The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for DSC with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1988-2000 (15) 2001-2004 (18) 2005-2006 (22) 2007-2008 (33) 2009-2010 (20) 2011-2013 (20) 2014-2016 (133) 2017 (193) 2018 (213) 2019 (146) 2020 (75) 2021 (161) 2022 (145) 2023 (130) 2024 (5)
Publication types (Num. hits)
article(92) inproceedings(1223) proceedings(14)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 70 occurrences of 62 keywords

Results
Found 1330 publication records. Showing 1329 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
36Yuhang Wang, Salman Nazir Logic-Based Trust Model for Industrial Cyber Intelligence with Enhanced Trustworthiness. Search on Bibsonomy DSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36Xiansen Chen, Kun Xiao, Lei Luo 0004, Yun Li, Lirong Chen GAN-IVDS: An Intrusion Detection System for Intelligent Connected Vehicles Based on Generative Adversarial Networks. Search on Bibsonomy DSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36Lin Xu A Data Sharing and Access Control Model Based on Blockchain. Search on Bibsonomy DSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36Zhaowei Zhang, Wenjing Yu, Zibin Wang, Youlin Xiang A Blackbox Fuzzing Based on Automated State Machine Extraction. Search on Bibsonomy DSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36Changchang Ma, Denghui Zhang, Junjian Zhang, Le Wang, Hao Li, Zhaoquan Gu Cybersecurity Knowledge Graph Enables Targeted Data Collection for Cybersecurity Analysis. Search on Bibsonomy DSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36JunJun Chen, Chengliang Gao, Fei Tang, Jiaxu Xing, Qianlong Xiao, Dongyang Zheng, Jing Qiu 0002 Automatically Identifying Sentences with Attack Behavior from Cyber Threat Intelligence Reports. Search on Bibsonomy DSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36Yizu Yang, Yuzhang Lee, Zeyu He, Chunlu Wang Hierarchical Abstract Syntax Tree Representation Learning Based on Graph Coarsening for Program Classification. Search on Bibsonomy DSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36Ning Su, Lijuan Sun, Yutong Gao, Jingchen Wu, Xu Wu Violence Detection In Videos via Motion-Guided Global and Local Views. Search on Bibsonomy DSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36Liu Yuan, Yashen Wang, Tianzhu Chen, Xuecheng Zhang, Chenyu Liu, Yi Zhang A Novel Concept-Driven Negative Sampling Mechanism for Enhancing Semanticity and Interpretability of Knowledge Graph Completion Task. Search on Bibsonomy DSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36Tianjian Zhao, Zhikai Lu, Wenxuan Wu, Fang Xiong, Ruitian Yang, Huaxu Zhou, Boyang Zhang, Yifan Hu, Yue Jiang The Report of Standardization for Blockchain-Based Digital Right Management System. Search on Bibsonomy DSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36Haibo Ye, Lei Zhao, Leiting Tao, Xiaofeng Wang Network Security Evaluation for Space-Ground Integrated Networks Based on Network Simulation. Search on Bibsonomy DSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36Jiahao Liu, Chao Li, Ruoyu Wang, Junjian Li, Wuhao Xia A Blockchain-Based Secure Data Sharing Approach with Proxy Re-Encryption. Search on Bibsonomy DSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36Guojin Sun, Chi Jiang, Jinqing Shen, Yin Zhang 0002 SCOBERT: A Pre-Trained BERT for Smart Contract Vulnerability Detection. Search on Bibsonomy DSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36Ruiting Qu, Lin Qiao, Qing Song, Yuanqi Yu, Zhenjiang Lei, Ran Ran, Haomiao Wang, Tianbo Wang Service Resources Mining Based on Association Rules. Search on Bibsonomy DSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36Bokai Li, Shenglong Wu, Yuke Yang, Geyao Zhang Analysis and Research of Neural Network Adversarial Samples for Power Grid Security. Search on Bibsonomy DSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36Changqing Li, Ye Qian, Li Pan Multimodal Features Enhanced Named Entity Recognition Based on Self-Attention Mechanism. Search on Bibsonomy DSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36Weidong Shi, Mingrui Fan, Jiaqi Gao, Jiahao Qi, Daoqi Han, Yueming Lu Enhancing IoT Flow Anomaly Detection with Differential Optimal Feature Subspace. Search on Bibsonomy DSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36Jonas Cunningham-Rush, James Holland, Shirin Noei, Arman Sargolzaei Designing and Testing A Secure Cooperative Adaptive Cruise Control under False Data Injection Attack. Search on Bibsonomy DSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36Keval Doshi, Yasin Yilmaz Semantic Video Transformer for Robust Action Recognition. Search on Bibsonomy DSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36Kelson J. McCollum, Nathaniel D. Bastian, Johannes O. Royset Towards Robust Learning using Diametrical Risk Minimization for Network Intrusion Detection. Search on Bibsonomy DSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36Albert Guan Secure Outsourcing of Boolean Formulas Truth Assignment Problem. Search on Bibsonomy DSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36Varun Kohli, Muhammad Naveed Aman, Biplab Sikdar 0001 SRAM and Generative Network-based Physical Fingerprinting for Trust Management in the Internet of Things. Search on Bibsonomy DSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36Parisa Ansari Bonab, James Holland, Arman Sargolzaei An Observer-Based Control for a Networked Control of Permanent Magnet Linear Motors under a False-Data-Injection Attack. Search on Bibsonomy DSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36Audun Myers, Alyson Bittner, Sinan Aksoy, Daniel M. Best, Gregory Henselman-Petrusek, Helen Jenne, Cliff A. Joslyn, Bill Kay, Garret Seppala, Stephen J. Young, Emilie Purvine Malicious Cyber Activity Detection using Zigzag Persistence. Search on Bibsonomy DSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36Mila Anastasova, Rabih El Khatib, Aimee Laclaustra, Reza Azarderakhsh, Mehran Mozaffari Kermani Highly Optimized Curve448 and Ed448 design in wolfSSL and Side-Channel Evaluation on Cortex-M4. Search on Bibsonomy DSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36Saif E. Nouma, Attila A. Yavuz Lightweight Digital Signatures for Internet of Things: Current and Post-Quantum Trends and Visions. Search on Bibsonomy DSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36Cong Pu Privacy-Preserving and Fault-Tolerant Data Aggregation Protocol for Internet of Drones. Search on Bibsonomy DSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36Eric Cooper, Eric Weese, Alex Fortson, Dan Lo 0001, Yong Shi 0002 Cyber Security in Blockchain. Search on Bibsonomy DSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36Jingdi Chen, Lei Zhang, Joseph Riem, Gina C. Adam, Nathaniel D. Bastian, Tian Lan RIDE: Real-time Intrusion Detection via Explainable Machine Learning Implemented in a Memristor Hardware Architecture. Search on Bibsonomy DSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36Soumyadeep Hore, Quoc H. Nguyen, Yulun Xu, Ankit Shah 0002, Nathaniel D. Bastian, Trung Le Empirical Evaluation of Autoencoder Models for Anomaly Detection in Packet-based NIDS. Search on Bibsonomy DSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36Tamer Omar, Barret Griffin, Jose Garcia ML based Detection and Mitigation Scheme for DoS attacks on SDN Controllers. Search on Bibsonomy DSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36Muna Jemal, Dan Chia-Tien Lo Detection of Ransomware Attack Using Deep Learning. Search on Bibsonomy DSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36Galamo Monkam, Michael J. De Lucia, Nathaniel D. Bastian Preprocessing Network Traffic using Topological Data Analysis for Data Poisoning Detection. Search on Bibsonomy DSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36Keval Doshi, Yasin Yilmaz Privacy-Preserving Video Understanding via Transformer-based Federated Learning. Search on Bibsonomy DSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36Mirza Athar Baig, Muhammad Naveed Aman Exploiting Hardware Imperfections for GPS Spoofing Detection using Clock Variations. Search on Bibsonomy DSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36Pojan Shahrivar, Stuart Millar, Ezzeldin Shereen Detecting Web Application DAST Attacks with Machine Learning. Search on Bibsonomy DSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36Seyed Hamed Haghshenas, Mia Naeini Impact of Topology Noise on Power Systems State Estimation Using a Temporal GCN Framework. Search on Bibsonomy DSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36Urva Maryam, Mehdi Hussain A Study on the Forensic Analysis of Airlines Applications on Android Operating System. Search on Bibsonomy DSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36Vinay Sachidananda, Rajendra Patil, Akshay Sachdeva, Kwok-Yan Lam, Yang Liu 0003 APTer: Towards the Investigation of APT Attribution. Search on Bibsonomy DSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36Tung-Lin Tsai, Pei-Yuan Wu SepMM: A General Matrix Multiplication Optimization Approach for Privacy-Preserving Machine Learning. Search on Bibsonomy DSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36Manuel Alejandro Cardona-López, Juan Carlos Chimal-Eguía, Víctor Manuel Silva García, Rolando Flores-Carapia The Substitution-Boxes Incompatibility in JPEG Image Encryption. Search on Bibsonomy DSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36Ocheme Anthony Ekle, Denis A. Ulybyshev Cyber Risk Evaluation for Android-based Devices. Search on Bibsonomy DSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36Heba M. Khater, Mohamad Khayat, Saed Alrabaee, Mohamed Adel Serhani, Ezedin Barka, Farag M. Sallabi AI Techniques for Software Vulnerability Detection and Mitigation. Search on Bibsonomy DSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36Tuncer Turhan, Hakan Tekgul, Ozcan Ozturk 0001 Compiler-Supported Selective Software Fault Tolerance. Search on Bibsonomy DSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36Maryam Davari, Mohammad Zulkernine Automatic Conversion of ABAC Policies for RBAC Systems. Search on Bibsonomy DSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36Md. Zarif Hossain, Ahmed Imteaj, Saika Zaman, Abdur R. Shahid, Sajedul Talukder, M. Hadi Amini FLID: Intrusion Attack and Defense Mechanism for Federated Learning Empowered Connected Autonomous Vehicles (CAVs) Application. Search on Bibsonomy DSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36Shanhsin Lee, Yung-Shiu Chen, Shiuhpyng Winston Shieh CoDex: Cross-Tactic Correlation System for Data Exfiltration Detection. Search on Bibsonomy DSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36Lo-Yao Yeh, Jun-Qian Jian, Jen-Wei Hu Decentralized and Incentivized Voting System with Web3 Technology Ensuring Anonymity and Preventing Double Voting. Search on Bibsonomy DSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36Sanoop Mallissery, Yu-Sung Wu Enriching the Semantics of Information Flow Tracking with Source-Level Memory Allocation Event Logging. Search on Bibsonomy DSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36 7th IEEE International Conference on Data Science in Cyberspace, DSC 2022, Guilin, China, July 11-13, 2022 Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36 IEEE Conference on Dependable and Secure Computing, DSC 2022, Edinburgh, UK, June 22-24, 2022 Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Lei Feng, Yuanfei Zhang, Zhiqiang Hao, Chonghua Wang WREP: A lightweight event real-time processing engine for IoT. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Yaya Huang, Yixing Chen 0005, Yuqiang Zhang, Jincai Zou, Zhihan Tan, Ning Hu TFHM: A Traffic Feature Hiding Scheme Based on Generative Adversarial Networks. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Ziqi Zhu, Bin Zhu, Huan Zhang, Yu Geng, Le Wang 0008, Denghui Zhang, Zhaoquan Gu Defense Against Query-Based Black-Box Attack With Small Gaussian-Noise. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Zhihan Tan, Yaya Huang, Yixing Chen 0005, Yuqiang Zhang, Jincai Zou, Ning Hu A Data Encoding Method for Multipath Anonymous Transmission. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Hongshun He, Wei Yu, Lei Yang, Yang Li, Luyu Sun Anchor graph semi-supervised learning method based on Evidence Theory. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Hongshun He, Zhipeng Zhang, Lei Yang, Yang Li, Jiakang Shi A novel Tri-training algorithm based on Evidence Theory. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Xiao Gong, Mengwei Li, Zhengbin Zhao, Dengqi Cui Research on industrial Robot system security based on Industrial Internet Platform. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Kai Chen, Jietong Su, Lansheng Han, Shenghui Li, Pengyi Gao Hybrid butterfly optimization algorithm-based support vector machine for botnet command-and-control channel detection. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Tong Liu, Zhongru Wang, Yuntao Zhang, Zhehui Liu, Binxing Fang, Zhengyuan Pang Automated Vulnerability Discovery System Based on Hybrid Execution. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Weidong Xiao, Xu Zhang, Dongbin Wang Cross-Security Domain Dynamic Orchestration Algorithm of Network Security Functions. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Wei Liu, Yutao Huang, Yibing Guo, Ye Wang, Binxing Fang, Qing Liao 0001 Topic Modeling for Short Texts Via Dual View Collaborate optimization. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Jun-Zhu Zhang, Yu-Gao Zheng Display Design Based on Virtual Reality Technology VR-Platform Platform. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36You Zhai, Hao Dong, Zhoujun Li 0001, Liqun Yang, Longtao He AGDB: A Dictionary-based Malicious Domain Detection Method based on Representation Fusion. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Jiahui Zheng, Junjian Li, Chao Li 0027, Ran Li A SQL Blind Injection Method Based on Gated Recurrent Neural Network. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Zhehui Liu, Zhongru Wang, Yuntao Zhang, Tong Liu, Binxing Fang, Zhengyuan Pang Automated Crash Analysis and Exploit Generation with Extendable Exploit Model. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Cheng Fang, Wenjie Mi, Ping Han, Lidong Zhai A method of network traffic anomaly detection based on Packet Window Transformer. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Haitao Zhang, Lei Luo 0004, Yun Li, Lirong Chen, Xiaobo Wu A Novel Framework For Malicious Encrypted Traffic Classification At Host Level And Flow Level. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Xiaonian Wu, Nian Tong, Ruanlian Zhang, Yongzhuang Wei The Power Analysis Based on Mean-Ridge Regression. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Qian Ke, Chunlu Wang, Haixia Wang 0001, Yongqiang Lyu 0001, Zihan Xu, Dongsheng Wang 0002 Model Checking for Microarchitectural Data Sampling Security. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Yixing Chen 0005, Yuqiang Zhang, Jincai Zou, Zhihan Tan, Yaya Huang, Ning Hu Stealth: A Heterogeneous Covert Access Channel for Mix-net. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Yabin Li, Yuanping Nie, Xiaohui Kuang Fuzzing DBMS via NNLM. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Feng Li, Fei Shu, Mingxuan Li, Bin Wang Network Security Intrusion Detection and Mass Alarms Under Cluster Computing Platform. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Ling Liu, Xin Liu, Yue Zhao, Ning Hu TLD-WF: Surfing Freely Under Website Fingerprinting Attacks. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Jiawei Wu, Senyi Li, Junqiang Li, Long Luo, Hongfang Yu, Gang Sun 0001 DeepCov: Coverage Guided Deep Learning Framework Fuzzing. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Tao Liu, Honghao Liang, Xiaowei Chen, Zimeng Li, Lingzi Kong, Jin Li, Yueming Lu Design and Implementation of Network Traffic Analysis System for Power Grid Metering System. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Xiaohan Yin, Lijuan Sun, Jingchen Wu, Yutong Gao, Xu Wu, Lirong Qiu MASCA: A Multimodal Abstractive Summarization Model Based on Core Words Fusion Attention. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Yundan Yang, Fenghui Duan, Maosheng Zhang, JunJie Liu, Jin Li, Yueming Lu Privacy Protection Management Model for Internet of Things Data. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Qi Yan, Jiaxin Fan, Mohan Li, Guanqun Qu, Yang Xiao A Survey on Knowledge Graph Embedding. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Lang Liu, Yuejiao Wu, Lujun Yin, Junxiang Ren, Ruiling Song, Guoqiang Xu A Method Combining Text Classification and Keyword Recognition to Improve Long Text Information Mining. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Jinhai Chen, Zheng Gong, Yufeng Tang, Yupeng Zhang, Bin Li optimizing Diffusion Layer with AVX Shuffling: A Study on SKINNY. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Yuanpeng Yang, Hongbo Wang, Xiaofeng Wang, Yuan Liu Research on One-way Data Transmission Technology Based on RDMA. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Haitian Liu, Rong Jiang 0001, Bin Zhou 0004, Xing Rong, Juan Li, Aiping Li Multiple Sequential Network Attacks Detection Based on DTW-HMM. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Yunfan Tian, Dongxin Liu, Laifu Wang, Bowen Hu A combined-CNN model of TLS Traffic Recognition and Classification. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Meng Zhao, Yong Ding 0005, Tong Zhang, Xiaochun Zhou Secure outsourced VANET data in clouds with designated supervisor. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Ling Zou, Jing Li Application of Virtual Simulation in Digital Exhibition and Performance. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Kai Chen, Jingxian Zhu, Lansheng Han, Shenghui Li, Pengyi Gao A Novel Network Security Situation Awareness Model for Advanced Persistent Threat. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Zian Jia, Xiaosu Wang, Yun Xiong, Yao Zhang 0009, Jinjing Zhao AISLE: Self-supervised Representation Learning for the Investigation of Advanced Persistent Threat. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Weiyou Liang, Yujue Wang, Yong Ding 0005, Haibin Zheng, Hai Liang, Huiyong Wang An efficient anonymous authentication and supervision system based on blockchain. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Yangyang Mei, Weihong Han, Shudong Li, Xiaobo Wu, Kaihan Lin, Yulu Qi A Review of Attribution Technical for APT Attacks. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Yichuan Wu, Jianping Zheng, Meng Guo A Novel Mobile Instant Messaging System. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Fenghui Duan, Yundan Yang, Maosheng Zhang, Songqi Wu, Yueming Lu, Man Zhang 0004, Xu Lu Access Control Mechanism for Edge Nodes. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Depeng Wang, Yibo Sun, Chen Hong End-to-end training image-text matching network. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Xiao Zhang, Hao Tan, Xuan Huang, Denghui Zhang, Keke Tang, Zhaoquan Gu Adversarial Example Attacks against ASR Systems: An Overview. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Maosheng Zhang, Ruohan Cao, Fenghui Duan, Yundan Yang, Yueming Lu, Man Zhang 0004, Xu Lu Research on Lightweight Blockchain Technology Based on Edge Computing. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Yu Zhang, Qingzhong Liu, Yuanquan Shi MANAGE: A Novel Malware Evolution Model based on Digital Genes. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Yixiang Chen, Linhao Ye, Yufeng Ye, Peng Zhang 0001, Qinfeng Tan Anomaly Detection from Log Data Sequences with Perturbations. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Jun Sun, Dong Liu, Yang Liu, Chuang Li, Yumeng Ma Research on the Characteristics and Security Risks of the Internet of Vehicles Data. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Yuewu Lian, Haitao Zhan, Peiheng Zhang, Mingwu Zhang Time-Lock Encryption for Multiple Consecutive Periods and its Application. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Ke Yan, Bo Yu 0008, Yong Tang 0005, Xiangdong Kong, Chen Chen, Jin Lei NAFuzzer: Augmenting Network Protocol Fuzzers via Automatic Template and Seed Generation. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 1329 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license