|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 83 occurrences of 74 keywords
|
|
|
Results
Found 305 publication records. Showing 295 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
228 | Senda Hammouda, Zouheir Trabelsi |
An enhanced secure ARP protocol and LAN switch for preveting ARP based attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, IWCMC 2009, Leipzig, Germany, June 21-24, 2009, pp. 942-946, 2009, ACM, 978-1-60558-569-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
ARP cache poisoning attack, ARP protocol, man-in-the-middle attack |
137 | Sanjeev Kumar |
Impact of Distributed Denial of Service (DDoS) Attack Due to ARP Storm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN (2) ![In: Networking - ICN 2005, 4th International Conference on Networking, ReunionIsland, France, April 17-21, 2005, Proceedings, Part II, pp. 997-1002, 2005, Springer, 3-540-25338-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
ARP attack, Distributed Denial of Service Attacks, Computer Network Security |
111 | Vipul Goyal, Rohit Tripathy 0002 |
An Efficient Solution to the ARP Cache Poisoning Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings, pp. 40-51, 2005, Springer, 3-540-26547-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
107 | Yasser Yasami, Majid Farahmand, Vahid Zargari |
An ARP-based Anomaly Detection Algorithm Using Hidden Markov Model in Enterprise Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSNC ![In: Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), August 25-31, 2007, Cap Esterel, French Riviera, France, pp. 69, 2007, IEEE Computer Society, 0-7695-2938-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Address Resolution Protocol (ARP), Hidden Markov Model (HMM), Anomaly Detection |
96 | Vivek Ramachandran, Sukumar Nandi |
Detecting ARP Spoofing: An Active Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings, pp. 239-250, 2005, Springer, 3-540-30706-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
96 | Mahesh V. Tripunitara, Partha Dutta |
A Middleware Approach to Asynchronous and Backward Compatible Detection and Prevention of ARP Cache Poisoning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 303-309, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
81 | Cristina L. Abad, Rafael Bonilla |
An Analysis on the Schemes for Detecting and Preventing ARP Cache Poisoning Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 27th International Conference on Distributed Computing Systems Workshops (ICDCS 2007 Workshops), June 25-29, 2007, Toronto, Ontario, Canada, pp. 60, 2007, IEEE Computer Society, 0-7695-2881-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
78 | Yuh-Chung Lin, Wei Kuang Lai, Feng-Jung Liu |
ARP-like direct link transmission scheme in WLAN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICUIMC ![In: Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC 2009, Suwon, Korea, January 15-16, 2009, pp. 26-31, 2009, ACM, 978-1-60558-405-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
ARP, ad hoc mode, direct link setup, infrastructure mode, IEEE 802.11e |
75 | Wesam Lootah, William Enck, Patrick D. McDaniel |
TARP: Ticket-based Address Resolution Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 21st Annual Computer Security Applications Conference (ACSAC 2005), 5-9 December 2005, Tucson, AZ, USA, pp. 106-116, 2005, IEEE Computer Society, 0-7695-2461-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
66 | Majid Farahmand, Arash Azarfar, A. Jafari, Vahid Zargari |
A Multivariate Adaptive Method for Detecting ARP Anomaly in Local Area Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSNC ![In: Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29 - November 3, 2006, Papeete, Tahiti, French Polynesia, pp. 53, 2006, IEEE Computer Society, 0-7695-2699-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
66 | Dadi Ármannsson, Gísli Hjálmtýsson, Paul D. Smith, Laurent Mathy |
Controlling the effects of anomalous ARP behaviour on ethernet networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoNEXT ![In: Proceedings of the 2005 ACM Conference on Emerging Network Experiment and Technology, CoNEXT 2005, Toulouse, France, October 24-27, 2005, pp. 50-60, 2005, ACM, 1-59593-197-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
address resolution protocol, ethernet performance, rate limiting |
66 | Danilo Bruschi, A. Ornaghi, Emilia Rosti |
S-ARP: a Secure Address Resolution Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 19th Annual Computer Security Applications Conference (ACSAC 2003), 8-12 December 2003, Las Vegas, NV, USA, pp. 66-74, 2003, IEEE Computer Society, 0-7695-2041-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
60 | Venkata C. Giruka, Mukesh Singhal |
Angular Routing Protocol for Mobile Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 6-10 June 2005, Columbus, OH, USA, pp. 551-557, 2005, IEEE Computer Society, 0-7695-2328-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Mobility, Mobile Ad-hoc networks, Position-based routing |
51 | Jahwan Koo, Seong-Jin Ahn 0001, Younghwan Lim, Youngsong Mun |
Evaluation of Network Blocking Algorithm Based on ARP Spoofing and Its Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part II, pp. 848-855, 2005, Springer, 3-540-25861-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
51 | A. Bruce McDonald, Taieb Znati |
Comparative Analysis of Neighbor Greeting Procotols ARP Versus ES-IS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Annual Simulation Symposium ![In: Proceedings 29st Annual Simulation Symposium (SS '96), April 8-11, 1996, New Orleans, LA, USA, pp. 71-80, 1996, IEEE Computer Society, 0-8186-7432-6. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
45 | Hyuncheol Kim, Seong-Jin Ahn 0001, Jun Kyun Choi |
Performance Analysis of Dynamic Host Isolation System in Wireless Mobile Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (5) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part V, pp. 829-838, 2006, Springer, 3-540-34079-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
45 | Yang-Wai Chow, Ronald Pose, Matthew Regan, James G. Phillips |
Human visual perception of region warping distortions with different display and scene characteristics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GRAPHITE ![In: Proceedings of the 4th International Conference on Computer Graphics and Interactive Techniques in Australasia and Southeast Asia 2006, Kuala Lumpur, Malaysia, November 29 - December 2, 2006, pp. 357-365, 2006, ACM, 1-59593-564-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
region warping, visual perception, distortion |
45 | Zouheir Trabelsi, Hamza Rahmani, Kamel Kaouech, Mounir Frikha |
Malicious Sniffing Systems Detection Platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT ![In: 2004 Symposium on Applications and the Internet (SAINT 2004), 26-30 January 2004, Tokyo, Japan, pp. 201-207, 2004, IEEE Computer Society, 0-7695-2068-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
42 | Jaroslaw Paduch, Jamie Levy, Bilal Khan |
Using a secure permutational covert channel to detect local and wide area interposition attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, IWCMC 2009, Leipzig, Germany, June 21-24, 2009, pp. 79-83, 2009, ACM, 978-1-60558-569-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
ARP, interposition, protocols, covert channels, DNS |
42 | Qing Li, Kip Macy |
Optimizing the BSD routing system for parallel processing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRESTO ![In: Proceedings of the ACM SIGCOMM 2009 Workshop on Programmable Routers for Extensible Services of Tomorrow, PRESTO 2009, Barcelona, Spain, August 21, 2009, pp. 37-42, 2009, ACM, 978-1-60558-446-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
arp, flow table, mp, neighbor cache, server load balancing (slb), smp, routing, synchronization, ipv6, freebsd, ip |
41 | Mohammed M. Alani, Ali Ismail Awad, Ezedin Barka |
ARP-PROBE: An ARP spoofing detector for Internet of Things networks using explainable deep learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Things ![In: Internet Things 23, pp. 100861, October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
41 | Sabah M. Morsy, Dalia Nashat |
D-ARP: An Efficient Scheme to Detect and Prevent ARP Spoofing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 49142-49153, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
41 | Motoyuki Ohmori, Naoki Miyata, Koji Okamura |
AXARPSC: Scalable ARP Snooping Using Policy-based Mirroring of Core Switches with ARP Log Contraction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Process. ![In: J. Inf. Process. 29, pp. 198-204, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
41 | Isaías Martinez-Yelmo, Joaquin Alvarez-Horcajo, Miguel Briso-Montiano, Diego Lopez-Pajares, Elisa Rojas |
ARP-P4: deep analysis of a hybrid SDN ARP-Path/P4Runtime switch. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Telecommun. Syst. ![In: Telecommun. Syst. 72(4), pp. 555-565, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
41 | Youngpin Kim, Sungwon Ahn, Nguyen Canh Thang, DongHo Choi, Minho Park |
ARP Poisoning Attack Detection Based on ARP Update State in Software-Defined Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: 33rd International Conference on Information Networking, ICOIN 2019, Kuala Lumpur, Malaysia, January 9-11, 2019, pp. 366-371, 2019, IEEE, 978-1-5386-8350-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
41 | Isaías Martinez-Yelmo, Joaquin Alvarez-Horcajo, Miguel Briso-Montiano, Diego Lopez-Pajares, Elisa Rojas |
ARP-P4: A Hybrid ARP-Path/P4Runtime Switch. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNP ![In: 2018 IEEE 26th International Conference on Network Protocols, ICNP 2018, Cambridge, UK, September 25-27, 2018, pp. 438-439, 2018, IEEE Computer Society, 978-1-5386-6043-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
41 | Mark Matties |
Distributed responder ARP: Using SDN to re-engineer ARP from within the network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNC ![In: 2017 International Conference on Computing, Networking and Communications, ICNC 2017, Silicon Valley, CA, USA, January 26-29, 2017, pp. 678-683, 2017, IEEE Computer Society, 978-1-5090-4588-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
41 | Vassilis Prevelakis, Wael Adi |
LS-ARP: A lightweight and secure ARP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EST ![In: Seventh International Conference on Emerging Security Technologies, EST 2017, Canterbury, United Kingdom, September 6-8, 2017, pp. 204-208, 2017, IEEE, 978-1-5386-4018-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
41 | Talal Alharbi, Marius Portmann |
SProxy ARP - efficient ARP handling in SDN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNAC ![In: 26th International Telecommunication Networks and Applications Conference, ITNAC 2016, Dunedin, New Zealand, December 7-9, 2016, pp. 179-184, 2016, IEEE Computer Society, 978-1-5090-0919-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
41 | Hyunjeong Cho, Saehoon Kang, Younghee Lee |
Centralized ARP proxy server over SDN controller to cut down ARP broadcast in large-scale data center networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: 2015 International Conference on Information Networking, ICOIN 2015, Siem Reap, Cambodia, January 12-14, 2015, pp. 301-306, 2015, IEEE Computer Society, 978-1-4799-8342-1. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
41 | Mukul Tiwari, Sumit Kumar |
Vulnerability of MR-ARP in Prevention of ARP Poisoning and Solution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSCC ![In: Security in Computing and Communications - Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014. Proceedings, pp. 363-369, 2014, Springer, 978-3-662-44965-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
41 | Guillermo Ibáñez, Juan A. Carral, José M. Arco, Diego Rivera, A. Montalvo |
ARP-Path: ARP-Based, Shortest Path Bridges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Commun. Lett. ![In: IEEE Commun. Lett. 15(7), pp. 770-772, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
41 | Seung Yeob Nam, Dongwon Kim, Jeongeun Kim |
Enhanced ARP: preventing ARP poisoning-based man-in-the-middle attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Commun. Lett. ![In: IEEE Commun. Lett. 14(2), pp. 187-189, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
41 | Zhenqi Wang, Yu Zhou |
Monitoring ARP Attack Using Responding Time and State ARP Cache. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISNN (4) ![In: The Sixth International Symposium on Neural Networks, ISNN 2009, Wuhan, China, May 26-29, 2009, Proceedings, Part IV, pp. 701-709, 2009, Springer, 978-3-642-01215-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
41 | Zouheir Trabelsi, Wassim El-Hajj |
Preventing ARP Attacks Using a Fuzzy-Based Stateful ARP Cache. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2007, Glasgow, Scotland, UK, 24-28 June 2007, pp. 1355-1360, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
41 | K. K. Bhattacharya, Hergovind Singh |
Agricultural Resource Planning through-IT platform - An approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Oper. Res. ![In: Oper. Res. 5(1), pp. 49-65, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
ARP (Agriculture resource planning), (DSS) Decision support system, Value chain |
41 | Chan Park, Jong Hyup Lee, Jin-Oh Kim, Hyup Jong Kim |
IP routing on logical address group. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCN ![In: Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1997), September 22-25, 1997 Las Vegas, NV, USA, pp. 378-382, 1997, IEEE Computer Society, 0-8186-8186-1. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
logical address group, virtual channel connection, IETF RFC1577, ARP over ATM, classical IP, logical IP subnet, ATM Forum, next hop resolution protocol, NHRP, MPOA, multiprotocol over ATM, inter-LIS communication, LIS information protocol, test-bed network, Internet, transport protocols, ATM network, prototype systems, IETF, network routers, IP services, IP routing |
36 | Ajit Nimbalker, Yufei W. Blankenship, Brian K. Classon, Keith T. Blankenship |
ARP and QPP Interleavers for LTE Turbo Coding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNC ![In: WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008 - April 3 2008, Las Vegas, Nevada, USA, Conference Proceedings, pp. 1032-1037, 2008, IEEE, 978-1-4244-1997-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Kyohyeok Kwon, Seong-Jin Ahn 0001, Jin-Wook Chung |
Network Security Management Using ARP Spoofing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part I, pp. 142-149, 2004, Springer, 3-540-22054-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
32 | Mohamed Abdelkader, Jorge Humberto Bravo Mendez, Marouane Temimi, Dana R. N. Brown, Katie V. Spellman, Christopher D. Arp, Allen C. Bondurant, Holli Kohl |
A Google Earth Engine Platform to Integrate Multi-Satellite and Citizen Science Data for the Monitoring of River Ice Dynamics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Remote. Sens. ![In: Remote. Sens. 16(8), pp. 1368, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
32 | Julia Wasala, Suzanne M. Marselis, Laurens Arp, Holger H. Hoos, Nicolas Longépé, Mitra Baratchi |
AutoSR4EO: An AutoML Approach to Super-Resolution for Earth Observation Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Remote. Sens. ![In: Remote. Sens. 16(3), pp. 443, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
32 | Zeliang Kan, Shae McFadden, Daniel Arp, Feargus Pendlebury, Roberto Jordaney, Johannes Kinder, Fabio Pierazzi, Lorenzo Cavallaro |
TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time (Extended Version). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.01359, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
32 | Daniel Arp, Erwin Quiring, Feargus Pendlebury, Alexander Warnecke, Fabio Pierazzi, Christian Wressnegger, Lorenzo Cavallaro, Konrad Rieck |
Lessons Learned on Machine Learning for Computer Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 21(5), pp. 72-77, September - October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
32 | Theo Chow, Zeliang Kan, Lorenz Linhardt, Lorenzo Cavallaro, Daniel Arp, Fabio Pierazzi |
Drift Forensics of Malware Classifiers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec@CCS ![In: Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security, AISec 2023, Copenhagen, Denmark, 30 November 2023, pp. 197-207, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
32 | Lukas Bostelmann-Arp, Christoph Steup, Sanaz Mostaghim |
Multi-Objective Seed Curve Optimization for Coverage Path Planning in Precision Farming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO ![In: Proceedings of the Genetic and Evolutionary Computation Conference, GECCO 2023, Lisbon, Portugal, July 15-19, 2023, pp. 1312-1320, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
32 | Laurens Arp, Mitra Baratchi, Holger H. Hoos |
VPint: value propagation-based spatial interpolation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Min. Knowl. Discov. ![In: Data Min. Knowl. Discov. 36(5), pp. 1647-1678, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
32 | Vera Wesselkamp, Konrad Rieck, Daniel Arp, Erwin Quiring |
Misleading Deep-Fake Detection with GAN Fingerprints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2205.12543, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
32 | Stefan Czybik, Daniel Arp, Konrad Rieck |
Quantifying the Risk of Wormhole Attacks on Bluetooth Contact Tracing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24 - 27, 2022, pp. 264-275, 2022, ACM, 978-1-4503-9220-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
32 | Daniel Arp, Erwin Quiring, Feargus Pendlebury, Alexander Warnecke, Fabio Pierazzi, Christian Wressnegger, Lorenzo Cavallaro, Konrad Rieck |
Dos and Don'ts of Machine Learning in Computer Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022, pp. 3971-3988, 2022, USENIX Association, 978-1-939133-31-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
32 | Vera Wesselkamp, Konrad Rieck, Daniel Arp, Erwin Quiring |
Misleading Deep-Fake Detection with GAN Fingerprints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SP (Workshops) ![In: 43rd IEEE Security and Privacy, SP Workshops 2022, San Francisco, CA, USA, May 22-26, 2022, pp. 59-65, 2022, IEEE, 978-1-6654-9643-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
32 | Christian Wressnegger, Delphine Reinhardt, Thomas Barber, Bernhard C. Witt, Daniel Arp, Zoltán Ádám Mann (eds.) |
Sicherheit, Schutz und Zuverlässigkeit: Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), Sicherheit 2022, Karlsruhe, Germany, April 5-8, 2022. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sicherheit ![Gesellschaft für Informatik, Bonn, 978-3-88579-717-3 The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
32 | Joan Grau, Kang Liang, Jae Ogilvie, Paul Arp, Sheng Li, Bonnie Robertson, Fan-Rui Meng |
Using Unmanned Aerial Vehicle and LiDAR-Derived DEMs to Estimate Channels of Small Tributary Streams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Remote. Sens. ![In: Remote. Sens. 13(17), pp. 3380, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
32 | Joan Grau, Kang Liang, Jae Ogilvie, Paul Arp, Sheng Li, Bonnie Robertson, Fan-Rui Meng |
Improved Accuracy of Riparian Zone Mapping Using Near Ground Unmanned Aerial Vehicle and Photogrammetry Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Remote. Sens. ![In: Remote. Sens. 13(10), pp. 1997, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
32 | Laurens Arp |
A Markov Reward Process-Based Approach to Spatial Interpolation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2106.00538, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
32 | Jan Malte Hilgefort, Daniel Arp, Konrad Rieck |
Spying through Virtual Backgrounds of Video Calls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec@CCS ![In: AISec@CCS 2021: Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security, Virtual Event, Republic of Korea, 15 November 2021, pp. 135-144, 2021, ACM, 978-1-4503-8657-9. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
32 | Daniel Arp, Erwin Quiring, Feargus Pendlebury, Alexander Warnecke, Fabio Pierazzi, Christian Wressnegger, Lorenzo Cavallaro, Konrad Rieck |
Dos and Don'ts of Machine Learning in Computer Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2010.09470, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
32 | Erwin Quiring, Lukas Pirch, Michael Reimsbach, Daniel Arp, Konrad Rieck |
Against All Odds: Winning the Defense Challenge in an Evasion Competition with Diversification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2010.09569, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
32 | Laurens Arp, Dyon van Vreumingen, Daniela Gawehns, Mitra Baratchi |
Metaheuristic macro scale traffic flow optimisation from urban movement data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2006.02214, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
32 | Erwin Quiring, David Klein, Daniel Arp, Martin Johns, Konrad Rieck |
Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks in Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 29th USENIX Security Symposium, USENIX Security 2020, August 12-14, 2020, pp. 1363-1380, 2020, USENIX Association, 978-1-939133-17-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
32 | Laurens Arp, Dyon van Vreumingen, Daniela Gawehns, Mitra Baratchi |
Dynamic macro scale traffic flow optimisation using crowd-sourced urban movement data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MDM ![In: 21st IEEE International Conference on Mobile Data Management, MDM 2020, Versailles, France, June 30 - July 3, 2020, pp. 168-177, 2020, IEEE, 978-1-7281-4663-8. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
32 | Alexander Warnecke, Daniel Arp, Christian Wressnegger, Konrad Rieck |
Evaluating Explanation Methods for Deep Learning in Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroS&P ![In: IEEE European Symposium on Security and Privacy, EuroS&P 2020, Genoa, Italy, September 7-11, 2020, pp. 158-174, 2020, IEEE, 978-1-7281-5087-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
32 | Alexander Warnecke, Daniel Arp, Christian Wressnegger, Konrad Rieck |
Don't Paint It Black: White-Box Explanations for Deep Learning in Computer Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1906.02108, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
32 | Ambra Demontis, Marco Melis, Battista Biggio, Davide Maiorca, Daniel Arp, Konrad Rieck, Igino Corona, Giorgio Giacinto, Fabio Roli |
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 16(4), pp. 711-724, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
32 | Daniel Arp |
Erkennung mobiler Schadsoftware mit maschinellen Lernverfahren. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ausgezeichnete Informatikdissertationen ![In: Ausgezeichnete Informatikdissertationen 2019., pp. 9-18, 2019, GI, 978-3-88579-775-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
32 | Daniel Arp |
Efficient and Explainable Detection of Mobile Malware with Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2019 |
RDF |
|
32 | Sara Belle Donevant, Robin Dawson Estrada, Joan Marie Culley, Brian Habing, Swann Arp Adams |
Exploring app features with outcomes in mHealth studies involving chronic respiratory diseases, diabetes, and hypertension: a targeted exploration of the literature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Am. Medical Informatics Assoc. ![In: J. Am. Medical Informatics Assoc. 25(10), pp. 1407-1418, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
32 | Daniel Arp, Erwin Quiring, Tammo Krueger, Stanimir Dragiev, Konrad Rieck |
Privacy-Enhanced Fraud Detection with Bloom Filters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm (1) ![In: Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings, Part I, pp. 396-415, 2018, Springer, 978-3-030-01700-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
32 | Erwin Quiring, Daniel Arp, Konrad Rieck |
Forgotten Siblings: Unifying Attacks on Machine Learning and Digital Watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroS&P ![In: 2018 IEEE European Symposium on Security and Privacy, EuroS&P 2018, London, United Kingdom, April 24-26, 2018, pp. 488-502, 2018, IEEE, 978-1-5386-4228-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
32 | Ingmar Nitze, Guido Grosse, Benjamin M. Jones, Christopher D. Arp, Mathias Ulrich, Alexander N. Fedorov, Alexandra Veremeeva |
Landsat-Based Trend Analysis of Lake Dynamics across Northern Permafrost Regions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Remote. Sens. ![In: Remote. Sens. 9(7), pp. 640, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
32 | Erwin Quiring, Daniel Arp, Konrad Rieck |
Fraternal Twins: Unifying Attacks on Machine Learning and Digital Watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1703.05561, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
32 | Ambra Demontis, Marco Melis, Battista Biggio, Davide Maiorca, Daniel Arp, Konrad Rieck, Igino Corona, Giorgio Giacinto, Fabio Roli |
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1704.08996, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
32 | Hugo Gascon, Bernd Grobauer, Thomas Schreck, Lukas Rist, Daniel Arp, Konrad Rieck |
Mining Attributed Graphs for Threat Intelligence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017, pp. 15-22, 2017, ACM, 978-1-4503-4523-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
32 | Daniel Arp, Erwin Quiring, Christian Wressnegger, Konrad Rieck |
Privacy Threats through Ultrasonic Side Channels on Mobile Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroS&P ![In: 2017 IEEE European Symposium on Security and Privacy, EuroS&P 2017, Paris, France, April 26-28, 2017, pp. 35-47, 2017, IEEE, 978-1-5090-5762-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
32 | Christian Wressnegger, Fabian Yamaguchi, Daniel Arp, Konrad Rieck |
Comprehensive Analysis and Detection of Flash-Based Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings, pp. 101-121, 2016, Springer, 978-3-319-40666-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
32 | Michael Spreitzenbarth, Thomas Schreck, Florian Echtler, Daniel Arp, Johannes Hoffmann |
Mobile-Sandbox: combining static and dynamic analysis with machine-learning techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 14(2), pp. 141-153, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
32 | Henning Perl, Sergej Dechand, Matthew Smith 0001, Daniel Arp, Fabian Yamaguchi, Konrad Rieck, Sascha Fahl, Yasemin Acar |
VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015, pp. 426-437, 2015, ACM, 978-1-4503-3832-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
32 | Daniel Arp, Fabian Yamaguchi, Konrad Rieck |
Torben: A Practical Side-Channel Attack for Deanonymizing Tor Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, Singapore, April 14-17, 2015, pp. 597-602, 2015, ACM, 978-1-4503-3245-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
32 | Hugo Gascon, Christian Wressnegger, Fabian Yamaguchi, Daniel Arp, Konrad Rieck |
Pulsar: Stateful Black-Box Fuzzing of Proprietary Network Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Security and Privacy in Communication Networks - 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers, pp. 330-347, 2015, Springer, 978-3-319-28864-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
32 | Daniel Arp, Michael Spreitzenbarth, Malte Hubner, Hugo Gascon, Konrad Rieck |
DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDSS ![In: 21st Annual Network and Distributed System Security Symposium, NDSS 2014, San Diego, California, USA, February 23-26, 2014, 2014, The Internet Society. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
32 | Fabian Yamaguchi, Nico Golde, Daniel Arp, Konrad Rieck |
Modeling and Discovering Vulnerabilities with Code Property Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Symposium on Security and Privacy ![In: 2014 IEEE Symposium on Security and Privacy, SP 2014, Berkeley, CA, USA, May 18-21, 2014, pp. 590-604, 2014, IEEE Computer Society, 978-1-4799-4686-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
32 | Bettina C. Schwab, Gunnar Seemann, Richard A. Lasher, Natalia S. Torres, Eike M. Wülfers, Maren Arp, Eric D. Carruth, John H. B. Bridge, Frank B. Sachse |
Quantitative Analysis of Cardiac Tissue Including Fibroblasts Using Three-Dimensional Confocal Microscopy and Image Reconstruction: Towards a Basis for Electrophysiological Modeling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Medical Imaging ![In: IEEE Trans. Medical Imaging 32(5), pp. 862-872, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
32 | Hugo Gascon, Fabian Yamaguchi, Daniel Arp, Konrad Rieck |
Structural detection of android malware using embedded call graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: AISec'13, Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, Co-located with CCS 2013, Berlin, Germany, November 4, 2013, pp. 45-54, 2013, ACM, 978-1-4503-2488-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
32 | Christian Wressnegger, Guido Schwenk, Daniel Arp, Konrad Rieck |
A close look on n-grams in intrusion detection: anomaly detection vs. classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: AISec'13, Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, Co-located with CCS 2013, Berlin, Germany, November 4, 2013, pp. 67-76, 2013, ACM, 978-1-4503-2488-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
32 | Volker Eiselein, Daniel Arp, Michael Pätzold, Thomas Sikora |
Real-Time Multi-human Tracking Using a Probability Hypothesis Density Filter and Multiple Detectors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AVSS ![In: Ninth IEEE International Conference on Advanced Video and Signal-Based Surveillance, AVSS 2012, Beijing, China, September 18-21, 2012, pp. 325-330, 2012, IEEE Computer Society, 978-1-4673-2499-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
32 | John-Paul Arp, Bradford G. Nickerson |
End-to-End Acknowledgement for Data Collection in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNSR ![In: 8th Annual Conference on Communication Networks and Services Research, CNSR 2010, 11-14 May 2010, Montreal, Canada, pp. 93-101, 2010, IEEE Computer Society, 978-0-7695-4041-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
wireless data protocol, sensor network protocol, low power, TinyOS, reliable communication, experimental validation |
32 | Jana Kolbe, Andreas Arp, Francesco Calderone, Edouard Marc Meyer, Wilhelm Meyer, Helmut Schaefer, Manuela Stuve |
Inkjettable conductive adhesive for use in microelectronics and microsystems technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Microelectron. Reliab. ![In: Microelectron. Reliab. 47(2-3), pp. 331-334, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
32 | John-Paul Arp, Bradford G. Nickerson |
A User Friendly Toolkit for Building Robust Environmental Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNSR ![In: Fifth Annual Conference on Communication Networks and Services Research (CNSR 2007), 14-17 May 2006, Fredericton, New Brunswick, Canada, pp. 76-84, 2007, IEEE Computer Society, 0-7695-2835-X. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Quazi K. Hassan, Charles P.-A. Bourque, Fan-Rui Meng, Paul Arp, David A. MacLean, Yun Zhang |
Net Daytime Carbon Dioxide Fluxes Over Eastern Canadian Forests: An Application of MODIS Imagery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IGARSS ![In: IEEE International Geoscience & Remote Sensing Symposium, IGARSS 2006, July 31 - August 4, 2006, Denver, Colorado, USA, Proceedings, pp. 1717-1720, 2006, IEEE, 0-7803-9509-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Bradford G. Nickerson, Zhongwei Sun, John-Paul Arp |
A Sensor Web Language for Mesh Architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNSR ![In: Third Annual Conference on Communication Networks and Services Research (CNSR 2005), 16-18 May 2005, Halifax, Novia Scotia, Canada, pp. 269-274, 2005, IEEE Computer Society, 0-7695-2333-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Ferdinand Arp |
Kovarianzgestützte lineare Interpolation unterabgetasteter Signale. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASST ![In: ASST '90, 7. Aachener Symposium für Signaltheorie: Modellgestützte Signalverarbeitung, Aachen, 12.-14. September 1990, Proceedings, pp. 154-159, 1990, Springer, 3-540-53124-6. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
32 | Ferdinand Arp |
Irrelevanzreduktion von Bildinformation durch Unscharffilterung. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASST ![In: ASST '87, 6. Aachener Symposium für Signaltheorie: Mehrdimensionale Signale und Bildverarbeitung, Aachen, 9.-12. September 1987, Proceedings, pp. 187-190, 1987, Springer, 3-540-18401-5. The full citation details ...](Pics/full.jpeg) |
1987 |
DBLP DOI BibTeX RDF |
|
30 | Finn Michael Halvorsen, Olav Haugen, Martin Eian, Stig Fr. Mjølsnes |
An Improved Attack on TKIP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NordSec ![In: Identity and Privacy in the Internet Age, 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings, pp. 120-132, 2009, Springer, 978-3-642-04765-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Yasser Yasami, Siavash Khorsandi, Saadat Pour Mozaffari, A. Jalalian |
An unsupervised network anomaly detection approach by k-Means clustering & ID3 algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), July 6-9, Marrakech, Morocco, pp. 398-403, 2008, IEEE Computer Society, 978-1-4244-2702-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Yves Igor Jerschow, Christian Lochert, Björn Scheuermann 0001, Martin Mauve |
CLL: A Cryptographic Link Layer for Local Area Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks, 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings, pp. 21-38, 2008, Springer, 978-3-540-85854-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Louis Senécal |
Understanding and Preventing Attacks at Layer 2 of the OSI Reference Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNSR ![In: Fourth Annual Conference on Communication Networks and Services Research (CNSR 2006), 24-25 May 2006, Moncton, New Brunswick, Canada, pp. 6-8, 2006, IEEE Computer Society, 0-7695-2578-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Yang-Wai Chow, Ronald Pose, Matthew Regan, James G. Phillips |
Human visual perception of region warping distortions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSC ![In: Computer Science 2006, Twenty-Nineth Australasian Computer Science Conference (ACSC2006), Hobart, Tasmania, Australia, January 16-19 2006, pp. 217-226, 2006, Australian Computer Society, 1-920682-30-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
address recalculation pipeline, priority rendering, region warping, tearing artefacts, visual perception, object segmentation |
30 | André Zúquete, Hugo Marques |
A Security Architecture for Protecting LAN Interactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings, pp. 311-326, 2006, Springer, 3-540-38341-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Shaikh Mostafa Al Masum, Mitsuru Ishizuka |
Making Topic-Specific Report and Multimodal Presentation Automatically by Mining the Web Resources. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Web Intelligence ![In: 2006 IEEE / WIC / ACM International Conference on Web Intelligence (WI 2006), 18-22 December 2006, Hong Kong, China, pp. 240-246, 2006, IEEE Computer Society, 0-7695-2747-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Sang-Woon Kim, B. John Oommen |
Enhancing prototype reduction schemes with recursion: a method applicable for "large" data sets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Syst. Man Cybern. Part B ![In: IEEE Trans. Syst. Man Cybern. Part B 34(3), pp. 1384-1397, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Hyuncheol Kim, Sunghae Kim, Seong-Jin Ahn 0001, Jin-Wook Chung |
A Host Protection Framework Against Unauthorized Access for Ensuring Network Survivability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NPC ![In: Network and Parallel Computing, IFIP International Conference, NPC 2004, Wuhan, China, October 18-20, 2004, Proceedings, pp. 635-643, 2004, Springer, 3-540-23388-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 295 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ >>] |
|