default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 29 matches
- 2024
- Essam Al Daoud, Laith Al Daoud, Mahmoud Asassfeh, Ala'a Al-Shaikh, Ala'a Saeb Al-Sherideh, Suha Afaneh:
Enhancing Cybersecurity with Transformers: Preventing Phishing Emails and Social Media Scams. DSC 2024: 31-36 - Chun-I Fan, Ming-Feng Tsai, Chun-Pin Hu, Ming-Hung Wang:
Sockpuppets Detection Using Markov-Driven Graph Convolutional Networks with Ensemble Learning. DSC 2024: 37-44 - Chansu Han, Akira Tanaka, Takeshi Takahashi, Sajjad Dadkhah, Ali A. Ghorbani, Tsung-Nan Lin:
Traceability Measurement Analysis of Sustained Internet-Wide Scanners via Darknet. DSC 2024: 17-22 - Mizuho Hasegawa, Yamato Kawaguchi, Hiroaki Takayama, Yasuhiro Kunimine, Hidekazu Tanaka, Shintaro Kawamura, Akira Fujita, Shingo Yasuda, Daisuke Inoue, Nobuyo Fujiwara, Kazuki Takada, Rui Tanabe, Katsunari Yoshioka:
A Case Study of URL Blocklist Maintenance. DSC 2024: 100-101 - Masanori Hirotomo, Atsushi Marui, Yoshiaki Shiraishi:
Systematic Construction of Adaptively Decodable Visual Secret Sharing Scheme on Background Color. DSC 2024: 82-87 - Yi-Chen Hsieh, Tzu-Chi Yu, Chi-Yu Li, Guan-Hua Tu:
InstaMAuth: Instant Mobile Authentication Service Based on 5G Authenticated Call Sessions. DSC 2024: 131-138 - Zhewei Huang, Yin Minn Pa Pa, Katsunari Yoshioka:
Exploring the Impact of LLM Assisted Malware Variants on Anti-Virus Detection. DSC 2024: 76-77 - Jheng-Jia Huang, Wei-Hsueh Wang, Wen-Yan Dai, Guan-Yu Chen, Yi-Fan Tseng:
Efficient and Secure Multi-Point Communication Framework Supporting Resource Constraints Environment. DSC 2024: 80-81 - Ryoichi Isawa, Nobuyuki Kanaya, Daisuke Inoue:
Information Flow Tracking for Hardware Trojan Detection: a Feasibility Study. DSC 2024: 51-57 - Akira Kanaoka, Mamoru Abe:
Enhanced Analysis of Cryptographic Library Usage Patterns and Trends in Android Applications. DSC 2024: 88-93 - Yamato Kawaguchi, Kazuki Takada, Yin Minn Pa Pa, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto:
Investigating Black-Market Jobs on Social Networking Service. DSC 2024: 106-107 - Mansoor Ali Khan, Muhammad Naveed Aman, Biplab Sikdar:
Quantum Guard: Pioneering Quantum-Based Malware Defense for IoT Devices. DSC 2024: 94-99 - Minjung Kim, Daejin Park:
Enhancing Microcontroller Security Through Volatile Memory-Resident Encrypted Code. DSC 2024: 78-79 - Pramod Kumar, Ayan Seal, Sraban Kumar Mohanty, Haibo Zhang, Kouichi Sakurai:
One Pixel Adversarial Attack for Fooling Deep Learning-Based Facial Expression Recognition Systems. DSC 2024: 23-30 - Hiroki Kuzuno, Toshihiro Yamauchi:
kdMonitor: Kernel Data Monitor for Detecting Kernel Memory Corruption. DSC 2024: 66-73 - Ortal Lavi, Ofir Manor, Tomer Schwartz, Andrés F. Murillo, Ayoub Messous, Motoyoshi Sekiya, Junichi Suga, Kenji Hikichi, Yuki Unno:
Fine-Tuning Large Language Models for Network Traffic Analysis in Cyber Security. DSC 2024: 45-50 - Hyunwoo Lee, Taewoong Kwon, Jun Lee, Jungsuk Song:
Enhancing Decision-Making of Network Intrusion Analysis Assisted by Explainable AI for Real-Time Security Monitoring. DSC 2024: 147-154 - Oratile Leteane, Yirsaw Ayalew, Tshiamo Motshegwa:
A Multi-Package Trust Model for Improving the Trustworthiness of Traceability Data in Blockchain-Based Beef Supply Chain. DSC 2024: 155-162 - Rui Liu, Yaokai Feng, Kouichi Sakurai:
An Approach to Multi-Class Intrusion Detection Based on Feature Subspaces and Weighted Fusion. DSC 2024: 139-146 - Shunsuke Nakatani, Hiroki Kuzuno, Makoto Takita, Masami Mohri, Yoshiaki Shiraishi:
Can We Determine Whether a Set of Ethereum Transaction Data Contains Fraudulent Transactions? DSC 2024: 108-114 - Boubakr Nour, Makan Pourzandi, Jesus Alatorre, Jan Willekens, Mourad Debbabi:
Chronohunt: Determining Optimal Pace for Automated Alert Analysis in Threat Hunting Using Reinforcement Learning. DSC 2024: 1-8 - Masaya Sato, Ryuki Mandai:
Control Displaying of Web Push Notifications Inducing Users to Phishing Websites. DSC 2024: 102-103 - Toshiro Sawamoto, Mio Suzuki, Yutaro Osako, Takahiro Kasama, Daisuke Inoue, Koji Nakao:
Inherited Threat Reproduction on Open Source 5G Testbed. DSC 2024: 9-16 - Makoto Shimamura, Shingo Matsugaya, Keisuke Sakai, Kosuke Takeshige, Masaki Hashimoto:
An Analysis of the Relationship Between Black-Hat SEO Malware Families Leveraging Information from Redirected Fake E-Commerce Scam Sites. DSC 2024: 123-130 - Jingyi Sun, Qi Shi, Guodong Jin, Hao Xu, Weichao Chen:
Blockchain-Enabled IoV: Secure Communication and Trustworthy Decision-Making. DSC 2024: 104-105 - Yuta Takabayashi, Masahiro Mambo:
Detection Evasion Using eBPF for Linux Fileless Malware. DSC 2024: 74-75 - Ayumu Yamada, Hiroyuki Ito, Kosuke Kajimoto, Tetsuya Kageyama, Taichi Aoki, Takahiro Kasama:
Threat of Technical Support Scams in Japan. DSC 2024: 115-122 - Sinan Yavuz, Edwin Naroska, Kai Daniel:
Vulnerabilities and Challenges in the Development of PUF-Based Authentication Protocols on FPGAs: A Brief Review. DSC 2024: 58-65 - IEEE Conference on Dependable and Secure Computing, DSC 2024, Tokyo, Japan, November 6-8, 2024. IEEE 2024, ISBN 979-8-3315-4028-9 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-19 00:11 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint