default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 21 matches
- 2022
- Mina Alishahi, Daan Gast, Sam Vermeiren:
Local Differential Privacy for Private Construction of Classification Algorithms. NordSec 2022: 58-79 - Xavier Arnal, Abraham Cano, Tamara Finogina, Javier Herranz:
How to Avoid Repetitions in Lattice-Based Deniable Zero-Knowledge Proofs. NordSec 2022: 253-269 - Alexander Bjerre, Andreas Philip Westh, Emil Villefrance, A. S. M. Farhan Al Haque, Jonas Bukrinski Andersen, Lucas K. Helgogaard, Marios Anagnostopoulos:
A Wide Network Scanning for Discovery of UDP-Based Reflectors in the Nordic Countries. NordSec 2022: 176-193 - Bernhards Blumbergs, Eriks Dobelis, Peteris Paikens, Krisjanis Nesenbergs, Kirils Solovjovs, Artis Rusins:
WearSec: Towards Automated Security Evaluation of Wireless Wearable Devices. NordSec 2022: 311-325 - Matthew Cole, Aravind Prakash:
Simplex: Repurposing Intel Memory Protection Extensions for Secure Storage. NordSec 2022: 215-233 - Mohamed Taoufiq Damir, Valtteri Niemi:
Location Privacy, 5G AKA, and Enhancements. NordSec 2022: 40-57 - Daniel Fraunholz, Dominik Brunke, Simon Beidenhauser, Sebastian Berger, Hartmut Koenig, Daniel Reti:
IMSI Probing: Possibilities and Limitations. NordSec 2022: 80-97 - Sarah Abdelwahab Gaballah, Lamya Abdullah, Minh Tung Tran, Ephraim Zimmer, Max Mühlhäuser:
On the Effectiveness of Intersection Attacks in Anonymous Microblogging. NordSec 2022: 3-19 - Mordechai Guri:
GPU-FAN: Leaking Sensitive Data from Air-Gapped Machines via Covert Noise from GPU Fans. NordSec 2022: 194-211 - Carsten Hesselmann, Delphine Reinhardt, Jan Gertheiss, Jörg P. Müller:
Data Privacy in Ride-Sharing Services: From an Analysis of Common Practices to Improvement of User Awareness. NordSec 2022: 20-39 - David Lantz, Felipe Boeira, Mikael Asplund:
Towards Self-monitoring Enclaves: Side-Channel Detection Using Performance Counters. NordSec 2022: 120-138 - Tobias Latzo, Andreas Hellmich, Annika Knepper, Lukas Hardi, Tim Phillip Castello-Waldow, Felix C. Freiling, Andreas Attenberger:
Maraudrone's Map: An Interactive Web Application for Forensic Analysis and Visualization of DJI Drone Log Data. NordSec 2022: 329-345 - Cristoffer Leite, Jerry den Hartog, Daniel Ricardo dos Santos, Elisa Costante:
Actionable Cyber Threat Intelligence for Automated Incident Response. NordSec 2022: 368-385 - Mohamed Msaad, Shreyas Srinivasa, Mikkel Møller Andersen, David Holm Audran, Charity U. Orji, Emmanouil Vasilomanolakis:
Honeysweeper: Towards Stealthy Honeytoken Fingerprinting Techniques. NordSec 2022: 101-119 - Charles-Henry Bertrand Van Ouytsel, Axel Legay:
Malware Analysis with Symbolic Execution and Graph Kernel. NordSec 2022: 292-310 - Arun Sankar Muttathu Sivasankara Pillai, Phillip L. De Leon, Utz Roedig:
Detection of Voice Conversion Spoofing Attacks Using Voiced Speech. NordSec 2022: 159-175 - Richard Plný, Karel Hynek, Tomás Cejka:
DeCrypto: Finding Cryptocurrency Miners on ISP Networks. NordSec 2022: 139-158 - Sebastian Schrittwieser, Patrick Kochberger, Michael Pucher, Caroline Lawitschka, Philip König, Edgar R. Weippl:
Obfuscation-Resilient Semantic Functionality Identification Through Program Simulation. NordSec 2022: 273-291 - Camille Sivelle, Lorys Debbah, Maxime Puys, Pascal Lafourcade, Thibault Franco-Rondisson:
Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models. NordSec 2022: 234-252 - Azadeh Tabiban, Heyang Zhao, Yosr Jarraya, Makan Pourzandi, Lingyu Wang:
VinciDecoder: Automatically Interpreting Provenance Graphs into Textual Forensic Reports with Application to OpenStack. NordSec 2022: 346-367 - Hans P. Reiser, Marcel Kyas:
Secure IT Systems - 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30-December 2, 2022, Proceedings. Lecture Notes in Computer Science 13700, Springer 2022, ISBN 978-3-031-22294-8 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-01-04 01:48 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint