default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 34 matches
- 2017
- Michael Backes, Sven Bugiel, Philipp von Styp-Rekowsky, Marvin WiBfeld:
Seamless In-App Ad Blocking on Stock Android. IEEE Symposium on Security and Privacy Workshops 2017: 163-168 - Jörg Keller, Gabriele Spenger, Steffen Wendzel:
Ant Colony-Inspired Parallel Algorithm to Improve Cryptographic Pseudo Random Number Generators. IEEE Symposium on Security and Privacy Workshops 2017: 17-22 - Kinan Dak Albab, Rawane Issa, Andrei Lapets, Azer Bestavros, Nikolaj Volgushev:
Scalable Secure Multi-party Network Vulnerability Analysis via Symbolic Optimization. IEEE Symposium on Security and Privacy Workshops 2017: 211-216 - Prashant Anantharaman, Michael E. Locasto, Gabriela F. Ciocarlie, Ulf Lindqvist:
Building Hardened Internet-of-Things Clients with Language-Theoretic Security. IEEE Symposium on Security and Privacy Workshops 2017: 120-126 - Aniqua Z. Baset, Tamara Denning:
IDE Plugins for Detecting Input-Validation Vulnerabilities. IEEE Symposium on Security and Privacy Workshops 2017: 143-146 - Tobias Bieschke, Lars Hermerschmidt, Bernhard Rumpe, Peter Stanchev:
Eliminating Input-Based Attacks by Deriving Automated Encoders and Decoders from Context-Free Grammars. IEEE Symposium on Security and Privacy Workshops 2017: 93-101 - Konstantin Böttinger:
Guiding a Colony of Black-Box Fuzzers with Chemotaxis. IEEE Symposium on Security and Privacy Workshops 2017: 11-16 - José Camacho, Pedro Garcia-Teodoro, Gabriel Maciá-Fernández:
Traffic Monitoring and Diagnosis with Multivariate Statistical Network Monitoring: A Case Study. IEEE Symposium on Security and Privacy Workshops 2017: 241-246 - Ankur Chattopadhyay, Michael J. Schulz, Clinton Rettler, Katie Turkiewicz, Laleah Fernandez, Askar Ziganshin:
Towards a Biometric Authentication-Based Hybrid Trust-Computing Approach for Verification of Provider Profiles in Online Healthcare Information. IEEE Symposium on Security and Privacy Workshops 2017: 56-65 - Pierre Chifflier, Geoffroy Couprie:
Writing Parsers Like it is 2017. IEEE Symposium on Security and Privacy Workshops 2017: 80-92 - Andrei Costin:
Lua Code: Security Overview and Practical Approaches to Static Analysis. IEEE Symposium on Security and Privacy Workshops 2017: 132-142 - Errin W. Fulp, H. Donald Gage, Matthew R. McNiece:
Using Evolutionary Diversity to Identify Problematic Software Parameters. IEEE Symposium on Security and Privacy Workshops 2017: 35-40 - Oliver Gasser, Quirin Scheitle, Carl Denis, Nadja Schricker, Georg Carle:
Security Implications of Publicly Reachable Building Automation Systems. IEEE Symposium on Security and Privacy Workshops 2017: 199-204 - Jeroen van der Ham:
Ethics and Internet Measurements. IEEE Symposium on Security and Privacy Workshops 2017: 247-251 - Ruidan Li, Errin W. Fulp:
Evolutionary Approaches for Resilient Surveillance Management. IEEE Symposium on Security and Privacy Workshops 2017: 23-28 - Fang Liu, Haipeng Cai, Gang Wang, Danfeng Yao, Karim O. Elish, Barbara G. Ryder:
MR-Droid: A Scalable and Prioritized Analysis of Inter-App Communication Risks. IEEE Symposium on Security and Privacy Workshops 2017: 189-198 - Yi Lu, Sora Bae, Padmanabhan Krishnan, K. R. Raghavendra:
Inference of Security-Sensitive Entities in Libraries. IEEE Symposium on Security and Privacy Workshops 2017: 102-109 - Stefan Lucks, Norina Marie Grosch, Joshua Konig:
Taming the Length Field in Binary Data: Calc-Regular Languages. IEEE Symposium on Security and Privacy Workshops 2017: 66-79 - Piers O'Hanlon, Ravishankar Borgaonkar, Lucca Hirschi:
Mobile Subscriber WiFi Privacy. IEEE Symposium on Security and Privacy Workshops 2017: 169-178 - Phu H. Phung, Abhinav Mohanty, Rahul Rachapalli, Meera Sridhar:
HybridGuard: A Principal-Based Permission and Fine-Grained Policy Enforcement Framework for Web-Based Mobile Applications. IEEE Symposium on Security and Privacy Workshops 2017: 147-156 - Brian M. Powell, Ekampreet Kalsy, Gaurav Goswami, Mayank Vatsa, Richa Singh, Afzel Noore:
Attack-Resistant aiCAPTCHA Using a Negative Selection Artificial Immune System. IEEE Symposium on Security and Privacy Workshops 2017: 41-46 - Stefan Prandl, Mihai M. Lazarescu, Duc-Son Pham, Sieteng Soh, Subhash C. Kak:
An Investigation of Power Law Probability Distributions for Network Anomaly Detection. IEEE Symposium on Security and Privacy Workshops 2017: 217-222 - Paul Prasse, Lukás Machlica, Tomás Pevný, Jirí Havelka, Tobias Scheffer:
Malware Detection by Analysing Network Traffic with Neural Networks. IEEE Symposium on Security and Privacy Workshops 2017: 205-210 - Aarthi Reddy, Meredith Ordway-West, Melissa Lee, Matt Dugan, Joshua Whitney, Ronen Kahana, Brad Ford, Johan Muedsam, Austin Henslee, Max Rao:
Using Gaussian Mixture Models to Detect Outliers in Seasonal Univariate Network Traffic. IEEE Symposium on Security and Privacy Workshops 2017: 229-234 - Jamison Rose, Yudong Liu, Ahmed Awad:
Biometric Authentication Using Mouse and Eye Movement Data. IEEE Symposium on Security and Privacy Workshops 2017: 47-55 - Hisham Salah, Mohamed Eltoweissy:
On the Personalization of Trust Management. IEEE Symposium on Security and Privacy Workshops 2017: 1-10 - Julian Sexton, Andrey Chudnov, David A. Naumann:
Spartan Jester: End-to-End Information Flow Control for Hybrid Android Applications. IEEE Symposium on Security and Privacy Workshops 2017: 157-162 - Khalid Shahbar, Nur Zincir-Heywood:
Effects of Shared Bandwidth on Anonymity of the I2P Network Users. IEEE Symposium on Security and Privacy Workshops 2017: 235-240 - Carlton Shepherd, Iakovos Gurulian, Eibe Frank, Konstantinos Markantonakis, Raja Naeem Akram, Emmanouil Panaousis, Keith Mayes:
The Applicability of Ambient Sensors as Proximity Evidence for NFC Transactions. IEEE Symposium on Security and Privacy Workshops 2017: 179-188 - Jacob I. Torrey, Mark P. Bridgman, Tomasz Tuzel:
Research Report: Hardware-Enforcement of Walther-Recursive Program Functions. IEEE Symposium on Security and Privacy Workshops 2017: 127-131
skipping 4 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-01-10 20:26 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint