The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for NSS with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1960-2001 (18) 2002-2005 (17) 2006-2008 (17) 2009 (91) 2010 (93) 2011 (59) 2012 (40) 2013 (73) 2014 (49) 2015 (42) 2016 (36) 2017 (61) 2018 (39) 2019 (49) 2020 (31) 2021 (27) 2022 (45) 2023 (22) 2024 (1)
Publication types (Num. hits)
article(19) data(1) incollection(1) inproceedings(774) proceedings(15)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 261 occurrences of 214 keywords

Results
Found 810 publication records. Showing 810 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
143Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman NSS: An NTRU Lattice-Based Signature Scheme. Search on Bibsonomy EUROCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF public key authentication, NSS, digital signature, NTRU, lattice-based cryptography
109Craig Gentry, Jakob Jonsson, Jacques Stern, Michael Szydlo Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF NSS, Transcript Analysis, Cyclotomic Integer, Cryptanalysis, Lattice, Signature Scheme, Key Recovery, NTRU, Forgery
82Craig Gentry, Michael Szydlo Cryptanalysis of the Revised NTRU Signature Scheme. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF NSS, NTRUSign, Orthogonal Lattice, Cyclotomic Integer, Galois Congruence, Cryptanalysis, Signature Scheme, Lattice Reduction, NTRU
77Hanxiao Shi, Guiyi Wei Research and Design of Multimedia NSS for E-Commerce. Search on Bibsonomy I3E (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
68Zhen Wang, John Lim Effect of Gender Composition and Negotiation Support Systems in Dyadic Setting. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
68John Lim, Yin Ping Yang Exploring Multilingual Negotiation Support for English-Chinese Dyads: An Experimental Study. Search on Bibsonomy HICSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
68Hiroaki Imade, Naoaki Mizuguchi, Isao Ono, Norihiko Ono, Masahiro Okamoto "Gridifying" an Evolutionary Algorithm for Inference of Genetic Networks Using the Improved GOGA Framework and Its Performance Evaluation on OBI Grid. Search on Bibsonomy LSGRID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
60Wei Shang, Yijun Li, Wenjun Sun A Practical Web-Based NSS Framework for E-Business Negotiation. Search on Bibsonomy HICSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
60John Lim, Binnie Gan, Ting-Ting Chang A Survey on NSS Adoption Intention. Search on Bibsonomy HICSS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Negotiation Support Systems Adoption, Technology Acceptance Model, Theory of Planned Behavior
60Jacques Ajenstat, Jaime Benchimol NSS in Project Management Enterprise Wide Technologies: The Case of PMOffice(tm). Search on Bibsonomy HICSS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
51Tung X. Bui, Melvin F. Shakun Minitrack: Negotiation Support Systems. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
51Haluk Demirkan, Michael Goul, Daniel S. Soper Service Level Agreement Negotiation: A Theory-based Exploratory Study as a Starting Point for Identifying Negotiation Support System Requirements. Search on Bibsonomy HICSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
51Richard A. Lawley, Michael Luck, Luc Moreau 0001 Modelling and Simulating Chained Negotiation to Enable Sharing of Notifications. Search on Bibsonomy Web Intelligence The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
51Tung Bui 0001, Melvin F. Shakun Negotiation Support Systems - Minitrack Introduction. Search on Bibsonomy HICSS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
43Shujun Li, Mark Manulis, Atsuko Miyaji (eds.) Network and System Security - 17th International Conference, NSS 2023, Canterbury, UK, August 14-16, 2023, Proceedings Search on Bibsonomy NSS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
43Songwei Luo, Shaojing Fu, Yuchuan Luo, Lin Liu 0018, Yanxiang Deng, Shixiong Wang Privacy-Preserving Federated Learning with Hierarchical Clustering to Improve Training on Non-IID Data. Search on Bibsonomy NSS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
43Aristodemos Paphitis, Nicolas Kourtellis, Michael Sirivianos Resilience of Blockchain Overlay Networks. Search on Bibsonomy NSS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
43Xiangyu Su, Mario Larangeira, Keisuke Tanaka Provably Secure Blockchain Protocols from Distributed Proof-of-Deep-Learning. Search on Bibsonomy NSS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
43Hiroki Kuzuno, Toshihiro Yamauchi KDRM: Kernel Data Relocation Mechanism to Mitigate Privilege Escalation Attack. Search on Bibsonomy NSS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
43Ali Burak Ünal, Nico Pfeifer, Mete Akgün ppAURORA: Privacy Preserving Area Under Receiver Operating Characteristic and Precision-Recall Curves. Search on Bibsonomy NSS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
43Anna Monreale, Francesca Naretto, Simone Rizzo Agnostic Label-Only Membership Inference Attack. Search on Bibsonomy NSS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
43Mayank Raikwar, Shuang Wu, Kristian Gjøsteen Security Model for Privacy-Preserving Blockchain-Based Cryptocurrency Systems. Search on Bibsonomy NSS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
43Aurélien Greuet, Simon Montoya, Clémence Vermeersch Modular Polynomial Multiplication Using RSA/ECC Coprocessor. Search on Bibsonomy NSS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
43Andreas Paul 0003, Franka Schuster, Hartmut König Whitelisting for Characterizing and Monitoring Process Control Communication. Search on Bibsonomy NSS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
43Rui Li, Olga Gadyatskaya Evaluating Rule-Based Global XAI Malware Detection Methods. Search on Bibsonomy NSS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
43Zhuotao Lian, Chen Zhang, Kaixi Nan, Chunhua Su SPoiL: Sybil-Based Untargeted Data Poisoning Attacks in Federated Learning. Search on Bibsonomy NSS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
43Satoki Kanno, Mamoru Mimura Detection of Malware Using Self-Attention Mechanism and Strings. Search on Bibsonomy NSS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
43Andres Hernandez-Matamoros, Hiroaki Kikuchi New LDP Approach Using VAE. Search on Bibsonomy NSS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
43Mahshid Mehr Nezhad, Elliot Laidlaw, Feng Hao 0001 Security Analysis of Mobile Point-of-Sale Terminals. Search on Bibsonomy NSS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
43Jia Wang, Shiqing He, Qiuzhen Lin RRML: Privacy Preserving Machine Learning Based on Random Response Technology. Search on Bibsonomy NSS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
43David Arroyo, Sara Degli-Esposti, Alberto Gómez-Espés, Santiago Palmero Muñoz, Luis Pérez-Miguel On the Design of a Misinformation Widget (MsW) Against Cloaked Science. Search on Bibsonomy NSS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
43Samuel Herodotou, Feng Hao 0001 Spying on the Spy: Security Analysis of Hidden Cameras. Search on Bibsonomy NSS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
43Gilang Mentari Hamidy, Pieter Philippaerts, Wouter Joosen T3E: A Practical Solution to Trusted Time in Secure Enclaves. Search on Bibsonomy NSS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
43Amirah Almutairi, BooJoong Kang, Nawfal F. Fadhel The Effectiveness of Transformer-Based Models for BEC Attack Detection. Search on Bibsonomy NSS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
43Yunusa Simpa Abdulsalam, Jaouhara Bouamama, Yahya Benkaouz, Mustapha Hedabou Decentralized SGX-Based Cloud Key Management. Search on Bibsonomy NSS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
43Maharage Nisansala Sevwandi Perera, Toru Nakamura, Takashi Matsunaka, Hiroyuki Yokoyama, Kouichi Sakurai Group Oriented Attribute-Based Encryption Scheme from Lattices with the Employment of Shamir's Secret Sharing Scheme. Search on Bibsonomy NSS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
43Xingliang Yuan, Guangdong Bai, Cristina Alcaraz, Suryadipta Majumdar (eds.) Network and System Security - 16th International Conference, NSS 2022, Denarau Island, Fiji, December 9-12, 2022, Proceedings Search on Bibsonomy NSS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
43Zoey Ziyi Li, Joseph K. Liu, Jiangshan Yu, Dragan Gasevic, Wayne Yang CVallet: A Blockchain-Oriented Application Development for Education and Recruitment. Search on Bibsonomy NSS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
43Anit Kumar Ghosal, Dipanwita Roychowdhury Strengthening the Security of AES Against Differential Fault Attack. Search on Bibsonomy NSS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
43Xinbo Ban, Ming Ding 0001, Shigang Liu, Chao Chen 0015, Jun Zhang 0010 A Survey on IoT Vulnerability Discovery. Search on Bibsonomy NSS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
43Junwei Luo, Xun Yi, Fengling Han, Xuechao Yang, Xu Yang 0002 An Efficient Clustering-Based Privacy-Preserving Recommender System. Search on Bibsonomy NSS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
43Kurt Friday, Elias Bou-Harb, Jorge Crichigno A Learning Methodology for Line-Rate Ransomware Mitigation with P4 Switches. Search on Bibsonomy NSS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
43Zhenzhen Bao, Jian Guo 0001, Shun Li, Phuong Pham Evaluating the Security of Merkle-Damgård Hash Functions and Combiners in Quantum Settings. Search on Bibsonomy NSS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
43Tianqi Zhou, Wenying Zheng, Haowen Tan An Efficient Authenticated Group Key Agreement Protocol with Dynamic Batch Verification for Secure Distributed Networks. Search on Bibsonomy NSS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
43Bo Zhang, Helei Cui, Yaxing Chen, Xiaoning Liu, Zhiwen Yu 0001, Bin Guo 0001 Enabling Secure Deduplication in Encrypted Decentralized Storage. Search on Bibsonomy NSS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
43Lei Shi, Shanti Krishnan, Sheng Wen, Yang Xiang 0001 Supporting Cyber-Attacks and System Anomaly Detection Research with an Industry 4.0 Dataset. Search on Bibsonomy NSS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
43Bhagyashri Tushir, Yuhong Liu, Behnam Dezfouli Leveraging Frame Aggregation in Wi-Fi IoT Networks for Low-Rate DDoS Attack Detection. Search on Bibsonomy NSS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
43Hongcheng Xie, Zizhuo Chen, Yu Guo 0003, Qin Liu 0003, Xiaohua Jia Privacy-Preserving Online Ride-Hailing Matching System with an Untrusted Server. Search on Bibsonomy NSS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
43Shyam Murthy, Srinivas Vivek 0001 Driver Locations Harvesting Attack on pRide. Search on Bibsonomy NSS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
43Shuang Zhao, Jincheng Zhong, Shuhui Chen, Jianbing Liang Comprehensive Mobile Traffic Characterization Based on a Large-Scale Mobile Traffic Dataset. Search on Bibsonomy NSS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
43Mengling Liu, Man Ho Au Practical Anonymous Multi-hop Locks for Lightning Network Compatible Payment Channel Networks. Search on Bibsonomy NSS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
43Xiaoling Yu, Lei Xu 0019, Xin Huang, Chungen Xu An Efficient Lattice-Based Encrypted Search Scheme with Forward Security. Search on Bibsonomy NSS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
43Shun Li, Guozhen Liu, Phuong Pham Rebound Attacks on sfSKINNY Hashing with Automatic Tools. Search on Bibsonomy NSS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
43Yining Xie, Xin Kang 0001, Tieyan Li, Cheng-Kang Chu, Haiguang Wang Towards Secure and Trustworthy Flash Loans: A Blockchain-Based Trust Management Approach. Search on Bibsonomy NSS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
43Han Xu, Priyadarsi Nanda, Jie Liang 0004, Xiangjian He The Force of Compensation, a Multi-stage Incentive Mechanism Model for Federated Learning. Search on Bibsonomy NSS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
43Siqi Xia, Sutharshan Rajasegarar, Christopher Leckie, Sarah M. Erfani, Jeffrey Chan Exploiting Redundancy in Network Flow Information for Efficient Security Attack Detection. Search on Bibsonomy NSS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
43Ning Xi 0002, Yajie Li, Jin Liu Decentralized Access Control for Secure Microservices Cooperation with Blockchain. Search on Bibsonomy NSS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
43Huihui Gong, Siqi Ma, Seyit Camtepe, Surya Nepal, Chang Xu 0002 Vulnerability Detection Using Deep Learning Based Function Classification. Search on Bibsonomy NSS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
43Jiani Fan, Lwin Khin Shar, Jiale Guo, Wenzhuo Yang, Dusit Niyato, Kwok-Yan Lam Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV Networks. Search on Bibsonomy NSS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
43Mohamed Taoufiq Damir, Tommi Meskanen, Sara Ramezanian, Valtteri Niemi A Beyond-5G Authentication and Key Agreement Protocol. Search on Bibsonomy NSS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
43Bo Yang, Yanchao Zhang, Dong Tong 0003 DOT-M: A Dual Offline Transaction Scheme of Central Bank Digital Currency for Trusted Mobile Devices. Search on Bibsonomy NSS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
43Wei Hong, Jiao Yin 0003, Mingshan You, Hua Wang 0002, Jinli Cao, Jianxin Li 0001, Ming Liu 0028 Graph Intelligence Enhanced Bi-Channel Insider Threat Detection. Search on Bibsonomy NSS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
43Zhuang Zhou, Cheng Tan, Shiyun Liu, Rongwei Yu, Siwei Wu, Shengwu Xiong BSB: Bringing Safe Browsing to Blockchain Platform. Search on Bibsonomy NSS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
43Stuart W. Hall, Amin Sakzad, Sepehr Minagar A Proof of Concept Implementation of Explainable Artificial Intelligence (XAI) in Digital Forensics. Search on Bibsonomy NSS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
43Aditya Pribadi Kalapaaking, Ibrahim Khalil, Mohammad Saidur Rahman 0001, Abdelaziz Bouras Blockchain-Based Access Control for Secure Smart Industry Management Systems. Search on Bibsonomy NSS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
43Fokke Heikamp, Lei Pan 0002, Rolando Trujillo-Rasua, Sushmita Ruj, Robin Doss Forward Traceability for Product Authenticity Using Ethereum Smart Contracts. Search on Bibsonomy NSS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
43Jianghua Liu, Lei Xu, Bruce Gu, Lei Cui 0006, Fei Zhu Efficient and Fine-Grained Sharing of Signed Healthcare Data in Smart Healthcare. Search on Bibsonomy NSS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
43Mengwei Yang, Chungen Xu, Pan Zhang Geometric Range Searchable Encryption with Forward and Backward Security. Search on Bibsonomy NSS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
43Yunhao Li, Weichuan Mo, Cong Li, Haiyang Wang, Jianwei He, Shanshan Hao, Hongyang Yan Network Intrusion Detection Adversarial Attacks for LEO Constellation Networks Based on Deep Learning. Search on Bibsonomy NSS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
43Pierre Crochelet, Christopher Neal, Nora Boulahia-Cuppens, Frédéric Cuppens Attacker Attribution via Characteristics Inference Using Honeypot Data. Search on Bibsonomy NSS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
43Yang Hong, Lisong Wang, Weizhi Meng 0001, Jian Cao, Chunpeng Ge, Qin Zhang, Rui Zhang A Privacy-Preserving Distributed Machine Learning Protocol Based on Homomorphic Hash Authentication. Search on Bibsonomy NSS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
43Eric Ficke, Raymond M. Bateman, Shouhuai Xu Reducing Intrusion Alert Trees to Aid Visualization. Search on Bibsonomy NSS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
43Hina Qayyum, Muhammad Salman, I Wayan Budi Sentana, Giang Linh Duc Nguyen, Muhammad Ikram 0001, Gareth Tyson, Mohamed Ali Kâafar A First Look at Android Apps' Third-Party Resources Loading. Search on Bibsonomy NSS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
43Keelan Evans, Alsharif Abuadbba, Tingmin Wu, Kristen Moore, Mohiuddin Ahmed, Ganna Pogrebna, Surya Nepal, Mike Johnstone RAIDER: Reinforcement-Aided Spear Phishing Detector. Search on Bibsonomy NSS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
43Xinguo Feng, Yanjun Zhang, Mark Huasong Meng, Sin G. Teo Detecting Contradictions from CoAP RFC Based on Knowledge Graph. Search on Bibsonomy NSS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
43Guizhen Yang, Mengmeng Ge, Shang Gao 0003, Xuequan Lu, Leo Yu Zhang, Robin Doss A Differential Privacy Mechanism for Deceiving Cyber Attacks in IoT Networks. Search on Bibsonomy NSS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
43Wei Yang, Shao-Jun Yang, Wei Wu 0001, Yong Zhao A Combination Reduction Algorithm and Its Application. Search on Bibsonomy NSS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
43Ru Ray Raymond Chao, Joseph K. Liu, Kai Su Blockchain Based Regulatory Technology Deployment for Real Estate Transaction. Search on Bibsonomy NSS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
43Min Yang 0002, Chao Chen 0015, Yang Liu 0003 (eds.) Network and System Security - 15th International Conference, NSS 2021, Tianjin, China, October 23, 2021, Proceedings Search on Bibsonomy NSS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
43Mustapha Hedabou Cloud Key Management Based on Verifiable Secret Sharing. Search on Bibsonomy NSS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
43Nadav Voloch, Ehud Gudes, Nurit Gal-Oz Preventing Fake News Propagation in Social Networks Using a Context Trust-Based Security Model. Search on Bibsonomy NSS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
43Yongbo Zhi, Ning Xi 0002, Yuanqing Liu, Honglei Hui A Lightweight Android Malware Detection Framework Based on Knowledge Distillation. Search on Bibsonomy NSS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
43João Soares, Ricardo Fernandez, Miguel Silva, Tadeu Freitas, Rolando Martins ZERMIA - A Fault Injector Framework for Testing Byzantine Fault Tolerant Protocols. Search on Bibsonomy NSS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
43Changzhi Li, Lihai Nie, Laiping Zhao RLTree: Website Fingerprinting Through Resource Loading Tree. Search on Bibsonomy NSS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
43Liang Zhang, Haibin Kan, Yang Xu 0013, Jinhao Ran Revocable Data Sharing Methodology Based on SGX and Blockchain. Search on Bibsonomy NSS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
43Ayman Youssef, Mohamed Abdelrazek 0001, Chandan K. Karmakar, Zubair A. Baig Tracing Software Exploitation. Search on Bibsonomy NSS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
43Yanhua Zhang, Ximeng Liu, Yupu Hu, Huiwen Jia On the Analysis of the Outsourced Revocable Identity-Based Encryption from Lattices. Search on Bibsonomy NSS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
43Wenya Wang, Yakang Li, Chao Wang, Yuan Yan, Juanru Li, Dawu Gu Re-Check Your Certificates! Experiences and Lessons Learnt from Real-World HTTPS Certificate Deployments. Search on Bibsonomy NSS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
43Hector B. Hougaard, Atsuko Miyaji Group Key Exchange Compilers from Generic Key Exchanges. Search on Bibsonomy NSS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
43Yuxin Ding, Zihan Zhou 0014, Wen Qian A Malware Family Classification Method Based on the Point Cloud Model DGCNN. Search on Bibsonomy NSS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
43Alessandro Barenghi, Diego Carrera, Silvia Mella, Andrea Pace, Gerardo Pelosi, Ruggero Susella Profiled Attacks Against the Elliptic Curve Scalar Point Multiplication Using Neural Networks. Search on Bibsonomy NSS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
43Yu Sang, Yilin Bei, Zhiyang Yang, Chen Zhao Accurate Polar Harmonic Transform-Based Watermarking Using Blind Statistical Detector. Search on Bibsonomy NSS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
43Nguyen Chi Vy, Nguyen Huu Quyen, Phan The Duy, Van-Hau Pham Federated Learning-Based Intrusion Detection in the Context of IIoT Networks: Poisoning Attack and Defense. Search on Bibsonomy NSS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
43Haisheng Yu 0001, Wenyong Wang, Yan Liu, Lihong Cheng, Sai Zou A Simplified and Effective Solution for Hybrid SDN Network Deployment. Search on Bibsonomy NSS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
43Yegang Du A Scheme for Sensor Data Reconstruction in Smart Home. Search on Bibsonomy NSS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
43Xudong Zhu, Hui Li 0006 Privacy-Preserving and Auditable Federated Deep Reinforcement Learning for Robotic Manipulation. Search on Bibsonomy NSS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
43Marios Anagnostopoulos, Egon Kidmose, Amine Laghaout, Rasmus L. Olsen, Sajad Homayoun, Christian Damsgaard Jensen, Jens Myrup Pedersen An Architecture for Processing a Dynamic Heterogeneous Information Network of Security Intelligence. Search on Bibsonomy NSS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
43Phan The Duy, Huynh Nhat Hao, Huynh Minh Chu, Van-Hau Pham A Secure and Privacy Preserving Federated Learning Approach for IoT Intrusion Detection System. Search on Bibsonomy NSS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
43Jérémy Donadio, Guillaume Guérard, Soufian Ben Amor Collection of the Main Anti-Virus Detection and Bypass Techniques. Search on Bibsonomy NSS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
43Ruiyuan Li, Zehui Song, Wei Xie, Chengwei Zhang 0002, Guohui Zhong, Xiaobing Pei HALNet: A Hybrid Deep Learning Model for Encrypted C&C Malware Traffic Detection. Search on Bibsonomy NSS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 810 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license