Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 38 matches
- 2013
- Roza Afarin, Saeed Mozaffari:
Image encryption using genetic algorithm and binary patterns. ISCISC 2013: 1-5 - Mahsa Afsharizadeh, Majid Mohammadi:
A reversible watermarking prediction based scheme using a new sorting technique. ISCISC 2013: 1-5 - M. A. Alavianmehr, Mehdi Rezaei, Mohammad Sadegh Helfroush, Ashkan Tashk:
A reversible data hiding scheme for video robust against H.264/AVC compression. ISCISC 2013: 1-6 - Ahad Azarian, Mahdi Abadi:
On the trade-off between stealth and propagation speed of Internet worms. ISCISC 2013: 1-6 - Soodeh Bakhshandeh, Fateme Bakhshande, Mahdi Aliyari:
Steganalysis algorithm based on Cellular Automata Transform and Neural Network. ISCISC 2013: 1-5 - Fatemeh Barani, Sajjad Gerami:
ManetSVM: Dynamic anomaly detection using one-class support vector machine in MANETs. ISCISC 2013: 1-6 - Amir Jalaly Bidgoly, Behrouz Tork Ladani:
Quantitative verification of beta reputation system using PRISM probabilistic model checker. ISCISC 2013: 1-6 - Hassan Daghigh, Somayeh Didari, Fatemeh Seifi Shahpar:
Computing elliptic curve discrete logarithm via lifting. ISCISC 2013: 1-4 - Hamzeh Ghasemzadeh, Mohammad Reza Aref, Ali Payandeh:
A novel and low-energy PKC-based key agreement protocol for WSNs. ISCISC 2013: 1-6 - Alireza Toroghi Haghighat, Mohammad Ali Kargar, Mohammad Sadeq Dousti, Rasool Jalili:
Minimal assumptions to achieve privacy in e-voting protocols. ISCISC 2013: 1-5 - Zahra Hakimi, Karim Faez, Morteza Barati:
An efficient architecture for distributed intrusion detection system. ISCISC 2013: 1-5 - Morteza Heidari, Shahrokh Gaemmaghami:
Universal image steganalysis using singular values of DCT coefficients. ISCISC 2013: 1-5 - Reza Hooshmand, Masoumeh Koochak Shooshtari, Mohammad Reza Aref:
Secret key cryptosystem based on polar codes over Binary Erasure Channel. ISCISC 2013: 1-6 - Sonu Kumar Jha:
Scan based side channel attack on Grain v1. ISCISC 2013: 1-4 - Vahid Khodabakhshi, Mahdi Soltani, Rasool Jalili, Mostafa Rezvani:
Chaos-based selective key (CSK) Cryptosystem: A new direction to secure VPN. ISCISC 2013: 1-7 - Z. Lashkaripour, Abbas Ghaemi Bafghi:
A security analysis tool for web application reinforcement against SQL injection attacks (SQLIAs). ISCISC 2013: 1-8 - Donia Malekian, Mahmoud Reza Hashemi:
An adaptive profile based fraud detection framework for handling concept drift. ISCISC 2013: 1-6 - Shahla Mardani, Hamid Reza Shahriari:
A new method for occupational fraud detection in process aware information systems. ISCISC 2013: 1-5 - Ehsan Meamari, Khadijeh Afhamisisi, Hadi Shahriar Shahhoseini:
An analysis on interactions among secondary user and unknown jammer in cognitive radio systems by fictitious play. ISCISC 2013: 1-6 - Amin Mohajer, Maryam Bavaghar, Rashin Saboor, Ali Payandeh:
Secure dominating set-based routing protocol in MANET: Using reputation. ISCISC 2013: 1-7 - Hamid Bagheriand Saeed Mozaffari:
Robust reversible data hiding in encrypted image: Using fractal coding approach. ISCISC 2013: 1-4 - Shirin Najdi, Afshin Ebrahimi:
Audio fingerprinting based on multi-resolution analysis of Discrete Wavelet Transform. ISCISC 2013: 1-5 - Hassan Nasiraee, Jamshid Bagherzadeh Mohasefi:
A novel three party key establishment scheme in the context of Internet-of-Things. ISCISC 2013: 1-5 - Farzad Pahlavani, Ali Pourmohammad:
A block set interpolation technique based Additive-White-Noise robust audio watermarking method. ISCISC 2013: 1-5 - Sajad Pourmohseni, Hassan Asgharian, Ahmad Akbari:
Detecting authentication misuse attacks against SIP entities. ISCISC 2013: 1-5 - Zohre Raghebi, Mahmoud Reza Hashemi:
A new trust evaluation method based on reliability of customer feedback for cloud computing. ISCISC 2013: 1-6 - Taha Yasin Rezapour, Meer Soheil Abolghasemi, Reza Ebrahimi Atani:
A position-based key management scheme for heterogeneous sensor networks. ISCISC 2013: 1-6 - Zahra Salek, Fariborz Mousavi Madani, Reza Azmi:
Intrusion detection using neuarl networks trained by differential evaluation algorithm. ISCISC 2013: 1-6 - Hassan Shakeri, Abbas Ghaemi Bafghi:
CATEF: Confidence-aware trust estimation framework. ISCISC 2013: 1-6 - Ehsan Shakeri, Shahrokh Ghaemmaghami:
An efficient feature extraction methodology for blind image steganalysis using contourlet transform and Zernike moments. ISCISC 2013: 1-6
skipping 8 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-08 03:25 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint