The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "NordSec"( http://dblp.L3S.de/Venues/NordSec )

URL (DBLP): http://dblp.uni-trier.de/db/conf/nordsec

Publication years (Num. hits)
2009 (21) 2010 (20) 2011 (18) 2012 (19) 2013 (22) 2014 (17) 2015 (17) 2016 (17) 2017 (19) 2018 (30) 2019 (18) 2020 (15) 2021-2022 (34) 2023 (18) 2024 (1)
Publication types (Num. hits)
inproceedings(271) proceedings(15)
Venues (Conferences, Journals, ...)
NordSec(286)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 28 occurrences of 27 keywords

Results
Found 286 publication records. Showing 286 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Lothar Fritsch, Ismail Hassan, Ebenezer Paintsil (eds.) Secure IT Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, November 16-17, 2023, Proceedings Search on Bibsonomy NordSec The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Thorsten Jenke, Elmar Padilla, Lilli Bruckschen Towards Generic Malware Unpacking: A Comprehensive Study on the Unpacking Behavior of Malicious Run-Time Packers. Search on Bibsonomy NordSec The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Philipp Eichhammer, Hans P. Reiser A Self-forming Community Approach for Intrusion Detection in Heterogeneous Networks. Search on Bibsonomy NordSec The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Jonas Palm, Meiko Jensen Analysis of a Consent Management Specification and Prototype Under the GDPR. Search on Bibsonomy NordSec The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Joakim Brorsson, Martin Gunnarsson DIPSAUCE: Efficient Private Stream Aggregation Without Trusted Parties. Search on Bibsonomy NordSec The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Paul Cotan, George Teseleanu Small Private Key Attack Against a Family of RSA-Like Cryptosystems. Search on Bibsonomy NordSec The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Philippe Mangeard, Xiufen Yu, Mohammad Mannan, Amr M. Youssef No Place to Hide: Privacy Exposure in Anti-stalkerware Apps and Support Websites. Search on Bibsonomy NordSec The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Amirreza Hamidi, Hossein Ghodosi Fair Distributed Oblivious Polynomial Evaluation via Bitcoin Deposits: Compute-as-a-Service. Search on Bibsonomy NordSec The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Mario Lins, René Mayrhofer, Michael Roland 0001, Alastair R. Beresford Mobile App Distribution Transparency (MADT): Design and Evaluation of a System to Mitigate Necessary Trust in Mobile App Distribution Systems. Search on Bibsonomy NordSec The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Vera Schmitt, Daniel Sivizaca Conde, Premtim Sahitaj, Sebastian Möller 0001 What is Your Information Worth? A Systematic Analysis of the Endowment Effect of Different Data Types. Search on Bibsonomy NordSec The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Samantha Klier, Harald Baier To Possess or Not to Possess - WhatsApp for Android Revisited with a Focus on Stickers. Search on Bibsonomy NordSec The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Tanveer Khan, Khoa Nguyen 0005, Antonis Michalas A More Secure Split: Enhancing the Security of Privacy-Preserving Split Learning. Search on Bibsonomy NordSec The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Karianne Kjønås, Gaute Wangen Cybersecurity Challenges and Smart Technology Adoption in Norwegian Livestock Farming. Search on Bibsonomy NordSec The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Lars Berg, Kirsi Helkala, André Årnes Legal Considerations on Gray Zone Operations - From a Norwegian Perspective. Search on Bibsonomy NordSec The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Mordechai Guri RAMBO: Leaking Secrets from Air-Gap Computers by Spelling Covert Radio Signals from Computer RAM. Search on Bibsonomy NordSec The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Tianxiang Dai, Li Duan, Yufan Jiang, Yong Li, Fei Mei, Yulian Sun Force: Highly Efficient Four-Party Privacy-Preserving Machine Learning on GPU. Search on Bibsonomy NordSec The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Marc Roßberger, Dogan Kesdogan Smart Noise Detection for Statistical Disclosure Attacks. Search on Bibsonomy NordSec The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Esko Vuorinen, Panu Puhtila, Sampsa Rauti, Ville Leppänen From Whistle to Echo: Data Leaks in Web-Based Whistleblowing Channels. Search on Bibsonomy NordSec The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Rajendra Patil, Viktoria Fodor, Mathias Ekstedt Mean Value Analysis of Critical Attack Paths with Multiple Parameters. Search on Bibsonomy NordSec The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Xavier Arnal, Abraham Cano, Tamara Finogina, Javier Herranz How to Avoid Repetitions in Lattice-Based Deniable Zero-Knowledge Proofs. Search on Bibsonomy NordSec The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1David Lantz, Felipe Boeira, Mikael Asplund Towards Self-monitoring Enclaves: Side-Channel Detection Using Performance Counters. Search on Bibsonomy NordSec The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Carsten Hesselmann, Delphine Reinhardt, Jan Gertheiss, Jörg P. Müller Data Privacy in Ride-Sharing Services: From an Analysis of Common Practices to Improvement of User Awareness. Search on Bibsonomy NordSec The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Alexander Bjerre, Andreas Philip Westh, Emil Villefrance, A. S. M. Farhan Al Haque, Jonas Bukrinski Andersen, Lucas K. Helgogaard, Marios Anagnostopoulos A Wide Network Scanning for Discovery of UDP-Based Reflectors in the Nordic Countries. Search on Bibsonomy NordSec The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Daniel Fraunholz, Dominik Brunke, Simon Beidenhauser, Sebastian Berger 0002, Hartmut Koenig, Daniel Reti IMSI Probing: Possibilities and Limitations. Search on Bibsonomy NordSec The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Mina Alishahi, Daan Gast, Sam Vermeiren Local Differential Privacy for Private Construction of Classification Algorithms. Search on Bibsonomy NordSec The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Richard Plný, Karel Hynek, Tomás Cejka DeCrypto: Finding Cryptocurrency Miners on ISP Networks. Search on Bibsonomy NordSec The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Tobias Latzo, Andreas Hellmich, Annika Knepper, Lukas Hardi, Tim Phillip Castello-Waldow, Felix C. Freiling, Andreas Attenberger Maraudrone's Map: An Interactive Web Application for Forensic Analysis and Visualization of DJI Drone Log Data. Search on Bibsonomy NordSec The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Charles-Henry Bertrand Van Ouytsel, Axel Legay Malware Analysis with Symbolic Execution and Graph Kernel. Search on Bibsonomy NordSec The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Sebastian Schrittwieser, Patrick Kochberger, Michael Pucher, Caroline Lawitschka, Philip König, Edgar R. Weippl Obfuscation-Resilient Semantic Functionality Identification Through Program Simulation. Search on Bibsonomy NordSec The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Matthew Cole, Aravind Prakash Simplex: Repurposing Intel Memory Protection Extensions for Secure Storage. Search on Bibsonomy NordSec The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Bernhards Blumbergs, Eriks Dobelis, Peteris Paikens, Krisjanis Nesenbergs, Kirils Solovjovs, Artis Rusins WearSec: Towards Automated Security Evaluation of Wireless Wearable Devices. Search on Bibsonomy NordSec The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Mordechai Guri GPU-FAN: Leaking Sensitive Data from Air-Gapped Machines via Covert Noise from GPU Fans. Search on Bibsonomy NordSec The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Arun Sankar Muttathu Sivasankara Pillai 0001, Phillip L. De Leon, Utz Roedig Detection of Voice Conversion Spoofing Attacks Using Voiced Speech. Search on Bibsonomy NordSec The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Camille Sivelle, Lorys Debbah, Maxime Puys, Pascal Lafourcade 0001, Thibault Franco-Rondisson Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models. Search on Bibsonomy NordSec The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Mohamed Msaad, Shreyas Srinivasa, Mikkel Møller Andersen, David Holm Audran, Charity U. Orji, Emmanouil Vasilomanolakis Honeysweeper: Towards Stealthy Honeytoken Fingerprinting Techniques. Search on Bibsonomy NordSec The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Mohamed Taoufiq Damir, Valtteri Niemi Location Privacy, 5G AKA, and Enhancements. Search on Bibsonomy NordSec The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Cristoffer Leite, Jerry den Hartog, Daniel Ricardo dos Santos, Elisa Costante Actionable Cyber Threat Intelligence for Automated Incident Response. Search on Bibsonomy NordSec The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Hans P. Reiser, Marcel Kyas (eds.) Secure IT Systems - 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30-December 2, 2022, Proceedings Search on Bibsonomy NordSec The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Azadeh Tabiban, Heyang Zhao, Yosr Jarraya, Makan Pourzandi, Lingyu Wang 0001 VinciDecoder: Automatically Interpreting Provenance Graphs into Textual Forensic Reports with Application to OpenStack. Search on Bibsonomy NordSec The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Sarah Abdelwahab Gaballah, Lamya Abdullah, Minh Tung Tran, Ephraim Zimmer, Max Mühlhäuser On the Effectiveness of Intersection Attacks in Anonymous Microblogging. Search on Bibsonomy NordSec The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Eugene Frimpong, Reyhaneh Rabbaninejad, Antonis Michalas Arrows in a Quiver: A Secure Certificateless Group Key Distribution Protocol for Drones. Search on Bibsonomy NordSec The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Khouloud Abdelli, Joo Yeon Cho, Stephan Pachnicke Secure Collaborative Learning for Predictive Maintenance in Optical Networks. Search on Bibsonomy NordSec The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Bjarke Hilmer Møller, Jacob Gosch Søndergaard, Kristoffer Skagbæk Jensen, Magnus Winkel Pedersen, Tobias Worm Bøgedal, Anton Christensen, Danny Bøgsted Poulsen, Kim Guldstrand Larsen, René Rydhof Hansen, Thomas Rosted Jensen, Heino Juvoll Madsen, Henrik Uhrenfeldt Preliminary Security Analysis, Formalisation, and Verification of OpenTitan Secure Boot Code. Search on Bibsonomy NordSec The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Mikael Asplund, Simin Nadjm-Tehrani (eds.) Secure IT Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, November 23-24, 2020, Proceedings Search on Bibsonomy NordSec The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Hsin Yi Chen, Siddharth Prakash Rao Adversarial Trends in Mobile Communication Systems: From Attack Patterns to Potential Defenses Strategies. Search on Bibsonomy NordSec The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Syafiq Al Atiiq, Christian Gehrmann X-Pro: Distributed XDP Proxies Against Botnets of Things. Search on Bibsonomy NordSec The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Cesar Pereida García, Sampo Sovio Size, Speed, and Security: An Ed25519 Case Study. Search on Bibsonomy NordSec The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Arto Niemi, Vasile Adrian Bogdan Pop, Jan-Erik Ekberg Trusted Sockets Layer: A TLS 1.3 Based Trusted Channel Protocol. Search on Bibsonomy NordSec The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1George Teseleanu Communicating Through Subliminal-Free Signatures. Search on Bibsonomy NordSec The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Nicola Tuveri, Antonis Michalas, Billy Bob Brumley (eds.) Secure IT Systems - 26th Nordic Conference, NordSec 2021, Virtual Event, November 29-30, 2021, Proceedings Search on Bibsonomy NordSec The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Calvin Brierley, Budi Arief, David J. Barnes, Julio C. Hernandez-Castro Industrialising Blackmail: Privacy Invasion Based IoT Ransomware. Search on Bibsonomy NordSec The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Kaspar Hageman, René Rydhof Hansen, Jens Myrup Pedersen Gollector: Measuring Domain Name Dark Matter from Different Vantage Points. Search on Bibsonomy NordSec The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Manuel Del Verme, Åvald Åslaugson Sommervoll, László Erdödi, Simone Totaro, Fabio Massimo Zennaro SQL Injections and Reinforcement Learning: An Empirical Evaluation of the Role of Action Structure. Search on Bibsonomy NordSec The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Alexandr Railean, Delphine Reinhardt OnLITE: On-line Label for IoT Transparency Enhancement. Search on Bibsonomy NordSec The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Alexandros Bakas, Antonis Michalas, Amjad Ullah (F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption. Search on Bibsonomy NordSec The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Zeeshan Afzal, Anna Brunström, Stefan Lindskog Using Features of Encrypted Network Traffic to Detect Malware. Search on Bibsonomy NordSec The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Thomas Haines, Rajeev Goré, Jack Stodart Machine-Checking the Universal Verifiability of ElectionGuard. Search on Bibsonomy NordSec The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Joo Yeon Cho, Andrew Sergeev TLV-to-MUC Express: Post-quantum MACsec in VXLAN. Search on Bibsonomy NordSec The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Farzane Karami, Olaf Owe, Gerardo Schneider Information-Flow Control by Means of Security Wrappers for Active Object Languages with Futures. Search on Bibsonomy NordSec The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Jennifer Bellizzi, Mark Vella, Christian Colombo 0001, Julio C. Hernandez-Castro Real-Time Triggering of Android Memory Dumps for Stealthy Attack Investigation. Search on Bibsonomy NordSec The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Katie Watson, Mike Just, Tessa Berg An Investigation of Comic-Based Permission Requests. Search on Bibsonomy NordSec The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Guillaume Bour, Karin Bernsmed, Ravishankar Borgaonkar, Per Håkon Meland On the Certificate Revocation Problem in the Maritime Sector. Search on Bibsonomy NordSec The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Canyang Shi, Huiping Sun HoneyHash: Honeyword Generation Based on Transformed Hashes. Search on Bibsonomy NordSec The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Kristian Gjøsteen, Thomas Haines, Morten Rotvold Solberg Efficient Mixing of Arbitrary Ballots with Everlasting Privacy: How to Verifiably Mix the PPATC Scheme. Search on Bibsonomy NordSec The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Samuel Wairimu, Nurul Momen Privacy Analysis of COVID-19 Contact Tracing Apps in the EU. Search on Bibsonomy NordSec The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Tommy Gustafsson, Jonas Almroth Cyber Range Automation Overview with a Case Study of CRATE. Search on Bibsonomy NordSec The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Calvin Brierley, Jamie Pont, Budi Arief, David J. Barnes, Julio C. Hernandez-Castro Persistence in Linux-Based IoT Malware. Search on Bibsonomy NordSec The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Thomas Dangl, Benjamin Taubmann, Hans P. Reiser Agent-Based File Extraction Using Virtual Machine Introspection. Search on Bibsonomy NordSec The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Aslan Askarov, René Rydhof Hansen, Willard Rafnsson (eds.) Secure IT Systems - 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18-20, 2019, Proceedings Search on Bibsonomy NordSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Christian Roth 0002, Mirja Nitschke, Christian Hutzler, Maximilian Koller, Rolf Küffner, Marc Roßberger, Dogan Kesdogan My Smartwatch Is Mine - Machine Learning Based Theft Detection of Smartwatches. Search on Bibsonomy NordSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Jamie Pont, Osama Abu Oun, Calvin Brierley, Budi Arief, Julio C. Hernandez-Castro A Roadmap for Improving the Impact of Anti-ransomware Research. Search on Bibsonomy NordSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Frederik Goovaerts, Gunes Acar, Rafael Galvez, Frank Piessens, Mathy Vanhoef Improving Privacy Through Fast Passive Wi-Fi Scanning. Search on Bibsonomy NordSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Joo Yeon Cho Securing Optical Networks by Modern Cryptographic Techniques. Search on Bibsonomy NordSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Thanh Bui, Markku Antikainen, Tuomas Aura Analysis of Topology Poisoning Attacks in Software-Defined Networking. Search on Bibsonomy NordSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Jean-Max Dutertre, Timothée Riom, Olivier Potin, Jean-Baptiste Rigaud Experimental Analysis of the Laser-Induced Instruction Skip Fault Model. Search on Bibsonomy NordSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Tamás Bisztray, Nils Gruschka Privacy Impact Assessment: Comparing Methodologies with a Focus on Practicality. Search on Bibsonomy NordSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Gunnar Grimsdal, Patrik Lundgren, Christian Vestlund, Felipe Boeira, Mikael Asplund Can Microkernels Mitigate Microarchitectural Attacks? Search on Bibsonomy NordSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Thomas Haines Cronus: Everlasting Privacy with Audit and Cast. Search on Bibsonomy NordSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Wenjun Xiong, Melek Gülsever, Koray Mustafa Kaya, Robert Lagerström A Study of Security Vulnerabilities and Software Weaknesses in Vehicles. Search on Bibsonomy NordSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Per Håkon Meland, Bent Heier Johansen, Guttorm Sindre An Experimental Analysis of Cryptojacking Attacks. Search on Bibsonomy NordSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Thanh Bui, Siddharth Prakash Rao, Markku Antikainen, Tuomas Aura Client-Side Vulnerabilities in Commercial VPNs. Search on Bibsonomy NordSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Antonis Michalas, Alexandros Bakas, Hai-Van Dang, Alexandr Zalitko MicroSCOPE: Enabling Access Control in Searchable Encryption with the Use of Attribute-Based Encryption and SGX. Search on Bibsonomy NordSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Stewart Sentanoe, Benjamin Taubmann, Hans P. Reiser VMIGuard: Detecting and Preventing Service Integrity Violations by Malicious Insiders Using Virtual Machine Introspection. Search on Bibsonomy NordSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Stephan Wiefling, Nils Gruschka, Luigi Lo Iacono Even Turing Should Sometimes Not Be Able to Tell: Mimicking Humanoid Usage Behavior for Exploratory Studies of Online Services. Search on Bibsonomy NordSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Zeeshan Afzal, Johan Garcia 0001, Stefan Lindskog, Anna Brunström Using Partial Signatures in Intrusion Detection for Multipath TCP. Search on Bibsonomy NordSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Florian Dehling, Tobias Mengel, Luigi Lo Iacono Rotten Cellar: Security and Privacy of the Browser Cache Revisited. Search on Bibsonomy NordSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Kursat Aktas, Sevil Sen UpDroid: Updated Android Malware and Its Familial Classification. Search on Bibsonomy NordSec The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Tobias Hamann, Mihai Herda, Heiko Mantel, Martin Mohr, David Schneider 0002, Markus Tasch A Uniform Information-Flow Security Benchmark Suite for Source Code and Bytecode. Search on Bibsonomy NordSec The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Alexander Reinthal, Eleftherios Lef Filippakis, Magnus Almgren Data Modelling for Predicting Exploits. Search on Bibsonomy NordSec The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mirja Nitschke, Philipp Holler, Lukas Hartmann, Dogan Kesdogan MixMesh Zones - Changing Pseudonyms Using Device-to-Device Communication in Mix Zones. Search on Bibsonomy NordSec The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Vivien M. Rooney, Simon N. Foley What You Can Change and What You Can't: Human Experience in Computer Network Defenses. Search on Bibsonomy NordSec The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Juha Nurmi, Mikko S. Niemelä PESTEL Analysis of Hacktivism Campaign Motivations. Search on Bibsonomy NordSec The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ahmed Seid Yesuf, Christian W. Probst Estimating the Risk of Fraud Against E-Services. Search on Bibsonomy NordSec The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Arash Atashpendar, Guru-Vamsi Policharla, Peter B. Rønne, Peter Y. A. Ryan Revisiting Deniability in Quantum Key Exchange - via Covert Communication and Entanglement Distillation. Search on Bibsonomy NordSec The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hongliang Liang, Yudong Wang, Tianqi Yang 0003, Yue Yu AppLance: A Lightweight Approach to Detect Privacy Leak for Packed Applications. Search on Bibsonomy NordSec The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Kuyju Kim, Taeyun Kim, Seungjin Lee, Soolin Kim, Hyoungshick Kim When Harry Met Tinder: Security Analysis of Dating Apps on Android. Search on Bibsonomy NordSec The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Rasmus Dahlberg, Tobias Pulls Verifiable Light-Weight Monitoring for Certificate Transparency Logs. Search on Bibsonomy NordSec The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Roberto Guanciale Protecting Instruction Set Randomization from Code Reuse Attacks. Search on Bibsonomy NordSec The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Iulia Bastys, Frank Piessens, Andrei Sabelfeld Tracking Information Flow via Delayed Output - Addressing Privacy in IoT and Emailing Apps. Search on Bibsonomy NordSec The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ahto Buldas, Risto Laanoja, Ahto Truu A Blockchain-Assisted Hash-Based Signature Scheme. Search on Bibsonomy NordSec The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 286 (100 per page; Change: )
Pages: [1][2][3][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license