The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ICICS"( http://dblp.L3S.de/Venues/ICICS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/IEEEicics

Publication years (Num. hits)
1997 (49) 1999 (27) 2001 (57) 2002 (42) 2003 (38) 2004 (43) 2005 (41) 2006 (40) 2007 (38) 2008 (30) 2009 (40) 2010 (33) 2011 (267) 2012 (50) 2013 (234) 2014 (22) 2015 (224) 2016 (38) 2017 (57) 2018 (52) 2019 (47) 2020 (35) 2022 (35) 2023 (45)
Publication types (Num. hits)
inproceedings(1557) proceedings(27)
Venues (Conferences, Journals, ...)
ICICS(1584)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 355 occurrences of 253 keywords

Results
Found 1584 publication records. Showing 1584 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Tianjun Ma, Haixia Xu 0002, Peili Li A Blockchain Traceable Scheme with Oversight Function. Search on Bibsonomy ICICS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Sébastien Canard, Adel Hamdi, Fabien Laguillaumie Blind Functional Encryption. Search on Bibsonomy ICICS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Linru Zhang, Xiangning Wang, Yuechen Chen, Siu-Ming Yiu Leakage-Resilient Inner-Product Functional Encryption in the Bounded-Retrieval Model. Search on Bibsonomy ICICS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Nissy Sombatruang, Tan Omiya, Daisuke Miyamoto, M. Angela Sasse, Youki Kadobayashi, Michelle Baddeley Attributes Affecting User Decision to Adopt a Virtual Private Network (VPN) App. Search on Bibsonomy ICICS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Marc Fischlin, Felix Günther 0001, Philipp Muth Information-Theoretic Security of Cryptographic Channels. Search on Bibsonomy ICICS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Anisa Halimi, Erman Ayday Profile Matching Across Online Social Networks. Search on Bibsonomy ICICS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Gareth T. Davies, Christian Janson, Daniel P. Martin 0001 Client-Oblivious OPRAM. Search on Bibsonomy ICICS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Afsah Anwar, Hisham Alasmary, Jeman Park 0001, An Wang 0002, Songqing Chen, David Mohaisen Statically Dissecting Internet of Things Malware: Analysis, Characterization, and Detection. Search on Bibsonomy ICICS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Dongdong Huo, Chao Liu 0020, Xiao Wang, Mingxuan Li, Yu Wang 0134, Yazhe Wang, Peng Liu 0005, Zhen Xu 0009 A Machine Learning-Assisted Compartmentalization Scheme for Bare-Metal Systems. Search on Bibsonomy ICICS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Alessandro Budroni, Benjamin Chetioui, Ermes Franch Attacks on Integer-RLWE. Search on Bibsonomy ICICS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Kaiming Chen, Jiageng Chen Anonymous End to End Encryption Group Messaging Protocol Based on Asynchronous Ratchet Tree. Search on Bibsonomy ICICS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Junko Takahashi, Keiichi Okabe, Hiroki Itoh, Xuan Thuy Ngo, Sylvain Guilley, Ritu Ranjan Shrivastwa, Mushir Ahmed, Patrick Lejoly Machine Learning Based Hardware Trojan Detection Using Electromagnetic Emanation. Search on Bibsonomy ICICS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Florian Fischer, Matthias Niedermaier, Thomas Hanka, Peter Knauer, Dominik Merli Analysis of Industrial Device Architectures for Real-Time Operations Under Denial of Service Attacks. Search on Bibsonomy ICICS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Georg Maringer, Tim Fritzmann, Johanna Sepúlveda The Influence of LWE/RLWE Parameters on the Stochastic Dependence of Decryption Failures. Search on Bibsonomy ICICS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Hongyu Yang, Renyun Zeng, Fengyan Wang, Guangquan Xu, Jiyong Zhang A Variational Generative Network Based Network Threat Situation Assessment. Search on Bibsonomy ICICS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Man Wei, Danping Shi, Siwei Sun, Peng Wang 0009, Lei Hu Convolutional Neural Network Based Side-Channel Attacks with Customized Filters. Search on Bibsonomy ICICS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Wenjuan Liang, Hong Chen 0001, Yuncheng Wu, Cuiping Li 0001 Differentially Private Frequent Itemset Mining Against Incremental Updates. Search on Bibsonomy ICICS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ning Guo, Xiaoyong Li 0003, Hui Yin, Yali Gao VulHunter: An Automated Vulnerability Detection System Based on Deep Learning and Bytecode. Search on Bibsonomy ICICS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Chunkai Zhang, Yepeng Deng, Xin Guo, Xuan Wang 0002, Chuanyi Liu An Adversarial Attack Based on Multi-objective Optimization in the Black-Box Scenario: MOEA-APGA II. Search on Bibsonomy ICICS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Pengbin Feng, Jianhua Sun, Songsong Liu, Kun Sun 0001 UBER: Combating Sandbox Evasion via User Behavior Emulators. Search on Bibsonomy ICICS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Qiu Chen, Danping Shi, Siwei Sun, Lei Hu Automatic Demirci-Selçuk Meet-in-the-Middle Attack on SKINNY with Key-Bridging. Search on Bibsonomy ICICS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Matthias Marx, Monina Schwarz, Maximilian Blochberger, Frederik Wille, Hannes Federrath Context-Aware IPv6 Address Hopping. Search on Bibsonomy ICICS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1WeiPeng Jiang, Bin Wu 0011, Zhou Jiang, ShaoBo Yang Cloning Vulnerability Detection in Driver Layer of IoT Devices. Search on Bibsonomy ICICS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ming Zhang 0021, Hu Li, Xiaohui Kuang, Ling Pang, Zhendong Wu Neuron Selecting: Defending Against Adversarial Examples in Deep Neural Networks. Search on Bibsonomy ICICS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ye Dong, Xiaojun Chen 0004, Liyan Shen, Dakui Wang Privacy-Preserving Distributed Machine Learning Based on Secret Sharing. Search on Bibsonomy ICICS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Zihao Zhao, Qixu Liu, Tiantian Song, Zhi Wang, Xianda Wu WSLD: Detecting Unknown Webshell Using Fuzzy Matching and Deep Learning. Search on Bibsonomy ICICS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Suya Zhao, Renzheng Wei, Lijun Cai, Aimin Yu, Dan Meng CTLMD: Continuous-Temporal Lateral Movement Detection Using Graph Embedding. Search on Bibsonomy ICICS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Wenzhuo Yang, Kwok-Yan Lam Automated Cyber Threat Intelligence Reports Classification for Early Warning of Cyber Attacks in Next Generation SOC. Search on Bibsonomy ICICS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Guang Yang, Huizhong Li, Jingdian Ming, Yongbin Zhou CDAE: Towards Empowering Denoising in Side-Channel Analysis. Search on Bibsonomy ICICS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Jing Tian, Gaopeng Gou, Chang Liu 0049, Yige Chen, Gang Xiong 0001, Zhen Li 0011 DLchain: A Covert Channel over Blockchain Based on Dynamic Labels. Search on Bibsonomy ICICS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ruoyu Deng, Na Ruan, Guangsheng Zhang, Xiaohu Zhang FraudJudger: Fraud Detection on Digital Payment Platforms with Fewer Labels. Search on Bibsonomy ICICS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Churan Tang, Zongbin Liu, Cunqing Ma, Jingquan Ge, Chenyang Tu SecFlush: A Hardware/Software Collaborative Design for Real-Time Detection and Defense Against Flush-Based Cache Attacks. Search on Bibsonomy ICICS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Xin Wang, Shimin Li, Rui Xue 0001 Adaptively Secure Puncturable Pseudorandom Functions via Puncturable Identity-Based KEMs. Search on Bibsonomy ICICS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Zhenyu Zhao, Qingni Shen, Wu Luo, Anbang Ruan CloudCoT: A Blockchain-Based Cloud Service Dependency Attestation Framework. Search on Bibsonomy ICICS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Muqian Chen, Xuebin Wang, Jinqiao Shi, Yue Gao 0003, Can Zhao 0005, Wei Sun 0041 Towards Comprehensive Security Analysis of Hidden Services Using Binding Guard Relays. Search on Bibsonomy ICICS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Geng Wang, Zhen Liu 0008, Dawu Gu Ciphertext Policy Attribute-Based Encryption for Circuits from LWE Assumption. Search on Bibsonomy ICICS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Long Mai, Yuan Yan, Songlin Jia, Shuran Wang, Jianqiang Wang, Juanru Li, Siqi Ma, Dawu Gu Accelerating SM2 Digital Signature Algorithm Using Modern Processor Features. Search on Bibsonomy ICICS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Andreas Abraham, Felix Hörandner, Olamide Omolola, Sebastian Ramacher Privacy-Preserving eID Derivation for Self-Sovereign Identity Systems. Search on Bibsonomy ICICS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Zhaoyu Zhou, Lingjing Yu, Qingyun Liu, Yang Liu, Bo Luo Tear Off Your Disguise: Phishing Website Detection Using Visual and Network Identities. Search on Bibsonomy ICICS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Hao Yang 0030, Zhongliang Yang, Yongjian Bao, Yongfeng Huang 0001 Hierarchical Representation Network for Steganalysis of QIM Steganography in Low-Bit-Rate Speech Signals. Search on Bibsonomy ICICS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Jingxuan Jiang, Chundong Wang 0001, Sudipta Chattopadhyay 0001, Wei Zhang 0021 Road Context-Aware Intrusion Detection System for Autonomous Cars. Search on Bibsonomy ICICS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Fenil Fadadu, Anand Handa, Nitesh Kumar, Sandeep Kumar Shukla Evading API Call Sequence Based Malware Classifiers. Search on Bibsonomy ICICS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Yuguang Li, Ming Tang 0002, Pengbo Wang, Yanbin Li, Shan Fu Practical Evaluation Methodology of Higher-Order Maskings at Different Operating Frequencies. Search on Bibsonomy ICICS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Jianzhou You, Shichao Lv, Yichen Hao, Xuan Feng, Ming Zhou, Limin Sun Characterizing Internet-Scale ICS Automated Attacks Through Long-Term Honeypot Data. Search on Bibsonomy ICICS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Athmane Seghier, Jianxin Li 0002 Parallel Steepest Ascent Hill-Climbing for High Nonlinear Boolean and Vectorial Boolean Functions (S-Boxes). Search on Bibsonomy ICICS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Renzheng Wei, Lijun Cai, Aimin Yu, Dan Meng AGE: Authentication Graph Embedding for Detecting Anomalous Login Activities. Search on Bibsonomy ICICS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Guangxi Yu, Xinghua Yang, Yan Zhang 0014, Huajun Cui, Huiran Yang, Yang Li Towards Homograph-Confusable Domain Name Detection Using Dual-Channel CNN. Search on Bibsonomy ICICS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Bin Qi, Jie Ma, Kewei Lv Using Equivalent Class to Solve Interval Discrete Logarithm Problem. Search on Bibsonomy ICICS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Bowen Liu, Qiang Tang 0001 Privacy-Preserving Decentralised Singular Value Decomposition. Search on Bibsonomy ICICS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Tian Qiu, Lin Hou, Dongdai Lin A Multi-Group Signature Scheme from Lattices. Search on Bibsonomy ICICS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Zhe Xia, Lein Harn, Bo Yang 0003, Mingwu Zhang, Yi Mu 0001, Willy Susilo, Weizhi Meng 0001 Provably Secure Group Authentication in the Asynchronous Communication Model. Search on Bibsonomy ICICS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Lijuan Yuan, Zhiyong Zeng, Yikang Lu, Xiaofeng Ou, Tao Feng A Character-Level BiGRU-Attention for Phishing Classification. Search on Bibsonomy ICICS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Guanjun Lin, Wei Xiao, Jun Zhang 0010, Yang Xiang 0001 Deep Learning-Based Vulnerable Function Detection: A Benchmark. Search on Bibsonomy ICICS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Jianwei Hou, Ziqi Zhang, Wenchang Shi, Bo Qin, Bin Liang 0002 DTGuard: A Lightweight Defence Mechanism Against a New DoS Attack on SDN. Search on Bibsonomy ICICS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Jian Chen, Tao Shu Impact of Multiple Reflections on Secrecy Capacity of Indoor VLC System. Search on Bibsonomy ICICS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Meng Li, Lijun Cai, Aimin Yu, Haibo Yu, Dan Meng HeteroUI: A Framework Based on Heterogeneous Information Network Embedding for User Identification in Enterprise Networks. Search on Bibsonomy ICICS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Yiru Zhao, Wanfeng Ge, Wenxin Li, Run Wang, Lei Zhao, Jiang Ming 0002 Capturing the Persistence of Facial Expression Features for Deepfake Video Detection. Search on Bibsonomy ICICS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Lixin Zhao, Lijun Cai, Aimin Yu, Zhen Xu, Dan Meng Prototype-Based Malware Traffic Classification with Novelty Detection. Search on Bibsonomy ICICS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Qiang Tang 0001 Towards Blockchain-Enabled Searchable Encryption. Search on Bibsonomy ICICS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Huaifeng Chen, Rui Zong, Xiaoyang Dong Improved Differential Attacks on GIFT-64. Search on Bibsonomy ICICS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Pingchuan Ma 0004, Zhiqiang Wang 0006, Le Zhang, Ruming Wang, Xiaoxiang Zou, Tao Yang Differentially Private Reinforcement Learning. Search on Bibsonomy ICICS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Maged AbdelAty, Roberto Doriguzzi Corin, Domenico Siracusa AADS: A Noise-Robust Anomaly Detection Framework for Industrial Control Systems. Search on Bibsonomy ICICS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Henning Kopp, Frank Kargl, Christoph Bösch, Andreas Peter uMine: A Blockchain Based on Human Miners. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yingpei Zeng, Shanqing Guo Deep Packet Inspection with Delayed Signature Matching in Network Auditing. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yao Lu 0002, Noboru Kunihiro, Rui Zhang 0002, Liqiang Peng, Hui Ma 0002 Certifying Variant of RSA with Generalized Moduli. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yuan Zhang 0006, Xiaodong Lin 0001, Chunxiang Xu Blockchain-Based Secure Data Provenance for Cloud Storage. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Zhiyuan Zhao, Chenxu Wang, Wei Rao Slop: Towards an Efficient and Universal Streaming Log Parser. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Xingfeng Wang, Liang Zhao 0020 Verifiable Single-Server Private Information Retrieval. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yunong Liang, Zhenfu Cao, Xiaolei Dong, Jiachen Shen Efficient Multi-keyword Searchable Encryption Based on Multi-input Inner-Product Functional Encryption. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Huorong Li, Jingqiang Lin, Bingyu Li, Wangzhao Cheng PoS: Constructing Practical and Efficient Public Key Cryptosystems Based on Symmetric Cryptography with SGX. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Alessandro Barenghi, Nicholas Mainardi, Gerardo Pelosi Comparison-Based Attacks Against Noise-Free Fully Homomorphic Encryption Schemes. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Dan Tang, Rui Dai, Liu Tang, Sijia Zhan, Jianping Man Low-Rate DoS Attack Detection Based on Two-Step Cluster Analysis. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Rui Zhang 0002, Yang Tao 0001 Key Dependent Message Security for Revocable Identity-Based Encryption and Identity-Based Encryption. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Haitao Cheng, Xiangxue Li, Haifeng Qian, Di Yan CCA Secure Multi-recipient KEM from LPN. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Abdullahi Chowdhury, Gour C. Karmakar, Joarder Kamruzzaman, Tapash Saha Detecting Intrusion in the Traffic Signals of an Intelligent Traffic System. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Meng Zheng, Jun Zhou 0018, Zhenfu Cao, Xiaolei Dong PPOIM: Privacy-Preserving Shape Context Based Image Denoising and Matching with Efficient Outsourcing. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jie Yin, Heyang Lv, Fangjiao Zhang, Zhihong Tian, Xiang Cui Study on Advanced Botnet Based on Publicly Available Resources. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Chengwei Peng, Xiaochun Yun, Yongzheng Zhang 0002, Shuhao Li MalHunter: Performing a Timely Detection on Malicious Domains via a Single DNS Query. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Lin Hou, Renzhang Liu, Tian Qiu, Dongdai Lin Hierarchical Group Signatures with Verifier-Local Revocation. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Maharage Nisansala Sevwandi Perera, Takeshi Koshiba Achieving Full Security for Lattice-Based Group Signatures with Verifier-Local Revocation. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ya Han, Yongqiang Li 0001, Mingsheng Wang Automatical Method for Searching Integrals of ARX Block Cipher with Division Property Using Three Subsets. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Haitao Cheng, Xiangxue Li, Haifeng Qian, Di Yan Simpler CCA Secure PKE from LPN Problem Without Double-Trapdoor. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Florian Kammüller Attack Trees in Isabelle. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Thanh Bui, Tuomas Aura Application of Public Ledgers to Revocation in Distributed Access Control. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Peifang Ni, Hongda Li 0001, Dongxue Pan Micropaying to a Distributed Payee with Instant Confirmation. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sihan Qing, Chris Mitchell, Liqun Chen, Dongmei Liu (eds.) Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Changsong Yang, Jianfeng Wang, Xiaoling Tao, Xiaofeng Chen 0001 Publicly Verifiable Data Transfer and Deletion Scheme for Cloud Storage. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mamoru Mimura, Hidema Tanaka A Linguistic Approach Towards Intrusion Detection in Actual Proxy Logs. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Henning Kopp, Frank Kargl, Christoph Bösch Publicly Verifiable Static Proofs of Storage: A Novel Scheme and Efficiency Comparisons. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Anis Bkakria, Nora Cuppens-Boulahia, Frédéric Cuppens Linking Differential Identifiability with Differential Privacy. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Fan Zhang, Cong Zhang 0007, Mingdi Xu, Xiaoli Liu, Fangning Hu, Han-Chieh Chao Automated Verification of Noninterference Property. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ziyang Wang, Fangyu Zheng, Jingqiang Lin, Jiankuo Dong Utilizing GPU Virtualization to Protect the Private Keys of GPU Cryptographic Computation. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Chenyu Wang, Tao Huang 0015, Hongjun Wu 0001 On the Weakness of Constant Blinding PRNG in Flash Player. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Xi Luo, Liming Wang, Zhen Xu 0009, Wei An LagProber: Detecting DGA-Based Malware by Using Query Time Lag of Non-existent Domains. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Kai Chen, Ning Zhang, Liming Wang, Zhen Xu 0009 Automatic Identification of Industrial Control Network Protocol Field Boundary Using Memory Propagation Tree. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Cédric Van Rompay, Refik Molva, Melek Önen Fast Two-Server Multi-User Searchable Encryption with Strict Access Pattern Leakage. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hiroaki Anada, Seiko Arita Witness-Indistinguishable Arguments with ∑-Protocols for Bundled Witness Spaces and Its Application to Global Identities. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jian Xu 0010, Xiaochun Yun, Yongzheng Zhang 0002, Zhenyu Cheng 0001 Community Discovery of Attribution Trace Based on Deep Learning Approach. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, Rongxing Lu, Zonghua Zhang, Ahmed Meddahi (eds.) Information and Communications Security - 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Zhili Chen, Sheng Chen, Hong Zhong 0001, Lin Chen 0002, Miaomiao Tian 0001 PP-MCSA: Privacy Preserving Multi-channel Double Spectrum Auction. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 1584 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license