default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 82 matches
- 2024
- Aditi Aggarwal, Deepika Varshney:
Multimodal Sentiment Analysis: Perceived vs Induced Sentiments. SVCC 2024: 1-7 - Wael Alsabbagh, Chaerin Kim, Peter Langendörfer:
Silent Sabotage: A Stealthy Control Logic Injection in IIoT Systems. SVCC 2024: 1-8 - Minah Chae, Wongeun Shin, Sangyun Jung, Jihun Yeom, Dongho Jeon, Heeseok Kim:
The Threat of Password Guessing Attacks Exploiting Linguistic Characteristics: A Case Study on the Korean Domains. SVCC 2024: 1-4 - Rono Cheruiyot, Sourav Purification, Simeon Wuthier, Sang-Yoon Chang:
5G Remote eSIM Provisioning: Blockchain-based Public Key Delivery. SVCC 2024: 1-3 - Seonho Choi:
Hop-Count Authentication with Moving Keys for Mobile Ad Hoc Networks. SVCC 2024: 1-3 - Taehyun Han, Sangyeon Hwang, Tae-Jin Lee:
Attack Group Analysis and Identification based on Heterogeneous Graph. SVCC 2024: 1-6 - Jaeseung Han, Yeon-Jae Kim, Dong-Guk Han:
Side-Channel Protected PIPO Implementation in Hardware. SVCC 2024: 1-3 - Kamrul Hasan, Nima Karimian, Sara Tehranipoor:
Combating Deepfakes: A Novel Hybrid Hardware-Software Approach. SVCC 2024: 1-2 - MohammadReza Hosseinzadehketilateh, Sara Tehranipoor, Nima Karimian:
Human-to-Device (H2D) Authentication Using Biometrics. SVCC 2024: 1-3 - Amanul Islam, Sang-Yoon Chang, Jinoh Kim, Jonghyun Kim:
Anomaly Detection in 5G using Variational Autoencoders. SVCC 2024: 1-6 - Kyungbae Jang, Yujin Oh, Minwoo Lee, Dukyoung Kim, Hwajeong Seo:
Depth Optimized Quantum Circuits for HIGHT and LEA. SVCC 2024: 1-6 - Firuz Juraev, Mohammed Abuhamad, Eric Chan-Tin, George K. Thiruvathukal, Tamer Abuhmed:
Unmasking the Vulnerabilities of Deep Learning Models: A Multi-Dimensional Analysis of Adversarial Attacks and Defenses. SVCC 2024: 1-8 - Firuz Juraev, Mohammed Abuhamad, Simon S. Woo, George K. Thiruvathukal, Tamer Abuhmed:
The Impact of Model Variations on the Robustness of Deep Learning Models in Adversarial Settings. SVCC 2024: 1-7 - Qaiser Khan, Sourav Purification, Rono Cheruiyot, Jinoh Kim, Jonghyun Kim, Sang-Yoon Chang:
Toward Post-Quantum Digital Certificate for eSIM. SVCC 2024: 1-3 - Jung-Hyun Kim, Steve Gustaman, Sang Kil Cha:
PoE: A Domain-Specific Language for Exploitation. SVCC 2024: 1-6 - Seon Woo Lee, Ju Young Lee, Tae Jin Lee:
Graph Neural Networks for Network Intrusion Detection: An IP Behavioral Analysis Perspective. SVCC 2024: 1-4 - Khanh Nguyen, Younghee Park:
Detecting Malicious Websites by using Deep Q-Networks. SVCC 2024: 1-10 - Steven Ning, Khanh Nguyen, Sohini Bagchi, Younghee Park:
The Study of Feature Engineering in Machine Learning and Deep Learning for Network Intrusion Detection Systems. SVCC 2024: 1-5 - Jinseob Oh, Chanho Choi, Dooho Choi:
Simplified Quantum Circuit Implementation for ASCON Security Analysis against Grover's Algorithm. SVCC 2024: 1-3 - Yujin Oh, Kyungbae Jang, Yujin Yang, Hwajeong Seo:
Quantum Implementation and Analysis of ARIA. SVCC 2024: 1-7 - Ravi Nitinkumar Patel, Xiaomei Zhang, Xiaoyan Sun, Jun Dai:
Exploring Scalable Bayesian Networks For Identification of Zero-day Attack Paths. SVCC 2024: 1-8 - Jetwadee Phanthanachai, Manoj Tripathy, Balakrishana Pamulaparthy:
Smart DC Microgrid Architectures and its Cyber Security Challenges: An Overview. SVCC 2024: 1-8 - Francesco Pietrantonio, Alessio Botta, Stefania Zinno, Giorgio Ventre, Luigi Gallo, Laura Mancuso, Roberta Presta:
A Gaze-Based Analysis of Human Detection of Email Phishing. SVCC 2024: 1-8 - Sourav Purification, Kyungmin Park, Jinoh Kim, Jonghyun Kim, Sang-Yoon Chang:
Wireless Link Routing to Secure Against Fake Base Station in 5G. SVCC 2024: 1-3 - Pablo Armingol Robles, Antonio Agustin Pastor Perales, Juan Carlos Caja Díaz:
A Distributed Approach for Detecting and Mitigating DDoS Attacks on White-Boxes. SVCC 2024: 1-8 - Jihyeon Song, Kyungmin Park, Cheolhee Park, Jonghyun Kim, Ikkyun Kim:
Analyzing the container security threat on the 5G Core Network. SVCC 2024: 1-3 - Anson Xu, Arnav Choudhury, Eason Liu, Sean Choi:
ProtectNIC: SmartNIC-based Ransomware Detection. SVCC 2024: 1-3 - Kelei Zhang, Sang-Yoon Chang:
Exploring Reinforcement Learning to Aid Tor Latency Performance. SVCC 2024: 1-3 - Silicon Valley Cybersecurity Conference, SVCC 2024, Seoul, Republic of Korea, June 17-19, 2024. IEEE 2024, ISBN 979-8-3503-8314-0 [contents]
- 2023
- Md. Abdullah Al Ahasan, Mengjun Hu, Nashid Shahriar:
OFMCDM/IRF: A Phishing Website Detection Model based on Optimized Fuzzy Multi-Criteria Decision-Making and Improved Random Forest. SVCC 2023: 1-8
skipping 52 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-18 23:28 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint