The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "CNS"( http://dblp.L3S.de/Venues/CNS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/cns

Publication years (Num. hits)
2013 (86) 2014 (79) 2015 (128) 2016 (102) 2017 (96) 2018 (86) 2019 (63) 2020 (79) 2021 (36) 2022 (62) 2023 (56)
Publication types (Num. hits)
inproceedings(862) proceedings(11)
Venues (Conferences, Journals, ...)
CNS(873)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 873 publication records. Showing 873 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Alejandro Cohen, Rafael G. L. D'Oliveira, Chia-Yi Yeh, Hichem Guerboukha, Rabi Shrestha, Zhaoji Fang, Edward W. Knightly, Muriel Médard, Daniel M. Mittleman Absolute Security in High-Frequency Wireless Links. Search on Bibsonomy CNS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Zhengguang Zhang, Marwan Krunz SIGTAM: A Tampering Attack on Wi-Fi Preamble Signaling and Countermeasures. Search on Bibsonomy CNS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Christopher Brant, Tuba Yavuz A Study on the Testing of Android Security Patches. Search on Bibsonomy CNS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Eric Pauley, Gang Tan, Danfeng Zhang, Patrick D. McDaniel Performant Binary Fuzzing without Source Code using Static Instrumentation. Search on Bibsonomy CNS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1 10th IEEE Conference on Communications and Network Security, CNS 2022, Austin, TX, USA, October 3-5, 2022 Search on Bibsonomy CNS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Andrew Morin, Tyler Moore 0001 Towards Cost-Balanced Intrusion Detection in OT Environments. Search on Bibsonomy CNS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Hao Liu, Wenhai Sun, Nan Niu, Boyang Wang MultiEvasion: Evasion Attacks Against Multiple Malware Detectors. Search on Bibsonomy CNS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Jiyu Chen, Yiwen Guo, Hao Chen 0003, Neil Gong Membership Inference Attack in Face of Data Transformations. Search on Bibsonomy CNS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Tao Hou, Shengping Bi, Mingkui Wei, Tao Wang 0026, Zhuo Lu, Yao Liu 0007 When Third-Party JavaScript Meets Cache: Explosively Amplifying Security Risks on the Internet. Search on Bibsonomy CNS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Daniel Olszewski, Weidong Zhu, Sandeep Sathyanarayana, Kevin R. B. Butler, Patrick Traynor HallMonitor: A Framework for Identifying Network Policy Violations in Software. Search on Bibsonomy CNS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Yunfei Ge, Quanyan Zhu Trust Threshold Policy for Explainable and Adaptive Zero-Trust Defense in Enterprise Networks. Search on Bibsonomy CNS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Daniel Brown, Gabriele Cianfarani, Natalija Vlajic Real World Snapshot of Trends in IoT Device and Protocol Deployment: IEEE CNS 22 Poster. Search on Bibsonomy CNS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Neji Mensi, Danda B. Rawat, Chunmei Liu Security Analysis of Mixed RF-FSO Blockage Attack Over Generalized RF Fading and Atmospheric Turbulence. Search on Bibsonomy CNS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Mst. Shapna Akter, Hossain Shahriar Towards Unsupervised Learning based Denoising of Cyber Physical System Data to Mitigate Security Concerns. Search on Bibsonomy CNS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Bruno P. Leao, Jagannadh Vempati, Ulrich Münz, Shashank Shekhar 0001, Amit Pandey, David Hingos, Siddharth Bhela, Jing Wang, Chris Bilby Machine Learning-based False Data Injection Attack Detection and Localization in Power Grids. Search on Bibsonomy CNS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Christoph Sendner, Lukas Iffländer, Sebastian Schindler, Michael Jobst, Alexandra Dmitrienko, Samuel Kounev Ransomware Detection in Databases through Dynamic Analysis of Query Sequences. Search on Bibsonomy CNS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Kilian Becher, Mirko Schäfer, Axel Schropfer, Thorsten Strufe Efficient Public Verification of Confidential Supply-Chain Transactions. Search on Bibsonomy CNS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Yuhui Wang, Junaid Farooq Proactive and Resilient UAV Orchestration for QoS Driven Connectivity and Coverage of Ground Users. Search on Bibsonomy CNS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Savio Sciancalepore, Pietro Tedeschi, Usman Riasat, Roberto Di Pietro Mitigating Energy Depletion Attacks in IoT via Random Time-Slotted Channel Access. Search on Bibsonomy CNS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Qisheng Zhang, Jin-Hee Cho, Terrence J. Moore, Frederica Free-Nelson DREVAN: Deep Reinforcement Learning-based Vulnerability-Aware Network Adaptations for Resilient Networks. Search on Bibsonomy CNS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Jordan Wright, Zane Fink, Michael Gowanlock, Christopher Robert Philabaum, Brian Donnelly, Bertrand Cambou A Symmetric Cipher Response-Based Cryptography Engine Accelerated Using GPGPU. Search on Bibsonomy CNS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Zhaowei Tan, Boyan Ding, Zhehui Zhang, Qianru Li, Yunqi Guo, Songwu Lu Device-Centric Detection and Mitigation of Diameter Signaling Attacks against Mobile Core. Search on Bibsonomy CNS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Songsong Liu, Pengbin Feng, Kun Sun 0001 HoneyBog: A Hybrid Webshell Honeypot Framework against Command Injection. Search on Bibsonomy CNS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Martin Fejrskov, Jens Myrup Pedersen, Leon Böck, Emmanouil Vasilomanolakis An uneven game of hide and seek: Hiding botnet CnC by encrypting IPs in DNS records. Search on Bibsonomy CNS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Lucian Trestioreanu, Cristina Nita-Rotaru, Aanchal Malhotra, Radu State SPON: Enabling Resilient Inter-Ledgers Payments with an Intrusion-Tolerant Overlay. Search on Bibsonomy CNS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Talha Ongun, Oliver Spohngellert, Benjamin A. Miller, Simona Boboila, Alina Oprea, Tina Eliassi-Rad, Jason Hiser, Alastair Nottingham, Jack W. Davidson, Malathi Veeraraghavan PORTFILER: Port-Level Network Profiling for Self-Propagating Malware Detection. Search on Bibsonomy CNS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Christoph Hardegen, Mike Petersen, Chukwuebuka Ezelu, Timo Geier, Sebastian Rieger, Ulrich Buehler A Hierarchical Architecture and Probabilistic Strategy for Collaborative Intrusion Detection. Search on Bibsonomy CNS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Rupendra Nath Mitra, Mohamed M. Kassem, Jon Larrea, Mahesh K. Marina CUPS Hijacking in Mobile RAN Slicing: Modeling, Prototyping, and Analysis. Search on Bibsonomy CNS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Md Tamjid Hossain, Shahriar Badsha, Haoting Shen Privacy, Security, and Utility Analysis of Differentially Private CPES Data. Search on Bibsonomy CNS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Suhan Jiang, Jie Wu 0001 On Game-theoretic Computation Power Diversification in the Bitcoin Mining Network. Search on Bibsonomy CNS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Joel Höglund, Shahid Raza LICE: Lightweight certificate enrollment for IoT using application layer security. Search on Bibsonomy CNS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Abrar S. Alrumayh, Sarah M. Lehman, Chiu C. Tan 0001 Understanding and Mitigating Privacy Leaks from Third-Party Smart Speaker Apps. Search on Bibsonomy CNS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Micael A. Dias, Francisco Marcos de Assis Evaluating the Eavesdropper Entropy via Bloch-Messiah Decomposition. Search on Bibsonomy CNS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Stephen Moskal, Shanchieh Jay Yang Translating Intrusion Alerts to Cyberattack Stages using Pseudo-Active Transfer Learning (PATRL). Search on Bibsonomy CNS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Md Hasan Shahriar, Alvi Ataur Khalil, Mohammad Ashiqur Rahman, Mohammad Hossein Manshaei, Dong Chen 0010 iAttackGen: Generative Synthesis of False Data Injection Attacks in Cyber-physical Systems. Search on Bibsonomy CNS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Wenjun Fan, Sang-Yoon Chang, Xiaobo Zhou 0002, Shouhuai Xu ConMan: A Connection Manipulation-based Attack Against Bitcoin Networking. Search on Bibsonomy CNS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Sara Beatriz Schwarz, Dimitrios-Georgios Akestoridis, Patrick Tague, Hanan Hibshi Hiding the Topology of an IEEE 802.15.4 Network with Limited Energy. Search on Bibsonomy CNS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Gerbert Roitburd, Matthias Ortmann, Matthias Hollick, Jiska Classen Very Pwnable Network: Cisco AnyConnect Security Analysis. Search on Bibsonomy CNS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1 IEEE Conference on Communications and Network Security, CNS 2021, Tempe, AZ, USA, October 4-6, 2021 Search on Bibsonomy CNS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Dimitrios-Georgios Akestoridis, Patrick Tague HiveGuard: A Network Security Monitoring Architecture for Zigbee Networks. Search on Bibsonomy CNS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Fangfang Yang, Mohammad A. Islam 0001, Fan Wu 0006, Shaolei Ren CompKey: Exploiting Computer's Electromagnetic Radiation for Secret Key Generation. Search on Bibsonomy CNS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Md. Mazharul Islam 0001, Ashutosh Dutta, Md Sajidul Islam Sajid, Ehab Al-Shaer, Jinpeng Wei, Sadegh Farhang CHIMERA: Autonomous Planning and Orchestration for Malware Deception. Search on Bibsonomy CNS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Yunqi Guo, Zhaowei Tan, Kaiyuan Chen, Songwu Lu, Ying Nian Wu A Model Obfuscation Approach to IoT Security. Search on Bibsonomy CNS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1A. S. M. Asadujjaman, Momen Oqaily, Yosr Jarraya, Suryadipta Majumdar, Makan Pourzandi, Lingyu Wang 0001, Mourad Debbabi Artificial Packet-Pair Dispersion (APPD): A Blackbox Approach to Verifying the Integrity of NFV Service Chains. Search on Bibsonomy CNS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Ahmed S. Bendary, C. Emre Koksal, Daniel Canaday, Andrew Pomerance Unconditional Authentication for Constrained Applications via Strong PUFs. Search on Bibsonomy CNS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Salah Sharieh, Alexander Ferworn Securing APIs and Chaos Engineering. Search on Bibsonomy CNS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Eric Husa, Reza Tourani Vibe: An Implicit Two-Factor Authentication using Vibration Signals. Search on Bibsonomy CNS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Nikolay Ivanov, Qiben Yan EthClipper: A Clipboard Meddling Attack on Hardware Wallets with Address Verification Evasion. Search on Bibsonomy CNS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Upakar Paudel, Andy Dolan, Suryadipta Majumdar, Indrakshi Ray Context-Aware IoT Device Functionality Extraction from Specifications for Ensuring Consumer Security. Search on Bibsonomy CNS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Oliver Slattery, Xiao Tang, Lijun Ma, Thomas Gerrits, Anouar Rahmouni, Sumit Bhushan The Quantum Communications and Networking Project at the Information Technology Laboratory of NIST. Search on Bibsonomy CNS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Shalin Kumar Deval, Meenakshi Tripathi, Bruhadeshwar Bezawada, Indrakshi Ray "X-Phish: Days of Future Past"‡: Adaptive & Privacy Preserving Phishing Detection. Search on Bibsonomy CNS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Wenhao Chen, Li Lin 0004, Jennifer Newman, Yong Guan Automatic Detection of Android Steganography Apps via Symbolic Execution and Tree Matching. Search on Bibsonomy CNS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Maged AbdelAty, Sandra Scott-Hayward, Roberto Doriguzzi Corin, Domenico Siracusa GADoT: GAN-based Adversarial Training for Robust DDoS Attack Detection. Search on Bibsonomy CNS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Zhifan Xu, Melike Baykal-Gürsoy, Predrag Spasojevic A Game-Theoretic Approach for Probabilistic Cooperative Jamming Strategies over Parallel Wireless Channels. Search on Bibsonomy CNS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Kun Jin, Chaoyue Liu 0001, Cathy Xia OTDA: a Unsupervised Optimal Transport framework with Discriminant Analysis for Keystroke Inference. Search on Bibsonomy CNS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Carsten Rudolf Janda, Eduard A. Jorswieck, Moritz Wiese, Holger Boche Arbitrarily Varying Wiretap Channels with and without Non-Causal Side Information at the Jammer. Search on Bibsonomy CNS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Alireza Tahsini, Noah Dunstatter, Mina Guirguis, Chuadhry Mujeeb Ahmed DeepBLOC: A Framework for Securing CPS through Deep Reinforcement Learning on Stochastic Games. Search on Bibsonomy CNS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Ben Niu 0001, Yahong Chen, Likun Zhang, Fenghua Li Membership Inference Attacks against MemGuard : IEEE CNS 20 Poster. Search on Bibsonomy CNS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Sang-Yoon Chang, Younghee Park, Nikhil Vijayakumar Kengalahalli, Xiaobo Zhou 0002 Query-Crafting DoS Threats Against Internet DNS. Search on Bibsonomy CNS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Rafael G. L. D'Oliveira, Salim El Rouayheb, Daniel Heinlein, David A. Karpuk Notes on Communication and Computation in Secure Distributed Matrix Multiplication. Search on Bibsonomy CNS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Jens Müller 0007, Marcus Brinkmann, Damian Poddebniak, Sebastian Schinzel, Jörg Schwenk Mailto: Me Your Secrets. On Bugs and Features in Email End-to-End Encryption. Search on Bibsonomy CNS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Dewan Chaulagain, Prabesh Poudel, Prabesh Pathak, Sankardas Roy, Doina Caragea, Guojun Liu, Xinming Ou Hybrid Analysis of Android Apps for Security Vetting using Deep Learning. Search on Bibsonomy CNS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Justin Grana Perturbing Inputs to Prevent Model Stealing. Search on Bibsonomy CNS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Long Jiao, Pu Wang 0003, Ning Wang 0003, Songlin Chen, Amir Alipour-Fanid, Junqing Le, Kai Zeng 0001 Efficient Physical Layer Group Key Generation in 5G Wireless Networks. Search on Bibsonomy CNS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Fengli Zhang, Philip Dale Huff, Kylie McClanahan, Qinghua Li A Machine Learning-based Approach for Automated Vulnerability Remediation Analysis. Search on Bibsonomy CNS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Michael Oxford, David Parker 0001, Mark Ryan 0001 Quantitative Verification of Certificate Transparency Gossip Protocols. Search on Bibsonomy CNS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Chad Spensky, Aravind Machiry, Marcel Busch, Kevin Leach, Rick Housley, Christopher Kruegel, Giovanni Vigna TRUST.IO: Protecting Physical Interfaces on Cyber-physical Systems. Search on Bibsonomy CNS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Muhammad Shadi Hajar, M. Omar Al-Kadri, Harsha K. Kalutarage ETAREE: An Effective Trend-Aware Reputation Evaluation Engine for Wireless Medical Sensor Networks. Search on Bibsonomy CNS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Benjamin Wu, Aaron B. Wagner, G. Edward Suh Optimal Mechanisms Under Maximal Leakage. Search on Bibsonomy CNS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Jiachun Liao, Lalitha Sankar, Oliver Kosut, Flávio P. Calmon Maximal α-Leakage and its Properties. Search on Bibsonomy CNS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Christopher Salls, Aravind Machiry, Adam Doupé, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna Exploring Abstraction Functions in Fuzzing. Search on Bibsonomy CNS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Allison Beemer, Eric Graves 0001, Jörg Kliewer, Oliver Kosut, Paul L. Yu Authentication and Partial Message Correction over Adversarial Multiple-Access Channels. Search on Bibsonomy CNS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Ali Tabaja, Reuven Cohen When the Network of a Smart City Is Not So Smart. Search on Bibsonomy CNS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Jan Pennekamp, Fritz Alder, Roman Matzutt, Jan Tobias Mühlberg, Frank Piessens, Klaus Wehrle Secure End-to-End Sensing in Supply Chains. Search on Bibsonomy CNS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Luan Huy Pham, Massimiliano Albanese, Ritu Chadha, Cho-Yu Jason Chiang, Sridhar Venkatesan, Charles A. Kamhoua, Nandi Leslie A Quantitative Framework to Model Reconnaissance by Stealthy Attackers and Support Deception-Based Defenses. Search on Bibsonomy CNS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Mattia Carlucci, Stefano Cecconello, Mauro Conti, Piero Romare Eathentication: A Chewing-based Authentication Method. Search on Bibsonomy CNS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Yuntao Wang 0004, Zhou Su, Ning Zhang 0007, Abderrahim Benslimane Sweet: Secure Wireless Energy Transfer with Electric Vehicles in Vehicular Energy Networks. Search on Bibsonomy CNS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Efe U. A. Seyitoglu, Attila A. Yavuz, Muslum Ozgur Ozmen Compact and Resilient Cryptographic Tools for Digital Forensics. Search on Bibsonomy CNS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Venkata Sai Krishna Avinash Nukala Website Cryptojacking Detection Using Machine Learning : IEEE CNS 20 Poster. Search on Bibsonomy CNS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Mohammad Saedi, Adrian Moore 0001, Philip Perry, Mohammad Shojafar, Hanif Ullah, Jonathan Synnott, Ruth Brown, Ian Herwono Generation of realistic signal strength measurements for a 5G Rogue Base Station attack scenario. Search on Bibsonomy CNS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Md Sajidul Islam Sajid, Jinpeng Wei, Md Rabbi Alam, Ehsan Aghaei, Ehab Al-Shaer DodgeTron: Towards Autonomous Cyber Deception Using Dynamic Hybrid Analysis of Malware. Search on Bibsonomy CNS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Naoki Fukushi, Daiki Chiba 0001, Mitsuaki Akiyama, Masato Uchida A Large-scale Analysis of Cloud Service Abuse. Search on Bibsonomy CNS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Guanjie Li, Chengzhe Lai Platoon Handover Authentication in 5G-V2X : IEEE CNS 20 Poster. Search on Bibsonomy CNS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Federico Mancini 0001, Solveig Bruvoll, John Melrose, Frederick A. Leve, Logan O. Mailloux, Raphael Ernst, Kellyn Rein, Stefano Fioravanti, Diego Merani, Robert Been A Security Reference Model for Autonomous Vehicles in Military Operations. Search on Bibsonomy CNS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Shriti Naraparaju Fingerprinting Voice Applications on Smart Speakers over Encrypted Traffic. Search on Bibsonomy CNS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Nebojsa Djosic, Bojan Nokovic, Salah Sharieh Machine Learning in Action: Securing IAM API by Risk Authentication Decision Engine. Search on Bibsonomy CNS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Martin Henze The Quest for Secure and Privacy-preserving Cloud-based Industrial Cooperation. Search on Bibsonomy CNS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Azadeh Tabiban, Yosr Jarraya, Mengyuan Zhang 0001, Makan Pourzandi, Lingyu Wang 0001, Mourad Debbabi Catching Falling Dominoes: Cloud Management-Level Provenance Analysis with Application to OpenStack. Search on Bibsonomy CNS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Lieneke Kusters, Alexandros Rikos, Frans M. J. Willems Modeling Temperature Behavior in the Helper Data for Secret-Key Binding with SRAM PUFs. Search on Bibsonomy CNS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Gbadebo Ayoade, Khandakar Ashrafi Akbar, Pracheta Sahoo, Yang Gao 0027, Anmol Agarwal, Kangkook Jee, Latifur Khan, Anoop Singhal Evolving Advanced Persistent Threat Detection using Provenance Graph and Metric Learning. Search on Bibsonomy CNS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Ahmed S. Bendary, C. Emre Koksal Order-Optimal Scaling of Covert Communication over MIMO AWGN Channels. Search on Bibsonomy CNS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Ahasanun Nessa, Fatima Hussain, Xavier N. Fernando Adaptive Latency Reduction in LoRa for Mission Critical Communications in Mines. Search on Bibsonomy CNS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Nathalie Tkauc, Thao Tran, Kevin Hernandez-Diaz, Fernando Alonso-Fernandez Cloud-Based Face and Speech Recognition for Access Control Applications. Search on Bibsonomy CNS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1 8th IEEE Conference on Communications and Network Security, CNS 2020, Avignon, France, June 29 - July 1, 2020 Search on Bibsonomy CNS The full citation details ... 2020 DBLP  BibTeX  RDF
1Livinus Obiora Nweke, Stephen D. Wolthusen Modelling Adversarial Flow in Software-Defined Industrial Control Networks Using a Queueing Network Model. Search on Bibsonomy CNS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Fabio Gritti, Lorenzo Fontana, Eric Gustafson, Fabio Pagani, Andrea Continella, Christopher Kruegel, Giovanni Vigna SYMBION: Interleaving Symbolic with Concrete Execution. Search on Bibsonomy CNS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Paul M. Berges, Basavesh Ammanaghatta Shivakumar, Timothy Graziano, Ryan M. Gerdes, Z. Berkay Celik On the Feasibility of Exploiting Traffic Collision Avoidance System Vulnerabilities. Search on Bibsonomy CNS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Jianhua Sun, Kun Sun 0001, Qi Li 0002 Towards a Believable Decoy System: Replaying Network Activities from Real System. Search on Bibsonomy CNS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Hamed Soroush, Massimiliano Albanese, Milad Asgari Mehrabadi, Ibifubara Iganibo, Marc Mosko, Jason H. Gao 0003, David J. Fritz, Shantanu Rane, Eric Bier SCIBORG: Secure Configurations for the IoT Based on optimization and Reasoning on Graphs. Search on Bibsonomy CNS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Grigory Kabatiansky, Elena Egorova Adversarial multiple access channels and a new model of multimedia fingerprinting coding. Search on Bibsonomy CNS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 873 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license