default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 196 matches
- 2024
- Ying Yuan, Giovanni Apruzzese, Mauro Conti:
Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks against Phishing Website Detectors Using Machine Learning. DTRAP 5(2): 16:1-16:51 (2024) - Andreas Hammer, Christian Cerny, Christoph Jung, Christian Eichenmüller, Felix C. Freiling:
Increasing Street Credibility: Cartography-Aware Forensic Analysis of GNSS Trace Validity. DTRAP 5(3): 32:1-32:20 (2024) - Andreas Hammer, Julian Geus, Florian Nicolai, Philip Schütz, Christofer Fein, Felix C. Freiling:
Fit for Forensics: Taxonomy and Common Model for Forensic Analysis of Fitness Trackers. DTRAP 5(3): 29:1-29:20 (2024) - Yurong Chen, Yongsheng Mei, Tian Lan, Guru Venkataramani:
Exploring Effective Fuzzing Strategies to Analyze Communication Protocols. DTRAP 5(1): 11:1-11:22 (2024) - Jing Xu, Stefanos Koffas, Stjepan Picek:
Unveiling the Threat: Investigating Distributed and Centralized Backdoor Attacks in Federated Graph Neural Networks. DTRAP 5(2): 15:1-15:29 (2024) - Rodney Adriko, Jason R. C. Nurse:
Does Cyber Insurance Promote Cyber Security Best Practice? An Analysis Based on Insurance Application Forms. DTRAP 5(3): 25:1-25:39 (2024) - Clement Chimezie Aladi:
Web Application Security: A Pragmatic Exposé. DTRAP 5(2): 20:1-20:9 (2024) - Yechan Bae, Sarbartha Banerjee, Sangho Lee, Marcus Peinado:
Spacelord: Private and Secure Smart Space Sharing. DTRAP 5(2): 14:1-14:27 (2024) - Benjamin E. Bagozzi, Rajni Goel, Brunilda Lugo-de-Fabritz, Kelly Knickmeier-Cummings, Karthik Balasubramanian:
A Framework for Enhancing Social Media Misinformation Detection with Topical-Tactics. DTRAP 5(3): 24:1-24:29 (2024) - Fabrício Ceschin, Marcus Botacin, Albert Bifet, Bernhard Pfahringer, Luiz S. Oliveira, Heitor Murilo Gomes, André Grégio:
Machine Learning (In) Security: A Stream of Problems. DTRAP 5(1): 9:1-9:32 (2024) - Markus Demmel, Thomas Göbel, Patrik Gonçalves, Harald Baier:
Data Synthesis Is Going Mobile - On Community-Driven Dataset Generation for Android Devices. DTRAP 5(3): 30:1-30:19 (2024) - Richard Derbyshire, Benjamin Green, Charl van der Walt, David Hutchison:
Dead Man's PLC: Towards Viable Cyber Extortion for Operational Technology. DTRAP 5(3): 23:1-23:24 (2024) - Andreas Dewald, Thomas Schreck:
Introduction to the IMF 2024 Special Issue. DTRAP 5(3): 26:1-26:2 (2024) - Eva Domschot, Ramyaa Ramyaa, Michael R. Smith:
Improving Automated Labeling for ATT&CK Tactics in Malware Threat Reports. DTRAP 5(1): 2:1-2:16 (2024) - Douglas Everson, Long Cheng:
A Survey on Network Attack Surface Mapping. DTRAP 5(2): 18:1-18:25 (2024) - Yang Gao, Benjamin M. Ampel, Sagar Samtani:
Evading Anti-Phishing Models: A Field Note Documenting an Experience in the Machine Learning Security Evasion Competition 2022. DTRAP 5(1): 7:1-7:8 (2024) - Jalal Ghadermazi, Ankit Shah, Sushil Jajodia:
A Machine Learning and Optimization Framework for Efficient Alert Management in a Cybersecurity Operations Center. DTRAP 5(2): 19:1-19:23 (2024) - Mehdi Akbari Gurabi, Lasse Nitz, Andrej Bregar, Jan Popanda, Christian Siemers, Roman Matzutt, Avikarsha Mandal:
Requirements for Playbook-Assisted Cyber Incident Response, Reporting and Automation. DTRAP 5(3): 34:1-34:11 (2024) - Erik Hemberg, Matthew J. Turner, Nick Rutar, Una-May O'Reilly:
Enhancements to Threat, Vulnerability, and Mitigation Knowledge for Cyber Analytics, Hunting, and Simulations. DTRAP 5(1): 8:1-8:33 (2024) - Andrew E. Hong, Peter P. Malinovsky, Suresh K. Damodaran:
Towards Attack Detection in Multimodal Cyber-Physical Systems with Sticky HDP-HMM based Time Series Analysis. DTRAP 5(1): 5:1-5:21 (2024) - Rucha Bhalchandra Joshi, Subhankar Mishra:
Locally and Structurally Private Graph Neural Networks. DTRAP 5(1): 10:1-10:23 (2024) - Tor J. Langehaug, Scott R. Graham:
CuMONITOR: Continuous Monitoring of Microarchitecture for Software Task Identification and Classification. DTRAP 5(3): 22:1-22:22 (2024) - Christian Lindenmeier, Jan Gruber, Felix C. Freiling:
InvesTEE: A TEE-supported Framework for Lawful Remote Forensic Investigations. DTRAP 5(3): 27:1-27:20 (2024) - Martina Lindorfer, Gianluca Stringhini:
Introduction to the ACSAC'22 Special Issue. DTRAP 5(2): 13:1-13:2 (2024) - Thalita Scharr Rodrigues Pimenta, Fabricio Ceschin, Andre Gregio:
ANDROIDGYNY: Reviewing Clustering Techniques for Android Malware Family Classification. DTRAP 5(1): 3:1-3:35 (2024) - Venkata Sai Charan Putrevu, Subhasis Mukhopadhyay, Subhajit Manna, Nanda Rani, Ansh Vaid, Hrushikesh Chunduri, Mohan Anand Putrevu, Sandeep K. Shukla:
ADAPT: Adaptive Camouflage Based Deception Orchestration For Trapping Advanced Persistent Threats. DTRAP 5(3): 21:1-21:35 (2024) - Ethan M. Rudd, David Krisiloff, Scott E. Coull, Daniel Olszewski, Edward Raff, James Holt:
Efficient Malware Analysis Using Metric Embeddings. DTRAP 5(1): 4:1-4:20 (2024) - Lisa Rzepka, Jenny Ottmann, Felix C. Freiling, Harald Baier:
Causal Inconsistencies Are Normal in Windows Memory Dumps (Too). DTRAP 5(3): 31:1-31:20 (2024) - Sagar Samtani, Edward Raff, Hyrum S. Anderson:
Applied Machine Learning for Information Security. DTRAP 5(1): 1:1-1:5 (2024) - Jakob Stühn, Jan-Niclas Hilgert, Martin Lambertz:
The Hidden Threat: Analysis of Linux Rootkit Techniques and Limitations of Current Detection Tools. DTRAP 5(3): 28:1-28:24 (2024)
skipping 166 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-01-05 02:25 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint