default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 37 matches
- 2021
- Galal A. AL-Rummana, Abdulrazzaq H. A. Al-Ahdal, G. N. Shinde:
An Implementation of Robust User Authentication Technique for Big Data Platform. ACeS 2021: 47-61 - Alwan Abdullah, Shams-ul-Arfeen Laghari, Ashish Jaisan, Shankar Karuppayah:
OSINT Explorer: A Tool Recommender Framework for OSINT Sources. ACeS 2021: 389-400 - Rafia Afzal, Raja Kumar Murugesan:
A Model to Detect Location Anomalies in a Cellular Network Using Travel Time and Distance Correlation. ACeS 2021: 459-468 - Ibrahim M. Ahmed, Manar Younis Kashmoola:
Threats on Machine Learning Technique by Data Poisoning Attack: A Survey. ACeS 2021: 586-600 - Khaled Gubran Al-Hashedi, Pritheega Magalingam, Nurazean Maarop, Ganthan Narayana Samy, Azizah Abdul Manaf:
A Conceptual Model to Identify Illegal Activities on the Bitcoin System. ACeS 2021: 18-34 - Zeyad Ghaleb Al-Mekhlafi, Badiea Abdulkarem Mohammed:
Using Genetic Algorithms to Optimized Stacking Ensemble Model for Phishing Websites Detection. ACeS 2021: 447-456 - Noor Al-Mi'ani, Mohammed Anbar, Yousef K. Sanjalawe, Shankar Karuppayah:
Securing Software Defined Networking Using Intrusion Detection System - A Review. ACeS 2021: 417-446 - Taief Alaa Alamiedy, Mohammed Anbar, Bahari Belaton, Arkan Hammoodi Hasan Kabla, Baidaa Hamza Khudayer:
Ensemble Feature Selection Approach for Detecting Denial of Service Attacks in RPL Networks. ACeS 2021: 340-360 - Rao Faizan Ali, Amgad Muneer, P. D. D. Dominic, Shakirah Mohd Taib, Ebrahim A. A. Ghaleb:
Internet of Things (IoT) Security Challenges and Solutions: A Systematic Literature Review. ACeS 2021: 128-154 - Reem Alshamy, Mossa Ghurab, Suad Othman, Faisal Alshami:
Intrusion Detection Model for Imbalanced Dataset Using SMOTE and Random Forest Algorithm. ACeS 2021: 361-378 - Navaneethan C. Arjuman, Selvakumar Manickam, Shankar Karuppayah:
An Improved Secure Router Discovery Mechanism to Prevent Fake RA Attack in Link Local IPv6 Network. ACeS 2021: 248-276 - Abdullah Ahmed Bahashwan, Mohammed Anbar, Selvakumar Manickam, Iznan Husainy Hasbullah, Mohammad Adnan Aladaileh:
Propose a Flow-Based Approach for Detecting Abnormal Behavior in Neighbor Discovery Protocol (NDP). ACeS 2021: 401-416 - Abdullateef Oluwagbemiga Balogun, Kayode S. Adewole, Amos Orenyi Bajeh, Rasheed Gbenga Jimoh:
Cascade Generalization Based Functional Tree for Website Phishing Detection. ACeS 2021: 288-306 - Jason Chia, Ji-Jian Chin, Sook-Chin Yip:
Pluggable Authentication Module Meets Identity-Based Identification. ACeS 2021: 155-175 - Abhilash Kumar Das, Nirmalya Kar:
g-EoN: A Non-salient Approach Towards Encryption Using Gamma Function $\varGamma \Big (-\frac{\alpha }{\beta }\Big ) = -\frac{\beta }{\alpha }\, \varGamma \Big (\frac{\beta -\alpha }{\beta }\Big )$. ACeS 2021: 78-94 - Islam Debicha, Thibault Debatty, Jean-Michel Dricot, Wim Mees, Tayeb Kenaza:
Detect & Reject for Transferability of Black-Box Adversarial Attacks Against Network Intrusion Detection Systems. ACeS 2021: 329-339 - Munaza Farooq, Aqsa Ashraf Makhdomi, Iqra Altaf Gillani:
Blockchain-Based Incentive Mechanism to Combat Fake News. ACeS 2021: 62-77 - Jamal N. Hasoon, Bashar Ahmed Khalaf, Rasha Subhi Hameed, Salama A. Mostafa, Ali Hussein Fadil:
A Light-Weight Stream Ciphering Model Based on Chebyshev Chaotic Maps and One Dimensional Logistic. ACeS 2021: 35-46 - Amrita Shivanand Hedge, M. N. Vinutha, Kona Supriya, S. Nagasundari, Prasad B. Honnavalli:
CLH: Approach for Detecting Deep Fake Videos. ACeS 2021: 539-551 - Abdulkareem A. Hezam, Salama A. Mostafa, Azizul Azhar Ramli, Hairulnizam Mahdin, Bashar Ahmed Khalaf:
Deep Learning Approach for Detecting Botnet Attacks in IoT Environment of Multiple and Heterogeneous Sensors. ACeS 2021: 317-328 - Joanna Hazaline Binti Johny, Wafa Athilah Fikriah Binti Nordin, Nurrina Mizana Binti Lahapi, Yu-Beng Leau:
SQL Injection Prevention in Web Application: A Review. ACeS 2021: 568-585 - Kinan Keshkeh, Aman Jantan, Kamal Alieyan, Usman Mohammed Gana:
A Review on TLS Encryption Malware Detection: TLS Features, Machine Learning Usage, and Future Directions. ACeS 2021: 213-229 - Bui Thanh Khoa, Nguyen Duong Thuc Vi:
Consumer Information Sharing in Facebook: The Negative Role of Perceived Privacy Risk. ACeS 2021: 552-567 - Alexander Kreppein, Alexander Kies, Robert H. Schmitt:
Novel Maturity Model for Cybersecurity Evaluation in Industry 4.0. ACeS 2021: 198-210 - Vu Le, Ramin Moazeni, Melody Moh:
Improving Security and Performance of Distributed IPFS-Based Web Applications with Blockchain. ACeS 2021: 114-127 - Poornima Mahadevappa, Raja Kumar Murugesan:
Review of Data Integrity Attacks and Mitigation Methods in Edge Computing. ACeS 2021: 505-514 - Faraz Masood, Arman Rasool Faridi:
A Blockchain Framework to Increase the Security and Verifiability of Educational Certificates. ACeS 2021: 3-17 - Badiea Abdulkarem Mohammed, Zeyad Ghaleb Al-Mekhlafi:
Optimized Stacking Ensemble Model to Detect Phishing Websites. ACeS 2021: 379-388 - Qais Saif Qassim, Norziana Jamil, Mohammed Najah Mahdi, Zaihisma Che Cob, Fiza Abdul Rahim, Lariyah Mohd Sidek:
A Short Review: Issues and Threats Pertaining the Security of SCADA Systems. ACeS 2021: 230-247 - Nor Ika Shahirah Ramli, Syifak Izhar Hisham, Gran Badshah:
Analysis of File Carving Approaches: A Literature Review. ACeS 2021: 277-287
skipping 7 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-01-17 03:18 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint