The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "SIN"( http://dblp.L3S.de/Venues/SIN )

URL (DBLP): http://dblp.uni-trier.de/db/conf/sin

Publication years (Num. hits)
2009 (51) 2010 (41) 2011 (44) 2012 (34) 2013 (90) 2014 (83) 2015 (63) 2016 (34) 2017 (50) 2018 (29) 2019 (29) 2020 (35) 2021 (28) 2022 (39) 2023 (35)
Publication types (Num. hits)
inproceedings(670) proceedings(15)
Venues (Conferences, Journals, ...)
SIN(685)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 146 occurrences of 129 keywords

Results
Found 685 publication records. Showing 685 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Nuno Oliveira 0008, Norberto Sousa, Jorge Oliveira 0002, Isabel Praça Anomaly Detection in Cyber-Physical Systems: Reconstruction of a Prediction Error Feature Space. Search on Bibsonomy SIN The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Truong-An Tran-Quoc, Chi Huynh-Minh, Anh-Duy Tran Towards OS-Independent Memory Images Analyzing: Using Paging Structures in Memory Forensics. Search on Bibsonomy SIN The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Oksana Kilik, Abdulaziz Almehmadi, Khalil El-Khatib Eye Gaze-Based Human Error Prevention System: Experts vs. Non-Experts. Search on Bibsonomy SIN The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Vasiliy M. Krundyshev Neural network approach to assessing cybersecurity risks in large-scale dynamic networks. Search on Bibsonomy SIN The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Mark Sokolov, Kehinde Olufowobi, Nic Herndon Visual spoofing in content-based spam detection. Search on Bibsonomy SIN The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Vara Vundavalli, Farhat Lamia Barsha, Mohammad Masum, Hossain Shahriar, Hisham Haddad Malicious URL Detection Using Supervised Machine Learning Techniques. Search on Bibsonomy SIN The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Hope Nkiruka Eke, Andrei Petrovski 0001, Hatem Ahriz Detection of False Command and Response Injection Attacks for Cyber Physical Systems Security and Resilience. Search on Bibsonomy SIN The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Stanislav Zhdanov, Ekaterina Maro Power Analysis Side-Channel Attacks on Symmetric Block Cipher Magma. Search on Bibsonomy SIN The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Jessica Fong, Ron Poet Creating Graphical Passwords on a Mobile Phone: Graphical Passwords on a Mobile. Search on Bibsonomy SIN The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Ouissem Ben Fredj, Alaeddine Mihoub, Moez Krichen, Omar Cheikhrouhou, Abdelouahid Derhab CyberSecurity Attack Prediction: A Deep Learning Approach. Search on Bibsonomy SIN The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Mark Vella, Christian Colombo 0001 SpotCheck: On-Device Anomaly Detection for Android. Search on Bibsonomy SIN The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Yakov Mironov, Polina Mironova, Konstantin E. Rumyantsev Characteristics of a two-stage synchronization algorithm in the system of quantum key distribution with dividing a fiber-optic line into sections with decreasing length. Search on Bibsonomy SIN The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Beyazit Bestami Yuksel, Serif Bahtiyar, Ayse Yilmazer Credit Card Fraud Detection with NCA Dimensionality Reduction. Search on Bibsonomy SIN The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Arnab Mukherjee, Raju Halder PoliceChain: Blockchain-Based Smart Policing System for Smart Cities. Search on Bibsonomy SIN The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Shreyas Srinivasa, Jens Myrup Pedersen, Emmanouil Vasilomanolakis Towards systematic honeytoken fingerprinting. Search on Bibsonomy SIN The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Markus Hornsteiner, Sebastian Groll, Alexander Puchta Towards a user-centric IAM entitlement shop - Learnings from the e-commerce. Search on Bibsonomy SIN The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Siddika Berna Örs, Atilla Elçi (eds.) SIN 2020: 13th International Conference on Security of Information and Networks, Virtual Event / Istanbul, Turkey, November 4-6, 2020 Search on Bibsonomy SIN The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Jiyou Wang, Ron Poet Permission Management and User Privacy Based On Android: Permission Management On Android. Search on Bibsonomy SIN The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Mamello Thinyane, Debora Irene Christine SMART Citizen Cyber Resilience (SC2R) Ontology. Search on Bibsonomy SIN The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Maksim Kalameyets, Dmitry Levshun, Sergei Soloviev 0001, Andrey Chechulin, Igor V. Kotenko Social networks bot detection using Benford's law. Search on Bibsonomy SIN The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Valeriy O. Osipyan, Kirill I. Litvinov Development of the mathematic model of disymmetric bigram cryptosystem based on a parametric solution family of multi-degree system of Diophantine equations✱. Search on Bibsonomy SIN The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Giovanni Salzillo, Massimiliano Rak, Felice Moretta Threat Modeling based Penetration Testing: The Open Energy Monitor Case study. Search on Bibsonomy SIN The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Muhammet Sahin, Serif Bahtiyar A Survey on Malware Detection with Deep Learning. Search on Bibsonomy SIN The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Nasser Al-Hadhrami, Matthew Collinson, Nir Oren A Subjective Network Approach for Cybersecurity Risk Assessment. Search on Bibsonomy SIN The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Tigran Ovasapyan, Dmitry A. Moskvin, Artem Tsvetkov Detection of attacks on the Internet of Things based on intelligent analysis of devices functioning indicators. Search on Bibsonomy SIN The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Jonathan Francis Roscoe, Max Smith-Creasey Unconventional Mechanisms for Biometric Data Acquisition via Side-Channels. Search on Bibsonomy SIN The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Kubra Aydin, Rahime Belen Saglam, Shujun Li, Abdullah Bulbul When GDPR Meets CRAs (Credit Reference Agencies): Looking through the Lens of Twitter. Search on Bibsonomy SIN The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Igor V. Kotenko, Igor Saenko 0001, Fadey Skorik Intelligent support for network administrator decisions based on combined neural networks. Search on Bibsonomy SIN The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Richard Beno, Ron Poet Hacking Passwords that Satisfy Common Password Policies: Hacking Passwords. Search on Bibsonomy SIN The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Giovanni Di Crescenzo, Glenn Veach RPM: Additive Stream Ciphers for Lightweight Communication Security. Search on Bibsonomy SIN The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Farzan Majdani, Lynne Batik, Andrei Petrovski 0001, Sergey Petrovski Detecting Malicious Signal Manipulation in Smart Grids Using Intelligent Analysis of Contextual Data. Search on Bibsonomy SIN The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Zeynep Chousein, Haci Yakup Tetik, Rahime Belen Saglam, Abdullah Bülbül, Shujun Li Tension between GDPR and Public Blockchains: A Data-Driven Analysis of Online Discussions. Search on Bibsonomy SIN The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Sinem Gur, Simge Demir, Sevval Simsek, Albert Levi Secure and Privacy-Aware Gateway for Home Automation Systems. Search on Bibsonomy SIN The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Maxim O. Kalinin, Peter D. Zegzhda AI-based Security for the Smart Networks. Search on Bibsonomy SIN The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Liudmila Babenko, Ilya Pisarev Modeling replay and integrity violations attacks for cryptographic protocols source codes verification of e-voting system based on blind intermediaries. Search on Bibsonomy SIN The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Karim Lounis, Mohammad Zulkernine Exploiting Race Condition for Wi-Fi Denial of Service Attacks. Search on Bibsonomy SIN The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Yuning Jiang, Yacine Atif An Approach to Discover and Assess Vulnerability Severity Automatically in Cyber-Physical Systems. Search on Bibsonomy SIN The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Alexey Nikolaevich Shniperov, Aleksandra Vladimirovna Prokofieva Steganalysis method of static JPEG images based on artificial immune system. Search on Bibsonomy SIN The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Kunbolat Algazy, Rustem Biyashev, Nursulu Kapalova, Ludmila K. Babenko, Evgeniya Ishchukova, Saule Nyssanbayeva Investigation of the different implementations for the new cipher Qamal. Search on Bibsonomy SIN The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Elena Basan, Oleg B. Makarevich, Evgeny Abramov, Dmitry Popov 0002 Analysis of the initial security of the robotics system. Search on Bibsonomy SIN The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Oleg B. Makarevich, Dmitry Popov 0002, Ludmila K. Babenko, Pete Burnap, Atilla Elçi, Ron Poet, Jaideep Vaidya, Mehmet A. Orgun, Manoj Singh Gaur, Rajveer Singh Shekhawat (eds.) Proceedings of the 12th International Conference on Security of Information and Networks, SIN 2019, Sochi, Russian Federation, September 12-15, 2019 Search on Bibsonomy SIN The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Denis Chernov, Alexey Sychugov Method of identifying and assessing of automated process control systems vulnerable elements. Search on Bibsonomy SIN The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Alexander N. Sokolov, Andrey N. Ragozin, Ilya A. Pyatnitsky, Sergei K. Alabugin Applying of digital signal processing techniques to improve the performance of machine learning-based cyber attack detection in industrial control system. Search on Bibsonomy SIN The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Yaroslav Tarasov, Ekaterina Pakulova, Oleg Basov Modeling of low-rate DDoS-attacks. Search on Bibsonomy SIN The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Antonina Komarova, Anatoly Korobeynikov Combined authentication schemes with increasing level of resistance and methods for improving the security of electronic signature schemes: kombinirovannye skhemy autentifikacii s povyshennym urovnem stojkosti i metody povysheniya bezopasnosti skhem elektronnoj podpisi. Search on Bibsonomy SIN The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Stanislav L. Belyakov, Alexander V. Bozhenyuk, Marina Savelyeva, Marina Belyakova Safety analysis of the flow of cartographic data with defects. Search on Bibsonomy SIN The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Hope Nkiruka Eke, Andrei Petrovski 0001, Hatem Ahriz The use of machine learning algorithms for detecting advanced persistent threats. Search on Bibsonomy SIN The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ekaterina Pakulova, Artem Ryndin, Oleg Basov Multi-path multimodal authentication system for remote information system. Search on Bibsonomy SIN The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Liudmila Babenko, Ilya Pisarev, Elena Popova Cryptographic protocols implementation security verification of the electronic voting system based on blind intermediaries. Search on Bibsonomy SIN The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Vasiliy M. Krundyshev, Maxim O. Kalinin Hybrid neural network framework for detection of cyber attacks at smart infrastructures. Search on Bibsonomy SIN The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Stanislav L. Belyakov, Alexander V. Bozhenyuk, Olesiya Kosenko, Evgeny Kosenko Evaluation of information reliability of complex systems using intuitionistic fuzzy graphs. Search on Bibsonomy SIN The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Andrey N. Ragozin, V. F. Telezhkin, P. S. Podkorytov Forecasting complex multi-component time series within systems designed to detect anomalies in dataflows of industrial automated systems. Search on Bibsonomy SIN The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Abdul Ashraf, Ron Poet Is it better to choose seen or unseen distracters for graphical passwords. Search on Bibsonomy SIN The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Andrey V. Krasovsky, Ekaterina A. Maro Actual and historical state of side channel attacks theory. Search on Bibsonomy SIN The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Mohamed Amine Daoud, Youcef Dahmani, Kadda Mostefaoui IDS-DL: A description language for detection system in cloud computing. Search on Bibsonomy SIN The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Vitaly V. Lapshichyov, Oleg B. Makarevich TLS certificate as a sign of establishing a connection with the network Tor. Search on Bibsonomy SIN The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Alexander N. Tselykh, Vladislav Vasilev, Larisa A. Tselykh Managing influence in complex systems to ensure safety of their operation. Search on Bibsonomy SIN The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Valeriy O. Osipyan, Kirill I. Litvinov, R. Kh. Bagdasaryan, E. P. Lukashchik, S. G. Sinitsa, A. S. Zhuk Development of information security system mathematical models by the solutions of the multigrade Diophantine equation systems. Search on Bibsonomy SIN The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Dmitriy Levonevskiy, Fedor Novikov, Ludmila N. Fedorchenko, Irina Afanasieva Verification of internet protocol properties using cooperating automaton objects. Search on Bibsonomy SIN The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Kirill Borisov, Irina Lubushkina, Sergey Panasenko Adaptation of an authentication protocol based on asymmetric keys for use in UAV C2 link security systems. Search on Bibsonomy SIN The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Karim Lounis, Mohammad Zulkernine Bad-token: denial of service attacks on WPA3. Search on Bibsonomy SIN The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Evgeniya Ishchukova, Ekaterina Maro, Gennady Veselov Development of information security quest based on use of information and communication technologies. Search on Bibsonomy SIN The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Vyacheslav V. Zolotarev, Alina O. Povazhnyuk, Ekaterina A. Maro Liveness detection methods implementation to face identification reinforcement in gaming services. Search on Bibsonomy SIN The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Igor V. Kotenko, Nikolay Komashinsky Combining spark and snort technologies for detection of network attacks and anomalies: assessment of performance for the big data framework. Search on Bibsonomy SIN The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Anil K. Saini, Shreyansh Sharma, Palash Jain, Vikash Sharma, Arvind Kumar Khandelwal A secure priority vehicle movement based on blockchain technology in connected vehicles. Search on Bibsonomy SIN The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Igor V. Kotenko, Igor Saenko 0001, Yury Sineshchuk, Valery Kuvatov, Oleg Chudakov Optimization of the cyber security system structure based on accounting of the prevented damage cost. Search on Bibsonomy SIN The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Elena Basan, Oleg B. Makarevich, Andrew Stepenkin Development of the Methodology for Testing the Security of Group Management System for Mobile Robots. Search on Bibsonomy SIN The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Viacheslav Belenko, Vasiliy M. Krundyshev, Maxim O. Kalinin Synthetic datasets generation for intrusion detection in VANET. Search on Bibsonomy SIN The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Valeriy O. Osipyan, Kirill I. Litvinov A mathematical model of the cryptosystem based on the linear Diophantine equation. Search on Bibsonomy SIN The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Gaurav Pareek, B. R. Purushothama Efficient Strong Key Indistinguishable Access Control in Dynamic Hierarchies with Constant Decryption Cost. Search on Bibsonomy SIN The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Maxim Pismensky, Elena Basan, Oleg B. Makarevich Development of a Protection System for a Group of Mobile Robots, Taking into Account the Requirements of Foreign and Russian Legislation. Search on Bibsonomy SIN The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1María Magdalena Payeras Capellà, Macià Mut Puigserver, Llorenç Huguet i Rotger Anonymity in Secure Access to Integrated Touristic Services Including Payment. Search on Bibsonomy SIN The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Elena Basan, Oleg B. Makarevich, Alexandr S. Basan Development of the Anomaly Detection Method for a Group of Mobile Robots. Search on Bibsonomy SIN The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Alexander I. Pechenkin, Roman Demidov Applying Deep Learning and Vector Representation for Software Vulnerabilities Detection. Search on Bibsonomy SIN The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1R. A. Gevorgyan, E. S. Abramov Detection of packaged and encrypted PE files with the use of machine-learning algorithm. Search on Bibsonomy SIN The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Alexey G. Busygin, Artem S. Konoplev, Maxim O. Kalinin, Dmitry P. Zegzhda Floating Genesis Block Enhancement for Blockchain Based Routing Between Connected Vehicles and Software-defined VANET Security Services. Search on Bibsonomy SIN The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1John Curry, Nick Drage Developments in State Level Cyber Wargaming. Search on Bibsonomy SIN The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Felisberto Semedo, Naghmeh Moradpoor, Majid Rafiq Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things. Search on Bibsonomy SIN The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Vishnu Kumar, Rajveer Singh Shekhawat, Manoj Kumar Bohra Secure Data Aggregation in WSNs: A Two Level Framework. Search on Bibsonomy SIN The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ludmila K. Babenko, Alexey Kirillov Development of method for malware classification based on statistical methods and an extended set of system calls data. Search on Bibsonomy SIN The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Evgeniya Ishchukova, Maxim Anikeev, Vyacheslav Salmanov, Oksana Shamilyan Linear and Differential Analysis of Simplified Kuznyechik Cipher. Search on Bibsonomy SIN The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Peter D. Zegzhda, Dmitry P. Zegzhda, Evgeny Pavlenko, Gleb Ignatev Applying deep learning techniques for Android malware detection. Search on Bibsonomy SIN The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yang Ma 0001, Hassan B. Kazemian Trapdoor-indistinguishable Secure Channel Free Public Key Encryption with Multi-Keywords Search (Student Contributions). Search on Bibsonomy SIN The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Rawan Baalous, Ronald Poet How Dangerous Permissions are Described in Android Apps' Privacy Policies? Search on Bibsonomy SIN The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Philipp Reinecke, Naghmeh Moradpoor, George Theodorakopoulos 0001 (eds.) Proceedings of the 11th International Conference on Security of Information and Networks, SIN 2018, Cardiff, United Kingdom, September 10-12, 2018 Search on Bibsonomy SIN The full citation details ... 2018 DBLP  BibTeX  RDF
1David Bird A Conceptual Framework To Identify Cyber Risks Associated With The Use Of Public Cloud Computing. Search on Bibsonomy SIN The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Alexander Branitskiy, Igor V. Kotenko Software Tool for Testing the Packet Analyzer of Network Attack Detection Systems. Search on Bibsonomy SIN The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Liudmila Babenko, Ilya Pisarev Distributed E-Voting System Based On Blind Intermediaries Using Homomorphic Encryption. Search on Bibsonomy SIN The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Dmitriy K. Levonevskiy, Ludmila N. Fedorchenko, Irina Afanasieva, Fedor Novikov Architecture of the Software System for Adaptive Protection of Network Infrastructure. Search on Bibsonomy SIN The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Abdulaziz Almehmadi SCADA Networks Anomaly-based Intrusion Detection System. Search on Bibsonomy SIN The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Lauri Koivunen, Sampsa Rauti, Ville Leppänen Towards Profiling Program Instances in Host-Based Intrusion Detection Systems by Recognizing Software Update Patterns. Search on Bibsonomy SIN The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Adnan Imeri, Christophe Feltus, Djamel Khadraoui, Nazim Agoulmine, Damien Nicolas Solving the trust issues in the process of transportation of dangerous goods by using blockchain technology. Search on Bibsonomy SIN The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Igor V. Kotenko, Sergey Ageev, Igor Saenko 0001 Implementation of Intelligent Agents for Network Traffic and Security Risk Analysis in Cyber-Physical Systems. Search on Bibsonomy SIN The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ahmed Dauda, Scott Mclean, Abdulaziz Almehmadi, Khalil El-Khatib Big Data Analytics Architecture for Security Intelligence. Search on Bibsonomy SIN The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ekaterina Maro, Maksim Kovalchuk Bypass Biometric Lock Systems With Gelatin Artificial Fingerprint. Search on Bibsonomy SIN The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jay Dave, Parvez Faruki, Vijay Laxmi, Bruhadeshwar Bezawada, Manoj Singh Gaur Secure and efficient proof of ownership for deduplicated cloud storage. Search on Bibsonomy SIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jani Tammi, Sampsa Rauti, Ville Leppänen Practical challenges in building fake services with the record and play approach. Search on Bibsonomy SIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Vivek P. Khalane, Umesh Bhadade Image encryption using wavelet transform over finite field. Search on Bibsonomy SIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Roman Demidov, Alexander I. Pechenkin, Peter D. Zegzhda Integer overflow vulnerabilities detection in software binary code. Search on Bibsonomy SIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Rajesh Kumar Shrivastava, Sanket Mishra, Srimanta Barua, Chittaranjan Hota Resilient complex event processing in IoT using side-channel information. Search on Bibsonomy SIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 685 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license