default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 865 matches
- 2023
- Fengjun Li, Kaitai Liang, Zhiqiang Lin, Sokratis K. Katsikas:
Security and Privacy in Communication Networks - 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 462, Springer 2023, ISBN 978-3-031-25537-3 [contents] - 2022
- Farzaneh Abazari, Enrico Branca, Evgeniya Novikova, Natalia Stakhanova:
Language and Platform Independent Attribution of Heterogeneous Code. SecureComm 2022: 173-191 - Ehsan Aghaei, Xi Niu, Waseem G. Shadid, Ehab Al-Shaer:
SecureBERT: A Domain-Specific Language Model for Cybersecurity. SecureComm 2022: 39-56 - Md Ali Reza Al Amin, Sachin Shetty, Valerio Formicola, Martin Otto:
Assessing the Quality of Differentially Private Synthetic Data for Intrusion Detection. SecureComm 2022: 473-490 - Alexandros Bakas, Eugene Frimpong, Antonis Michalas:
Symmetrical Disguise: Realizing Homomorphic Encryption Services from Symmetric Primitives. SecureComm 2022: 353-370 - Jingfei Bian, Nan Yu, Hong Li, Hongsong Zhu, Qiang Wang, Limin Sun:
An Evolutionary Learning Approach Towards the Open Challenge of IoT Device Identification. SecureComm 2022: 20-38 - Robert Cantaragiu, Antonis Michalas, Eugene Frimpong, Alexandros Bakas:
MetaPriv: Acting in Favor of Privacy on Social Media Platforms. SecureComm 2022: 692-709 - Niusen Chen, Bo Chen, Weisong Shi:
A Cross-layer Plausibly Deniable Encryption System for Mobile Devices. SecureComm 2022: 150-169 - Maryam Davari, Mohammad Zulkernine:
Classification-Based Anomaly Prediction in XACML Policies. SecureComm 2022: 3-19 - Qiying Dong, Ding Wang, Yaosheng Shen, Chunfu Jia:
PII-PSM: A New Targeted Password Strength Meter Using Personally Identifiable Information. SecureComm 2022: 648-669 - Ruizhong Du, Tianhe Zhang:
Blockchain-Based Ciphertext Policy-Hiding Access Control Scheme. SecureComm 2022: 272-289 - Xiaoyi Duan, Ye Huang, Yonghua Su, Yujin Li, Xiaohong Fan:
Research on the Grouping Method of Side-Channel Leakage Detection. SecureComm 2022: 807-818 - Juanjuan Guo, Mengjie Shuai, Qiongxiao Wang, Wenyuan Li, Jingqiang Lin:
Replicated Additive Secret Sharing with the Optimized Number of Shares. SecureComm 2022: 371-389 - Muhammad Shadi Hajar, Harsha K. Kalutarage, M. Omar Al-Kadri:
DQR: A Double Q Learning Multi Agent Routing Protocol for Wireless Medical Sensor Network. SecureComm 2022: 611-629 - Xiantong Hao, Dandan Ma, Hongliang Liang:
Detection and Privacy Leakage Analysis of Third-Party Libraries in Android Apps. SecureComm 2022: 569-587 - Omar Adel Ibrahim, Savio Sciancalepore, Roberto Di Pietro:
MAG-PUF: Magnetic Physical Unclonable Functions for Device Authentication in the IoT. SecureComm 2022: 130-149 - Hanyu Jia, Xiangxue Li, Qiang Li, Yue Bao, Xintian Hou:
Generic 2-Party PFE with Constant Rounds and Linear Active Security, and Efficient Instantiation. SecureComm 2022: 390-410 - Shohei Kakei, Yoshiaki Shiraishi, Shoichi Saito:
Granting Access Privileges Using OpenID Connect in Permissioned Distributed Ledgers. SecureComm 2022: 290-308 - Pranay Kapoor, Rohan Pagey, Mohammad Mannan, Amr M. Youssef:
Silver Surfers on the Tech Wave: Privacy Analysis of Android Apps for the Elderly. SecureComm 2022: 673-691 - Douglas J. Leith:
What Data Do the Google Dialer and Messages Apps on Android Send to Google? SecureComm 2022: 549-568 - Xiaoting Li, Lingwei Chen, Dinghao Wu:
Adversary for Social Good: Leveraging Attribute-Obfuscating Attack to Protect User Privacy on Social Networks. SecureComm 2022: 710-728 - Zhengyu Liu, Haochen Su, Nannan Wang, Cheng Huang:
Coreference Resolution for Cybersecurity Entity: Towards Explicit, Comprehensive Cybersecurity Knowledge Graph with Low Redundancy. SecureComm 2022: 89-108 - Qiang Liu, Hequ Xian, Jiancheng Zhang, Kunpeng Liu:
A Random Reversible Watermarking Scheme for Relational Data. SecureComm 2022: 413-430 - Ziqiang Ma, Shuaigang Li, Jingqiang Lin, Quanwei Cai, Shuqin Fan, Fan Zhang, Bo Luo:
Another Lattice Attack Against ECDSA with the wNAF to Recover More Bits per Signature. SecureComm 2022: 111-129 - Spandan Mahadevegowda, Ryan M. Gerdes, Thidapat Chantem, Rose Qingyang Hu:
Secure CV2X Using COTS Smartphones over LTE Infrastructure. SecureComm 2022: 588-607 - Peyman Momeni, Sergey Gorbunov, Bohan Zhang:
FairBlock: Preventing Blockchain Front-Running with Minimal Overheads. SecureComm 2022: 250-271 - Sivaanandh Muneeswaran, Vinay Sachidananda, Rajendra Patil, Hongyi Peng, Mingchang Liu, Mohan Gurusamy:
Hiatus: Unsupervised Generative Approach for Detection of DoS and DDoS Attacks. SecureComm 2022: 529-546 - Yuedong Pan, Lijun Cai, Tao Leng, Lixin Zhao, Jiangang Ma, Aimin Yu, Dan Meng:
AttackMiner: A Graph Neural Network Based Approach for Attack Detection from Audit Logs. SecureComm 2022: 510-528 - Qian Qiang, Yige Chen, Yang Hu, Tianning Zang, Mian Cheng, Quanbo Pan, Yu Ding, Zisen Qi:
Cost-Effective Malware Classification Based on Deep Active Learning. SecureComm 2022: 212-227 - Nanda Rani, Ayushi Mishra, Rahul Kumar, Sarbajit Ghosh, Sandeep K. Shukla, Priyanka Bagade:
A Generalized Unknown Malware Classification. SecureComm 2022: 793-806
skipping 835 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-01-23 01:39 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint