The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase counter-measures (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1987-2004 (18) 2005-2006 (22) 2007-2008 (25) 2009-2011 (16) 2012-2015 (18) 2016-2020 (17) 2021-2024 (12)
Publication types (Num. hits)
article(28) incollection(1) inproceedings(96) phdthesis(3)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 96 occurrences of 81 keywords

Results
Found 128 publication records. Showing 128 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
68Frédéric Cuppens, Sylvain Gombault, Thierry Sans Selecting Appropriate Counter-Measures in an Intrusion Detection Framework. Search on Bibsonomy CSFW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF IDMEF, counter-measures, anti-correlation, Intrusion detection, correlation, response
46Elena Trichina, Antonio Bellezza Implementation of Elliptic Curve Cryptography with Built-In Counter Measures against Side Channel Attacks. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
30Yu Fu 0005, Benafsh Husain, Richard R. Brooks Analysis of Botnet Counter-Counter-Measures. Search on Bibsonomy CISR The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
26Jean-Jacques Quisquater, David Samyde ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards. Search on Bibsonomy E-smart The full citation details ... 2001 DBLP  DOI  BibTeX  RDF electromagnetic and power analysis, DPA, smartcard, SPA, tamper resistance, DEMA, SEMA
21Elena Trichina, Domenico De Seta, Lucia Germani Simplified Adaptive Multiplicative Masking for AES. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
19Karel Pärlin, Taneli Riihonen, Vincent Le Nir, Marc Adrat Physical-Layer Reliability of Drones and Their Counter-Measures: Full Versus Half Duplex. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19 Retraction Note: Intrusion detection based on machine learning in the internet of things, attacks and counter measures. Search on Bibsonomy J. Supercomput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Jean-Luc Dugelay A Review on Malicious Facial Image Processing and Possible Counter-Measures. Search on Bibsonomy ICPRAM The full citation details ... 2024 DBLP  BibTeX  RDF
19Awais Khan 0007, Khalid Mahmood Malik, James Ryan, Mikul Saravanan Battling voice spoofing: a review, comparative analysis, and generalizability evaluation of state-of-the-art voice spoofing counter measures. Search on Bibsonomy Artif. Intell. Rev. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19 Intrusion detection based on machine learning in the internet of things, attacks and counter measures. Search on Bibsonomy J. Supercomput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Mohammad Kamrul Hasan, Taher M. Ghazal, Rashid A. Saeed, Bishwajeet Pandey, Hardik A. Gohel, Ala' A. Eshmawi, Sayed Abdel-Khalek, Hula Mahmoud Alkhassawneh A review on security threats, vulnerabilities, and counter measures of 5G enabled Internet-of-Medical-Things. Search on Bibsonomy IET Commun. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Mohasinina Binte Kamal, Mohammad Farajollahi, Hamidreza Nazaripouya, Hamed Mohsenian Rad Cyberattacks Against Event-Based Analysis in Micro-PMUs: Attack Models and Counter Measures. Search on Bibsonomy IEEE Trans. Smart Grid The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Noor Ahmad Hazari, Ahmed Oun, Mohammed Y. Niamat Machine Learning Vulnerability Analysis of FPGA-based Ring Oscillator PUFs and Counter Measures. Search on Bibsonomy ACM J. Emerg. Technol. Comput. Syst. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Karen Renaud, Suzanne Prior The "three M's" counter-measures to children's risky online behaviors: mentor, mitigate and monitor. Search on Bibsonomy Inf. Comput. Secur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Christophe Nègre Side Channel Counter-measures based on Randomized AMNS Modular Multiplication. Search on Bibsonomy SECRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Bin Hu, Yijian Wu, Xin Peng 0001, Jun Sun 0001, Nanjie Zhan, Jun Wu Assessing Code Clone Harmfulness: Indicators, Factors, and Counter Measures. Search on Bibsonomy SANER The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Lisa Gussek, Lisa Schned, Manuel Wiesche Obsolescence in IT Work: Causes, Consequences and Counter-Measures. Search on Bibsonomy Wirtschaftsinformatik The full citation details ... 2021 DBLP  BibTeX  RDF
19Yazdan Ahmad Qadri, Rashid Ali 0001, Arslan Musaddiq, Fadi Al-Turjman 0001, Dae Wan Kim, Sung Won Kim The limitations in the state-of-the-art counter-measures against the security threats in H-IoT. Search on Bibsonomy Clust. Comput. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Pardeep Kaur, Shalli Rani A Comprehensive Study of Attacks on the IoT and its Counter Measures Using Blockchain. Search on Bibsonomy Integration of WSN and IoT for Smart Cities The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Raoudha Rahmeni, Anis Ben Aicha, Yassine Ben Ayed Acoustic features exploration and examination for voice spoofing counter measures with boosting machine learning techniques. Search on Bibsonomy KES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Marc Pic, Gaël Mahfoudi, Anis Trabelsi Remote KYC: Attacks and Counter-Measures. Search on Bibsonomy EISIC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Shirina Samreen Packet Dropping Counter Measures in a MANET Through Reliable Routing Protocol Leveraging a Trust Management Framework. Search on Bibsonomy Int. J. Mob. Comput. Multim. Commun. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Ha Dao, Johan Mazel, Kensuke Fukuda Understanding abusive web resources: characteristics and counter-measures of malicious web resources and cryptocurrency mining. Search on Bibsonomy AINTEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Abid Jamil, Kashif Asif, Rehan Ashraf, Sheraz Mehmood, Ghulam Mustafa A comprehensive study of cyber attacks & counter measures for web systems. Search on Bibsonomy ICFNDS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Liangxiao Xin Cascading attacks in Wi-Fi networks: demonstration and counter-measures Search on Bibsonomy 2018   RDF
19Kiran Garimella, Orestis Kostakis, Michael Mathioudakis Ad-blocking: A Study on Performance, Privacy and Counter-measures. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
19Matthias Gabel, Jeremias Mechler Secure Database Outsourcing to the Cloud: Side-Channels, Counter-Measures and Trusted Execution. Search on Bibsonomy CBMS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Kiran Garimella, Orestis Kostakis, Michael Mathioudakis Ad-blocking: A Study on Performance, Privacy and Counter-measures. Search on Bibsonomy WebSci The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Volker Stich, Moritz Schröter, Felix Jordan, Lucas Wenger, Matthias Blum Assessment of Counter-Measures for Disturbance Management in Manufacturing Environments. Search on Bibsonomy APMS (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Célestin Matte Wi-Fi Tracking: Fingerprinting Attacks and Counter-Measures. (Traçage Wi-Fi: Attaques par Prise d'Empreinte et Contre-Mesures). Search on Bibsonomy 2017   RDF
19Claude Carlet, Sylvain Guilley Complementary dual codes for counter-measures to side-channel attacks. Search on Bibsonomy Adv. Math. Commun. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Daniel Díaz López, Ginés Dólera Tormo, Félix Gómez Mármol, Gregorio Martínez Pérez Dynamic counter-measures for risk-based access control systems: An evolutive approach. Search on Bibsonomy Future Gener. Comput. Syst. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Valentin Burger, Matthias Hirth, Tobias Hoßfeld, Phuoc Tran-Gia Principles of information neutrality and counter measures against biased information. Search on Bibsonomy GI-Jahrestagung The full citation details ... 2016 DBLP  BibTeX  RDF
19Erick Leon, Stefan D. Bruda Counter-Measures against Stack Buffer Overflows in GNU/Linux Operating Systems. Search on Bibsonomy ANT/SEIT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Claude Carlet, Sylvain Guilley Complementary Dual Codes for Counter-measures to Side-Channel Attacks. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
19Pedro Tome, Ramachandra Raghavendra, Christoph Busch 0001, Santosh Tirunagari, Norman Poh, B. H. Shekar, Diego Gragnaniello, Carlo Sansone, Luisa Verdoliva, Sébastien Marcel The 1st Competition on Counter Measures to Finger Vein Spoofing Attacks. Search on Bibsonomy ICB The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Christophe Bacara, Valentin Lefils, Julien Iguchi-Cartigny, Gilles Grimaud, Jean-Philippe Wary Virtual Keyboard Logging Counter-Measures Using Human Vision Properties. Search on Bibsonomy HPCC/CSS/ICESS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Sven Dittes, Nils Urbach, Frederik Ahlemann, Stefan Smolnik, Thomas Müller 0018 Why don't you stick to them? Understanding factors influencing and counter-measures to combat deviant behavior towards organizational IT standards. (PDF / PS) Search on Bibsonomy Wirtschaftsinformatik The full citation details ... 2015 DBLP  BibTeX  RDF
19Ali Ayyaz, Urwa Muaz, Shahid Awan, Muhammad Naeem Ayyaz Simulation Model for Counter-Measures against Aedes Aegypti. Search on Bibsonomy FIT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Sindhu Shivshankar, Sujni Paul E-Learning Environment - The Security and Privacy Challenges Focusing on the Counter Measures. Search on Bibsonomy DeSE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Hao Qin 0005 Sécurité pratique de systèmes de cryptographie quantique : étude d'attaques et développement de contre-mesures. (Practical security of quantum cryptography system : study of side channel attacks and developments of counter-measures). Search on Bibsonomy 2015   RDF
19André Anjos, Murali Mohan Chakka, Sébastien Marcel Motion-based counter-measures to photo attacks in face recognition. Search on Bibsonomy IET Biom. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
19Neha Gupta 0005, Ponnurangam Kumaraguru Exploration of gaps in Bitly's spam detection and relevant counter measures. Search on Bibsonomy CoRR The full citation details ... 2014 DBLP  BibTeX  RDF
19Belal Amro Mobile Agent Systems, Recent Security Threats and Counter Measures. Search on Bibsonomy CoRR The full citation details ... 2014 DBLP  BibTeX  RDF
19Sanchita Mal-Sarkar, Aswin Raghav Krishna, Anandaroop Ghosh, Swarup Bhunia Hardware trojan attacks in FPGA devices: threat analysis and effective counter measures. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
19Claude Carlet, Sylvain Guilley Complementary Dual Codes for Counter-Measures to Side-Channel Attacks. Search on Bibsonomy ICMCTA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
19Louis-François Pau Business and social evaluation of denial of service attacks of communications networks in view of scaling economic counter-measures. Search on Bibsonomy CoRR The full citation details ... 2013 DBLP  BibTeX  RDF
19Ivana Chingovska, J. Yang, Zhen Lei 0001, Dong Yi, Stan Z. Li, Olga Kähm, Christian Glaser, Naser Damer, Arjan Kuijper, Alexander Nouak, Jukka Komulainen, Tiago Freitas Pereira, Shubham Gupta, Shubham Khandelwal, Shubham Bansal, Ayush K. Rai, Tarun Krishna, Dushyant Goyal, Muhammad-Adeel Waris, Honglei Zhang, Iftikhar Ahmad 0001, Serkan Kiranyaz, Moncef Gabbouj, Roberto Tronci, Maurizio Pili, Nicola Sirena, Fabio Roli, Javier Galbally, Julian Fiérrez, Allan da Silva Pinto, Hélio Pedrini, W. S. Schwartz, Anderson Rocha 0001, André Anjos, Sébastien Marcel The 2nd competition on counter measures to 2D face spoofing attacks. Search on Bibsonomy ICB The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
19K. Munivara Prasad, A. Rama Mohan Reddy, M. Ganesh Karthik Flooding attacks to internet threat monitors (ITM): Modeling and counter measures using botnet and honeypots Search on Bibsonomy CoRR The full citation details ... 2012 DBLP  BibTeX  RDF
19Swapan Purkait Phishing counter measures and their effectiveness - literature review. Search on Bibsonomy Inf. Manag. Comput. Secur. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
19Urs Hunkeler, James Colli-Vignarelli, Catherine Dehollain Effectiveness of GPS-jamming and counter-measures. Search on Bibsonomy ICL-GNSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
19Steffen Ortmann, Peter Langendörfer, Stephan Kornemann WiSec 2011 demo: demonstrating self-contained on-node counter measures for various jamming attacks in WSN. Search on Bibsonomy ACM SIGMOBILE Mob. Comput. Commun. Rev. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
19André Anjos, Sébastien Marcel Counter-measures to photo attacks in face recognition: A public database and a baseline. Search on Bibsonomy IJCB The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
19Murali Mohan Chakka, André Anjos, Sébastien Marcel, Roberto Tronci, Daniele Muntoni, Gianluca Fadda, Maurizio Pili, Nicola Sirena, Gabriele Murgia, Marco Ristori, Fabio Roli, Junjie Yan, Dong Yi, Zhen Lei 0001, Zhiwei Zhang, Stan Z. Li, William Robson Schwartz, Anderson Rocha 0001, Hélio Pedrini, Javier Lorenzo-Navarro, Modesto Castrillón Santana, Jukka Määttä, Abdenour Hadid, Matti Pietikäinen Competition on counter measures to 2-D facial spoofing attacks. Search on Bibsonomy IJCB The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
19Howard Li, Alexandru Popa 0002, Carl Thibault, Michael Trentini, Mae L. Seto A software framework for multi-agent control of multiple autonomous underwater vehicles for underwater mine counter-measures. Search on Bibsonomy AIS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
19Thomas J. Schoepf Counter-Measures for Relay Failures due to Dynamic Welding: A Robust Engineering Design. Search on Bibsonomy IEICE Trans. Electron. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Hongbin Kong, Gang Xue, Shaowen Yao 0001 Essence of Inconsistent Ontology and Counter Measures. Search on Bibsonomy DBTA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Mukesh Agrawal, Sandip Karmakar, Dhiman Saha, Debdeep Mukhopadhyay Scan Based Side Channel Attacks on Stream Ciphers and Their Counter-Measures. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19In-Jung Kim, Cheol Won Lee, Eul-Gyu Im Changes of Cyber-Terrorism: Autonomous Terrors and Counter-Measures. Search on Bibsonomy ICCSA (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF autogenous terror, cyber terrorism, CERT, ISAC
19Yihong Zhou, Dapeng Wu 0001, Scott Nettles On MAC-layer denial of service attacks in IEEE 802.11 ad hoc networks: analysis and counter measures. Search on Bibsonomy Int. J. Wirel. Mob. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Frédéric Cuppens, Fabien Autrel, Yacine Bouzida, Joaquín García 0001, Sylvain Gombault, Thierry Sans Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection framework. Search on Bibsonomy Ann. des Télécommunications The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Zhimin Huang, Shuqin Cai Developing Medium and Small Technological Enterprises in China: Informatization Issues and Counter-Measures. Search on Bibsonomy Int. J. Enterp. Inf. Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19David A. J. Pearce, Alister G. Burr, Timothy C. Tozer Capacity of TDMA cellular systems with slow Rayleigh fading counter-measures. Search on Bibsonomy PIMRC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
19Les Labuschagne, Jan H. P. Eloff Activating dynamic counter measures to reduce risk. Search on Bibsonomy SEC The full citation details ... 1996 DBLP  BibTeX  RDF
19Tony Ballardie, Jon Crowcroft Multicast-specific security threats and counter-measures. Search on Bibsonomy NDSS The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
18Hua Wang, Yao Guo 0001, Xiangqun Chen DPAC: A Reuse-Oriented Password Authentication Framework for Improving Password Security. Search on Bibsonomy HASE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger, Nidhal Selmane, Renaud Pacalet Silicon-level Solutions to Counteract Passive and Active Attacks. Search on Bibsonomy FDTC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Daniel Boteanu, Edouard Reich, José M. Fernandez 0001, John McHugh Implementing and testing dynamic timeout adjustment as a dos counter-measure. Search on Bibsonomy QoP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF degradation of service, denial of service, SYN flood
18Mohamed Abdelhafez, George F. Riley, Robert G. Cole, Nam Phamdo Modeling and Simulations of TCP MANET Worms. Search on Bibsonomy PADS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Ryad Benadjila, Olivier Billet, Stanislas Francfort Drm to counter side-channel attacks? Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2007 DBLP  DOI  BibTeX  RDF white-box, AES, side-channel attacks, DRM
18Yoon Jung Chung, In-Jung Kim, Chulsoo Lee, Eul-Gyu Im, Dongho Won Design of an On-Line Intrusion Forecast System with a Weather Forecasting Model. Search on Bibsonomy ICCSA (4) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Damage Propagation, Information Security control system (ISMS), Forecast, Intrusion, Weather Forecasting
15Pierre-Marc Bureau, José M. Fernandez 0001 Optimising Networks Against Malware. Search on Bibsonomy IPCCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Yannick Monnet, Marc Renaudin, Régis Leveugle, Christophe Clavier, Pascal Moitrel Case Study of a Fault Attack on Asynchronous DES Crypto-Processors. Search on Bibsonomy FDTC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Colin D. Walter Longer Keys May Facilitate Side Channel Attacks. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Key Length, Side Channel Attacks, DPA, Power Analysis, Timing Attack, RSA Cryptosystem
12Dongkook Park, Chrysostomos Nicopoulos, Jongman Kim, Narayanan Vijaykrishnan, Chita R. Das Exploring Fault-Tolerant Network-on-Chip Architectures. Search on Bibsonomy DSN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Gergely Tóth, Zoltán Hornák Measuring Anonymity in a Non-adaptive, Real-Time System. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Sorina Dumitrescu, Xiaolin Wu 0001, Zhe Wang 0022 Detection of LSB Steganography via Sample Pair Analysis. Search on Bibsonomy Information Hiding The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
9Florian Deissenboeck, Lars Heinemann, Benjamin Hummel, Elmar Jürgens Flexible architecture conformance assessment with ConQAT. Search on Bibsonomy ICSE (2) The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
9Matt Webster, Grant Malcolm Detection of metamorphic and virtualization-based malware using algebraic specification. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
9Ying-Wei Kuo, Shou-Hsuan Stephen Huang Detecting Stepping-Stone Connection Using Association Rule Mining. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
9Fabio Tango, Marco Botta Evaluation of Distraction in a Driver-Vehicle-Environment Framework: An Application of Different Data-Mining Techniques. Search on Bibsonomy ICDM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Adaptive-Network-based Fuzzy Inference System, Neural Networks, Machine Learning, Fuzzy Logic, Distraction, Traffic Safety
9Michael Klafft, Tobias Kräntzer, Ulrich Meissen, Agnès Voisard Early warning systems in practice: performance of the SAFE system in the field. Search on Bibsonomy GIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF wireless sensor networks, actuators, alerting, early warning systems, domotics
9Milosz Marian Hulboj, Ryszard Erazm Jurga CERN Investigation of Network Behaviour and Anomaly Detection. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anomaly detection, computer networks, network monitoring, packet sampling
9John Black, Martin Cochran MAC Reforgeability. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Provable Security, Message Authentication Codes, Birthday Attacks
9Ilya Kizhvatov Side channel analysis of AVR XMEGA crypto engine. Search on Bibsonomy WESS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cryptography, DPA, side channel analysis
9Werner Schindler, Colin D. Walter Optimal Recovery of Secret Keys from Weak Side Channel Traces. Search on Bibsonomy IMACC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF power analysis, Side channel leakage, optimal strategy
9Hailun Tan, Diethelm Ostry, John Zic, Sanjay K. Jha A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF code dissemination protocols, sensor network security, broadcast authentication, code distribution
9Aurélien Francillon, Claude Castelluccia Code injection attacks on harvard-architecture devices. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF harvard architecture, return oriented programming, wireless sensor networks, buffer overflow, embedded devices, computer worms, code injection attacks, gadgets
9Gene Tsudik Confronting a mobile adversary in unattended sensor networks. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Marek Ostaszewski, Pascal Bouvry, Franciszek Seredynski Adaptive and dynamic intrusion detection by means of idiotypic networks paradigm. Search on Bibsonomy IPDPS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Lothar Fickert, Helmut Malleck, Christian Wakolbinger Challenges Concerning the Energy-Dependency of the Telecom Infrastructure. Search on Bibsonomy CRITIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF interdependencies power and information infrastructure, decentralized generation, islanded operation, sensitivity analysis, smart grid, Blackouts
9Kanglin Gao, Mei Dong, Shihu An To Accelerate the Establishment of IT Practical Teaching Teams and the Environment in Colleges and Universities. Search on Bibsonomy CSSE (5) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Roberto Di Cosmo, Stefano Zacchiroli, Paulo Trezentos Package Upgrades In FOSS Distributions: Details And Challenges. Search on Bibsonomy HotSWUp The full citation details ... 2008 DBLP  DOI  BibTeX  RDF FOSS, distribution, packages, rollback, upgrade
9Francesco Regazzoni 0001, Thomas Eisenbarth 0001, Luca Breveglieri, Paolo Ienne, Israel Koren Can Knowledge Regarding the Presence of Countermeasures Against Fault Attacks Simplify Power Attacks on Cryptographic Devices?. Search on Bibsonomy DFT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Colin D. Walter Recovering Secret Keys from Weak Side Channel Traces of Differing Lengths. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Hidden Markov Models, simple power analysis, SPA, Viterbi Algorithm, Forward-Backward Algorithm, Side channel leakage
9Huijuan Yang, Alex ChiChung Kot Pattern-Based Data Hiding for Binary Image Authentication by Connectivity-Preserving. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Steven Daniel Webb, Sieteng Soh Cheating in networked computer games: a review. Search on Bibsonomy DIMEA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF networked computer games, peer-to-peer, client/server, cheating
9Masaomi Kimura, Kouji Tatsuno, Toshiharu Hayasaka, Yuta Takahashi, Tetsuro Aoto, Michiko Ohkura, Fumito Tsuchiya The Analysis of Near-Miss Cases Using Data-Mining Approach. Search on Bibsonomy HCI (4) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Safety in drug use, data mining, text mining
9Attila Ondi, Richard Ford Modeling malcode with Hephaestus: beyond simple spread. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Hephaestus, code-red, virus-spread simulation
9Johann Barbier, Kichenakoumar Mayoura Steganalysis of Multi Bit Plane Image Steganography. Search on Bibsonomy IWDW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Multi bit plane image steganography, Fisher discriminant, RS steganalysis
Displaying result #1 - #100 of 128 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license