default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 28 matches
- 2015
- Norhaiza Ya Abdullah, Herny Ramadhani Mohd Husny Hamid:
Folder Lock by Using Multimodal Biometric: Fingerprint and Signature Authentication. CyberSec 2015: 140-145 - Takumi Akiyama, Kazuya Otani, Yoshio Kakizaki, Ryôichi Sasaki:
Evaluation of a Risk-Based Management Method for Online Accounts. CyberSec 2015: 52-57 - Delwar Alam, Md. Alamgir Kabir, Touhid Bhuiyan, Tanjila Farah:
A Case Study of SQL Injection Vulnerabilities Assessment of .bd Domain Web Applications. CyberSec 2015: 73-77 - Abdullah Said Alkalbani, Teddy Mantoro, Sardjoeni Moedjiono, Media A. Ayu:
Hybrid Solution for Secured and Energy Aware Routing Path in Wireless Sensor Networks. CyberSec 2015: 78-83 - Mohammad Ahmad Abu Allawi, Ali Hadi, Arafat Awajan:
MLDED: Multi-layer Data Exfiltration Detection System. CyberSec 2015: 107-112 - Normaziah Abdul Aziz, Fakhrulrazi Mokhti, M. Nadhar M. Nozri:
Mobile Device Forensics: Extracting and Analysing Data from an Android-Based Smartphone. CyberSec 2015: 123-128 - Chyquitha Danuputri, Teddy Mantoro, Mardi Hardjianto:
Data Security Using LSB Steganography and Vigenere Chiper in an Android Environment. CyberSec 2015: 22-27 - Herny Ramadhani Mohd Husny Hamid, Norhaiza Ya Abdullah:
Physical Authentication Using Random Number Generated (RNG) Keypad Based on One Time Pad (OTP) Concept. CyberSec 2015: 135-139 - Herny Ramadhani Mohd Husny Hamid, Megat Ahmad Izzat bin Megat Ahmad Kamil, Norhaiza Ya Abdullah:
Portable Toolkit for Penetration Testing and Firewall Configuration. CyberSec 2015: 90-94 - Kazuki Hashimoto, Hiroyuki Hiruma, Takashi Matsumoto, Kosetus Kayama, Yoshio Kaikizaki, Hiroshi Yamaki, Tetsutaro Uehara, Ryôichi Sasaki:
Development of Intellectual Network Forensic System LIFT against Targeted Attacks. CyberSec 2015: 16-21 - Mohammad Imran, Muhammad Tanvir Afzal, Muhammad Abdul Qadir:
Similarity-Based Malware Classification Using Hidden Markov Model. CyberSec 2015: 129-134 - Dwiki Jatikusumo, Hanny Hikmayanti H., Feriadi, Wendi Usino:
Securing Official Account Twitter Using Social Media Management System: Accuracy of the Data and Information Publish with Twitter. CyberSec 2015: 11-15 - Muhammad Hilmi Kamarudin, Carsten Maple, Tim Watson, Hasliza Sofian:
Packet Header Intrusion Detection with Binary Logistic Regression Approach in Detecting R2L and U2R Attacks. CyberSec 2015: 101-106 - Ryohei Koizumi, Ryôichi Sasaki:
Study on Countermeasures Using Mitigation Software against Vulnerability Attacks. CyberSec 2015: 28-33 - Nabil Laoufi:
From Risk Analysis to the Expression of Security Requirements for Systems Information. CyberSec 2015: 84-89 - Ahmad Luthfi, Yudi Prayudi:
Process Model of Digital Forensics Readiness Scheme (DFRS) as a Recommendation of Digital Evidence Preservation. CyberSec 2015: 117-122 - Teddy Mantoro, M. Iman Wahyudi, Media A. Ayu, Wendi Usino:
Real-Time Printed Document Authentication Using Watermarked QR Code. CyberSec 2015: 68-72 - Naoto Nakagawa, Yoshimi Teshigawara, Ryôichi Sasaki:
Development of a Detection and Responding System for Malware Communications by Using OpenFlow and Its Evaluation. CyberSec 2015: 46-51 - P. D. Persadha, A. A. Waskita, S. Yazid:
Comparative Study of Cyber Security Policies among Malaysia, Australia, Indonesia: A Responsibility Perspective. CyberSec 2015: 146-150 - Sriram Raghavan, S. V. Raghavan:
Estimating Posterior Probabilities to Identify Breach Points during Cyber-attacks. CyberSec 2015: 113-116 - Makoto Sato, Akihiko Sugimoto, Naoki Hayashi, Yoshiaki Isobe, Ryôichi Sasaki:
Proposal of a Method for Identifying the Infection Route for Targeted Attacks Based on Malware Behavior in a Network. CyberSec 2015: 40-45 - Ahmad Budi Setiawan, Aries Syamsudin, Ashwin Sasongko Sastrosubroto:
Implementation of Secure Smart Grid as Critical Information Infrastructure in Indonesia: A Case Study in Smart Grid Electricity. CyberSec 2015: 34-39 - Mikhail Styugin:
Analysis of Awareness Structures in Information Security Systems. CyberSec 2015: 6-10 - Ali Tamimi, D. Subbaram Naidu, Sanaz Kavianpour:
An Intrusion Detection System Based on NSGA-II Algorithm. CyberSec 2015: 58-61 - Manh Cong Tran, Yasuhiro Nakamura:
An Approach to Mine Suspicious Domain Based on HTTP Automated Software Communication Behavior. CyberSec 2015: 1-5 - Victor Wahanggara, Yudi Prayudi:
Malware Detection through Call System on Android Smartphone Using Vector Machine Method. CyberSec 2015: 62-67 - Hyoseok Yoon, Se-Ho Park, Kyung-Taek Lee:
Exploiting Ambient Light Sensor for Authentication on Wearable Devices. CyberSec 2015: 95-100 - Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015. IEEE Computer Society 2015, ISBN 978-1-4673-8499-5 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-06 14:18 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint