default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 445 matches
- 2017
- Ahmed O. Aseeri, Nuttapong Netjinda, Rattikorn Hewett:
Alleviating eavesdropping attacks in software-defined networking data plane. CISRC 2017: 1:1-1:8 - Anna L. Buczak, Daniel S. Berman, Sean W. Yen, Lanier A. Watkins, Lien T. Duong, Jeffrey S. Chavis:
Using sequential pattern mining for common event format (CEF) cyber data. CISRC 2017: 2:1-2:4 - Micah Bushouse, Sanghyun Ahn, Douglas S. Reeves:
Arav: monitoring a cloud's virtual routers. CISRC 2017: 3:1-3:8 - Lahiru S. Gallege, Rajeev R. Raje:
Parallel methods for evidence and trust based selection and recommendation of software apps from online marketplaces. CISRC 2017: 4:1-4:8 - Maheedhar Gunasekharan, Samik Basu, Ganesh Ram Santhanam:
Selecting the minimal set of preferred responses to counter detected intrusions. CISRC 2017: 5:1-5:8 - Russell Harkanson, Yoohwan Kim:
Applications of elliptic curve cryptography: a light introduction to elliptic curves and a survey of their applications. CISRC 2017: 6:1-6:7 - Zachary Hill, Samuel Chen, Donald Wall, Mauricio Papa, John Hale, Peter J. Hawrylak:
Simulation and analysis framework for cyber-physical systems. CISRC 2017: 7:1-7:4 - Kelly M. T. Huffer, Joel W. Reed:
Situational awareness of network system roles (SANSR). CISRC 2017: 8:1-8:4 - Ahmad Mansour, Andrew Davis, Matthew Wagner, Richard Bassous, Huirong Fu, Ye Zhu:
Multi-asymmetric cryptographic RSA scheme. CISRC 2017: 9:1-9:8 - Brendan Mattina, Franki Yeung, Alex Hsu, Dale Savoy, Joseph G. Tront, David R. Raymond:
MARCS: mobile augmented reality for cybersecurity. CISRC 2017: 10:1-10:4 - Michael Roy Moore, Robert A. Bridges, Frank L. Combs, Michael S. Starr, Stacy J. Prowell:
Modeling inter-signal arrival times for accurate detection of CAN bus signal injection attacks: a data-driven approach to in-vehicle intrusion detection. CISRC 2017: 11:1-11:4 - Will Nichols, Peter J. Hawrylak, John Hale, Mauricio Papa:
Introducing priority into hybrid attack graphs. CISRC 2017: 12:1-12:4 - Ahmet Okutan, Shanchieh Jay Yang, Katie McConky:
Predicting cyber attacks with bayesian networks using unconventional signals. CISRC 2017: 13:1-13:4 - Amar A. Rasheed, A. Kenneth, Rabi N. Mahapatra, Deepak Puthal:
Private matching and set intersection computation in multi-agent and industrial control systems. CISRC 2017: 14:1-14:6 - Christopher A. Rouff, M. Douglas Williams, Qinqing Zhang, Daniel J. Bennett, Raymond C. McDowell, Anthony R. Nowicki, J. Aaron Pendergrass, Daniel R. Anderson, Robert Douglass, Bradley T. Dufresne, Jonathan T. Pham:
Automatic generation of network element software (AGNES): short paper. CISRC 2017: 15:1-15:4 - Himanshu Thapliyal, T. S. S. Varun, S. Dinesh Kumar:
UTB-SOI based adiabatic computing for low-power and secure IoT devices. CISRC 2017: 16:1-16:4 - Jagannadh Vempati, Mark A. Thompson, Ram Dantu:
Feedback control for resiliency in face of an attack. CISRC 2017: 17:1-17:7 - Gordon Werner, Shanchieh Jay Yang, Katie McConky:
Time series forecasting of cyber attack intensity. CISRC 2017: 18:1-18:3 - Joseph P. Trien, Stacy J. Prowell, John R. Goodall, Justin M. Beaver, Robert A. Bridges:
Proceedings of the 12th Annual Conference on Cyber and Information Security Research, CISRC 2017, Oak Ridge, TN, USA, April 4 - 6, 2017. ACM 2017, ISBN 978-1-4503-4855-3 [contents] - 2016
- Mustafa Atici:
Efficient Algorithm to Construct Perfect Secret Sharing Scheme for a Given Access Structure. CISRC 2016: 2:1-2:7 - Michael Atighetchi, Borislava I. Simidchieva, Marco M. Carvalho, David Last:
Experimentation Support for Cyber Security Evaluations. CISRC 2016: 5:1-5:7 - Anna L. Buczak, Paul A. Hanke, George J. Cancro, Michael K. Toma, Lanier A. Watkins, Jeffrey S. Chavis:
Detection of Tunnels in PCAP Data by Random Forests. CISRC 2016: 16:1-16:4 - Bertrand Cambou, Marius Orlowski:
PUF designed with Resistive RAM and Ternary States. CISRC 2016: 1:1-1:8 - Michele Co, Jack W. Davidson, Jason D. Hiser, John C. Knight, Anh Nguyen-Tuong, Westley Weimer, Jonathan Burket, Gregory L. Frazier, Tiffany M. Frazier, Bruno Dutertre, Ian A. Mason, Natarajan Shankar, Stephanie Forrest:
Double Helix and RAVEN: A System for Cyber Fault Tolerance and Recovery. CISRC 2016: 17:1-17:4 - Kyle Cook, Thomas Shaw, Peter J. Hawrylak, John Hale:
Scalable Attack Graph Generation. CISRC 2016: 21:1-21:4 - John Dombrowski, Todd R. Andel, Jeffrey Todd McDonald:
The Application of Moving Target Defense to Field Programmable Gate Arrays. CISRC 2016: 20:1-20:4 - Erik M. Ferragut, Andrew C. Brady, Ethan J. Brady, Jacob M. Ferragut, Nathan M. Ferragut, Max C. Wildgruber:
HackAttack: Game-Theoretic Analysis of Realistic Cyber Conflicts. CISRC 2016: 8:1-8:8 - Lahiru S. Gallege, Rajeev R. Raje:
Towards Selecting and Recommending Online Software Services by Evaluating External Attributes. CISRC 2016: 23:1-23:4 - Leonora Gerlock, Abhishek Parakh:
Linear Cryptanalysis of Quasigroup Block Cipher. CISRC 2016: 19:1-19:4 - Christopher R. Harshaw, Robert A. Bridges, Michael D. Iannacone, Joel W. Reed, John R. Goodall:
GraphPrints: Towards a Graph Analytic Method for Network Anomaly Detection. CISRC 2016: 15:1-15:4
skipping 415 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-29 05:15 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint