|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 449 occurrences of 373 keywords
|
|
|
Results
Found 662 publication records. Showing 662 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
110 | Florian Mueller 0001, Stefan Agamanolis, Frank Vetere, Martin R. Gibbs |
Brute force interactions: leveraging intense physical actions in gaming. |
OZCHI |
2009 |
DBLP DOI BibTeX RDF |
blunt force, brute force, social interaction, tangible, physical, videoconferencing, design space, sports, exertion interface |
110 | Florian Mueller 0001, Stefan Agamanolis, Frank Vetere, Martin R. Gibbs |
Brute force as input for networked gaming. |
OZCHI |
2007 |
DBLP DOI BibTeX RDF |
blunt force, brute force, interaction, framework, tangible, physical, videoconferencing, active, social, design space, sports, exertion interface, exhausting, team spirit |
84 | Florian Mueller 0001, Stefan Agamanolis, Martin R. Gibbs, Frank Vetere |
Remote impact: shadowboxing over a distance. |
CHI Extended Abstracts |
2008 |
DBLP DOI BibTeX RDF |
blunt force, brute force, interaction., tangible, physical, videoconferencing, active, social, sports, exertion interface, exhausting, team building, team spirit |
82 | Jean-Marc Champarnaud, Fabien Coulon, Thomas Paranthoën |
Brute Force Determinization of NFAs by Means of State Covers. |
CIAA |
2004 |
DBLP DOI BibTeX RDF |
|
72 | Alain Wahl, Jean Hennebert, Andreas Humm, Rolf Ingold |
Generation and Evaluation of Brute-Force Signature Forgeries. |
MRCS |
2006 |
DBLP DOI BibTeX RDF |
|
66 | Jun Yu, Come Raczy, Gary S. H. Tan |
Evaluation of a sort-based matching algorithm for DDM. |
PADS |
2002 |
DBLP DOI BibTeX RDF |
brute force algorithm, grid-based algorithm, runtime infrastructure, sort-based algorithm, high level architecture, data distribution management |
54 | Jimmy Lin |
Brute force and indexed approaches to pairwise document similarity comparisons with MapReduce. |
SIGIR |
2009 |
DBLP DOI BibTeX RDF |
distributed algorithms, hadoop |
54 | Adams Wai-Kin Kong, David Zhang 0001, Mohamed Kamel |
A Study of Brute-Force Break-ins of a Palmprint Verification System. |
AVBPA |
2005 |
DBLP DOI BibTeX RDF |
|
54 | Randal C. Nelson, Andrea Selinger |
Learning 3D Recognition Models for General Objects from Unlabeled Imagery: An Experiment in Intelligent Brute Force. |
ICPR |
2000 |
DBLP DOI BibTeX RDF |
|
53 | Christopher Schölzel |
Brutus der Orkschamane erklärt die Brute-Force-Methode(Brutus the Orc-Shaman Explains Brute-Force-Methods). |
DeLFI Workshops |
2018 |
DBLP BibTeX RDF |
|
52 | Nitin 0001, Durg Singh Chauhan, Vivek Kumar Sehgal, Ankit Mahanot, Pallavi Singh, Sohit Ahuja, Utkarsh Shrivastava, Manisha Rana, Vineet Punjabi, Shivam Vinay, Nakul Sharma |
Security Analysis and Implementation of JUIT-Image Based Authentication System Using Kerberos Protocol. |
ACIS-ICIS |
2008 |
DBLP DOI BibTeX RDF |
Image Based Authentication System, Diffie-Hellman key Exchange, Kerberos Protocol, Keystroke Logging, Tempest Attack, Shoulder Attack, Brute-force Attack, AJAX, MySQL |
50 | Cormac Herley, Dinei A. F. Florêncio |
Protecting Financial Institutions from Brute-Force Attacks. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Junko Takahashi, Toshinori Fukunaga, Kimihiro Yamakoshi |
DFA Mechanism on the AES Key Schedule. |
FDTC |
2007 |
DBLP DOI BibTeX RDF |
|
42 | Hae Yong Kim, Sidnei Alves de Araújo |
Grayscale Template-Matching Invariant to Rotation, Scale, Translation, Brightness and Contrast. |
PSIVT |
2007 |
DBLP DOI BibTeX RDF |
RST-invariance, segmentation-free shape recognition, Template matching |
42 | Ee-Chien Chang, Ren Shen, Francis Weijian Teo |
Finding the original point set hidden among chaff. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
biometric privacy protection, fingerprint template, online parking, secure sketch |
42 | Stefan Edelkamp |
Prediction of Regular Search Tree Growth by Spectral Analysis. |
KI/ÖGAI |
2001 |
DBLP DOI BibTeX RDF |
|
40 | Vincent Garcia, Frank Nielsen |
Searching High-Dimensional Neighbours: CPU-Based Tailored Data-Structures Versus GPU-Based Brute-Force Method. |
MIRAGE |
2009 |
DBLP DOI BibTeX RDF |
finding similar patches, image processing, texture synthesis, kNN, GPU programming, NVIDIA CUDA |
40 | Anna Sperotto, Ramin Sadre, Pieter-Tjerk de Boer, Aiko Pras |
Hidden Markov Model Modeling of SSH Brute-Force Attacks. |
DSOM |
2009 |
DBLP DOI BibTeX RDF |
|
40 | Javier Galbally, Julian Fiérrez, Marcos Martinez-Diaz, Javier Ortega-Garcia |
Evaluation of Brute-force Attack to Dynamic Signature Verification Using Synthetic Samples. |
ICDAR |
2009 |
DBLP DOI BibTeX RDF |
|
40 | Sammy H. M. Kwok, Edmund Y. Lam |
Effective Uses of FPGAs for Brute-Force Attack on RC4 Ciphers. |
IEEE Trans. Very Large Scale Integr. Syst. |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Matej Crepinsek, Marjan Mernik, Viljem Zumer |
Extracting grammar from programs: brute force approach. |
ACM SIGPLAN Notices |
2005 |
DBLP DOI BibTeX RDF |
learning from positive and negative examples, exhaustive search, grammar induction, grammar inference |
40 | Susumu Katayama |
Power of Brute-Force Search in Strongly-Typed Inductive Functional Programming Automation. |
PRICAI |
2004 |
DBLP DOI BibTeX RDF |
|
40 | John O. Pliam |
On the Incomparability of Entropy and Marginal Guesswork in Brute-Force Attacks. |
INDOCRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
38 | Stephen Farrell |
Leaky or Guessable Session Identifiers. |
IEEE Internet Comput. |
2011 |
DBLP DOI BibTeX RDF |
session identifier security, brute-force, guessing, information leakage |
38 | Giovanni Agosta, Alessandro Barenghi, Fabrizio De Santis, Gerardo Pelosi |
Record Setting Software Implementation of DES Using CUDA. |
ITNG |
2010 |
DBLP DOI BibTeX RDF |
Brute-force Attacks, GPGPU, DES |
28 | Lei Shi, Vandana Pursnani Janeja |
Anomalous window discovery through scan statistics for linear intersecting paths (SSLIP). |
KDD |
2009 |
DBLP DOI BibTeX RDF |
anomalous window discovery, intersecting paths, scan statistic, traffic accidents |
28 | Yu Sasaki, Kazumaro Aoki |
Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
RIPEMD, double branch, preimage, meet-in-the-middle |
28 | Debdeep Mukhopadhyay |
An Improved Fault Based Attack of the Advanced Encryption Standard. |
AFRICACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Arthur Kantor, A. Hasegawa-Johnson |
Stream weight tuning in dynamic Bayesian networks. |
ICASSP |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Umesh Bellur, Harin Vadodaria |
On Extending Semantic Matchmaking to Include Preconditions and Effects. |
ICWS |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Alberto Ros 0001, Manuel E. Acacio, José M. García 0001 |
DiCo-CMP: Efficient cache coherency in tiled CMP architectures. |
IPDPS |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Michel Leclère, Marie-Laure Mugnier |
An Algorithmic Study of Deduction in Simple Conceptual Graphs with Classical Negation. |
ICCS |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Sherif A. Tawfik, Volkan Kursun |
Characterization of New Static Independent-Gate-Biased FinFET Latches and Flip-Flops under Process Variations. |
ISQED |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Desta Tadesse, R. Iris Bahar, Joel Grodstein |
Fast Measurement of the "Non-Deterministic Zone" in Microprocessor Debug Using Maximum Likelihood Estimation. |
VTS |
2008 |
DBLP DOI BibTeX RDF |
Microprocessor Diagnosis, Pass/Fail Region, Maximum Likelihood Estimation, Silicon Debug |
28 | Eamonn J. Keogh, Jessica Lin 0001, Sang-Hee Lee, Helga Van Herle |
Finding the most unusual time series subsequence: algorithms and applications. |
Knowl. Inf. Syst. |
2007 |
DBLP DOI BibTeX RDF |
Time series data mining, Clustering, Anomaly detection |
28 | Andrew Leaver-Fay, Yuanxin Liu, Jack Snoeyink, Xueyi Wang |
Faster placement of hydrogens in protein structures by dynamic programming. |
ACM J. Exp. Algorithmics |
2007 |
DBLP DOI BibTeX RDF |
hard-sphere model, hydrogen bonds, hydrogen placement, Dynamic programming, treewidth, protein structure |
28 | Edward P. F. Chan, Jie Zhang |
A fast unified optimal route query evaluation algorithm. |
CIKM |
2007 |
DBLP DOI BibTeX RDF |
distance materialization, optimal route queries, route query evaluation |
28 | Min Yeol Lim, Vincent W. Freeh |
Determining the Minimum Energy Consumption using Dynamic Voltage and Frequency Scaling. |
IPDPS |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Ramon Piedrafita Moreno, José Luis Villarroel Salcedo |
Performance evaluation of petri nets execution algorithms. |
SMC |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Eamonn J. Keogh, Jessica Lin 0001, Ada Wai-Chee Fu, Helga Van Herle |
Finding Unusual Medical Time-Series Subsequences: Algorithms and Applications. |
IEEE Trans. Inf. Technol. Biomed. |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Matthew Hertz, Stephen M. Blackburn, J. Eliot B. Moss, Kathryn S. McKinley, Darko Stefanovic |
Generating object lifetime traces with Merlin. |
ACM Trans. Program. Lang. Syst. |
2006 |
DBLP DOI BibTeX RDF |
object lifetime analysis, trace design, Garbage collection, trace generation |
28 | Ashish Aggarwal, Shankar L. Regunathan, Kenneth Rose |
A trellis-based optimal parameter value selection for audio coding. |
IEEE Trans. Speech Audio Process. |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Alejandro González Romero |
King Race. |
ACG |
2006 |
DBLP DOI BibTeX RDF |
|
28 | John Kelsey, Tadayoshi Kohno |
Herding Hash Functions and the Nostradamus Attack. |
EUROCRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Yoav Weiss, Elena Gabriela Barrantes |
Known/Chosen Key Attacks against Software Instruction Set Randomization. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Osama M. Alattar, Adnan M. Alattar |
A fast hierarchical watermark detector for real-time software or low-cost hardware implementation. |
ICIP (1) |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Aseem Agarwal, Kaviraj Chopra, David T. Blaauw |
Statistical Timing Based Optimization using Gate Sizing. |
DATE |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Jessica Lin 0001, Eamonn J. Keogh, Ada Wai-Chee Fu, Helga Van Herle |
Approximations to Magic: Finding Unusual Medical Time Series. |
CBMS |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Tomas Hlavaty, Václav Skala |
Combinatories and Triangulations. |
ICCSA (3) |
2004 |
DBLP DOI BibTeX RDF |
|
28 | Steven Walczak |
Knowledge-Based Search in Competitive Domains. |
IEEE Trans. Knowl. Data Eng. |
2003 |
DBLP DOI BibTeX RDF |
heuristic pruning, Search, knowledge-based, chunking, opponent modeling, chess |
28 | Wolfgang W. Bein, Jeffrey S. Coombs, Kazem Taghva |
A Method for Calculating Term Similarity on Large Document Collections. |
ITCC |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Sunil Prabhakar, Yuni Xia, Dmitri V. Kalashnikov, Walid G. Aref, Susanne E. Hambrusch |
Query Indexing and Velocity Constrained Indexing: Scalable Techniques for Continuous Queries on Moving Objects. |
IEEE Trans. Computers |
2002 |
DBLP DOI BibTeX RDF |
Moving objects, continuous queries, query indexing, spatio-temporal indexing |
28 | Ismo Kärkkäinen, Pasi Fränti |
Dynamic Local Search for Clustering with Unknown Number of Clusters. |
ICPR (2) |
2002 |
DBLP DOI BibTeX RDF |
clustering, optimization, vector quantization, number of clusters |
28 | Matthew Hertz, Stephen M. Blackburn, J. Eliot B. Moss, Kathryn S. McKinley, Darko Stefanovic |
Error-free garbage collection traces: how to cheat and not get caught. |
SIGMETRICS |
2002 |
DBLP DOI BibTeX RDF |
|
28 | Desikachari Nadadur, Robert M. Haralick |
Recursive binary dilation and erosion using digital line structuring elements in arbitrary orientations. |
IEEE Trans. Image Process. |
2000 |
DBLP DOI BibTeX RDF |
|
28 | David A. Wagner 0001 |
Cryptanalysis of the Yi-Lam Hash. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
28 | Timothy K. Shih |
Using Food Web as an Evolution Computing Model for Internet-Based Multimedia Agents. |
ICMCS, Vol. 2 |
1999 |
DBLP DOI BibTeX RDF |
Internet Multimedia, Mobile Network Architectures, Web Services |
28 | Robert Bernecky |
The Role of Dynamic Programming & Control Structures in Performance. |
APL |
1995 |
DBLP DOI BibTeX RDF |
flow control structures, interpreter overhead, optimization, performance, APL, APL, dynamic programming, J, puzzles, control structures |
28 | Jochen Liedtke |
A Short Note on Implementing Thread Exclusiveness and Address Space Locking. |
ACM SIGOPS Oper. Syst. Rev. |
1994 |
DBLP DOI BibTeX RDF |
|
28 | Scotte Zinn, Michael H. Coffin |
Efficient event generation for detecting races. |
CASCON |
1993 |
DBLP BibTeX RDF |
|
28 | Diana Patterson |
The myth and realities of C.A.S.E. for documentation. |
SIGDOC |
1989 |
DBLP DOI BibTeX RDF |
|
27 | Arash Ahmadi, Amanj Khorramian |
Efficient Brute-force state space search for Yin-Yang puzzle. |
J. Supercomput. |
2024 |
DBLP DOI BibTeX RDF |
|
27 | Yicheng Xu, Vincent Chau, Chenchen Wu, Yong Zhang 0001, Vassilis Zissimopoulos, Yifei Zou |
A Semi Brute-Force Search Approach for (Balanced) Clustering. |
Algorithmica |
2024 |
DBLP DOI BibTeX RDF |
|
27 | Baris Can Esmer, Ariel Kulik, Dániel Marx, Philipp Schepper, Karol Wegrzycki |
Computing Generalized Convolutions Faster Than Brute Force. |
Algorithmica |
2024 |
DBLP DOI BibTeX RDF |
|
27 | Cihangir Tezcan |
GPU-Based Brute Force Cryptanalysis of KLEIN. |
ICISSP |
2024 |
DBLP DOI BibTeX RDF |
|
27 | Sachin Kumar Singh, Shreeman Gautam, Cameron Cartier, Sameer Patil, Robert Ricci |
Where The Wild Things Are: Brute-Force SSH Attacks In The Wild And How To Stop Them. |
NSDI |
2024 |
DBLP BibTeX RDF |
|
27 | Maikel Lázaro Pérez Gort, Martina Olliaro, Agostino Cortesi |
Relational data watermarking resilience to brute force attacks in untrusted environments. |
Expert Syst. Appl. |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Anushka Mitra, Shibambika Manna, Raima Kundu, Ditipriya Hazra, Amlan Roychowdhury |
Brute Force Virtual Drug Screening with Molecular Dynamics Simulation and MM/PBSA to Find Potent Inhibitors of METTL16. |
IEEE ACM Trans. Comput. Biol. Bioinform. |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Ryuichi Ueda, Leon Tonouchi, Tatsuhiro Ikebe, Yasuo Hayashibara |
Implementation of Brute-Force Value Iteration for Mobile Robot Path Planning and Obstacle Bypassing. |
J. Robotics Mechatronics |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Shuichi Hirahara, Rahul Ilango, Ryan Williams 0001 |
Beating Brute Force for Compression Problems. |
Electron. Colloquium Comput. Complex. |
2023 |
DBLP BibTeX RDF |
|
27 | Jun Bai, Xiaofeng Zhang 0004, Chen Li, Hanhua Hong, Xi Xu, Chenghua Lin, Wenge Rong |
How to Determine the Most Powerful Pre-trained Language Model without Brute Force Fine-tuning? An Empirical Survey. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Vivek Nair, Dawn Song |
Multi-Factor Credential Hashing for Asymmetric Brute-Force Attack Resistance. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Sascha Mücke |
Faster QUBO Brute-Force Solving using Gray Code. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Yu Chen, Yiling He |
BrutePrint: Expose Smartphone Fingerprint Authentication to Brute-force Attack. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Hans-Peter Lehmann, Peter Sanders 0001, Stefan Walzer |
ShockHash: Towards Optimal-Space Minimal Perfect Hashing Beyond Brute-Force. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Andreas Eipper, Daniela Pöhn |
How to Design a Blue Team Scenario for Beginners on the Example of Brute-Force Attacks on Authentications. |
ICISSP |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Günter Fahrnberger |
Bloom Filter-Based Realtime Risk Monitoring of SSH Brute Force Attacks. |
I4CS |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Yu Chen, Yang Yu, Lidong Zhai |
InfinityGauntlet: Expose Smartphone Fingerprint Authentication to Brute-force Attack. |
USENIX Security Symposium |
2023 |
DBLP BibTeX RDF |
|
27 | Sabi Y. M. Bandiri, Souleymane Diakite, Max Frejus O. Sanya, Francisco A. B. Souza Filho, Herman S. S. L. Pereira, Tales C. Pimenta |
Minimizing Power Consumption Through Brute Force Algorithm in Elastic Optical Network. |
LASCAS |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Vivek Nair, Dawn Song |
Multi-Factor Credential Hashing for Asymmetric Brute-Force Attack Resistance. |
EuroS&P |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Kenichi Yoshida |
Brute force concept drift detection. |
KES |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Boris V. Kuprijanov, Alexander A. Roschin |
Limiting the Search in Brute Force Method for Subsets Detection. |
OPTIMA |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Yawen Feng, Shengke Zeng, Jixiang Xiao, Shuai Cheng, Fengchun Zhang |
Fine-Grained Searchable Encryption Scheme Against Keyword Brute-Force Attacks. |
AIS&P (1) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Jun Bai, Xiaofeng Zhang 0004, Chen Li, Hanhua Hong, Xi Xu, Chenghua Lin, Wenge Rong |
How to Determine the Most Powerful Pre-trained Language Model without Brute Force Fine-tuning? An Empirical Survey. |
EMNLP (Findings) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Ahmed Fawzi Otoom, Wafa' Eleisah, Emad E. Abdallah |
Deep Learning for Accurate Detection of Brute Force attacks on IoT Networks. |
ANT/EDI40 |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Yaoshu Xie, Kiyou Shibata, Teruyasu Mizoguchi |
A brute-force code searching for cell of non-identical displacement for CSL grain boundaries and interfaces. |
Comput. Phys. Commun. |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Alfonso Francisco De Abiega-L'Eglisse, Gina Gallegos-García, Mariko Nakano-Miyatake, Mario Rosas Otero, Vladimir Azpeitia Hernández |
A New Fuzzy Vault based Biometric System robust to Brute-Force Attack. |
Computación y Sistemas |
2022 |
DBLP BibTeX RDF |
|
27 | Baris Can Esmer, Ariel Kulik, Dániel Marx, Philipp Schepper, Karol Wegrzycki |
Computing Generalized Convolutions Faster Than Brute Force. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Aron Gohr |
Brute Force Cryptanalysis. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
27 | Cihangir Tezcan |
Key lengths revisited: GPU-based brute force cryptanalysis of DES, 3DES, and PRESENT. |
J. Syst. Archit. |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Günter Fahrnberger |
Realtime Risk Monitoring of SSH Brute Force Attacks. |
I4CS |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Christopher Faircloth, Gavin Hartzell, Nathan Callahan, Suman Bhunia |
A Study on Brute Force Attack on T-Mobile Leading to SIM-Hijacking and Identity-Theft. |
AIIoT |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Stewart Sentanoe, Christofer Fellicious, Hans P. Reiser, Michael Granitzer |
"The Need for Speed": Extracting Session Keys From the Main Memory Using Brute-force and Machine Learning. |
TrustCom |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Baris Can Esmer, Ariel Kulik, Dániel Marx, Philipp Schepper, Karol Wegrzycki |
Computing Generalized Convolutions Faster Than Brute Force. |
IPEC |
2022 |
DBLP DOI BibTeX RDF |
|
27 | João P. P. Novais, Lucas Andrade Maciel, Matheus Alcântara Souza, Mark A. J. Song, Henrique C. Freitas |
An open computing language-based parallel Brute Force algorithm for formal concept analysis on heterogeneous architectures. |
Concurr. Comput. Pract. Exp. |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Muhammad Nadeem, Ali Arshad, Saman Riaz, Shahab S. Band, Amir Mosavi |
Intercept the Cloud Network From Brute Force and DDoS Attacks via Intrusion Detection and Prevention System. |
IEEE Access |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Zuoguang Wang, Jiaqian Peng, Hongsong Zhu, Limin Sun |
SEIGuard: An Authentication-simplified and Deceptive Scheme to Protect Server-side Social Engineering Information Against Brute-force Attacks. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
27 | Ni Ding, Farhad Farokhi |
Measuring Information Leakage in Non-stochastic Brute-Force Guessing. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
27 | Oleksiy Lisovets, David Knichel, Thorben Moos, Amir Moradi 0001 |
Let's Take it Offline: Boosting Brute-Force Attacks on iPhone's User Authentication through SCA. |
IACR Trans. Cryptogr. Hardw. Embed. Syst. |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Oleksiy Lisovets, David Knichel, Thorben Moos, Amir Moradi 0001 |
Let's Take it Offline: Boosting Brute-Force Attacks on iPhone's User Authentication through SCA. |
IACR Cryptol. ePrint Arch. |
2021 |
DBLP BibTeX RDF |
|
Displaying result #1 - #100 of 662 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ >>] |
|