|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 64 occurrences of 58 keywords
|
|
|
Results
Found 381 publication records. Showing 381 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
155 | Peter Muhlberger |
Should e-government design for citizen participation?: stealth democracy and deliberation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DG.O ![In: Proceedings of the 7th Annual International Conference on Digital Government Research, DG.O 2006, San Diego, California, USA, May 21-24, 2006, pp. 53-61, 2006, Digital Government Research Center. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
democratic deliberation, human agency, political apathy, political discussion, stealth democracy, online deliberation, political participation |
130 | Aaron Striegel |
Stealth Multicast: A Novel Catalyst for Network-Level Multicast Deployment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETWORKING ![In: NETWORKING 2004, Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication, Third International IFIP-TC6 Networking Conference, Athens, Greece, May 9-14, 2004, Proceedings, pp. 817-828, 2004, Springer, 3-540-21959-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Multicast Deployment, QoS, Routing |
82 | Andrew MacQuire, Andrew Brampton, Idris A. Rai, Laurent Mathy |
Performance Analysis of Stealth DHT with Mobile Nodes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom Workshops ![In: 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 13-17 March 2006, Pisa, Italy, pp. 184-189, 2006, IEEE Computer Society, 0-7695-2520-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
79 | David Salyers, Aaron Striegel |
A Novel Approach for Transparent Bandwidth Conservation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETWORKING ![In: NETWORKING 2005: Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems, 4th International IFIP-TC6 Networking Conference, Waterloo, Canada, May 2-6, 2005, Proceedings, pp. 1219-1230, 2005, Springer, 3-540-25809-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
66 | Jason F. Cantin, Mikko H. Lipasti, James E. Smith 0001 |
Stealth prefetching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASPLOS ![In: Proceedings of the 12th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS 2006, San Jose, CA, USA, October 21-25, 2006, pp. 274-282, 2006, ACM, 1-59593-451-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
multiprocessors, prefetching, coherence |
66 | Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, Chad Verbowski |
Detecting Stealth Software with Strider GhostBuster. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June - 1 July 2005, Yokohama, Japan, Proceedings, pp. 368-377, 2005, IEEE Computer Society, 0-7695-2282-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
66 | Markus Jakobsson, XiaoFeng Wang 0001, Susanne Wetzel |
Stealth attacks in vehicular technologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTC Fall (2) ![In: Proceedings of the 60th IEEE Vehicular Technology Conference, VTC Fall 2004, 26-29 September 2004, Los Angeles, CA, USA, pp. 1218-1222, 2004, IEEE. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
66 | Phillip Krueger, Rohit Chawla |
The Stealth distributed scheduler. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 10th International Conference on Distributed Computing Systems (ICDCS 1991), May 20-24, 1991, Arlington, Texas, USA, pp. 336-343, 1991, IEEE Computer Society, 0-8186-2144-3. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
60 | Andrew Brampton, Andrew MacQuire, Idris A. Rai, Nicholas J. P. Race, Laurent Mathy |
Stealth distributed hash table: a robust and flexible super-peered DHT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoNEXT ![In: Proceedings of the 2006 ACM Conference on Emerging Network Experiment and Technology, CoNEXT 2006, Lisboa, Portugal, December 4-7, 2006, pp. 19, 2006, ACM, 1-59593-456-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
stealth DHT, peer-to-peer, distributed hash tables |
50 | Amit Vasudevan, Ramesh Yerraballi |
Stealth Breakpoints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 21st Annual Computer Security Applications Conference (ACSAC 2005), 5-9 December 2005, Tucson, AZ, USA, pp. 381-392, 2005, IEEE Computer Society, 0-7695-2461-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
48 | Márk Jelasity, Vilmos Bilicki |
Scalable P2P Overlays of Very Small Constant Degree: An Emerging Security Threat. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSS ![In: Stabilization, Safety, and Security of Distributed Systems, 11th International Symposium, SSS 2009, Lyon, France, November 3-6, 2009. Proceedings, pp. 399-412, 2009, Springer, 978-3-642-05117-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
48 | William H. Allen, Richard Ford |
How Not to Be Seen II: The Defenders Fight Back. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 5(6), pp. 65-68, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
48 | Richard Ford, William H. Allen |
How Not to Be Seen. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 5(1), pp. 67-69, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Andrew Brampton, Andrew MacQuire, Idris A. Rai, Nicholas J. P. Race, Laurent Mathy |
Stealth distributed hash table: unleashing the real potential of peer-to-peer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoNEXT ![In: Proceedings of the 2005 ACM Conference on Emerging Network Experiment and Technology, CoNEXT 2005, Toulouse, France, October 24-27, 2005, pp. 230-231, 2005, ACM, 1-59593-197-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
stealth DHT, peer-to-peer, distributed hash tables |
42 | Byoungyoung Lee, Yuna Kim, Jong Kim 0001 |
binOb+: a framework for potent and stealthy binary obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 13-16, 2010, pp. 271-281, 2010, ACM, 978-1-60558-936-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
binary obfuscation, stealth, windows SEH, reverse engineering, exception handling |
42 | Yan Wen, Jinjing Zhao, Huaimin Wang, Jiannong Cao 0001 |
Implicit Detection of Hidden Processes with a Feather-Weight Hardware-Assisted Virtual Machine Monitor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings, pp. 361-375, 2008, Springer, 978-3-540-69971-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
stealth malware, hardware-assisted VMM, Virtual machine monitor |
42 | Barry G. Silverman, Michael Johns, Ransom Weaver, Joshua Mosley |
Authoring Edutainment Stories for Online Players (AESOP): Introducing Gameplay into Interactive Dramas. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Virtual Storytelling ![In: Virtual Storytelling; Using Virtual Reality Technologies for Storytelling, Second International Conference, ICVS 2003, Toulouse, France, November 20-21, 2003, Proceedings, pp. 65-73, 2003, Springer, 3-540-20535-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
videogame generator, stealth learning, agent ap- proach, training, interactive drama, role-playing games |
37 | Jinhua Tao, Shi Qiu, Shaoli Liu, Tianshi Chen 0002, Rui Mao 0001 |
Stealth-ACK: stealth transmissions of NoC acknowledgements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Inf. Sci. ![In: Sci. China Inf. Sci. 60(9), pp. 92102, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
37 | Zhe Zhao, Yifeng Niu, Zhaowei Ma, Xiaoting Ji |
A fast stealth trajectory planning algorithm for stealth UAV to fly in multi-radar network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RCAR ![In: IEEE International Conference on Real-time Computing and Robotics, RCAR 2016, Angkor Wat, Cambodia, June 6-10, 2016, pp. 549-554, 2016, IEEE, 978-1-4673-8959-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
34 | Jung-Hee Park, Jeong-Sik Choi, Jimin Kim, Beom Hee Lee 0001 |
Roadmap-based stealth navigation for intercepting an invader. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICRA ![In: 2009 IEEE International Conference on Robotics and Automation, ICRA 2009, Kobe, Japan, May 12-17, 2009, pp. 442-447, 2009, IEEE. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
34 | Wu-chang Feng, Edward C. Kaiser, Travis Schluessler |
Stealth measurements for cheat detection in on-line games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETGAMES ![In: Proceedings of the 7th ACM SIGCOMM Workshop on Network and System Support for Games, NETGAMES 2008, Worcester, Massachusetts, USA, October 21-22, 2008, pp. 15-20, 2008, ACM, 978-1-60558-132-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Vikas R. Vasisht, Hsien-Hsin S. Lee |
SHARK: Architectural support for autonomic protection against stealth by rootkit exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MICRO ![In: 41st Annual IEEE/ACM International Symposium on Microarchitecture (MICRO-41 2008), November 8-12, 2008, Lake Como, Italy, pp. 106-116, 2008, IEEE Computer Society, 978-1-4244-2836-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Robert Strandh, John Hamer, Gilbert Baumann |
Using Stealth Mixins to Achieve Modularity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASWEC ![In: 18th Australian Software Engineering Conference (ASWEC 2007), April 10-13, 2007, Melbourne, Australia, pp. 111-116, 2007, IEEE Computer Society, 0-7695-2778-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Andrew MacQuire, Andrew Brampton, Idris A. Rai, Nicholas J. P. Race, Laurent Mathy |
Authentication in Stealth Distributed Hash Tables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROMICRO-SEAA ![In: 32nd EUROMICRO Conference on Software Engineering and Advanced Applications (EUROMICRO-SEAA 2006), August 29 - September 1, 2006, Cavtat/Dubrovnik, Croatia, pp. 348-355, 2006, IEEE Computer Society, 0-7695-2594-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Amit Vasudevan, Ramesh Yerraballi |
Cobra: Fine-grained Malware Analysis using Stealth Localized-executions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2006 IEEE Symposium on Security and Privacy (S&P 2006), 21-24 May 2006, Berkeley, California, USA, pp. 264-279, 2006, IEEE Computer Society, 0-7695-2574-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Stephen Weiss |
Teaching design patterns by stealth. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 36th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2005, St. Louis, Missouri, USA, February 23-27, 2005, pp. 492-494, 2005, ACM, 1-58113-997-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
programming pedagogy, design patterns |
34 | Peter Smet, Don Gossink, Greg Calbert |
The Value of Stealth in the Game of Chess. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Australian Conference on Artificial Intelligence ![In: AI 2005: Advances in Artificial Intelligence, 18th Australian Joint Conference on Artificial Intelligence, Sydney, Australia, December 5-9, 2005, Proceedings, pp. 207-214, 2005, Springer, 3-540-30462-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Itaru Kitahara, Kiyoshi Kogure, Norihiro Hagita |
Stealth Vision for Protecting Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPR (4) ![In: 17th International Conference on Pattern Recognition, ICPR 2004, Cambridge, UK, August 23-26, 2004., pp. 404-407, 2004, IEEE Computer Society, 0-7695-2128-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
32 | Aleksandra Korolova, Ayman Farahat, Philippe Golle |
Enhancing the privacy of web-based communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW (Special interest tracks and posters) ![In: Proceedings of the 14th international conference on World Wide Web, WWW 2005, Chiba, Japan, May 10-14, 2005 - Special interest tracks and posters, pp. 1096-1097, 2005, ACM, 1-59593-051-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
privacy, profiling, protection |
32 | Lauren Davis 0001 |
Liemandt Foundation launches hidden agenda contest: university students vie for a $25, 000 prize by building video games that secretly teach middle school subjects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Entertain. ![In: Comput. Entertain. 1(1), pp. 4, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Scott Beattie |
Sam Fisher versus Immanuel Kant: the ethics of interactive media. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IE ![In: Proceedings of the 4th Australasian Conference on Interactive Entertainment, IE 2007, 3-5 December 2007, Melbourne, Australia, pp. 5, 2007, ACM, 978-1-921166-87-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
stealth games, ethics, interactive media |
26 | Salvatore J. Stolfo |
Worm and Attack Early Warning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 2(3), pp. 73-75, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
worminator, stealth, scan, probe, cyberattack |
26 | Barry G. Silverman, Michael Johns, Ransom Weaver |
Satisfying the Perceived Need for Free-Play in Pedagogically Oriented Interactive Dramas. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CASA ![In: 16th International Conference on Computer Animation and Social Agents, CASA 2003, New Brunswick, NJ, USA, May 7-9, 2003, pp. 161-167, 2003, IEEE Computer Society, 0-7695-1934-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
videogame generator, stealth learning, training, role playing games, story telling, systems approach |
18 | Jie He, Xin Zhao, Jianxun Wang 0008, Chao Zuo, Zuoshuai Wang |
High-Dimensional Multiobjective Optimization Design for Magnetic Stealth of Underwater Vehicle Based on Improved MSOPS Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Instrum. Meas. ![In: IEEE Trans. Instrum. Meas. 73, pp. 1-13, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Abdullah H. Alqahtani |
An incremental hybrid adaptive network-based IDS in Software Defined Networks to detect stealth attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2404.01109, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Pedro Beltran Lopez, Pantaleone Nespoli, Manuel Gil Pérez |
Cyber Deception Reactive: TCP Stealth Redirection to On-Demand Honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.09191, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Xue Xiong, Beixiong Zheng, A. Lee Swindlehurst, Jie Tang 0002, Wen Wu |
A New Intelligent Reflecting Surface-Aided Electromagnetic Stealth Strategy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.12352, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Dineshkumar Rajendran, Prasanna Santhanam |
Leveraging ensemble learning for stealth assessment model with game-based learning environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Soft Comput. ![In: Soft Comput. 28(4), pp. 3509-3517, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Anton Wahrstätter, Matthew Solomon, Ben DiFrancesco, Vitalik Buterin, Davor Svetinovic |
BaseSAP: Modular Stealth Address Protocol for Programmable Blockchains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 19, pp. 3539-3553, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Qi Chang, Jinzu Ji, Ke Chen, Wenxing Wu, Yunpeng Ma |
Transparent and Ultra-Thin Flexible Checkerboard Metasurface for Radar-Infrared Bi-Stealth. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 24(5), pp. 1531, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Xin Wang, Li Lin, Yao Wang |
Stealth Address Schemes With Fast Retrievability Based On Subgroup Membership Assumptions Related To Factoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. J. ![In: Comput. J. 67(4), pp. 1253-1264, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Jianbo Wang, Jianyu Ye, Xiao-Liang Wu, Jianqing Sun, Guang Hua 0002 |
RCS Statistical Modeling of Stealth Targets Based on Fractional-Order Legendre Polynomials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Aerosp. Electron. Syst. ![In: IEEE Trans. Aerosp. Electron. Syst. 59(6), pp. 9807-9820, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Baisakhi Bandyopadhyay, Sudeb Bhattacharya, Rahul Kumar Jaiswal, Mondeep Saikia, Kumar Vaibhav Srivastava |
Wideband RCS Reduction of a Linear Patch Antenna Array Using AMC Metasurface for Stealth Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 11, pp. 127458-127467, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Xiuzhen Ye, Iñaki Esnaola, Samir M. Perlaza, Robert F. Harrison |
Stealth Data Injection Attacks With Sparsity Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Smart Grid ![In: IEEE Trans. Smart Grid 14(4), pp. 3201-3209, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Ke Sun 0014, Iñaki Esnaola, Antonia M. Tulino, H. Vincent Poor |
Asymptotic Learning Requirements for Stealth Attacks on Linearized State Estimation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Smart Grid ![In: IEEE Trans. Smart Grid 14(4), pp. 3189-3200, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Min Du, Lianhong Wang, Yicong Zhou |
High-Stealth False Data Attacks on Overloading Multiple Lines in Power Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Smart Grid ![In: IEEE Trans. Smart Grid 14(2), pp. 1321-1324, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Ying Fang, Tong Li, Linh Huynh, Katerina Christhilf, Rod D. Roscoe, Danielle S. McNamara |
Stealth Literacy Assessments via Educational Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. ![In: Comput. 12(7), pp. 130, June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Danielle S. McNamara, Tracy Arner, Reese Butterfuss, Ying Fang, Micah Watanabe, Natalie Newton, Kathryn S. McCarthy, Laura K. Allen, Rod D. Roscoe |
iSTART: Adaptive Comprehension Strategy Training and Stealth Literacy Assessment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Hum. Comput. Interact. ![In: Int. J. Hum. Comput. Interact. 39(11), pp. 2239-2252, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Alex Kovács, István András Seres |
Anonymity Analysis of the Umbra Stealth Address Scheme on Ethereum. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2308.01703, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Kenji Tojo, Ariel Shamir, Bernd Bickel, Nobuyuki Umetani |
Stealth Shaper: Reflectivity Optimization as Surface Stylization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2305.05944, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Anton Wahrstätter, Matthew Solomon, Ben DiFrancesco, Vitalik Buterin, Davor Svetinovic |
BaseSAP: Modular Stealth Address Protocol for Programmable Blockchains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2306.14272, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Yuping Yan, George Shao, Dennis Song, Mason Song, Yaochu Jin |
HE-DKSAP: Privacy-Preserving Stealth Address Protocol via Additively Homomorphic Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2312.10698, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Lauren Alvarez, Tim Menzies |
Don't Lie to Me: Avoiding Malicious Explanations with STEALTH. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2301.10407, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Marija Mikic, Mihajlo Srbakoski |
Elliptic Curve Pairing Stealth Address Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2312.12131, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Loïc Buckwell, Olivier Gilles, Daniel Gracia Pérez, Nikolai Kosmatov |
Execution at RISC: Stealth JOP Attacks on RISC-V Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2307.12648, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Lauren Alvarez, Tim Menzies |
Don't Lie to Me: Avoiding Malicious Explanations With STEALTH. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Softw. ![In: IEEE Softw. 40(3), pp. 43-53, May - June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Sihang Pu, Sri Aravinda Krishnan Thyagarajan, Nico Döttling, Lucjan Hanzlik |
Post Quantum Fuzzy Stealth Signatures and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 1148, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
18 | Marc Fischlin |
Stealth Key Exchange and Confined Access to the Record Protocol Data in TLS 1.3. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 651, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
18 | Jeffrey Anderson, Ryan Anderson, Taylor Anderson 0002, Carter Bailey, Mario Harper |
Stealth Centric Autonomous Robot Simulator (SCARS). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Softw. Impacts ![In: Softw. Impacts 16, pp. 100497, May 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Miroslav Svítek, Olga Kosheleva, Vladik Kreinovich |
Freedom of Will, Non-uniqueness of Cauchy Problem, Fractal Processes, Renormalization, Phase Transitions, and Stealth Aircraft. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Uncertainty, Constraints, and Decision Making ![In: Uncertainty, Constraints, and Decision Making, pp. 227-231, 2023, Springer, 978-3-031-36393-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Anisha Gupta, Dan Carpenter, Wookhee Min, Bradford W. Mott, Krista D. Glazewski, Cindy E. Hmelo-Silver, James C. Lester |
Enhancing Stealth Assessment in Collaborative Game-Based Learning with Multi-task Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIED ![In: Artificial Intelligence in Education - 24th International Conference, AIED 2023, Tokyo, Japan, July 3-7, 2023, Proceedings, pp. 304-315, 2023, Springer, 978-3-031-36271-2. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Sihang Pu, Sri Aravinda Krishnan Thyagarajan, Nico Döttling, Lucjan Hanzlik |
Post Quantum Fuzzy Stealth Signatures and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, pp. 371-385, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Marc Fischlin |
Stealth Key Exchange and Confined Access to the Record Protocol Data in TLS 1.3. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, pp. 2901-2914, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Gabriele Gualandi, Alessandro V. Papadopoulos |
Worst-Case Impact Assessment of Multi-Alarm Stealth Attacks Against Control Systems with CUSUM-Based Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSOS ![In: IEEE International Conference on Autonomic Computing and Self-Organizing Systems, ACSOS 2023, Toronto, ON, Canada, September 25-29, 2023, pp. 117-126, 2023, IEEE, 979-8-3503-3744-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Pengfei Zhang, Xiong Cheng, Yao Ma, Jun Liu, Liyan Zhu, Daying Sun, Xiaodong Huang |
Efficient and Accurate Design of Infrared and Laser-Compatible Stealth Metasurface Using Bidirectional Artificial Neural Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MHS ![In: International Symposium on Micro-NanoMehatronics and Human Science, MHS 2023, Nagoya, Japan, November 20-22, 2023, pp. 1-5, 2023, IEEE, 979-8-3503-1507-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Mary K. McIntosh, Sean Christie |
Opportunities and challenges for robotic-assisted spine surgery: feasible indications for the MAZOR™ X Stealth Edition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EMBC ![In: 45th Annual International Conference of the IEEE Engineering in Medicine & Biology Society, EMBC 2023, Sydney, Australia, July 24-27, 2023, pp. 1-4, 2023, IEEE, 979-8-3503-2447-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Maxim Goukhshtein, Stark C. Draper |
Polar Coded Distribution Matching for Probabilistic Shaping and Stealth Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISTC ![In: 12th International Symposium on Topics in Coding, ISTC 2023, Brest, France, September 4-8, 2023, pp. 1-5, 2023, IEEE, 979-8-3503-2611-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Wael Al Enezi, Clark Verbrugge |
Investigating the Influence of Behaviors and Dialogs on Player Enjoyment in Stealth Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIIDE ![In: Proceedings of the AAAI Conference on Artificial Intelligence and Interactive Digital Entertainment, October 08-12, 2023, Salt Lake City, UT, USA, pp. 166-174, 2023, AAAI Press, 978-1-57735-883-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Wael Al Enezi, Clark Verbrugge |
Evaluating Player Experience in Stealth Games: Dynamic Guard Patrol Behavior Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIIDE ![In: Proceedings of the AAAI Conference on Artificial Intelligence and Interactive Digital Entertainment, October 08-12, 2023, Salt Lake City, UT, USA, pp. 175-184, 2023, AAAI Press, 978-1-57735-883-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Zihan Xue, Jinchi Han, Wei Song 0002 |
CTPP: A Fast and Stealth Algorithm for Searching Eviction Sets on Intel Processors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2023, Hong Kong, China, October 16-18, 2023, pp. 151-163, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Michael G. Christel, Angelina Shi, James Finkel, Hannah Baxter, Hsuan-Ju Wang, Yuchan Wu, Ricardo Washingon, Bryan S. Maher, John Balash |
Power Core Values: Teaching Racial Bias Awareness Through a Stealth Game and Workshop. ![Search on Bibsonomy](Pics/bibsonomy.png) |
JCSG ![In: Serious Games - 9th Joint International Conference, JCSG 2023, Dublin, Ireland, October 26-27, 2023, Proceedings, pp. 243-256, 2023, Springer, 978-3-031-44750-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Kenji Tojo, Ariel Shamir, Bernd Bickel, Nobuyuki Umetani |
Stealth Shaper: Reflectivity Optimization as Surface Stylization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGGRAPH (Conference Paper Track) ![In: ACM SIGGRAPH 2023 Conference Proceedings, SIGGRAPH 2023, Los Angeles, CA, USA, August 6-10, 2023, pp. 20:1-20:10, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Manoj Prabhakar K, Vipin Pavithran, Saranya Chandran, Sreelakshmi R. Syam |
Long-Range Stealth Mode Wi-Fi Surveillance and Interception System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCNT ![In: 14th International Conference on Computing Communication and Networking Technologies, ICCCNT 2023, Delhi, India, July 6-8, 2023, pp. 1-6, 2023, IEEE, 979-8-3503-3509-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Loïc Buckwell, Olivier Gilles, Daniel Gracia Pérez, Nikolai Kosmatov |
Execution at RISC: Stealth JOP Attacks on RISC-V Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS Workshops (2) ![In: Computer Security. ESORICS 2023 International Workshops - CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part II, pp. 377-391, 2023, Springer, 978-3-031-54128-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Sebastian Schrittwieser, Elisabeth Wimmer, Kevin Mallinger, Patrick Kochberger, Caroline Lawitschka, Sebastian Raubitzek, Edgar R. Weippl |
Modeling Obfuscation Stealth Through Code Complexity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS Workshops (2) ![In: Computer Security. ESORICS 2023 International Workshops - CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part II, pp. 392-408, 2023, Springer, 978-3-031-54128-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Pedro Miguel Sánchez Sánchez, Enrique Tomás Martínez Beltrán, Alberto Huertas Celdrán, Robin Wassink, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller |
Stealth Spectrum Sensing Data Falsification Attacks Affecting IoT Spectrum Monitors on the Battlefield. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MILCOM ![In: IEEE Military Communications Conference, MILCOM 2023, Boston, MA, USA, October 30 - Nov. 3, 2023, pp. 673-678, 2023, IEEE, 979-8-3503-2181-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Hauke Heseding, Moritz Dieing, Ankush Meshram, Martina Zitterbart |
Protocol-Agnostic Detection of Stealth Attacks on Networked Control Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDIN ![In: 21st IEEE International Conference on Industrial Informatics, INDIN 2023, Lemgo, Germany, July 18-20, 2023, pp. 1-7, 2023, IEEE, 978-1-6654-9313-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Ryan Anderson, Taylor Anderson 0002, Carter Bailey, Jeffrey Anderson, Mario Harper |
Stealth Centric A*: Bio-Inspired Navigation for Ground Robots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IRC ![In: Seventh IEEE International Conference on Robotic Computing, IRC 2023, Laguna Hills, CA, USA, December 11-13, 2023, pp. 1-2, 2023, IEEE, 979-8-3503-9574-7. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Xiao Yu, Zhao Li, Xu Qiao, Yu-an Tan 0001, Yuanzhang Li, Li Zhang |
A Stealth Security Hardening Method Based on SSD Firmware Function Extension. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICONIP (9) ![In: Neural Information Processing - 30th International Conference, ICONIP 2023, Changsha, China, November 20-23, 2023, Proceedings, Part IX, pp. 362-375, 2023, Springer, 978-981-99-8137-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Ioannis Kazoleas, Panagiotis Karampelas |
A novel malicious remote administration tool using stealth and self-defense techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 21(2), pp. 357-378, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Wenjie Wang, Jinming Jiang, Jiangang Liang, Zhenxu Wang, Cuilian Xu, Yongfeng Li, Lin Zheng 0005, Yueyu Meng, Jiafu Wang, Shaobo Qu |
A Multifunctional Coating for Radar-Infrared Stealth-Compatible at High Temperatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 122280-122285, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Shaoze Lu, Zhijun Meng, Jun Huang, Mingxu Yi, Zeyang Wang |
The Optimization of Warhead and QRCS Simulation for a Stealth Missile. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 54660-54667, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Dineshkumar Rajendran, S. Prasanna |
Stealth assessment strategy in distributed systems using optimal deep learning with game based learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Supercomput. ![In: J. Supercomput. 78(6), pp. 8285-8301, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Osman Boyaci, Mohammad Rasoul Narimani, Katherine R. Davis 0001, Muhammad Ismail 0001, Thomas J. Overbye, Erchin Serpedin |
Joint Detection and Localization of Stealth False Data Injection Attacks in Smart Grids Using Graph Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Smart Grid ![In: IEEE Trans. Smart Grid 13(1), pp. 807-819, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Xiao-Lei Wang, Guang-Hong Yang, Dianhua Zhang |
Optimal Stealth Attack Strategy Design for Linear Cyber-Physical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Cybern. ![In: IEEE Trans. Cybern. 52(1), pp. 472-480, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Abdulrahman Takiddin, Suman Rath, Muhammad Ismail 0001, Subham Sahoo |
Data-Driven Detection of Stealth Cyber-Attacks in DC Microgrids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Syst. J. ![In: IEEE Syst. J. 16(4), pp. 6097-6106, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Osman Boyaci, Amarachi Umunnakwe, Abhijeet Sahu, Mohammad Rasoul Narimani, Muhammad Ismail 0001, Katherine R. Davis 0001, Erchin Serpedin |
Graph Neural Networks Based Detection of Stealth False Data Injection Attacks in Smart Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Syst. J. ![In: IEEE Syst. J. 16(2), pp. 2946-2957, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Jiaqi Yu, Wenchao Ma, Jewoong Moon, André R. Denham |
Developing a Stealth Assessment System Using a Continuous Conjunctive Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Learn. Anal. ![In: J. Learn. Anal. 9(3), pp. 11-31, December 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Xiuzhen Ye, Iñaki Esnaola, Samir M. Perlaza, Robert F. Harrison |
Stealth Data Injection Attacks with Sparsity Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2201.00065, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
18 | Weizhou Li, Zhiqiang Lin, Qi Chen |
A Hybrid Design of Linkable Ring Signature Scheme with Stealth Addresses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 2022, pp. 1417607:1-1417607:9, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Jinwei Jia, Zhuangzhi Han, Yuying Liang, Limin Liu, Xuetian Wang |
Design of Multi-Parameter Compound Modulated RF Stealth Anti-Sorting Signals Based on Hyperchaotic Interleaving Feedback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Entropy ![In: Entropy 24(9), pp. 1283, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Jinwei Jia, Limin Liu, Yuying Liang, Zhuangzhi Han, Xuetian Wang |
Chaotic Mapping-Based Anti-Sorting Radio Frequency Stealth Signals and Compressed Sensing-Based Echo Signal Processing Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Entropy ![In: Entropy 24(11), pp. 1559, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Xin Yin, Zhen Liu 0008, Guomin Yang, Guoxing Chen, Haojin Zhu |
Secure Hierarchical Deterministic Wallet Supporting Stealth Address. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 627, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
18 | Shaoze Lu, Zhijun Meng, Jun Huang, Mingxu Yi, Zeyang Wang |
Study on Quantum Radar Detection Probability Based on Flying-Wing Stealth Aircraft. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 22(16), pp. 5944, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Zhen Liu 0008, Guomin Yang, Duncan S. Wong, Khoa Nguyen 0002, Huaxiong Wang, Xiaorong Ke, Yining Liu |
Secure Deterministic Wallet and Stealth Address: Key-Insulated and Privacy-Preserving Signature Scheme With Publicly Derived Public Key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 19(5), pp. 2934-2951, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Moonseok Jang, Kexin Wang, Sangjin Lee 0001, Hyeonggyu Jeong, In-Yeong Song, Yong Ho Song, Jungwook Choi |
Achieving low write latency through new stealth program operation supporting early write completion in NAND flash memory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Syst. Archit. ![In: J. Syst. Archit. 133, pp. 102767, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Yixing Chen 0005, Yuqiang Zhang, Jincai Zou, Zhihan Tan, Yaya Huang, Ning Hu |
Stealth: A Heterogeneous Covert Access Channel for Mix-net. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSC ![In: 7th IEEE International Conference on Data Science in Cyberspace, DSC 2022, Guilin, China, July 11-13, 2022, pp. 118-125, 2022, IEEE, 978-1-6654-7480-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Nathan L. Henderson, Halim Acosta, Wookhee Min, Bradford W. Mott, Trudi Lord, Frieda Reichsman, Chad Dorsey, Eric N. Wiebe, James C. Lester |
Enhancing Stealth Assessment in Game-Based Learning Environments with Generative Zero-Shot Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDM ![In: Proceedings of the 15th International Conference on Educational Data Mining, EDM 2022, Durham, UK, July 24-27, 2022, 2022, International Educational Data Mining Society. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
18 | Alan Oliveira de Sá, Lucila Maria Souza Bento, Mariana Luiza Flavio, Marco Pasetti, Paolo Ferrari, Emiliano Sisinni |
ANN-Based Stealth Attack to Battery Energy Storage Systems by Using a Low-Cost Device. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MetroInd4.0& IoT ![In: IEEE International Workshop on Metrology for Industry 4.0 & IoT, MetroInd4.0&IoT 2022, Trento, Italy, June 7-9, 2022, pp. 201-206, 2022, IEEE, 978-1-6654-1093-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Young Seo Lee, Gunjae Koo, Young-Ho Gong, Sung Woo Chung |
Stealth ECC: A Data-Width Aware Adaptive ECC Scheme for DRAM Error Resilience. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DATE ![In: 2022 Design, Automation & Test in Europe Conference & Exhibition, DATE 2022, Antwerp, Belgium, March 14-23, 2022, pp. 382-387, 2022, IEEE, 978-3-9819263-6-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 381 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ >>] |
|