default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 2,289 matches
- 2023
- Carlo Adornetto, Antonella Guzzo, Andrea Vasile:
Automatic Medical Report Generation via Latent Space Conditioning and Transformers. DASC/PiCom/CBDCom/CyberSciTech 2023: 428-435 - Chidi Agbo, Hoda Mehrpouyan:
Resilience of Industrial Control Systems Using Signal Temporal Logic And Autotuning Mechanism. DASC/PiCom/CBDCom/CyberSciTech 2023: 284-293 - Najeebuddin Ahmed, Hassan Naser, Amir Ameli:
Fault Detection and Mitigation in Vehicle Platooning. DASC/PiCom/CBDCom/CyberSciTech 2023: 868-873 - Mahmoud AlJamal, Ala Mughaid, Rabee Alqura'n, Muder Almiani, Shadi AlZu'bi:
Simulated Model for Preventing IoT Fake Clients over the Smart Cities Environment. DASC/PiCom/CBDCom/CyberSciTech 2023: 757-761 - Jamal N. Al-Karaki, Awni Itradat, Selam Mekonen:
Immersive Cybersecurity Teaching/Training Using Gamification on the Metaverse: A Hands-On Case Study. DASC/PiCom/CBDCom/CyberSciTech 2023: 101-108 - Nadia Mohammed Al-Nowfleh, Nidal A. Al-Dmour, Hussam M. N. Al Hamadi, Fatma Taher, Taher M. Ghazal:
Review of Fundamental, Security, and Privacy in Metaverse. DASC/PiCom/CBDCom/CyberSciTech 2023: 408-414 - Mohammed M. Alani, Atefeh Mashatan, Ali Miri:
Explainable Ensemble-Based Detection of Cyber Attacks on Internet of Medical Things. DASC/PiCom/CBDCom/CyberSciTech 2023: 609-614 - Khalid Ali, Manar Jammal:
ML-Based Dynamic Scaling and Traffic Forecasting for 5G O-RAN. DASC/PiCom/CBDCom/CyberSciTech 2023: 444-451 - Mina Alishahi, Vahideh Moghtadaiee:
Feature Selection on Anonymized Datasets. DASC/PiCom/CBDCom/CyberSciTech 2023: 852-859 - Aisha Almaazmi, Shadi Atalla, Hamzah Ali Alkhazaleh, Wathiq Mansoor, Amjad Gawanmeh:
Predicting Student Dropout in Online Learning Platforms Using Deep Learning Techniques. DASC/PiCom/CBDCom/CyberSciTech 2023: 1107-1114 - Rahaf Adam Alnuaimi, Moatsum Alawida:
Understanding Cyberterrorism: Exploring Threats, Tools, and Statistical Trends. DASC/PiCom/CBDCom/CyberSciTech 2023: 1155-1162 - Moayad Aloqaily:
Message from the Executive General Chair. DASC/PiCom/CBDCom/CyberSciTech 2023: 1 - Zain Ahmed Alrahmani, Khaled Elleithy:
DDoS Attack Forecasting Using Transformers. DASC/PiCom/CBDCom/CyberSciTech 2023: 911-915 - Janete Amaral, Alberto Sampaio Lima, José Neuman de Souza, José Antão Beltrão Moura:
An Architecture for Predictive Resource Allocation in Cloud Capacity Management Using Neural Networks. DASC/PiCom/CBDCom/CyberSciTech 2023: 1130-1136 - Ewerton R. Andrade, Cristiano Coimbra Goes, João Bezerra Da R. Neto, César Augusto De S. Pastorini, Janislley Oliveira de Sousa:
Experimental Evaluation and Expansion Suggestion of Digital Signatures Available on OP-TEE. DASC/PiCom/CBDCom/CyberSciTech 2023: 69-76 - Obed Appiah, Wafa Elmannai:
A Smart Cane with Fall Detection System for People with Visual Impairments. DASC/PiCom/CBDCom/CyberSciTech 2023: 1010-1015 - Nancy A. Arafa, Saied M. Abd El-atty, Diana W. Dawoud, Mohamed S. Arafa:
Secrecy Capacity Evaluation for Vehicular Network Based on VLC. DASC/PiCom/CBDCom/CyberSciTech 2023: 1088-1093 - Alì Aghazadeh Ardebili, Antonella Longo, Antonio Ficarella:
Digital Twinning of PV Modules for Smart Systems - A Comparison Between Commercial and Open-Source Simulation Models. DASC/PiCom/CBDCom/CyberSciTech 2023: 1045-1050 - Afnan Asasfeh, Nidal A. Al-Dmour, Hussam M. N. Al Hamadi, Wathiq Mansoor, Taher M. Ghazal:
Exploring Cyber Investigators: An In-Depth Examination of the Field of Digital Forensics. DASC/PiCom/CBDCom/CyberSciTech 2023: 84-88 - Muhammad Muzamil Aslam, Ali Tufail, Zahoor Ahmed, Kassim Kalinaki, Muhammad Nasir, Rosyzie Anna Awg Haji Mohd Apong:
Spectrum Sharing and Consensus Performance of Vehicular Networks based on Deep Multi-User Reinforcement Learning. DASC/PiCom/CBDCom/CyberSciTech 2023: 348-354 - Elena Becker, Maanak Gupta, Feras M. Awaysheh:
Analyzing Edge IoT Digital Forensics Tools: Cyber Attacks Reconstruction and Anti-Forensics Enhancements. DASC/PiCom/CBDCom/CyberSciTech 2023: 991-998 - Veronika Bekbulatova, Andrea Morichetta, Schahram Dustdar:
FL-SERENADE: Federated Learning for SEmi-supeRvisEd Network Anomaly DEtection. A Case Study. DASC/PiCom/CBDCom/CyberSciTech 2023: 1072-1079 - Giuseppe Beltrano, Claudia Greco, Michele Ianni, Giancarlo Fortino:
Deep Learning-Based Detection of CSRF Vulnerabilities in Web Applications. DASC/PiCom/CBDCom/CyberSciTech 2023: 916-920 - Sweta Bhattacharya, Pratik S. Vyas, Supriya Yarradoddi, Bhulakshmi Dasari, Sumathy S, Rajesh Kaluri, Srinivas Koppu, David J. Brown, Mufti Mahmud, Thippa Reddy Gadekallu:
Towards Smart Education in the Industry 5.0 Era: A Mini Review on the Application of Federated Learning. DASC/PiCom/CBDCom/CyberSciTech 2023: 602-608 - Burcu Bolat-Akça, Elif Bozkaya:
Software-Defined Intrusion Detection System for DDoS Attacks in IoT Edge Networks. DASC/PiCom/CBDCom/CyberSciTech 2023: 672-677 - Jaouhara Bouamama, Yahya Benkaouz, Mohammed Ouzzif:
EdgeSA: Secure Aggregation for Privacy-Preserving Federated Learning in Edge Computing. DASC/PiCom/CBDCom/CyberSciTech 2023: 375-382 - Marija Brkic, Horia-Stefan Dinu, Alida Mirkovic, Alma Sabirovic, Sajjad Khan, Davor Svetinovic:
Cyber Vulnerabilities in Blockchain Electronic Health Records: An In-Depth Threat Analysis. DASC/PiCom/CBDCom/CyberSciTech 2023: 784-791 - Wenxi Cai, Tatsuhiro Tsuchiya:
Shapley Value-Based Node Assessment in Unreliable Complex Networks: Initial Research Progress. DASC/PiCom/CBDCom/CyberSciTech 2023: 886-890 - Chuan-Yu Chang, Xin-Hui Lin, Hui-Huang Hsu:
Infant Vomit Detection Using ShuffleNetV2. DASC/PiCom/CBDCom/CyberSciTech 2023: 149-154 - Lang Chen, Yuling Chen, Chaoyue Tan, Hui Dou, Yun Luo, Pengyu Chen:
A Multiple Indicator Credit Ranking Scheme Based on Notary Mechanism. DASC/PiCom/CBDCom/CyberSciTech 2023: 492-498
skipping 2,259 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-25 09:29 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint