The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for defeat with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1968-1997 (15) 1998-2001 (19) 2002-2003 (19) 2004 (16) 2005 (35) 2006 (28) 2007 (34) 2008 (22) 2009 (18) 2010-2013 (20) 2014-2017 (16) 2018-2020 (24) 2021-2022 (22) 2023-2024 (13)
Publication types (Num. hits)
article(79) incollection(2) inproceedings(219) phdthesis(1)
Venues (Conferences, Journals, ...)
CoRR(15) CHES(6) Synth.(6) WSC(5) ACSAC(4) Artif. Intell.(4) ArgMAS(3) CCS(3) Computer(3) DIMVA(3) ECSQARU(3) ICICS(3) ISCAS(3) Security Protocols Workshop(3) AAAI(2) AAAI Spring Symposium: AI Tech...(2) More (+10 of total 220)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 195 occurrences of 177 keywords

Results
Found 301 publication records. Showing 301 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
71Massimiliano Giacomin Self-Stabilizing Distributed Algorithms for Defeat Status Computation in Argumentation. Search on Bibsonomy Multi-Agent-Systems and Applications The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
71Brent Heeringa, Paul R. Cohen An underlying model for defeat mechanisms. Search on Bibsonomy WSC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
59Gary W. King, Brent Heeringa, David L. Westbrook, Joe Catalano, Paul R. Cohen Agent modeling: models of defeat. Search on Bibsonomy WSC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
48Lei Liu 0021, Songqing Chen Malyzer: Defeating Anti-detection for Application-Level Malware Analysis. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
47Diego C. Martínez, Alejandro Javier García, Guillermo Ricardo Simari Progressive Defeat Paths in Abstract Argumentation Frameworks. Search on Bibsonomy Canadian AI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
36Sanjay Modgil Nested Argumentation and Its Application to Decision Making over Actions. Search on Bibsonomy ArgMAS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
35Kurosh Madani, Véronique Amarger, Christophe Sabourin ANN Based Solutions: It Is Time to Defeat Real-World and Industrial Dilemmas. Search on Bibsonomy IWANN (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Real-Time, Artificial Neural Networks, Implementation, Industrial, Solutions, Real-world
35Praveen Sivadasan, P. Sojan Lal, Naveen Sivadasan JDATATRANS for array obfuscation in Java source codes to defeat reverse engineering from decompiled codes. Search on Bibsonomy Bangalore Compute Conf. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF restructured arrays, source code obfuscation, reverse engineering
35Yinan Jing, Jingtao Li, Xueping Wang, Xiaochun Xiao, Gendu Zhang A Distributed-Log-based IP Traceback Scheme to Defeat DDoS Attacks. Search on Bibsonomy AINA (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Xin Li 0008, Fang Bian, Mark Crovella, Christophe Diot, Ramesh Govindan, Gianluca Iannaccone, Anukool Lakhina Detection and identification of network anomalies using sketch subspaces. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF defeat, anomaly detection, sketch, subspace method
33Quoc Bao Vo, Norman Y. Foo, Joe Thurbon Semantics for a theory of defeasible reasoning. Search on Bibsonomy Ann. Math. Artif. Intell. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF argument-based systems, argumentation-theoretic semantics, defeat, justification, defeasible reasoning
24Battista Biggio, Giorgio Fumera, Ignazio Pillai, Fabio Roli Image Spam Filtering Using Visual Information. Search on Bibsonomy ICIAP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Paul C. van Oorschot, Anil Somayaji, Glenn Wurster Hardware-Assisted Circumvention of Self-Hashing Software Tamper Resistance. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF self-hashing, operating system kernels, software protection, Tamper resistance, checksumming, application security, processor design
24Shuo Chen 0001, Jun Xu 0003, Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. Iyer Defeating Memory Corruption Attacks via Pointer Taintedness Detection. Search on Bibsonomy DSN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng Ning Defending against Sybil Attacks in Sensor Networks. Search on Bibsonomy ICDCS Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Jaap Hage Law and Defeasibility. Search on Bibsonomy Artif. Intell. Law The full citation details ... 2003 DBLP  DOI  BibTeX  RDF defeasibility, legal justification, non-monotonic logic
24Mike Burmester, Yvo Desmedt, Yongge Wang Using Approximation Hardness to Achieve Dependable Computation. Search on Bibsonomy RANDOM The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
22Hamza Javed, Zainab Abaid, Shahid Akbar, Kifayat Ullah 0004, Ashfaq Ahmad, Aamir Saeed, Hashim Ali, Yazeed Yasin Ghadi, Tahani Jaser Alahmadi, Hend Khalid Alkahtani, Ali Raza Blockchain-Based Logging to Defeat Malicious Insiders: The Case of Remote Health Monitoring Systems. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Ke Sun, Pei Liu, Pengfei Li, Zhifang Liao ModWaveMLP: MLP-Based Mode Decomposition and Wavelet Denoising Model to Defeat Complex Structures in Traffic Forecasting. Search on Bibsonomy AAAI The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Vid Kocijan, Ernest Davis, Thomas Lukasiewicz, Gary Marcus 0001, Leora Morgenstern The Defeat of the Winograd Schema Challenge (Abstract Reprint). Search on Bibsonomy AAAI The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Wenjian Sun, Dongsheng Wu, Yang Luo, Lu Liu, Hongjing Zhang, Shuang Wu, Yan Zhang, Chenglong Wang, Houjun Zheng, Jiang Shen, Chunbo Luo ExpertNet: Defeat noisy labels by deep expert consultation paradigm for pneumoconiosis staging on chest radiographs. Search on Bibsonomy Expert Syst. Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Wolfgang Dvorák, Anna Rapberger, Stefan Woltran A claim-centric perspective on abstract argumentation semantics: Claim-defeat, principles, and expressiveness. Search on Bibsonomy Artif. Intell. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Vid Kocijan, Ernest Davis, Thomas Lukasiewicz, Gary Marcus 0001, Leora Morgenstern The defeat of the Winograd Schema Challenge. Search on Bibsonomy Artif. Intell. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Mashari Alatawi, Nitesh Saxena Exploring Encrypted Keyboards to Defeat Client-Side Scanning in End-to-End Encryption Systems. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Guangyuan Hu, Ruby B. Lee Random and Safe Cache Architecture to Defeat Cache Timing Attacks. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Pascal Urien Innovative Countermeasures to Defeat Cyber Attacks Against Blockchain Wallets: A Crypto Terminal Use Case. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Libor Caha, Xavier Coiteux-Roy, Robert Koenig A colossal advantage: 3D-local noisy shallow quantum circuits defeat unbounded fan-in classical circuits. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Aleks Knoks Conciliatory Reasoning, Self-Defeat, and Abstract Argumentation. Search on Bibsonomy Rev. Symb. Log. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Yishay Mansour, Richard Nock, Robert C. Williamson Random Classification Noise does not defeat All Convex Potential Boosters Irrespective of Model Choice. Search on Bibsonomy ICML The full citation details ... 2023 DBLP  BibTeX  RDF
22Zeyu Deng, Long Huang, Chen Wang 0009 Enhanced In-air Signature Verification via Hand Skeleton Tracking to Defeat Robot-level Replays. Search on Bibsonomy ACSAC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Lee Sharkey Circumventing interpretability: How to defeat mind-readers. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Vid Kocijan, Ernest Davis, Thomas Lukasiewicz, Gary Marcus 0001, Leora Morgenstern The Defeat of the Winograd Schema Challenge. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  BibTeX  RDF
22Mohammed Baz, Sabita Khatri, Abdullah Baz, Hosam Alhakami 0001, Alka Agrawal, Raees Ahmad Khan Blockchain and Artificial Intelligence Applications to Defeat COVID-19 Pandemic. Search on Bibsonomy Comput. Syst. Sci. Eng. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Lifeng Huang, Chengying Gao, Ning Liu DEFEAT: Decoupled feature attack across deep neural networks. Search on Bibsonomy Neural Networks The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Michael Coole, Deborah Evans, David Brooks A Framework for the Analysis of Security Technology Vulnerabilities: Defeat Evaluation of an Electronic Access Control Locking System. Search on Bibsonomy ICCST The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Didem Demirag, Jeremy Clark Opening Sentences in Academic Writing: How Security Researchers Defeat the Blinking Cursor. Search on Bibsonomy SIGCSE (1) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Jack Mumford, Isabel Sassoon, Elizabeth Black, Simon Parsons On the Complexity of Determining Defeat Relations Consistent with Abstract Argumentation Semantics. Search on Bibsonomy COMMA The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Zhendong Zhao, Xiaojun Chen 0004, Yuexin Xuan, Ye Dong, Dakui Wang, Kaitai Liang DEFEAT: Deep Hidden Feature Backdoor Attacks by Imperceptible Perturbation and Latent Representation Constraints. Search on Bibsonomy CVPR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Mashari Alatawi, Nitesh Saxena Exploring Encrypted Keyboards to Defeat Client-Side Scanning in End-to-End Encryption Systems. Search on Bibsonomy ICISC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Lydia Blümel, Markus Ulbricht 0001 Defining Defense and Defeat in Abstract Argumentation From Scratch - A Generalizing Approach. Search on Bibsonomy KR The full citation details ... 2022 DBLP  BibTeX  RDF
22Wei-Loon Mow, Shih-Kun Huang, Hsu-Chun Hsiao LAEG: Leak-based AEG using Dynamic Binary Analysis to Defeat ASLR. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Matthew Moore, Kristen R. Walcott Generating Human-Like Motion to Defeat Interaction-Based CAPTCHAs. Search on Bibsonomy FTC (2) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Wenjie Yang, Sitong Wang, Zhenhui Peng, Chuhan Shi, Xiaojuan Ma, Diyi Yang Know It to Defeat It: Exploring Health Rumor Characteristics and Debunking Efforts on Chinese Social Media during COVID-19 Crisis. Search on Bibsonomy ICWSM The full citation details ... 2022 DBLP  BibTeX  RDF
22Nguyen Van Huynh, Dinh Thai Hoang, Diep N. Nguyen, Eryk Dutkiewicz DeepFake: Deep Dueling-Based Deception Strategy to Defeat Reactive Jammers. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22Guangzhao Cheng, Siliang Tang To be a fast adaptive learner: using game history to defeat opponents. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
22Wenjie Yang, Sitong Wang, Zhenhui Peng, Chuhan Shi, Xiaojuan Ma, Diyi Yang Know it to Defeat it: Exploring Health Rumor Characteristics and Debunking Efforts on Chinese Social Media during COVID-19 Crisis. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
22Samuel Selassie Yakohene, Winfred Yaokumah, Ernest Barfo Boadi Gyebi Scrambling Keypad for Secure Pin Entry to Defeat Shoulder Surfing and Inference Attacks. Search on Bibsonomy Int. J. Secur. Priv. Pervasive Comput. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22Margaux Dugardin, Werner Schindler, Sylvain Guilley Stochastic methods defeat regular RSA exponentiation algorithms with combined blinding methods. Search on Bibsonomy J. Math. Cryptol. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22Charles V. Lovejoy, Mary L. McDonald, Thomas W. Lucas, Susan M. Sanchez Investigating an Active Shooter Defeat System With Simulation And Data Farming. Search on Bibsonomy WSC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22Yusi Feng, Ziyuan Zhu, Shuan Li, Ben Liu, Huozhu Wang, Dan Meng Constant-Time Loading: Modifying CPU Pipeline to Defeat Cache Side-Channel Attacks. Search on Bibsonomy TrustCom The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22James C. Davis 0001, Francisco Servant, Dongyoon Lee Using Selective Memoization to Defeat Regular Expression Denial of Service (ReDoS). Search on Bibsonomy SP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22Pascal Urien Innovative Countermeasures to Defeat Cyber Attacks Against Blockchain Wallets. Search on Bibsonomy CSNet The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22Jan Constantin Replacement and reasoning: a reliabilist account of epistemic defeat. Search on Bibsonomy Synth. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
22Jan Constantin, Thomas Grundmann Epistemic authority: preemption through source sensitive defeat. Search on Bibsonomy Synth. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
22Ru Ye Higher-order defeat and intellectual responsibility. Search on Bibsonomy Synth. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
22Muneer Alwazzeh, Sameer Karaman, Mohammad Nur Shamma Man in The Middle Attacks Against SSL/TLS: Mitigation and Defeat. Search on Bibsonomy J. Cyber Secur. Mobil. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
22Zhi Li 0048, Hai Jin 0001, Deqing Zou, Bin Yuan Exploring New Opportunities to Defeat Low-Rate DDoS Attack in Container-Based Cloud Environment. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
22Jaime Spencer, Richard Bowden, Simon Hadfield DeFeat-Net: General Monocular Depth via Simultaneous Unsupervised Representation Learning. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
22Nguyen Van Huynh, Dinh Thai Hoang, Diep N. Nguyen, Eryk Dutkiewicz DeepFake: Deep Dueling-based Deception Strategy to Defeat Reactive Jammers. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
22Wesley H. Holliday, Eric Pacuit Axioms for Defeat in Democratic Elections. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
22Cong Wu 0003, Kun He 0008, Jing Chen 0003, Ziming Zhao 0001, Ruiying Du Liveness is Not Enough: Enhancing Fingerprint Authentication with Behavioral Biometrics to Defeat Puppet Attacks. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2020 DBLP  BibTeX  RDF
22Yongge Wang, Jingwen Sun, Xin Wang, Yunchuan Wei, Hao Wu 0023, Zhou Yu, Gillian Chu Sperax: An Approach To Defeat Long Range Attacks In Blockchains. Search on Bibsonomy INFOCOM Workshops The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
22Jaime Spencer, Richard Bowden, Simon Hadfield DeFeat-Net: General Monocular Depth via Simultaneous Unsupervised Representation Learning. Search on Bibsonomy CVPR The full citation details ... 2020 DBLP  BibTeX  RDF
22B. N. Yuvaraju, M. Narender To Defeat DDoS Attacks in Cloud Computing Environment Using Software Defined Networking (SDN). Search on Bibsonomy CSOC (1) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
22Lixin Fan, Kam Woh Ng, Chee Seng Chan Rethinking Deep Neural Network Ownership Verification: Embedding Passports to Defeat Ambiguity Attacks. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
22Le Guan, Chen Cao, Peng Liu 0005, Xinyu Xing, Xinyang Ge, Shengzhi Zhang, Meng Yu 0001, Trent Jaeger Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
22Mohamed Zeyad, Houssem Maghrebi, Davide Alessio, Boris Batteux Another Look on Bucketing Attack to Defeat White-Box Implementations. Search on Bibsonomy COSADE The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
22Md. Sabir Hossain, Mohammad Robaitul Islam Bhuiyan, Md. Shariful Islam, Md. Faridul Islam, Md. Al-Hasan Facilitating Hard-to-Defeat Car AI Using Flood-Fill Algorithm. Search on Bibsonomy IJCCI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
22Lixin Fan, Kam Woh Ng, Chee Seng Chan Rethinking Deep Neural Network Ownership Verification: Embedding Passports to Defeat Ambiguity Attacks. Search on Bibsonomy NeurIPS The full citation details ... 2019 DBLP  BibTeX  RDF
22Mengjia Yan 0001, Jen-Yang Wen, Christopher W. Fletcher, Josep Torrellas SecDir: a secure directory to defeat directory side-channel attacks. Search on Bibsonomy ISCA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
22Arvind Rajagopalan, Duong Duc Nguyen, Jijoong Kim Predictive Regret-Matching for Cooperating Interceptors to Defeat an Advanced Threat. Search on Bibsonomy Australasian Conference on Artificial Intelligence The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
22J. Adam Carter Meta-epistemic defeat. Search on Bibsonomy Synth. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
22Matthias Steup Destructive defeat and justificational force: the dialectic of dogmatism, conservatism, and meta-evidentialism. Search on Bibsonomy Synth. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
22Duncan Pritchard Anti-luck virtue epistemology and epistemic defeat. Search on Bibsonomy Synth. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
22Valentina Cardo Technology, popular culture and everyday life: The electoral defeat of New Zealand Internet MANA. Search on Bibsonomy Inf. Polity The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
22Peter A. Chew Searching for Unknown Unknowns: Unsupervised Bot Detection to Defeat an Adaptive Adversary. Search on Bibsonomy SBP-BRiMS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
22Chen Cao, Le Guan, Peng Liu 0005, Neng Gao, Jingqiang Lin, Ji Xiang Hey, you, keep away from my device: remotely implanting a virus expeller to defeat Mirai on IoT devices. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
22Damien Jauvart, Jacques J. A. Fournier, Louis Goubin First Practical Side-channel Attack to Defeat Point Randomization in Secure Implementations of Pairing-based Cryptography. Search on Bibsonomy SECRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
22Kevin Bock 0001, Daven Patel, George Hughey, Dave Levin unCaptcha: A Low-Resource Defeat of reCaptcha's Audio Challenge. Search on Bibsonomy WOOT The full citation details ... 2017 DBLP  BibTeX  RDF
22Ye Wang 0006, Yuanjiang Huang, Wu Zheng, Zhi Zhou 0006, Debin Liu, Mi Lu Combining convolutional neural network and self-adaptive algorithm to defeat synthetic multi-digit text-based CAPTCHA. Search on Bibsonomy ICIT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
22Moritz Contag, Vector Guo Li, Andre Pawlowski, Felix Domke, Kirill Levchenko, Thorsten Holz, Stefan Savage How They Did It: An Analysis of Emission Defeat Devices in Modern Automobiles. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
22Max Wolotsky, Mohammad Husain, Elisha Choe Chill-Pass: Using Neuro-Physiological Responses to Chill Music to Defeat Coercion Attacks. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
22 Future cyberdefenses will defeat cyberattacks on PCs. Search on Bibsonomy Commun. ACM The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
22Margaux Dugardin, Sylvain Guilley, Jean-Luc Danger, Zakaria Najm, Olivier Rioul Correlated Extra-Reductions Defeat Blinded Regular Exponentiation - Extended Version. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
22Ye Wang 0006, Mi Lu A self-adaptive algorithm to defeat text-based CAPTCHA. Search on Bibsonomy ICIT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
22Margaux Dugardin, Sylvain Guilley, Jean-Luc Danger, Zakaria Najm, Olivier Rioul Correlated Extra-Reductions Defeat Blinded Regular Exponentiation. Search on Bibsonomy CHES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
22Luke Jones, Andrew J. Sellers, Martin C. Carlisle CARDINAL: similarity analysis to defeat malware compiler variations. Search on Bibsonomy MALWARE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
22Michael L. Mirer, Leticia Bode Tweeting in defeat: How candidates concede and claim victory in 140 characters. Search on Bibsonomy New Media Soc. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
22Fu-Hau Hsu, Li-Han Chen, Chia-Jun Lin Defeat scanning worms in cyber warfare. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
22Philip Hodgers, Neil Hanley, Máire O'Neill Pre-processing power traces to defeat random clocking countermeasures. Search on Bibsonomy ISCAS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
22Luke Jones, Ryan Whelan, Jeremy Blackthorne, Graham Baker Flowtables: Program Skeletal Inversion for Defeat of Interprocedural Analysis with Unique Metamorphism. Search on Bibsonomy PPREW@ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
22Pedro Henriques Abreu, Daniel Castro Silva, João Portela, João Mendes-Moreira 0001, Luís Paulo Reis Using model-based collaborative filtering techniques to recommend the expected best strategy to defeat a simulated soccer opponent. Search on Bibsonomy Intell. Data Anal. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
22Elena Maceviciute Review of: Moon, David, Ruffini, Patrick and Segal, David (eds.) Hacking politics: how geeks, progressives, the Tea Party, gamers, anarchists and suits teamed up to defeat SOPA and save the internet. New York/London: OR Books, 2013. Search on Bibsonomy Inf. Res. The full citation details ... 2013 DBLP  BibTeX  RDF
22J. Matias Kivikangas, Niklas Ravaja Emotional Responses to Victory and Defeat as a Function of Opponent. Search on Bibsonomy IEEE Trans. Affect. Comput. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
22Ruoting Yang, Bernie J. Daigle Jr., Seid Y. Muhie, Rasha Hammamieh, Marti Jett, Linda R. Petzold, Francis J. Doyle III Core modular blood and brain biomarkers in social defeat mouse model for post traumatic stress disorder. Search on Bibsonomy BMC Syst. Biol. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
22Christopher A. Ballinger, Sushil J. Louis Finding robust strategies to defeat specific opponents using case-injected coevolution. Search on Bibsonomy CIG The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
22Seung-Hyun Kim, Daeseon Choi, Seung-Hun Jin, Sung-Hoon Lee Geo-location based QR-Code authentication scheme to defeat active real-time phishing attack. Search on Bibsonomy Digital Identity Management The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
22Wentao Chang, Songqing Chen Defeat Information Leakage from Browser Extensions via Data Obfuscation. Search on Bibsonomy ICICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
22Robert Daland, Kie Zuraw Does Korean defeat phonotactic word segmentation? Search on Bibsonomy ACL (2) The full citation details ... 2013 DBLP  BibTeX  RDF
22Matthew Van Gundy, Hao Chen 0003 Noncespaces: Using randomization to defeat cross-site scripting attacks. Search on Bibsonomy Comput. Secur. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 301 (100 per page; Change: )
Pages: [1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license