The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "SIN"( http://dblp.L3S.de/Venues/SIN )

URL (DBLP): http://dblp.uni-trier.de/db/conf/sin

Publication years (Num. hits)
2009 (51) 2010 (41) 2011 (44) 2012 (34) 2013 (90) 2014 (83) 2015 (63) 2016 (34) 2017 (50) 2018 (29) 2019 (29) 2020 (35) 2021 (28) 2022 (39) 2023 (35)
Publication types (Num. hits)
inproceedings(670) proceedings(15)
Venues (Conferences, Journals, ...)
SIN(685)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 146 occurrences of 129 keywords

Results
Found 685 publication records. Showing 685 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Dmitry P. Zegzhda, Peter D. Zegzhda, Alexander I. Pechenkin, Maria A. Poltavtseva Modeling of information systems to their security evaluation. Search on Bibsonomy SIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Alexander S. Basan, Elena Basan, Oleg B. Makarevich Analysis of ways to secure group control for autonomous mobile robots. Search on Bibsonomy SIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Vishnu Prasad C, Arun Raj Kumar P Secret sharing scheme based on Cauchy matrix for data outsourcing. Search on Bibsonomy SIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Valeriy O. Osipyan, Valeriy S. Tlusten, Nina V. Laktionova, Nadezhda V. Vakhrusheva The duality principle in the theory of development generalized A-M knapsack cryptosystems. Search on Bibsonomy SIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jimmy Bondu, Anupal Mishra, Vijay Laxmi, Manoj Singh Gaur Flooding in secure wireless sensor networks: Student contribution. Search on Bibsonomy SIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Fedor Novikov, Ludmila N. Fedorchenko, Vladimir I. Vorobiev, Roza R. Fatkieva, Dmitriy K. Levonevskiy Attribute-based approach of defining the secure behavior of automata objects. Search on Bibsonomy SIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Upasana T. Nagar, Priyadarsi Nanda, Xiangjian He, Zhiyuan Thomas Tan A framework for data security in cloud using collaborative intrusion detection scheme. Search on Bibsonomy SIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Gaurav Pareek, B. R. Purushothama Proxy visible re-encryption scheme with application to e-mail forwarding. Search on Bibsonomy SIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sampsa Rauti, Ville Leppänen Internal interface diversification with multiple fake interfaces. Search on Bibsonomy SIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ronak Odhaviya, Anamika Modi, Rahi Sheth, Anish Mathuria Feasibility of idle port scanning using RST rate-limit. Search on Bibsonomy SIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Maxim O. Kalinin, Vasiliy M. Krundyshev, Peter D. Zegzhda, Viacheslav Belenko Network security architectures for VANET. Search on Bibsonomy SIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Nivindar Kaur, Ashutosh Kumar Singh 0002, Naveen Kumar 0013, Shashank Srivastava Performance impact of topology poisoning attack in SDN and its countermeasure. Search on Bibsonomy SIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ankit Bansal, Sudipta Mahapatra A comparative analysis of machine learning techniques for botnet detection. Search on Bibsonomy SIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Durbadal Chattaraj, Monalisa Sarma, Debasis Samanta Privacy preserving two-server Diffie-Hellman key exchange protocol. Search on Bibsonomy SIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Antonina Komarova, Alexander Menshchikov, Tatyana Klyaus, Anatoly Korobeynikov, Yurij A. Gatchin, Nina Tishukova Analysis and comparison of electronic digital signature state standards GOST R 34.10-1994, GOST R 34.10-2001 and GOST R 34.10-2012. Search on Bibsonomy SIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Peter D. Zegzhda, Dmitry P. Zegzhda, Evgeny Pavlenko, Andrew Dremov Detecting Android application malicious behaviors based on the analysis of control flows and data flows. Search on Bibsonomy SIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Rajveer Singh Shekhawat, Manoj Singh Gaur, Atilla Elçi, Jaideep Vaidya, Oleg B. Makarevich, Ron Poet, Mehmet A. Orgun, Vijaypal S. Dhaka, Manoj Kumar Bohra, Virender Singh, Ludmila K. Babenko, Naghmeh Moradpoor Sheykhkanloo, Behnam Rahnama (eds.) Proceedings of the 10th International Conference on Security of Information and Networks, SIN 2017, Jaipur, IN, India, October 13-15, 2017. Search on Bibsonomy SIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ludmila K. Babenko, Alexey Kirillov Malware detection by meta-information of used system functions. Search on Bibsonomy SIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Naghmeh Moradpoor, Martyn Brown, Gordon Russell 0001 Insider threat detection using principal component analysis and self-organising map. Search on Bibsonomy SIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Evgeniya Ishchukova, Ekaterina Tolomanenko, Ludmila K. Babenko Differential ananlysis of 3 round Kuznyechik. Search on Bibsonomy SIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Raksha Nawal, Rajbir Kaur Abnormal leakage of energy in battery-based IoT-devices. Search on Bibsonomy SIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Nazatul Haque Sultan, Ferdous Ahmed Barbhuiya, Nityananda Sarma A universal cloud user revocation scheme with key-escrow resistance for ciphertext-policy attribute-based access control. Search on Bibsonomy SIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Rachana Yogesh Patil, Satish R. Devane Unmasking of source identity, a step beyond in cyber forensic. Search on Bibsonomy SIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ankur Shukla, Divya Vikash, Bharavi Mishra, Poonam Gera Permission recommender system for Android. Search on Bibsonomy SIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mahaveer Prasad Soni, Alwyn R. Pais Light-weight hash algorithms using GRP instruction. Search on Bibsonomy SIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Evgeniya Ishchukova, Ludmila K. Babenko, Maxim Anikeev Two simplified versions of Kuznyechik cipher (GOST R 34.12-2015). Search on Bibsonomy SIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jaina P. Bhoiwala, Rutvij H. Jhaveri Cooperation based defense mechanism against selfish nodes in DTNs. Search on Bibsonomy SIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ajay Nehra, Meenakshi Tripathi, Manoj Singh Gaur 'Global view' in SDN: existing implementation, vulnerabilities & threats. Search on Bibsonomy SIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Anubha Parashar, Apoorva Parashar, Somya Goyal Identification of gait data using machine learning technique to categories human locomotion. Search on Bibsonomy SIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Konstantin E. Rumyantsev, Evgeny Rudinsky Parameters of the two-stage synchronization algorithm for the quantum key distribution system. Search on Bibsonomy SIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Rahul Saxena, Monika Jain, Dushyant Singh, Ashutosh Kushwah An enhanced parallel version of RSA public key crypto based algorithm using openMP. Search on Bibsonomy SIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Liudmila Babenko, Ilya Pisarev, Oleg B. Makarevich A model of a secure electronic voting system based on blind intermediaries using russian cryptographic algorithms. Search on Bibsonomy SIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Abdulaziz Almehmadi, Zeinab Joudaki, Roozbeh Jalali Language usage on Twitter predicts crime rates. Search on Bibsonomy SIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Kamalakanta Sethi, Anish Chopra, Padmalochan Bera, Bata Krishna Tripathy Integration of role based access control with homomorphic cryptosystem for secure and controlled access of data in cloud. Search on Bibsonomy SIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Srikanta Pradhan, Somanath Tripathy CAP: collaborative attack on pastry. Search on Bibsonomy SIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Swati Gaur, Sudhanshu Gaur Component-centric application-driven framework: towards taming privilege separation in Android. Search on Bibsonomy SIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sunil Dutt, Bikram Paul, Anshu Chauhan, Sukumar Nandi, Gaurav Trivedi Approxhash: delay, power and area optimized approximate hash functions for cryptography applications. Search on Bibsonomy SIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Muhammad I. H. Sukmana, Kennedy A. Torkura, Christoph Meinel, Hendrik Graupner Redesign cloudRAID for flexible and secure enterprise file sharing over public cloud storage. Search on Bibsonomy SIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Narayan Vetrekar, Ramachandra Raghavendra, Kiran B. Raja, Rajendra S. Gad, Christoph Busch 0001 Extended multi-spectral imaging for gender classification based on image set. Search on Bibsonomy SIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Pynbianglut Hadem, Dilip Kumar Saikia SMITE: an SDN and MPLS integrated traceback mechanism. Search on Bibsonomy SIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Narayan Vetrekar, Kiran B. Raja, Ramachandra Raghavendra, Rajendra S. Gad, Christoph Busch 0001 Collaborative representation of Grassmann manifold projection metric for robust multi-spectral face recognition. Search on Bibsonomy SIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Kamalakanta Sethi, Shankar Kumar Chaudhary, Bata Krishna Tripathy, Padmalochan Bera A novel malware analysis for malware detection and classification using machine learning algorithms. Search on Bibsonomy SIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Naveen Kumar 0013, Ashutosh Kumar Singh 0002, Shashank Srivastava Evaluating machine learning algorithms for detection of interest flooding attack in named data networking. Search on Bibsonomy SIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Shailja Dahiya, Manoj Kumar Bohra Element-key table based complex key generation (E-CKG) for IoT based health care networks. Search on Bibsonomy SIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Harsurinder Kaur, Husanbir Singh Pannu Anomaly detection survey for information security. Search on Bibsonomy SIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ludmila K. Babenko, Ekaterina Maro, Maxim Anikeev Modeling of Algebraic Analysis of GOST+ Cipher in SageMath. Search on Bibsonomy SIN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jagjot Kaur, Dale Lindskog An Algorithm to Facilitate Intrusion Response in Mobile Ad Hoc Networks. Search on Bibsonomy SIN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yong-pyo Hong, Youngjun Kim A Study on Unified Security Mechanism and Platform for Centralized Business Contents. Search on Bibsonomy SIN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Vladimir Eliseev, Anastasiya Gurina Algorithms for network server anomaly behavior detection without traffic content inspection. Search on Bibsonomy SIN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mohammadreza Soltan Aghaei, Elham Zamani The Improved Protocols Based on AODV in terms of Quality and Security in MANET Network. Search on Bibsonomy SIN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sonam Chauhan, Ajay Sharma Fuzzy Commitment Scheme based on Reed Solomon Codes. Search on Bibsonomy SIN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Peter D. Zegzhda, Dmitry P. Zegzhda, Maxim O. Kalinin, Alexander I. Pechenkin, Alexander Minin, Daria S. Lavrova Safe Integration of SIEM Systems with Internet of Things: Data Aggregation, Integrity Control, and Bioinspired Safe Routing. Search on Bibsonomy SIN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Martin Stokkenes, Ramachandra Raghavendra, Christoph Busch 0001 Biometric Authentication Protocols on Smartphones: An Overview. Search on Bibsonomy SIN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Andrey Yu. Chernov, Artem S. Konoplev, Dmitry P. Zegzhda Applying Virtualization Technology for the Construction of Trusted Executable Environment. Search on Bibsonomy SIN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Evgeniya Ishchukova, Ludmila K. Babenko, Maxim Anikeev Fast Implementation and Cryptanalysis of GOST R 34.12-2015 Block Ciphers. Search on Bibsonomy SIN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Alexandr S. Basan, Elena Basan, Oleg B. Makarevich Development of the Hierarchal Trust management System for Mobile Cluster-based Wireless Sensor Network. Search on Bibsonomy SIN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mouna Jouini, Latifa Ben Arfa Rabai A Scalable Threats Classification Model in Information Systems. Search on Bibsonomy SIN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Salem Benferhat, Mouslim Tolba, Karim Tabia, Abdelkader Belkhir Integrating non elementary actions in access control models. Search on Bibsonomy SIN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Manel Elleuchi, Omar Cheikhrouhou, Abdulfattah Mohammad Obeid, Mohamed Abid An Efficient Secure scheme for Wireless Sensor Networks. Search on Bibsonomy SIN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Hao Jiang, Ahmed Bouabdallah, Amin Aflatoonian, Jean-Marie Bonnin, Karine Guillouard A Secure Multi-Tenant Framework for SDN. Search on Bibsonomy SIN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Robert Bronte, Hossain Shahriar, Hisham M. Haddad A Signature-Based Intrusion Detection System for Web Applications based on Genetic Algorithm. Search on Bibsonomy SIN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kiran B. Raja, Ramachandra Raghavendra, Christoph Busch 0001 Color Adaptive Quantized Patterns for Presentation Attack Detection in Ocular Biometric Systems. Search on Bibsonomy SIN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Xavier J. A. Bellekens, Greig Paul, Christos Tachtatzis, James Irvine 0001, Robert C. Atkinson Strategies for Protecting Intellectual Property when Using CUDA Applications on Graphics Processing Units. Search on Bibsonomy SIN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sardar Hussain, Richard O. Sinnott, Ron Poet Security-enabled Enactment of Decentralized Workflows. Search on Bibsonomy SIN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kun He 0006, Christophe Bidan, Gaëtan Le Guelvouit Experimentation of Privacy Protection for JPEG Contents on Image-Sharing Platforms. Search on Bibsonomy SIN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Deepak Subramanian, Guillaume Hiet, Christophe Bidan Preventive information flow control through a mechanism of split addresses. Search on Bibsonomy SIN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Goutham Reddy Alavalapati, Eun-Jun Yoon, Ashok Kumar Das, Kee-Young Yoo An Enhanced Anonymous Two-factor Mutual Authentication with Key-agreement Scheme for Session Initiation Protocol. Search on Bibsonomy SIN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Alexander G. Chefranov, Amir Narimani Participant Authenticating, Error Detecting, and 100% Multiple Errors Repairing Chang-Chen-Wang's Secret Sharing Method Enhancement. Search on Bibsonomy SIN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Safwan Alam, Khalil El-Khatib Phishing Susceptibility Detection through Social Media Analytics. Search on Bibsonomy SIN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Alexey A. Tselykh, Margarita Knyazeva, Elena Popkova, Antonina Durfee, Alexander N. Tselykh An Attributed Graph Mining Approach to Detect Transfer Pricing Fraud. Search on Bibsonomy SIN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Roger Jardí-Cedó, Macià Mut Puigserver, Jordi Castellà-Roca, Magdalena Payeras-Capellà, Alexandre Viejo Privacy-preserving Electronic Road Pricing System for Multifare Low Emission Zones. Search on Bibsonomy SIN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ramachandra Raghavendra, Kiran B. Raja, Christoph Busch 0001 Impact of Drug Abuse on Face Recognition Systems: A Preliminary Study. Search on Bibsonomy SIN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Myria Bouhaddi, Kamel Adi, Mohammed Said Radjef Evolutionary Game-Based Defense Mechanism in the MANETs. Search on Bibsonomy SIN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ussama Yakub, Vijayalakshmi Atluri, Jaideep Vaidya Efficient Evaluation of Authorizations for Video Data. Search on Bibsonomy SIN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Vladimir I. Vorobiev, Elena L. Evnevich, Roza R. Fatkieva, Ludmila N. Fedorchenko, Dmitriy K. Levonevskiy Criteria and Indices of Computer Network Protection. Search on Bibsonomy SIN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Hye-Young Kim A Study of a Smart IT Convergence Framework in IoT. Search on Bibsonomy SIN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1 Proceedings of the 9th International Conference on Security of Information and Networks, Newark, NJ, USA, July 20-22, 2016 Search on Bibsonomy SIN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Manel Medhioub, Mohamed Hamdi, Tai-Hoon Kim A New Authentication Scheme for Cloud-based Storage Applications. Search on Bibsonomy SIN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Giovanni Bottazzi, Giuseppe F. Italiano, Giuseppe Giulio Rutigliano Frequency Domain Analysis of Large-Scale Proxy Logs for Botnet Traffic Detection. Search on Bibsonomy SIN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Anil Saini, Manoj Singh Gaur, Vijay Laxmi, Priyadarsi Nanda sandFOX: secure sandboxed and isolated environment for firefox browser. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Zainab Saud, M. Hasan Islam Towards proactive detection of advanced persistent threat (APT) attacks using honeypots. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jyoti Gajrani, Jitendra Sarswat, Meenakshi Tripathi, Vijay Laxmi, Manoj Singh Gaur, Mauro Conti A robust dynamic analysis system preventing SandBox detection by Android malware. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Marian Gawron, Aragats Amirkhanyan, Feng Cheng 0002, Christoph Meinel Automatic vulnerability detection for weakness visualization and advisory creation. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Meenu Mary John, P. Vinod 0001, K. A. Dhanya Hartley's test ranked opcodes for Android malware analysis. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Andrei Petrovski 0001, Prapa Rattadilok, Sergey Petrovski Designing a context-aware cyber physical system for detecting security threats in motor vehicles. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1S. S. Alkhasov, Alexander N. Tselykh, Alexey A. Tselykh Application of cluster analysis for the assessment of the share of fraud victims among bank card holders. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Hamid Hanifi, Leemon C. Baird III, Ramakrishna Thurimella A new algorithm for unkeyed jam resistance. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Nezar Nassr, Eric Steegmans Mitigating conflicts of interest by authorization policies. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Alexander Minin, Maxim O. Kalinin Information security in computer networks with dynamic topology. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Aragats Amirkhanyan, Andrey Sapegin, Marian Gawron, Feng Cheng 0002, Christoph Meinel Simulation user behavior on a security testbed using user behavior states graph. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Princy George, P. Vinod 0001 Machine learning approach for filtering spam emails. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Igor Anikin, Lilia Yu. Emaletdinova Information security risk management in computer networks based on fuzzy logic and cost/benefit ratio estimation. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Dmitry V. Moskvin, Denis Ivanov Cybersecurity of ad-hoc distributed systems. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Philipp Burtyka, Oleg B. Makarevich Execution of data-dependent programs over encrypted data. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Xuefei Wang, Hengtai Ma, Lisha Jing A dynamic marking method for implicit information flow in dynamic taint analysis. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Evgeny Shcherba Two formal problems of network security and a theory of boolean-valued flow networks. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Shweta Bhandari, Rishabh Gupta, Vijay Laxmi, Manoj Singh Gaur, Akka Zemmari, Maxim Anikeev DRACO: DRoid analyst combo an android malware analysis framework. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Artem S. Konoplev, Alexey G. Busygin Steganographic methods of communications in distributed computing networks. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Artem Garkusha Building data in motion DLP system from scratch using opensource software and confirming its effectiveness within "capture the flag" competitions. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Elvia León, Brayan S. Reyes Daza, Octavio J. Salcedo Parra Comparison between safety and efficient security of the ARP protocol. Search on Bibsonomy SIN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 685 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license