|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 96 occurrences of 81 keywords
|
|
|
Results
Found 128 publication records. Showing 128 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
68 | Frédéric Cuppens, Sylvain Gombault, Thierry Sans |
Selecting Appropriate Counter-Measures in an Intrusion Detection Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 17th IEEE Computer Security Foundations Workshop, (CSFW-17 2004), 28-30 June 2004, Pacific Grove, CA, USA, pp. 78-87, 2004, IEEE Computer Society, 0-7695-2169-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
IDMEF, counter-measures, anti-correlation, Intrusion detection, correlation, response |
46 | Elena Trichina, Antonio Bellezza |
Implementation of Elliptic Curve Cryptography with Built-In Counter Measures against Side Channel Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers, pp. 98-113, 2002, Springer, 3-540-00409-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
30 | Yu Fu 0005, Benafsh Husain, Richard R. Brooks |
Analysis of Botnet Counter-Counter-Measures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISR ![In: Proceedings of the 10th Annual Cyber and Information Security Research Conference, CISR '15, Oak Ridge, TN, USA, April 7-9, 2015, pp. 9:1-9:4, 2015, ACM, 978-1-4503-3345-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Jean-Jacques Quisquater, David Samyde |
ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
E-smart ![In: Smart Card Programming and Security, International Conference on Research in Smart Cards, E-smart 2001, Cannes, France, September 19-21, 2001, Proceedings, pp. 200-210, 2001, Springer, 3-540-42610-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
electromagnetic and power analysis, DPA, smartcard, SPA, tamper resistance, DEMA, SEMA |
21 | Elena Trichina, Domenico De Seta, Lucia Germani |
Simplified Adaptive Multiplicative Masking for AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers, pp. 187-197, 2002, Springer, 3-540-00409-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
19 | Karel Pärlin, Taneli Riihonen, Vincent Le Nir, Marc Adrat |
Physical-Layer Reliability of Drones and Their Counter-Measures: Full Versus Half Duplex. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Wirel. Commun. ![In: IEEE Trans. Wirel. Commun. 23(2), pp. 1535-1549, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
19 | |
Retraction Note: Intrusion detection based on machine learning in the internet of things, attacks and counter measures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Supercomput. ![In: J. Supercomput. 80(7), pp. 10194-10195, May 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Jean-Luc Dugelay |
A Review on Malicious Facial Image Processing and Possible Counter-Measures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPRAM ![In: Proceedings of the 13th International Conference on Pattern Recognition Applications and Methods, ICPRAM 2024, Rome, Italy, February 24-26, 2024., pp. 7, 2024, SCITEPRESS, 978-989-758-684-2. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
19 | Awais Khan 0007, Khalid Mahmood Malik, James Ryan, Mikul Saravanan |
Battling voice spoofing: a review, comparative analysis, and generalizability evaluation of state-of-the-art voice spoofing counter measures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Artif. Intell. Rev. ![In: Artif. Intell. Rev. 56(S1), pp. 513-566, October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | |
Intrusion detection based on machine learning in the internet of things, attacks and counter measures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Supercomput. ![In: J. Supercomput. 78(6), pp. 8890-8924, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Mohammad Kamrul Hasan, Taher M. Ghazal, Rashid A. Saeed, Bishwajeet Pandey, Hardik A. Gohel, Ala' A. Eshmawi, Sayed Abdel-Khalek, Hula Mahmoud Alkhassawneh |
A review on security threats, vulnerabilities, and counter measures of 5G enabled Internet-of-Medical-Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Commun. ![In: IET Commun. 16(5), pp. 421-432, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Mohasinina Binte Kamal, Mohammad Farajollahi, Hamidreza Nazaripouya, Hamed Mohsenian Rad |
Cyberattacks Against Event-Based Analysis in Micro-PMUs: Attack Models and Counter Measures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Smart Grid ![In: IEEE Trans. Smart Grid 12(2), pp. 1577-1588, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Noor Ahmad Hazari, Ahmed Oun, Mohammed Y. Niamat |
Machine Learning Vulnerability Analysis of FPGA-based Ring Oscillator PUFs and Counter Measures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM J. Emerg. Technol. Comput. Syst. ![In: ACM J. Emerg. Technol. Comput. Syst. 17(3), pp. 36:1-36:20, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Karen Renaud, Suzanne Prior |
The "three M's" counter-measures to children's risky online behaviors: mentor, mitigate and monitor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Comput. Secur. ![In: Inf. Comput. Secur. 29(3), pp. 526-557, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Christophe Nègre |
Side Channel Counter-measures based on Randomized AMNS Modular Multiplication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021, July 6-8, 2021., pp. 611-619, 2021, SCITEPRESS, 978-989-758-524-1. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Bin Hu, Yijian Wu, Xin Peng 0001, Jun Sun 0001, Nanjie Zhan, Jun Wu |
Assessing Code Clone Harmfulness: Indicators, Factors, and Counter Measures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SANER ![In: 28th IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2021, Honolulu, HI, USA, March 9-12, 2021, pp. 225-236, 2021, IEEE, 978-1-7281-9630-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Lisa Gussek, Lisa Schned, Manuel Wiesche |
Obsolescence in IT Work: Causes, Consequences and Counter-Measures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirtschaftsinformatik ![In: Innovation durch Informationssysteme - WI als zukunftsweisende Wissenschaft, 16. Internationale Tagung Wirtschaftsinformatik (WI 2021), March 09-11, 2021, Universität Duisburg-Essen, Germany., 2021, AISeL. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
19 | Yazdan Ahmad Qadri, Rashid Ali 0001, Arslan Musaddiq, Fadi Al-Turjman 0001, Dae Wan Kim, Sung Won Kim |
The limitations in the state-of-the-art counter-measures against the security threats in H-IoT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Clust. Comput. ![In: Clust. Comput. 23(3), pp. 2047-2065, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Pardeep Kaur, Shalli Rani |
A Comprehensive Study of Attacks on the IoT and its Counter Measures Using Blockchain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Integration of WSN and IoT for Smart Cities ![In: Integration of WSN and IoT for Smart Cities, pp. 15-42, 2020, Springer, 978-3-030-38515-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Raoudha Rahmeni, Anis Ben Aicha, Yassine Ben Ayed |
Acoustic features exploration and examination for voice spoofing counter measures with boosting machine learning techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES ![In: Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 24th International Conference KES-2020, Virtual Event, 16-18 September 2020., pp. 1073-1082, 2020, Elsevier. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Marc Pic, Gaël Mahfoudi, Anis Trabelsi |
Remote KYC: Attacks and Counter-Measures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EISIC ![In: European Intelligence and Security Informatics Conference, EISIC 2019, Oulu, Finland, November 26-27, 2019, pp. 126-129, 2019, IEEE, 978-1-7281-6735-0. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Shirina Samreen |
Packet Dropping Counter Measures in a MANET Through Reliable Routing Protocol Leveraging a Trust Management Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Mob. Comput. Multim. Commun. ![In: Int. J. Mob. Comput. Multim. Commun. 9(3), pp. 60-75, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Ha Dao, Johan Mazel, Kensuke Fukuda |
Understanding abusive web resources: characteristics and counter-measures of malicious web resources and cryptocurrency mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINTEC ![In: Proceedings of the Asian Internet Engineering Conference, AINTEC 2018, Bangkok, Thailand, November 12-14, 2018, pp. 54-61, 2018, ACM, 978-1-4503-6131-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Abid Jamil, Kashif Asif, Rehan Ashraf, Sheraz Mehmood, Ghulam Mustafa |
A comprehensive study of cyber attacks & counter measures for web systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICFNDS ![In: Proceedings of the 2nd International Conference on Future Networks and Distributed Systems, Amman, Jordan, June 26-27, 2018, pp. 50:1-50:7, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Liangxiao Xin |
Cascading attacks in Wi-Fi networks: demonstration and counter-measures ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2018 |
RDF |
|
19 | Kiran Garimella, Orestis Kostakis, Michael Mathioudakis |
Ad-blocking: A Study on Performance, Privacy and Counter-measures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1705.03193, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
19 | Matthias Gabel, Jeremias Mechler |
Secure Database Outsourcing to the Cloud: Side-Channels, Counter-Measures and Trusted Execution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CBMS ![In: 30th IEEE International Symposium on Computer-Based Medical Systems, CBMS 2017, Thessaloniki, Greece, June 22-24, 2017, pp. 799-804, 2017, IEEE Computer Society, 978-1-5386-1710-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Kiran Garimella, Orestis Kostakis, Michael Mathioudakis |
Ad-blocking: A Study on Performance, Privacy and Counter-measures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WebSci ![In: Proceedings of the 2017 ACM on Web Science Conference, WebSci 2017, Troy, NY, USA, June 25 - 28, 2017, pp. 259-262, 2017, ACM, 978-1-4503-4896-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Volker Stich, Moritz Schröter, Felix Jordan, Lucas Wenger, Matthias Blum |
Assessment of Counter-Measures for Disturbance Management in Manufacturing Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APMS (1) ![In: Advances in Production Management Systems. The Path to Intelligent, Collaborative and Sustainable Manufacturing - IFIP WG 5.7 International Conference, APMS 2017, Hamburg, Germany, September 3-7, 2017, Proceedings, Part I, pp. 449-456, 2017, Springer, 978-3-319-66922-9. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Célestin Matte |
Wi-Fi Tracking: Fingerprinting Attacks and Counter-Measures. (Traçage Wi-Fi: Attaques par Prise d'Empreinte et Contre-Mesures). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2017 |
RDF |
|
19 | Claude Carlet, Sylvain Guilley |
Complementary dual codes for counter-measures to side-channel attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Adv. Math. Commun. ![In: Adv. Math. Commun. 10(1), pp. 131-150, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Daniel Díaz López, Ginés Dólera Tormo, Félix Gómez Mármol, Gregorio Martínez Pérez |
Dynamic counter-measures for risk-based access control systems: An evolutive approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Gener. Comput. Syst. ![In: Future Gener. Comput. Syst. 55, pp. 321-335, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Valentin Burger, Matthias Hirth, Tobias Hoßfeld, Phuoc Tran-Gia |
Principles of information neutrality and counter measures against biased information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GI-Jahrestagung ![In: 46. Jahrestagung der Gesellschaft für Informatik, Informatik von Menschen für Menschen, INFORMATIK 2016, Klagenfurt, Austria, September 26-30, 2016, pp. 295-307, 2016, GI, 978-3-88579-653-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
19 | Erick Leon, Stefan D. Bruda |
Counter-Measures against Stack Buffer Overflows in GNU/Linux Operating Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ANT/SEIT ![In: The 7th International Conference on Ambient Systems, Networks and Technologies (ANT 2016) / The 6th International Conference on Sustainable Energy Information Technology (SEIT-2016) / Affiliated Workshops, May 23-26, 2016, Madrid, Spain, pp. 1301-1306, 2016, Elsevier. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Claude Carlet, Sylvain Guilley |
Complementary Dual Codes for Counter-measures to Side-Channel Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2015, pp. 603, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
19 | Pedro Tome, Ramachandra Raghavendra, Christoph Busch 0001, Santosh Tirunagari, Norman Poh, B. H. Shekar, Diego Gragnaniello, Carlo Sansone, Luisa Verdoliva, Sébastien Marcel |
The 1st Competition on Counter Measures to Finger Vein Spoofing Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICB ![In: International Conference on Biometrics, ICB 2015, Phuket, Thailand, 19-22 May, 2015, pp. 513-518, 2015, IEEE, 978-1-4799-7824-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Christophe Bacara, Valentin Lefils, Julien Iguchi-Cartigny, Gilles Grimaud, Jean-Philippe Wary |
Virtual Keyboard Logging Counter-Measures Using Human Vision Properties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCC/CSS/ICESS ![In: 17th IEEE International Conference on High Performance Computing and Communications, HPCC 2015, 7th IEEE International Symposium on Cyberspace Safety and Security, CSS 2015, and 12th IEEE International Conference on Embedded Software and Systems, ICESS 2015, New York, NY, USA, August 24-26, 2015, pp. 1230-1235, 2015, IEEE, 978-1-4799-8937-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Sven Dittes, Nils Urbach, Frederik Ahlemann, Stefan Smolnik, Thomas Müller 0018 |
Why don't you stick to them? Understanding factors influencing and counter-measures to combat deviant behavior towards organizational IT standards. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirtschaftsinformatik ![In: Smart Enterprise Engineering: 12. Internationale Tagung Wirtschaftsinformatik, WI 2015, Osnabrück, Germany, March 4-6, 2015., pp. 615-629, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
19 | Ali Ayyaz, Urwa Muaz, Shahid Awan, Muhammad Naeem Ayyaz |
Simulation Model for Counter-Measures against Aedes Aegypti. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FIT ![In: 13th International Conference on Frontiers of Information Technology, FIT 2015, Islamabad, Pakistan, December 14-16, 2015, pp. 98-103, 2015, IEEE Computer Society, 978-1-4673-9666-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Sindhu Shivshankar, Sujni Paul |
E-Learning Environment - The Security and Privacy Challenges Focusing on the Counter Measures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DeSE ![In: International Conference on Developments of E-Systems Engineering, DeSE 2015, Dubai, United Arab Emirates, December 13-14, 2015, pp. 176-179, 2015, IEEE, 978-1-5090-1860-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Hao Qin 0005 |
Sécurité pratique de systèmes de cryptographie quantique : étude d'attaques et développement de contre-mesures. (Practical security of quantum cryptography system : study of side channel attacks and developments of counter-measures). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2015 |
RDF |
|
19 | André Anjos, Murali Mohan Chakka, Sébastien Marcel |
Motion-based counter-measures to photo attacks in face recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Biom. ![In: IET Biom. 3(3), pp. 147-158, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
19 | Neha Gupta 0005, Ponnurangam Kumaraguru |
Exploration of gaps in Bitly's spam detection and relevant counter measures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1405.1511, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
19 | Belal Amro |
Mobile Agent Systems, Recent Security Threats and Counter Measures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1410.4147, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
19 | Sanchita Mal-Sarkar, Aswin Raghav Krishna, Anandaroop Ghosh, Swarup Bhunia |
Hardware trojan attacks in FPGA devices: threat analysis and effective counter measures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Great Lakes Symposium on VLSI ![In: Great Lakes Symposium on VLSI 2014, GLSVLSI '14, Houston, TX, USA - May 21 - 23, 2014, pp. 287-292, 2014, ACM, 978-1-4503-2816-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
19 | Claude Carlet, Sylvain Guilley |
Complementary Dual Codes for Counter-Measures to Side-Channel Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMCTA ![In: Coding Theory and Applications, 4th International Castle Meeting, ICMCTA 2014, Palmela Castle, Portugal, September 15-18, 2014., pp. 97-105, 2014, Springer, 978-3-319-17295-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
19 | Louis-François Pau |
Business and social evaluation of denial of service attacks of communications networks in view of scaling economic counter-measures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1308.3693, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
19 | Ivana Chingovska, J. Yang, Zhen Lei 0001, Dong Yi, Stan Z. Li, Olga Kähm, Christian Glaser, Naser Damer, Arjan Kuijper, Alexander Nouak, Jukka Komulainen, Tiago Freitas Pereira, Shubham Gupta, Shubham Khandelwal, Shubham Bansal, Ayush K. Rai, Tarun Krishna, Dushyant Goyal, Muhammad-Adeel Waris, Honglei Zhang, Iftikhar Ahmad 0001, Serkan Kiranyaz, Moncef Gabbouj, Roberto Tronci, Maurizio Pili, Nicola Sirena, Fabio Roli, Javier Galbally, Julian Fiérrez, Allan da Silva Pinto, Hélio Pedrini, W. S. Schwartz, Anderson Rocha 0001, André Anjos, Sébastien Marcel |
The 2nd competition on counter measures to 2D face spoofing attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICB ![In: International Conference on Biometrics, ICB 2013, 4-7 June, 2013, Madrid, Spain, pp. 1-6, 2013, IEEE, 978-1-4799-0310-8. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
19 | K. Munivara Prasad, A. Rama Mohan Reddy, M. Ganesh Karthik |
Flooding attacks to internet threat monitors (ITM): Modeling and counter measures using botnet and honeypots ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1201.2481, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
19 | Swapan Purkait |
Phishing counter measures and their effectiveness - literature review. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Manag. Comput. Secur. ![In: Inf. Manag. Comput. Secur. 20(5), pp. 382-420, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
19 | Urs Hunkeler, James Colli-Vignarelli, Catherine Dehollain |
Effectiveness of GPS-jamming and counter-measures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICL-GNSS ![In: International Conference on Localization and GNSS, ICL-GNSS 2012, Starnberg, Germany, June 25-27, 2012, pp. 1-4, 2012, IEEE, 978-1-4673-2344-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
19 | Steffen Ortmann, Peter Langendörfer, Stephan Kornemann |
WiSec 2011 demo: demonstrating self-contained on-node counter measures for various jamming attacks in WSN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGMOBILE Mob. Comput. Commun. Rev. ![In: ACM SIGMOBILE Mob. Comput. Commun. Rev. 15(3), pp. 39-40, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
19 | André Anjos, Sébastien Marcel |
Counter-measures to photo attacks in face recognition: A public database and a baseline. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IJCB ![In: 2011 IEEE International Joint Conference on Biometrics, IJCB 2011, Washington, DC, USA, October 11-13, 2011, pp. 1-7, 2011, IEEE Computer Society, 978-1-4577-1358-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
19 | Murali Mohan Chakka, André Anjos, Sébastien Marcel, Roberto Tronci, Daniele Muntoni, Gianluca Fadda, Maurizio Pili, Nicola Sirena, Gabriele Murgia, Marco Ristori, Fabio Roli, Junjie Yan, Dong Yi, Zhen Lei 0001, Zhiwei Zhang, Stan Z. Li, William Robson Schwartz, Anderson Rocha 0001, Hélio Pedrini, Javier Lorenzo-Navarro, Modesto Castrillón Santana, Jukka Määttä, Abdenour Hadid, Matti Pietikäinen |
Competition on counter measures to 2-D facial spoofing attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IJCB ![In: 2011 IEEE International Joint Conference on Biometrics, IJCB 2011, Washington, DC, USA, October 11-13, 2011, pp. 1-6, 2011, IEEE Computer Society, 978-1-4577-1358-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
19 | Howard Li, Alexandru Popa 0002, Carl Thibault, Michael Trentini, Mae L. Seto |
A software framework for multi-agent control of multiple autonomous underwater vehicles for underwater mine counter-measures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIS ![In: Autonomous and Intelligent Systems - First International Conference, AIS 2010, Povoa de Varzim, Portugal, June 21-23, 2010. Proceedings, pp. 1-6, 2010, IEEE, 978-1-4244-7104-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
19 | Thomas J. Schoepf |
Counter-Measures for Relay Failures due to Dynamic Welding: A Robust Engineering Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Electron. ![In: IEICE Trans. Electron. 92-C(5), pp. 728-735, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Hongbin Kong, Gang Xue, Shaowen Yao 0001 |
Essence of Inconsistent Ontology and Counter Measures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBTA ![In: First International Workshop on Database Technology and Applications, DBTA 2009, Wuhan, Hubei, China, April 25-26, 2009, Proceedings, pp. 570-573, 2009, IEEE Computer Society, 978-0-7695-3604-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Mukesh Agrawal, Sandip Karmakar, Dhiman Saha, Debdeep Mukhopadhyay |
Scan Based Side Channel Attacks on Stream Ciphers and Their Counter-Measures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings, pp. 226-238, 2008, Springer, 978-3-540-89753-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
19 | In-Jung Kim, Cheol Won Lee, Eul-Gyu Im |
Changes of Cyber-Terrorism: Autonomous Terrors and Counter-Measures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings, Part II, pp. 75-84, 2007, Springer, 978-3-540-74475-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
autogenous terror, cyber terrorism, CERT, ISAC |
19 | Yihong Zhou, Dapeng Wu 0001, Scott Nettles |
On MAC-layer denial of service attacks in IEEE 802.11 ad hoc networks: analysis and counter measures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Wirel. Mob. Comput. ![In: Int. J. Wirel. Mob. Comput. 1(3/4), pp. 268-275, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Frédéric Cuppens, Fabien Autrel, Yacine Bouzida, Joaquín García 0001, Sylvain Gombault, Thierry Sans |
Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ann. des Télécommunications ![In: Ann. des Télécommunications 61(1-2), pp. 197-217, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Zhimin Huang, Shuqin Cai |
Developing Medium and Small Technological Enterprises in China: Informatization Issues and Counter-Measures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Enterp. Inf. Syst. ![In: Int. J. Enterp. Inf. Syst. 1(4), pp. 20-38, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
19 | David A. J. Pearce, Alister G. Burr, Timothy C. Tozer |
Capacity of TDMA cellular systems with slow Rayleigh fading counter-measures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PIMRC ![In: The 9th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 1998, Boston, MA, USA, September 8-11, 1998, pp. 1240-1244, 1998, IEEE, 0-7803-4872-9. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
19 | Les Labuschagne, Jan H. P. Eloff |
Activating dynamic counter measures to reduce risk. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Information Systems Security, Facing the information society of the 21st Century, pp. 187-196, 1996, Chapman & Hall, 0-412-78120-4. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP BibTeX RDF |
|
19 | Tony Ballardie, Jon Crowcroft |
Multicast-specific security threats and counter-measures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDSS ![In: 1995 Symposium on Network and Distributed System Security, (S)NDSS '95, San Diego, California, USA, February 16-17, 1995, pp. 2-16, 1995, IEEE Computer Society, 0-8186-7027-4. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
18 | Hua Wang, Yao Guo 0001, Xiangqun Chen |
DPAC: A Reuse-Oriented Password Authentication Framework for Improving Password Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HASE ![In: 11th IEEE High Assurance Systems Engineering Symposium, HASE 2008, Nanjing, China, December 3 - 5, 2008, pp. 475-478, 2008, IEEE Computer Society, 978-0-7695-3482-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger, Nidhal Selmane, Renaud Pacalet |
Silicon-level Solutions to Counteract Passive and Active Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FDTC ![In: Fifth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2008, FDTC 2008, Washington, DC, USA, 10 August 2008, pp. 3-17, 2008, IEEE Computer Society, 978-0-7695-3314-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Daniel Boteanu, Edouard Reich, José M. Fernandez 0001, John McHugh |
Implementing and testing dynamic timeout adjustment as a dos counter-measure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![In: Proceedings of the 3th ACM Workshop on Quality of Protection, QoP 2007, Alexandria, VA, USA, October 29, 2007, pp. 34-39, 2007, ACM, 978-1-59593-885-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
degradation of service, denial of service, SYN flood |
18 | Mohamed Abdelhafez, George F. Riley, Robert G. Cole, Nam Phamdo |
Modeling and Simulations of TCP MANET Worms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PADS ![In: 21st International Workshop on Principles of Advanced and Distributed Simulation, PADS'07, San Diego, California, USA, June 12-15, 2007, pp. 123-130, 2007, IEEE Computer Society, 0-7695-2898-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Ryad Benadjila, Olivier Billet, Stanislas Francfort |
Drm to counter side-channel attacks? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Proceedings of the Seventh ACM Workshop on Digital Rights Management, Alexandria, VA, USA, October 29, 2007, pp. 23-32, 2007, ACM, 978-1-59593-884-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
white-box, AES, side-channel attacks, DRM |
18 | Yoon Jung Chung, In-Jung Kim, Chulsoo Lee, Eul-Gyu Im, Dongho Won |
Design of an On-Line Intrusion Forecast System with a Weather Forecasting Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (4) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part IV, pp. 777-786, 2006, Springer, 3-540-34077-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Damage Propagation, Information Security control system (ISMS), Forecast, Intrusion, Weather Forecasting |
15 | Pierre-Marc Bureau, José M. Fernandez 0001 |
Optimising Networks Against Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPCCC ![In: Proceedings of the 26th IEEE International Performance Computing and Communications Conference, IPCCC 2007, April 11-13, 2007, New Orleans, Louisiana, USA, pp. 518-527, 2007, IEEE Computer Society, 1-4244-1138-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Yannick Monnet, Marc Renaudin, Régis Leveugle, Christophe Clavier, Pascal Moitrel |
Case Study of a Fault Attack on Asynchronous DES Crypto-Processors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FDTC ![In: Fault Diagnosis and Tolerance in Cryptography, Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006, Proceedings, pp. 88-97, 2006, Springer, 3-540-46250-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
15 | Colin D. Walter |
Longer Keys May Facilitate Side Channel Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 10th Annual International Workshop, SAC 2003, Ottawa, Canada, August 14-15, 2003, Revised Papers, pp. 42-57, 2003, Springer, 3-540-21370-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Key Length, Side Channel Attacks, DPA, Power Analysis, Timing Attack, RSA Cryptosystem |
12 | Dongkook Park, Chrysostomos Nicopoulos, Jongman Kim, Narayanan Vijaykrishnan, Chita R. Das |
Exploring Fault-Tolerant Network-on-Chip Architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: 2006 International Conference on Dependable Systems and Networks (DSN 2006), 25-28 June 2006, Philadelphia, Pennsylvania, USA, Proceedings, pp. 93-104, 2006, IEEE Computer Society, 0-7695-2607-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Gergely Tóth, Zoltán Hornák |
Measuring Anonymity in a Non-adaptive, Real-Time System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 4th International Workshop, PET 2004, Toronto, Canada, May 26-28, 2004, Revised Selected Papers, pp. 226-241, 2004, Springer, 3-540-26203-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Sorina Dumitrescu, Xiaolin Wu 0001, Zhe Wang 0022 |
Detection of LSB Steganography via Sample Pair Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 5th International Workshop, IH 2002, Noordwijkerhout, The Netherlands, October 7-9, 2002, Revised Papers, pp. 355-372, 2002, Springer, 3-540-00421-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
9 | Florian Deissenboeck, Lars Heinemann, Benjamin Hummel, Elmar Jürgens |
Flexible architecture conformance assessment with ConQAT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE (2) ![In: Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 2, ICSE 2010, Cape Town, South Africa, 1-8 May 2010, pp. 247-250, 2010, ACM. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
9 | Matt Webster, Grant Malcolm |
Detection of metamorphic and virtualization-based malware using algebraic specification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 5(3), pp. 221-245, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
9 | Ying-Wei Kuo, Shou-Hsuan Stephen Huang |
Detecting Stepping-Stone Connection Using Association Rule Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan, pp. 90-97, 2009, IEEE Computer Society, 978-1-4244-3572-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
9 | Fabio Tango, Marco Botta |
Evaluation of Distraction in a Driver-Vehicle-Environment Framework: An Application of Different Data-Mining Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDM ![In: Advances in Data Mining. Applications and Theoretical Aspects, 9th Industrial Conference, ICDM 2009, Leipzig, Germany, July 20-22, 2009. Proceedings, pp. 176-190, 2009, Springer, 978-3-642-03066-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Adaptive-Network-based Fuzzy Inference System, Neural Networks, Machine Learning, Fuzzy Logic, Distraction, Traffic Safety |
9 | Michael Klafft, Tobias Kräntzer, Ulrich Meissen, Agnès Voisard |
Early warning systems in practice: performance of the SAFE system in the field. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GIS ![In: 17th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, ACM-GIS 2009, November 4-6, 2009, Seattle, Washington, USA, Proceedings, pp. 436-439, 2009, ACM, 978-1-60558-649-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
wireless sensor networks, actuators, alerting, early warning systems, domotics |
9 | Milosz Marian Hulboj, Ryszard Erazm Jurga |
CERN Investigation of Network Behaviour and Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009. Proceedings, pp. 353-354, 2009, Springer, 978-3-642-04341-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
anomaly detection, computer networks, network monitoring, packet sampling |
9 | John Black, Martin Cochran |
MAC Reforgeability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 16th International Workshop, FSE 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers, pp. 345-362, 2009, Springer, 978-3-642-03316-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Provable Security, Message Authentication Codes, Birthday Attacks |
9 | Ilya Kizhvatov |
Side channel analysis of AVR XMEGA crypto engine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WESS ![In: Proceedings of the 4th Workshop on Embedded Systems Security, WESS 2009, Grenoble, France, October 15, 2009, 2009, ACM, 978-1-60558-700-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
cryptography, DPA, side channel analysis |
9 | Werner Schindler, Colin D. Walter |
Optimal Recovery of Secret Keys from Weak Side Channel Traces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding, 12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings, pp. 446-468, 2009, Springer, 978-3-642-10867-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
power analysis, Side channel leakage, optimal strategy |
9 | Hailun Tan, Diethelm Ostry, John Zic, Sanjay K. Jha |
A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009, pp. 245-252, 2009, ACM, 978-1-60558-460-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
code dissemination protocols, sensor network security, broadcast authentication, code distribution |
9 | Aurélien Francillon, Claude Castelluccia |
Code injection attacks on harvard-architecture devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008, pp. 15-26, 2008, ACM, 978-1-59593-810-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
harvard architecture, return oriented programming, wireless sensor networks, buffer overflow, embedded devices, computer worms, code injection attacks, gadgets |
9 | Gene Tsudik |
Confronting a mobile adversary in unattended sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008, pp. 1, 2008, ACM, 978-1-59593-979-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Marek Ostaszewski, Pascal Bouvry, Franciszek Seredynski |
Adaptive and dynamic intrusion detection by means of idiotypic networks paradigm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 22nd IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2008, Miami, Florida USA, April 14-18, 2008, pp. 1-8, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Lothar Fickert, Helmut Malleck, Christian Wakolbinger |
Challenges Concerning the Energy-Dependency of the Telecom Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRITIS ![In: Critical Information Infrastructure Security, Third International Workshop, CRITIS 2008, Rome, Italy, October 13-15, 2008. Revised Papers, pp. 376-385, 2008, Springer, 978-3-642-03551-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
interdependencies power and information infrastructure, decentralized generation, islanded operation, sensitivity analysis, smart grid, Blackouts |
9 | Kanglin Gao, Mei Dong, Shihu An |
To Accelerate the Establishment of IT Practical Teaching Teams and the Environment in Colleges and Universities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (5) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 5: E-learning and Knowledge Management / Socially Informed and Instructinal Design / Learning Systems Platforms and Architectures / Modeling and Representation / Other Applications , December 12-14, 2008, Wuhan, China, pp. 1375-1378, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Roberto Di Cosmo, Stefano Zacchiroli, Paulo Trezentos |
Package Upgrades In FOSS Distributions: Details And Challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HotSWUp ![In: Proceedings of the 1st ACM Workshop on Hot Topics in Software Upgrades, HotSWUp 2008, Nashville, TN, USA, October 20, 2008., 2008, ACM, 978-1-60558-304-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
FOSS, distribution, packages, rollback, upgrade |
9 | Francesco Regazzoni 0001, Thomas Eisenbarth 0001, Luca Breveglieri, Paolo Ienne, Israel Koren |
Can Knowledge Regarding the Presence of Countermeasures Against Fault Attacks Simplify Power Attacks on Cryptographic Devices?. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DFT ![In: 23rd IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2008), 1-3 October 2008, Boston, MA, USA, pp. 202-210, 2008, IEEE Computer Society, 978-0-7695-3365-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Colin D. Walter |
Recovering Secret Keys from Weak Side Channel Traces of Differing Lengths. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings, pp. 214-227, 2008, Springer, 978-3-540-85052-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Hidden Markov Models, simple power analysis, SPA, Viterbi Algorithm, Forward-Backward Algorithm, Side channel leakage |
9 | Huijuan Yang, Alex ChiChung Kot |
Pattern-Based Data Hiding for Binary Image Authentication by Connectivity-Preserving. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Multim. ![In: IEEE Trans. Multim. 9(3), pp. 475-486, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Steven Daniel Webb, Sieteng Soh |
Cheating in networked computer games: a review. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMEA ![In: Proceedings of the Second International Conference on Digital Interactive Media in Entertainment and Arts, DIMEA 2007, 19-21 September 2007, Perth, Western Australia, pp. 105-112, 2007, ACM, 978-1-59593-708-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
networked computer games, peer-to-peer, client/server, cheating |
9 | Masaomi Kimura, Kouji Tatsuno, Toshiharu Hayasaka, Yuta Takahashi, Tetsuro Aoto, Michiko Ohkura, Fumito Tsuchiya |
The Analysis of Near-Miss Cases Using Data-Mining Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (4) ![In: Human-Computer Interaction. HCI Applications and Services, 12th International Conference, HCI International 2007, Beijing, China, July 22-27, 2007, Proceedings, Part IV, pp. 474-483, 2007, Springer, 978-3-540-73109-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Safety in drug use, data mining, text mining |
9 | Attila Ondi, Richard Ford |
Modeling malcode with Hephaestus: beyond simple spread. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference ![In: Proceedings of the 45th Annual Southeast Regional Conference, 2007, Winston-Salem, North Carolina, USA, March 23-24, 2007, pp. 379-384, 2007, ACM, 978-1-59593-629-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Hephaestus, code-red, virus-spread simulation |
9 | Johann Barbier, Kichenakoumar Mayoura |
Steganalysis of Multi Bit Plane Image Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, 6th International Workshop, IWDW 2007, Guangzhou, China, December 3-5, 2007, Proceedings, pp. 99-111, 2007, Springer, 978-3-540-92237-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Multi bit plane image steganography, Fisher discriminant, RS steganalysis |
Displaying result #1 - #100 of 128 (100 per page; Change: ) Pages: [ 1][ 2][ >>] |
|