The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for stealth with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1991-2004 (22) 2005-2006 (25) 2007-2008 (27) 2009-2011 (24) 2012-2013 (21) 2014 (15) 2015 (21) 2016 (22) 2017 (15) 2018 (26) 2019 (20) 2020 (29) 2021 (39) 2022 (29) 2023 (38) 2024 (8)
Publication types (Num. hits)
article(161) book(1) incollection(1) inproceedings(217) phdthesis(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 64 occurrences of 58 keywords

Results
Found 381 publication records. Showing 381 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
155Peter Muhlberger Should e-government design for citizen participation?: stealth democracy and deliberation. Search on Bibsonomy DG.O The full citation details ... 2006 DBLP  DOI  BibTeX  RDF democratic deliberation, human agency, political apathy, political discussion, stealth democracy, online deliberation, political participation
130Aaron Striegel Stealth Multicast: A Novel Catalyst for Network-Level Multicast Deployment. Search on Bibsonomy NETWORKING The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Multicast Deployment, QoS, Routing
82Andrew MacQuire, Andrew Brampton, Idris A. Rai, Laurent Mathy Performance Analysis of Stealth DHT with Mobile Nodes. Search on Bibsonomy PerCom Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
79David Salyers, Aaron Striegel A Novel Approach for Transparent Bandwidth Conservation. Search on Bibsonomy NETWORKING The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
66Jason F. Cantin, Mikko H. Lipasti, James E. Smith 0001 Stealth prefetching. Search on Bibsonomy ASPLOS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF multiprocessors, prefetching, coherence
66Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, Chad Verbowski Detecting Stealth Software with Strider GhostBuster. Search on Bibsonomy DSN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
66Markus Jakobsson, XiaoFeng Wang 0001, Susanne Wetzel Stealth attacks in vehicular technologies. Search on Bibsonomy VTC Fall (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
66Phillip Krueger, Rohit Chawla The Stealth distributed scheduler. Search on Bibsonomy ICDCS The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
60Andrew Brampton, Andrew MacQuire, Idris A. Rai, Nicholas J. P. Race, Laurent Mathy Stealth distributed hash table: a robust and flexible super-peered DHT. Search on Bibsonomy CoNEXT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF stealth DHT, peer-to-peer, distributed hash tables
50Amit Vasudevan, Ramesh Yerraballi Stealth Breakpoints. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
48Márk Jelasity, Vilmos Bilicki Scalable P2P Overlays of Very Small Constant Degree: An Emerging Security Threat. Search on Bibsonomy SSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
48William H. Allen, Richard Ford How Not to Be Seen II: The Defenders Fight Back. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
48Richard Ford, William H. Allen How Not to Be Seen. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
44Andrew Brampton, Andrew MacQuire, Idris A. Rai, Nicholas J. P. Race, Laurent Mathy Stealth distributed hash table: unleashing the real potential of peer-to-peer. Search on Bibsonomy CoNEXT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF stealth DHT, peer-to-peer, distributed hash tables
42Byoungyoung Lee, Yuna Kim, Jong Kim 0001 binOb+: a framework for potent and stealthy binary obfuscation. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF binary obfuscation, stealth, windows SEH, reverse engineering, exception handling
42Yan Wen, Jinjing Zhao, Huaimin Wang, Jiannong Cao 0001 Implicit Detection of Hidden Processes with a Feather-Weight Hardware-Assisted Virtual Machine Monitor. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF stealth malware, hardware-assisted VMM, Virtual machine monitor
42Barry G. Silverman, Michael Johns, Ransom Weaver, Joshua Mosley Authoring Edutainment Stories for Online Players (AESOP): Introducing Gameplay into Interactive Dramas. Search on Bibsonomy International Conference on Virtual Storytelling The full citation details ... 2003 DBLP  DOI  BibTeX  RDF videogame generator, stealth learning, agent ap- proach, training, interactive drama, role-playing games
37Jinhua Tao, Shi Qiu, Shaoli Liu, Tianshi Chen 0002, Rui Mao 0001 Stealth-ACK: stealth transmissions of NoC acknowledgements. Search on Bibsonomy Sci. China Inf. Sci. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
37Zhe Zhao, Yifeng Niu, Zhaowei Ma, Xiaoting Ji A fast stealth trajectory planning algorithm for stealth UAV to fly in multi-radar network. Search on Bibsonomy RCAR The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
34Jung-Hee Park, Jeong-Sik Choi, Jimin Kim, Beom Hee Lee 0001 Roadmap-based stealth navigation for intercepting an invader. Search on Bibsonomy ICRA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
34Wu-chang Feng, Edward C. Kaiser, Travis Schluessler Stealth measurements for cheat detection in on-line games. Search on Bibsonomy NETGAMES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
34Vikas R. Vasisht, Hsien-Hsin S. Lee SHARK: Architectural support for autonomic protection against stealth by rootkit exploits. Search on Bibsonomy MICRO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
34Robert Strandh, John Hamer, Gilbert Baumann Using Stealth Mixins to Achieve Modularity. Search on Bibsonomy ASWEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
34Andrew MacQuire, Andrew Brampton, Idris A. Rai, Nicholas J. P. Race, Laurent Mathy Authentication in Stealth Distributed Hash Tables. Search on Bibsonomy EUROMICRO-SEAA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Amit Vasudevan, Ramesh Yerraballi Cobra: Fine-grained Malware Analysis using Stealth Localized-executions. Search on Bibsonomy S&P The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Stephen Weiss Teaching design patterns by stealth. Search on Bibsonomy SIGCSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF programming pedagogy, design patterns
34Peter Smet, Don Gossink, Greg Calbert The Value of Stealth in the Game of Chess. Search on Bibsonomy Australian Conference on Artificial Intelligence The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
34Itaru Kitahara, Kiyoshi Kogure, Norihiro Hagita Stealth Vision for Protecting Privacy. Search on Bibsonomy ICPR (4) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
32Aleksandra Korolova, Ayman Farahat, Philippe Golle Enhancing the privacy of web-based communication. Search on Bibsonomy WWW (Special interest tracks and posters) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF privacy, profiling, protection
32Lauren Davis 0001 Liemandt Foundation launches hidden agenda contest: university students vie for a $25, 000 prize by building video games that secretly teach middle school subjects. Search on Bibsonomy Comput. Entertain. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Scott Beattie Sam Fisher versus Immanuel Kant: the ethics of interactive media. Search on Bibsonomy IE The full citation details ... 2007 DBLP  BibTeX  RDF stealth games, ethics, interactive media
26Salvatore J. Stolfo Worm and Attack Early Warning. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF worminator, stealth, scan, probe, cyberattack
26Barry G. Silverman, Michael Johns, Ransom Weaver Satisfying the Perceived Need for Free-Play in Pedagogically Oriented Interactive Dramas. Search on Bibsonomy CASA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF videogame generator, stealth learning, training, role playing games, story telling, systems approach
18Jie He, Xin Zhao, Jianxun Wang 0008, Chao Zuo, Zuoshuai Wang High-Dimensional Multiobjective Optimization Design for Magnetic Stealth of Underwater Vehicle Based on Improved MSOPS Algorithm. Search on Bibsonomy IEEE Trans. Instrum. Meas. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Abdullah H. Alqahtani An incremental hybrid adaptive network-based IDS in Software Defined Networks to detect stealth attacks. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Pedro Beltran Lopez, Pantaleone Nespoli, Manuel Gil Pérez Cyber Deception Reactive: TCP Stealth Redirection to On-Demand Honeypots. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Xue Xiong, Beixiong Zheng, A. Lee Swindlehurst, Jie Tang 0002, Wen Wu A New Intelligent Reflecting Surface-Aided Electromagnetic Stealth Strategy. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Dineshkumar Rajendran, Prasanna Santhanam Leveraging ensemble learning for stealth assessment model with game-based learning environment. Search on Bibsonomy Soft Comput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Anton Wahrstätter, Matthew Solomon, Ben DiFrancesco, Vitalik Buterin, Davor Svetinovic BaseSAP: Modular Stealth Address Protocol for Programmable Blockchains. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Qi Chang, Jinzu Ji, Ke Chen, Wenxing Wu, Yunpeng Ma Transparent and Ultra-Thin Flexible Checkerboard Metasurface for Radar-Infrared Bi-Stealth. Search on Bibsonomy Sensors The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Xin Wang, Li Lin, Yao Wang Stealth Address Schemes With Fast Retrievability Based On Subgroup Membership Assumptions Related To Factoring. Search on Bibsonomy Comput. J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Jianbo Wang, Jianyu Ye, Xiao-Liang Wu, Jianqing Sun, Guang Hua 0002 RCS Statistical Modeling of Stealth Targets Based on Fractional-Order Legendre Polynomials. Search on Bibsonomy IEEE Trans. Aerosp. Electron. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Baisakhi Bandyopadhyay, Sudeb Bhattacharya, Rahul Kumar Jaiswal, Mondeep Saikia, Kumar Vaibhav Srivastava Wideband RCS Reduction of a Linear Patch Antenna Array Using AMC Metasurface for Stealth Applications. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Xiuzhen Ye, Iñaki Esnaola, Samir M. Perlaza, Robert F. Harrison Stealth Data Injection Attacks With Sparsity Constraints. Search on Bibsonomy IEEE Trans. Smart Grid The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Ke Sun 0014, Iñaki Esnaola, Antonia M. Tulino, H. Vincent Poor Asymptotic Learning Requirements for Stealth Attacks on Linearized State Estimation. Search on Bibsonomy IEEE Trans. Smart Grid The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Min Du, Lianhong Wang, Yicong Zhou High-Stealth False Data Attacks on Overloading Multiple Lines in Power Systems. Search on Bibsonomy IEEE Trans. Smart Grid The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Ying Fang, Tong Li, Linh Huynh, Katerina Christhilf, Rod D. Roscoe, Danielle S. McNamara Stealth Literacy Assessments via Educational Games. Search on Bibsonomy Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Danielle S. McNamara, Tracy Arner, Reese Butterfuss, Ying Fang, Micah Watanabe, Natalie Newton, Kathryn S. McCarthy, Laura K. Allen, Rod D. Roscoe iSTART: Adaptive Comprehension Strategy Training and Stealth Literacy Assessment. Search on Bibsonomy Int. J. Hum. Comput. Interact. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Alex Kovács, István András Seres Anonymity Analysis of the Umbra Stealth Address Scheme on Ethereum. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Kenji Tojo, Ariel Shamir, Bernd Bickel, Nobuyuki Umetani Stealth Shaper: Reflectivity Optimization as Surface Stylization. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Anton Wahrstätter, Matthew Solomon, Ben DiFrancesco, Vitalik Buterin, Davor Svetinovic BaseSAP: Modular Stealth Address Protocol for Programmable Blockchains. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Yuping Yan, George Shao, Dennis Song, Mason Song, Yaochu Jin HE-DKSAP: Privacy-Preserving Stealth Address Protocol via Additively Homomorphic Encryption. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Lauren Alvarez, Tim Menzies Don't Lie to Me: Avoiding Malicious Explanations with STEALTH. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Marija Mikic, Mihajlo Srbakoski Elliptic Curve Pairing Stealth Address Protocols. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Loïc Buckwell, Olivier Gilles, Daniel Gracia Pérez, Nikolai Kosmatov Execution at RISC: Stealth JOP Attacks on RISC-V Applications. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Lauren Alvarez, Tim Menzies Don't Lie to Me: Avoiding Malicious Explanations With STEALTH. Search on Bibsonomy IEEE Softw. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Sihang Pu, Sri Aravinda Krishnan Thyagarajan, Nico Döttling, Lucjan Hanzlik Post Quantum Fuzzy Stealth Signatures and Applications. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
18Marc Fischlin Stealth Key Exchange and Confined Access to the Record Protocol Data in TLS 1.3. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
18Jeffrey Anderson, Ryan Anderson, Taylor Anderson 0002, Carter Bailey, Mario Harper Stealth Centric Autonomous Robot Simulator (SCARS). Search on Bibsonomy Softw. Impacts The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Miroslav Svítek, Olga Kosheleva, Vladik Kreinovich Freedom of Will, Non-uniqueness of Cauchy Problem, Fractal Processes, Renormalization, Phase Transitions, and Stealth Aircraft. Search on Bibsonomy Uncertainty, Constraints, and Decision Making The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Anisha Gupta, Dan Carpenter, Wookhee Min, Bradford W. Mott, Krista D. Glazewski, Cindy E. Hmelo-Silver, James C. Lester Enhancing Stealth Assessment in Collaborative Game-Based Learning with Multi-task Learning. Search on Bibsonomy AIED The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Sihang Pu, Sri Aravinda Krishnan Thyagarajan, Nico Döttling, Lucjan Hanzlik Post Quantum Fuzzy Stealth Signatures and Applications. Search on Bibsonomy CCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Marc Fischlin Stealth Key Exchange and Confined Access to the Record Protocol Data in TLS 1.3. Search on Bibsonomy CCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Gabriele Gualandi, Alessandro V. Papadopoulos Worst-Case Impact Assessment of Multi-Alarm Stealth Attacks Against Control Systems with CUSUM-Based Anomaly Detection. Search on Bibsonomy ACSOS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Pengfei Zhang, Xiong Cheng, Yao Ma, Jun Liu, Liyan Zhu, Daying Sun, Xiaodong Huang Efficient and Accurate Design of Infrared and Laser-Compatible Stealth Metasurface Using Bidirectional Artificial Neural Network. Search on Bibsonomy MHS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Mary K. McIntosh, Sean Christie Opportunities and challenges for robotic-assisted spine surgery: feasible indications for the MAZOR™ X Stealth Edition. Search on Bibsonomy EMBC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Maxim Goukhshtein, Stark C. Draper Polar Coded Distribution Matching for Probabilistic Shaping and Stealth Communication. Search on Bibsonomy ISTC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Wael Al Enezi, Clark Verbrugge Investigating the Influence of Behaviors and Dialogs on Player Enjoyment in Stealth Games. Search on Bibsonomy AIIDE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Wael Al Enezi, Clark Verbrugge Evaluating Player Experience in Stealth Games: Dynamic Guard Patrol Behavior Study. Search on Bibsonomy AIIDE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Zihan Xue, Jinchi Han, Wei Song 0002 CTPP: A Fast and Stealth Algorithm for Searching Eviction Sets on Intel Processors. Search on Bibsonomy RAID The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Michael G. Christel, Angelina Shi, James Finkel, Hannah Baxter, Hsuan-Ju Wang, Yuchan Wu, Ricardo Washingon, Bryan S. Maher, John Balash Power Core Values: Teaching Racial Bias Awareness Through a Stealth Game and Workshop. Search on Bibsonomy JCSG The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Kenji Tojo, Ariel Shamir, Bernd Bickel, Nobuyuki Umetani Stealth Shaper: Reflectivity Optimization as Surface Stylization. Search on Bibsonomy SIGGRAPH (Conference Paper Track) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Manoj Prabhakar K, Vipin Pavithran, Saranya Chandran, Sreelakshmi R. Syam Long-Range Stealth Mode Wi-Fi Surveillance and Interception System. Search on Bibsonomy ICCCNT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Loïc Buckwell, Olivier Gilles, Daniel Gracia Pérez, Nikolai Kosmatov Execution at RISC: Stealth JOP Attacks on RISC-V Applications. Search on Bibsonomy ESORICS Workshops (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Sebastian Schrittwieser, Elisabeth Wimmer, Kevin Mallinger, Patrick Kochberger, Caroline Lawitschka, Sebastian Raubitzek, Edgar R. Weippl Modeling Obfuscation Stealth Through Code Complexity. Search on Bibsonomy ESORICS Workshops (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Pedro Miguel Sánchez Sánchez, Enrique Tomás Martínez Beltrán, Alberto Huertas Celdrán, Robin Wassink, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller Stealth Spectrum Sensing Data Falsification Attacks Affecting IoT Spectrum Monitors on the Battlefield. Search on Bibsonomy MILCOM The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Hauke Heseding, Moritz Dieing, Ankush Meshram, Martina Zitterbart Protocol-Agnostic Detection of Stealth Attacks on Networked Control Systems. Search on Bibsonomy INDIN The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Ryan Anderson, Taylor Anderson 0002, Carter Bailey, Jeffrey Anderson, Mario Harper Stealth Centric A*: Bio-Inspired Navigation for Ground Robots. Search on Bibsonomy IRC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Xiao Yu, Zhao Li, Xu Qiao, Yu-an Tan 0001, Yuanzhang Li, Li Zhang A Stealth Security Hardening Method Based on SSD Firmware Function Extension. Search on Bibsonomy ICONIP (9) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Ioannis Kazoleas, Panagiotis Karampelas A novel malicious remote administration tool using stealth and self-defense techniques. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Wenjie Wang, Jinming Jiang, Jiangang Liang, Zhenxu Wang, Cuilian Xu, Yongfeng Li, Lin Zheng 0005, Yueyu Meng, Jiafu Wang, Shaobo Qu A Multifunctional Coating for Radar-Infrared Stealth-Compatible at High Temperatures. Search on Bibsonomy IEEE Access The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Shaoze Lu, Zhijun Meng, Jun Huang, Mingxu Yi, Zeyang Wang The Optimization of Warhead and QRCS Simulation for a Stealth Missile. Search on Bibsonomy IEEE Access The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Dineshkumar Rajendran, S. Prasanna Stealth assessment strategy in distributed systems using optimal deep learning with game based learning. Search on Bibsonomy J. Supercomput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Osman Boyaci, Mohammad Rasoul Narimani, Katherine R. Davis 0001, Muhammad Ismail 0001, Thomas J. Overbye, Erchin Serpedin Joint Detection and Localization of Stealth False Data Injection Attacks in Smart Grids Using Graph Neural Networks. Search on Bibsonomy IEEE Trans. Smart Grid The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Xiao-Lei Wang, Guang-Hong Yang, Dianhua Zhang Optimal Stealth Attack Strategy Design for Linear Cyber-Physical Systems. Search on Bibsonomy IEEE Trans. Cybern. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Abdulrahman Takiddin, Suman Rath, Muhammad Ismail 0001, Subham Sahoo Data-Driven Detection of Stealth Cyber-Attacks in DC Microgrids. Search on Bibsonomy IEEE Syst. J. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Osman Boyaci, Amarachi Umunnakwe, Abhijeet Sahu, Mohammad Rasoul Narimani, Muhammad Ismail 0001, Katherine R. Davis 0001, Erchin Serpedin Graph Neural Networks Based Detection of Stealth False Data Injection Attacks in Smart Grids. Search on Bibsonomy IEEE Syst. J. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Jiaqi Yu, Wenchao Ma, Jewoong Moon, André R. Denham Developing a Stealth Assessment System Using a Continuous Conjunctive Model. Search on Bibsonomy J. Learn. Anal. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Xiuzhen Ye, Iñaki Esnaola, Samir M. Perlaza, Robert F. Harrison Stealth Data Injection Attacks with Sparsity Constraints. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  BibTeX  RDF
18Weizhou Li, Zhiqiang Lin, Qi Chen A Hybrid Design of Linkable Ring Signature Scheme with Stealth Addresses. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Jinwei Jia, Zhuangzhi Han, Yuying Liang, Limin Liu, Xuetian Wang Design of Multi-Parameter Compound Modulated RF Stealth Anti-Sorting Signals Based on Hyperchaotic Interleaving Feedback. Search on Bibsonomy Entropy The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Jinwei Jia, Limin Liu, Yuying Liang, Zhuangzhi Han, Xuetian Wang Chaotic Mapping-Based Anti-Sorting Radio Frequency Stealth Signals and Compressed Sensing-Based Echo Signal Processing Technology. Search on Bibsonomy Entropy The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Xin Yin, Zhen Liu 0008, Guomin Yang, Guoxing Chen, Haojin Zhu Secure Hierarchical Deterministic Wallet Supporting Stealth Address. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
18Shaoze Lu, Zhijun Meng, Jun Huang, Mingxu Yi, Zeyang Wang Study on Quantum Radar Detection Probability Based on Flying-Wing Stealth Aircraft. Search on Bibsonomy Sensors The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Zhen Liu 0008, Guomin Yang, Duncan S. Wong, Khoa Nguyen 0002, Huaxiong Wang, Xiaorong Ke, Yining Liu Secure Deterministic Wallet and Stealth Address: Key-Insulated and Privacy-Preserving Signature Scheme With Publicly Derived Public Key. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Moonseok Jang, Kexin Wang, Sangjin Lee 0001, Hyeonggyu Jeong, In-Yeong Song, Yong Ho Song, Jungwook Choi Achieving low write latency through new stealth program operation supporting early write completion in NAND flash memory. Search on Bibsonomy J. Syst. Archit. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Yixing Chen 0005, Yuqiang Zhang, Jincai Zou, Zhihan Tan, Yaya Huang, Ning Hu Stealth: A Heterogeneous Covert Access Channel for Mix-net. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Nathan L. Henderson, Halim Acosta, Wookhee Min, Bradford W. Mott, Trudi Lord, Frieda Reichsman, Chad Dorsey, Eric N. Wiebe, James C. Lester Enhancing Stealth Assessment in Game-Based Learning Environments with Generative Zero-Shot Learning. Search on Bibsonomy EDM The full citation details ... 2022 DBLP  BibTeX  RDF
18Alan Oliveira de Sá, Lucila Maria Souza Bento, Mariana Luiza Flavio, Marco Pasetti, Paolo Ferrari, Emiliano Sisinni ANN-Based Stealth Attack to Battery Energy Storage Systems by Using a Low-Cost Device. Search on Bibsonomy MetroInd4.0& IoT The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Young Seo Lee, Gunjae Koo, Young-Ho Gong, Sung Woo Chung Stealth ECC: A Data-Width Aware Adaptive ECC Scheme for DRAM Error Resilience. Search on Bibsonomy DATE The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 381 (100 per page; Change: )
Pages: [1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license