default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 203 matches
- 2024
- Jörg Keller, Carina Heßeling, Steffen Wendzel:
Robust and Homomorphic Covert Channels in Streams of Numeric Data. ARES 2024: 79:1-79:4 - Mubashar Iqbal, Sabah Suhail, Raimundas Matulevicius:
DECEPTWIN: Proactive Security Approach for IoV by Leveraging Deception-based Digital Twins and Blockchain. ARES 2024: 161:1-161:11 - Hongyu Jin, Zhichao Zhou, Panos Papadimitratos:
Future-proofing Secure V2V Communication against Clogging DoS Attacks. ARES 2024: 94:1-94:8 - Georgios Petihakis, Aristeidis Farao, Panagiotis Bountakas, Athanasia Sabazioti, John Polley, Christos Xenakis:
AIAS: AI-ASsisted cybersecurity platform to defend against adversarial AI attacks. ARES 2024: 126:1-126:7 - Richard May, Jacob Krüger, Thomas Leich:
SoK: How Artificial-Intelligence Incidents Can Jeopardize Safety and Security. ARES 2024: 44:1-44:12 - Tim Wood, Keerthi Thomas, Matthew Dean, Swaminathan Kannan, Robert Learney:
Towards Post-Quantum Verifiable Credentials. ARES 2024: 88:1-88:10 - Wisam Abbasi, Paolo Mori, Andrea Saracino:
Further Insights: Balancing Privacy, Explainability, and Utility in Machine Learning-based Tabular Data Analysis. ARES 2024: 176:1-176:10 - Ashraf Abdelhamid, Mahmoud Said Elsayed, Heba K. Aslan, Marianne A. Azer:
Anomaly-Based Intrusion Detection for Blackhole Attack Mitigation. ARES 2024: 124:1-124:9 - Alessandro Aldini, Tommaso Petrelli:
Image-based detection and classification of Android malware through CNN models. ARES 2024: 61:1-61:11 - Ruba Alsmadi, Taha Gharaibeh, Andrew M. Webb, Ibrahim M. Baggili:
Give Me Steam: A Systematic Approach for Handling Stripped Symbols in Memory Forensics of the Steam Deck. ARES 2024: 193:1-193:10 - Tadani Nasser Alyahya, Leonardo Aniello, Vladimiro Sassone:
ScaNeF-IoT: Scalable Network Fingerprinting for IoT Device. ARES 2024: 195:1-195:9 - Luca Ardito:
Behavioural Modelling for Sustainability in Smart Homes. ARES 2024: 57:1-57:11 - Hooman Asadian, Paul Fiterau-Brostean, Bengt Jonsson, Konstantinos Sagonas:
Monitor-based Testing of Network Protocol Implementations Using Symbolic Execution. ARES 2024: 17:1-17:12 - Atmane Ayoub Mansour Bahar, Kamel Soaïd Ferrahi, Mohamed-Lamine Messai, Hamida Seba, Karima Amrouche:
FedHE-Graph: Federated Learning with Hybrid Encryption on Graph Neural Networks for Advanced Persistent Threat Detection. ARES 2024: 119:1-119:10 - Christos Baloukas, Lazaros Papadopoulos, Kostas Demestichas, Axel Weissenfeld, Sven Schlarb, Mikel Aramburu, David Redó, Jorge García, Seán Gaines, Thomas Marquenie, Ezgi Eren, Irmak Erdogan Peter:
A Risk Assessment and Legal Compliance Framework for Supporting Personal Data Sharing with Privacy Preservation for Scientific Research. ARES 2024: 184:1-184:10 - Markus Batz, Sebastian Zickau:
Towards Functions for Verifiable Credentials in a 2-Holder Model. ARES 2024: 89:1-89:8 - Thomas Baumer, Johannes Grill, Jacob Adan, Günther Pernul:
A Trust and Reputation System for Examining Compliance with Access Control. ARES 2024: 181:1-181:10 - Georg Becker, Thomas Eisenbarth, Hannes Federrath, Mathias Fischer, Nils Loose, Simon Ott, Joana Pecholt, Stephan Marwedel, Dominik Meyer, Jan Stijohann, Anum Talpur, Matthias Vallentin:
SOVEREIGN - Towards a Holistic Approach to Critical Infrastructure Protection. ARES 2024: 144:1-144:9 - Dmitrii Belimov, Evgenii Vinogradov:
Reverse Engineered MiniFS File System. ARES 2024: 40:1-40:7 - Diana Gratiela Berbecaru, Antonio Lioy:
Threat-TLS: A Tool for Threat Identification in Weak, Malicious, or Suspicious TLS Connections. ARES 2024: 125:1-125:9 - Sjoerd Berning, Vincent Dunning, Dayana Spagnuelo, Thijs Veugen, Jasper van der Waa:
The Trade-off Between Privacy & Quality for Counterfactual Explanations. ARES 2024: 179:1-179:9 - Bibek Bhattarai, H. Howie Huang:
Prov2vec: Learning Provenance Graph Representation for Anomaly Detection in Computer Systems. ARES 2024: 15:1-15:14 - Pushparaj Bhosale, Wolfgang Kastner, Thilo Sauter:
Modeling Human Error Factors with Security Incidents in Industrial Control Systems: A Bayesian Belief Network Approach. ARES 2024: 53:1-53:9 - Giuseppe Marco Bianco, Luca Ardito, Michele Valsesia:
A tool for IoT Firmware Certification. ARES 2024: 59:1-59:7 - Vasiliki-Georgia Bilali, Eustratios Magklaris, Dimitrios Kosyvas, Lazaros Karagiannidis, Eleftherios Ouzounoglou, Angelos Amditis:
A SOAR platform for standardizing, automating operational processes and a monitoring service facilitating auditing procedures among IoT trustworthy environments. ARES 2024: 151:1-151:8 - Eddie Billoir, Romain Laborde, Ahmad Samer Wazan, Yves Rutschle, Abdelmalek Benzekri:
Enhancing Secure Deployment with Ansible: A Focus on Least Privilege and Automation for Linux. ARES 2024: 56:1-56:7 - Francesco Blefari, Francesco Aurelio Pironti, Angelo Furfaro:
Toward a Log-based Anomaly Detection System for Cyber Range Platforms. ARES 2024: 115:1-115:9 - Julian Blümke, Kevin Mayer, Hans-Joachim Hof:
An Analysis of Security Concerns in Transitioning Battery Management Systems from First to Second Life. ARES 2024: 101:1-101:11 - Ricardo Bochnia, Jürgen Anke:
Long-Lived Verifiable Credentials: Ensuring Durability Beyond the Issuer's Lifetime. ARES 2024: 87:1-87:9 - Kevin De Boeck, Jenno Verdonck, Michiel Willocx, Jorn Lapon, Vincent Naessens:
Compromising anonymity in identity-reserved k-anonymous datasets through aggregate knowledge. ARES 2024: 6:1-6:12
skipping 173 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-17 03:54 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint