Ali Abbasi, Jos Wetzels, Wouter Bokslag, Emmanuele Zambon, Sandro Etalle:
\mu Shield - Configurable Code-Reuse Attacks Mitigation For Embedded Systems. NSS 2017: 694-709 - Tahmina Ahmed, Ravi S. Sandhu:
Safety of ABAC _\alpha Is Decidable. NSS 2017: 257-272 - Mohammed Al-Janabi, Peter Andras:
A Systematic Analysis of Random Forest Based Social Media Spam Classification. NSS 2017: 427-438 - Smriti Bhatt, Farhan Patwa, Ravi S. Sandhu:
Access Control Model for AWS Internet of Things. NSS 2017: 721-736 - Hanlu Chen, Yulong Fu, Zheng Yan:
Survey on Big Data Analysis Algorithms for Network Security Measurement. NSS 2017: 128-142 - Yun Chen, Kun Lv, Changzhen Hu:
Optimal Attack Path Generation Based on Supervised Kohonen Neural Network. NSS 2017: 399-412 - Chia-Mei Chen, Gu Hsin Lai, Yen-Chih Kuo, Tan-Ho Chang:
Improving Alert Accuracy for Smart Vehicles. NSS 2017: 623-631 - Deepak Kumar Dalai, Dibyendu Roy:
A State Recovery Attack on ACORN-v1 and ACORN-v2. NSS 2017: 332-345 - Deepak Kumar Dalai, Pinaki Sarkar:
Enhancing Resilience of KPS Using Bidirectional Hash Chains and Application on Sensornet. NSS 2017: 683-693 - Yajie Dong, Zhenyan Liu, Yida Yan, Yong Wang, Tu Peng, Ji Zhang:
Machine Learning for Analyzing Malware. NSS 2017: 386-398 - Patrick Eitschberger, Jörg Keller, Simon Holmbacka:
Hardware and Software Support for Transposition of Bit Matrices in High-Speed Encryption. NSS 2017: 160-168 - Keita Emura:
A Generic Construction of Secure-Channel Free Searchable Encryption with Multiple Keywords. NSS 2017: 3-18 - Noria Foukia, David Billard, Eduardo Solana:
Privacy Verification Chains for IoT. NSS 2017: 737-752 - Fakher Ben Ftima, Kamel Karoui, Henda Ben Ghézala:
A Formal Approach for Network Security Policy Relevancy Checking. NSS 2017: 555-564 - Amirhossein Gharib, Ali A. Ghorbani:
DNA-Droid: A Real-Time Android Ransomware Detection Framework. NSS 2017: 184-198 - Jialu Hao, Jian Liu, Hong Rong, Huimei Wang, Ming Xian:
OE-CP-ABE: Over-Encryption Based CP-ABE Scheme for Efficient Policy Updating. NSS 2017: 499-509 - Fannv He, Yuqing Zhang, Donghang Liu, Ying Dong, Caiyun Liu, Chensi Wu:
Mixed Wavelet-Based Neural Network Model for Cyber Security Situation Prediction Using MODWT and Hurst Exponent Analysis. NSS 2017: 99-111 - Leo Hippelainen, Ian Oliver, Shankar Lal:
Towards Dependably Detecting Geolocation of Cloud Servers. NSS 2017: 643-656 - Silke Holtmanns, Yoan Miche, Ian Oliver:
Subscriber Profile Extraction and Modification via Diameter Interconnection. NSS 2017: 585-594 - Lauri Isotalo:
5G Slicing as a Tool to Test User Equipment Against Advanced Persistent Threats. NSS 2017: 595-603 - Elena Ivannikova, Mikhail Zolotukhin, Timo Hämäläinen:
Probabilistic Transition-Based Approach for Detecting Application-Layer DDoS Attacks in Encrypted Software-Defined Networks. NSS 2017: 531-543 - Lijun Jiang, Weizhi Meng, Yu Wang, Chunhua Su, Jin Li:
Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones: A Pilot Study. NSS 2017: 199-213 - Igor Kabashkin:
Risk Modelling of Blockchain Ecosystem. NSS 2017: 59-70 - Joona Kannisto, Jarmo Harju:
The Time Will Tell on You: Exploring Information Leaks in SSH Public Key Authentication. NSS 2017: 301-314 - Jayaprakash Kar:
Cryptanalysis and Improvement of an Identity-Based Proxy Multi-signature Scheme. NSS 2017: 291-300 - Mohsin Khan, Valtteri Niemi:
Concealing IMSI in 5G Network Using Identity Based Encryption. NSS 2017: 544-554 - Jing Li, Lihua Yin, Yunchuan Guo, Chao Li, Fenghua Li, Lihua Chen:
A Novel Threat-Driven Data Collection Method for Resource-Constrained Networks. NSS 2017: 486-496 - Lulu Liang, Kai Zheng, Qiankun Sheng, Wei Wang, Rong Fu, Xin Huang:
A Denial of Service Attack Method for IoT System in Photovoltaic Energy System. NSS 2017: 613-622 - Donghang Liu, Lihua Dong, Shaoqing Lv, Ying Dong, Fannv He, Chensi Wu, Yuqing Zhang, Hua Ma:
A Novel Approach to Network Security Situation Assessment Based on Attack Confidence. NSS 2017: 450-463 - Rui Ma, Siyu Chen, Ke Ma, Changzhen Hu, Xiajing Wang:
Defenses Against Wormhole Attacks in Wireless Sensor Networks. NSS 2017: 413-426
skipping 30 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-19 13:24 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint