The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ARES"( http://dblp.L3S.de/Venues/ARES )

URL (DBLP): http://dblp.uni-trier.de/db/conf/IEEEares

Publication years (Num. hits)
2006 (141) 2007 (155) 2008 (203) 2009 (159) 2010 (109) 2011 (145) 2012 (83) 2013 (110) 2014 (79) 2015 (97) 2016 (108) 2017 (101) 2018 (130) 2019 (108) 2020 (117) 2021 (161) 2022 (159) 2023 (156)
Publication types (Num. hits)
inproceedings(2302) proceedings(19)
Venues (Conferences, Journals, ...)
ARES(2321)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 888 occurrences of 577 keywords

Results
Found 2321 publication records. Showing 2321 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Giovanni Maria Riva, Alexandr Vasenev, Nicola Zannone SoK: engineering privacy-aware high-tech systems. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Lukas Jäger, Richard Petri 0001 DICE harder: a hardware implementation of the device identifier composition engine. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Omair Faraj, David Megías 0001, Abdel-Mehsen Ahmad, Joaquín García-Alfaro Taxonomy and challenges in machine learning-based approaches to detect attacks in the internet of things. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Harm Griffioen, Christian Doerr Quantifying autonomous system IP churn using attack traffic of botnets. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Vincenzo Mangini, Irina Tal, Arghir-Nicolae Moldovan An empirical study on the impact of GDPR and right to be forgotten - organisations and users perspective. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Rui Tanabe, Tatsuya Tamai, Akira Fujita, Ryoichi Isawa, Katsunari Yoshioka, Tsutomu Matsumoto, Carlos Gañán, Michel van Eeten Disposable botnets: examining the anatomy of IoT botnet infrastructure. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Fabian Boemer, Rosario Cammarota, Daniel Demmler, Thomas Schneider 0003, Hossein Yalame MP2ML: a mixed-protocol machine learning framework for private inference. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Daniela Pöhn, Wolfgang Hommel An overview of limitations and approaches in identity management. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Joo Yeon Cho, Andrew Sergeev Post-quantum MACsec key agreement for ethernet networks. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Marietheres Dietz, Manfred Vielberth, Günther Pernul Integrating digital twin security simulations in the security operations center. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Michael Pfeiffer 0006, Franz Girlich, Michael Rossberg, Guenter Schaefer Vector packet encapsulation: the case for a scalable IPsec encryption protocol. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Robert P. Markiewicz, Daniele Sgandurra Clust-IT: clustering-based intrusion detection in IoT environments. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Dmitrii Vekshin, Karel Hynek, Tomás Cejka DoH Insight: detecting DNS over HTTPS by machine learning. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Andreas Meyer-Berg, Rolf Egert, Leon Böck, Max Mühlhäuser IoT dataset generation framework for evaluating anomaly detection mechanisms. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Theodoros Rokkas, Ioannis Neokosmidis Factors affecting the market adoption of cyber-security products in energy and electrical systems: the case of SPEAR. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Martin Husák, Tomás Jirsík, Shanchieh Jay Yang SoK: contemporary issues and challenges to enable cyber situational awareness for network security. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Olga Villagrán-Velasco, Eduardo B. Fernández, Jorge L. Ortega-Arjona Refining the evaluation of the degree of security of a system built using security patterns. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Amir Khaleghi Moghaddam, Nur Zincir-Heywood Exploring data leakage in encrypted payload using supervised machine learning. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Uwe Breidenbach, Martin Steinebach, Huajian Liu Privacy-enhanced robust image hashing with bloom filters. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Anatoli Kalysch, Mark Deutel, Tilo Müller Template-based Android inter process communication fuzzing. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Caine Silva, Sylvain Guérin, Raúl Mazo, Joël Champeau Contract-based design patterns: a design by contract approach to specify security patterns. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Bhargav Kuchipudi, Ravi Teja Nannapaneni, Qi Liao Adversarial machine learning for spam filters. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Zhen Li 0025, Qi Liao 0002 Ransomware 2.0: to sell, or not to sell a game-theoretical model of data-selling Ransomware. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Yi Qin, Ryan Hunt, Chuan Yue Distinguishability of adversarial examples. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Michael Pucher, Christian Kudera, Georg Merzdovnik AVRS: emulating AVR microcontrollers for reverse engineering and security testing. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Marco De Bona, Federica Paci A real world study on employees' susceptibility to phishing attacks. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Daniel Vogel 0004, Ulugbek Akhmedjanov, Marc Ohm, Michael Meier 0001 An investigation on the feasibility of the bluetooth frequency hopping mechanism for the use as a covert channel technique. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Mikolaj Komisarek, Michal Choras, Rafal Kozik, Marek Pawlicki Real-time stream processing tool for detecting suspicious network patterns using machine learning. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Piotr Nowakowski, Piotr Zórawski, Krzysztof Cabaj, Marcin Gregorczyk, Maciej Purski, Wojciech Mazurczyk Distributed packet inspection for network security purposes in software-defined networking environments. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Przemyslaw Szary, Wojciech Mazurczyk, Steffen Wendzel, Luca Caviglione Design and performance evaluation of reversible network covert channels. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Arthur Drichel, Ulrike Meyer, Samuel Schüppen, Dominik Teubert Making use of NXt to nothing: the effect of class imbalances on DGA detection classifiers. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Álvaro Luis Martínez, Víctor A. Villagrá González A novel automatic discovery system of critical assets in cyberspace-oriented military missions. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Xavier Larriva-Novo, Mario Vega-Barbas, Víctor A. Villagrá, Diego Rivera, Mario Sanz Rodrigo, Manuel Alvarez-Campana Dynamic risk management architecture based on heterogeneous data sources for enhancing the cyber situational awareness in organizations. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Georgios N. Selimis, Rui Wang, Roel Maes, Geert Jan Schrijen, Mario Münzer, Stefan Ilic, Frans M. J. Willems, Lieneke Kusters RESCURE: a security solution for IoT life cycle. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Maya Dotan, Yvonne-Anne Pignolet, Stefan Schmid 0001, Saar Tochner, Aviv Zohar SOK: cryptocurrency networking context, state-of-the-art, challenges. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Richard E. Overill Cosmic rays: a neglected potential threat to evidential integrity in digital forensic investigations? Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Jordi Ortiz 0001, Ramon Sanchez-Iborra, Jorge Bernal Bernabé, Antonio F. Skarmeta, Chafika Benzaid, Tarik Taleb, Pol Alemany, Raul Muñoz 0001, Ricard Vilalta, Chrystel Gaber, Jean-Philippe Wary, Dhouha Ayed, Pascal Bisson, Maria Christopoulou, George Xilouris, Edgardo Montes de Oca, Gürkan Gür, Gianni Santinelli, Vincent Lefebvre, Antonio Pastor 0001, Diego R. López INSPIRE-5Gplus: intelligent security and pervasive trust for 5G and beyond networks. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Melanie Volkamer, Christian Wressnegger (eds.) ARES 2020: The 15th International Conference on Availability, Reliability and Security, Virtual Event, Ireland, August 25-28, 2020 Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Arnold Sykosch, Christian Doll, Matthias Wübbeling, Michael Meier 0001 Generalizing the phishing principle: analyzing user behavior in response to controlled stimuli for IT security awareness assessment. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Jan Richter-Brockmann, Pascal Sasdrich, Florian Bache, Tim Güneysu Concurrent error detection revisited: hardware protection against fault and side-channel attacks. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Roumen Daton Medenou, Victor Manuel Calzado Mayo, Miriam Garcia Balufo, Miguel Páramo Castrillo, Francisco José González Garrido, Álvaro Luis Martínez, David Nevado Catalán, Ao Hu, David Sandoval Rodríguez-Bermejo, Jorge Maestre Vidal, Gerardo Ramis Pasqual De Riquelme, Antonio Berardi, Paolo De Santis, Francesco Torelli, Salvador Llopis Sánchez CYSAS-S3: a novel dataset for validating cyber situational awareness related tools for supporting military operations. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Fanny Rivera-Ortiz, Liliana Pasquale Automated modelling of security incidents to represent logging requirements in software systems. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Oren Halvani, Lukas Graner, Roey Regev TAVeer: an interpretable topic-agnostic authorship verification method. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Marta Catillo, Antonio Pecchia, Massimiliano Rak, Umberto Villano A case study on the representativeness of public DoS network traffic data for cybersecurity research. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Gueltoum Bendiab, Konstantinos-Panagiotis Grammatikakis, Ioannis Koufos, Nicholas Kolokotronis, Stavros Shiaeles Advanced metering infrastructures: security risks and mitigation. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Fabian Fleischer, Marcel Busch, Phillip Kuhrt Memory corruption attacks within Android TEEs: a case study based on OP-TEE. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Marc Ohm, Arnold Sykosch, Michael Meier 0001 Towards detection of software supply chain attacks by forensic artifacts. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Dayu Shi, Xun Zhang 0002, Andrei Vladimirescu, Lina Shi, Yanqi Huang, Yourong Liu A device identification method based on LED fingerprint for visible light communication system. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Piotr Nowakowski, Piotr Zórawski, Krzysztof Cabaj, Wojciech Mazurczyk Network covert channels detection using data mining and hierarchical organisation of frequent sets: an initial study. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Guilherme Henrique Ribeiro, Elaine Ribeiro de Faria Paiva, Rodrigo Sanches Miani A comparison of stream mining algorithms on botnet detection. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Mauro Conti, Giulio Rigoni, Flavio Toffalini ASAINT: a spy App identification system based on network traffic. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Jorge Maestre Vidal, Marco Antonio Sotelo Monge Denial of sustainability on military tactical clouds. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Christoph Saatjohann, Fabian Ising, Luise Krings, Sebastian Schinzel STALK: security analysis of smartwatches for kids. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Radoslava Svihrová, Christian Lettner A semi-supervised approach for network intrusion detection. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Taichi Ishikawa, Yu-Lu Liu 0001, David Lawrence Shepard, Kilho Shin Machine learning for tree structures in fake site detection. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Sepideh Pouyanrad, Jan Tobias Mühlberg, Wouter Joosen SCFMSP: static detection of side channels in MSP430 programs. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Ben Lenard, James Wagner, Alexander Rasin, Jonathan Grier SysGen: system state corpus generator. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Jose Andre Morales, Thomas P. Scanlon, Aaron Volkmann, Joseph Yankel, Hasan Yasar Security impacts of sub-optimal DevSecOps implementations in a highly regulated environment. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Niccolò Maltoni, Antonio Magnani, Luca Calderoni Privacy threats in low-cost people counting devices. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Rainer Diesch, Helmut Krcmar SoK: linking information security metrics to management success factors. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Dominik Widhalm, Karl M. Göschka, Wolfgang Kastner SoK: a taxonomy for anomaly detection in wireless sensor networks focused on node-level techniques. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Jacob Leon Kröger, Jens Lindemann 0001, Dominik Herrmann How do app vendors respond to subject access requests?: a longitudinal privacy study on iOS and Android Apps. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Kazuhide Fukushima, Thomas Perianin, Victor Dyseryn, Shinsaku Kiyomoto, Sylvain Guilley, Adrien Facon Feasibility study of a camera-based PUF in a realistic scenario. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Xiaoyu Du, Chris Hargreaves, John Sheppard 0002, Felix Anda, Asanka P. Sayakkara, Nhien-An Le-Khac, Mark Scanlon SoK: exploring the state of the art and the future potential of artificial intelligence in digital forensic investigation. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Ludwig Englbrecht, Günther Pernul A privacy-aware digital forensics investigation in enterprises. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Dimitrios Vozikis, Eleni Darra, Tanel Kuusk, Dimitris Kavallieros, Aare Reintam, Xavier J. A. Bellekens On the importance of cyber-security training for multi-vector energy distribution system operators. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Rose Esmander, Pascal Lafourcade 0001, Marius Lombard-Platet, Claudia Negri Ribalta A silver bullet?: a comparison of accountants and developers mental models in the raise of blockchain. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Florian Platzer, Marcel Schäfer, Martin Steinebach Critical traffic analysis on the tor network. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Michael P. Heinl, Alexander Giehl, Lukas Graif AntiPatterns regarding the application of cryptographic primitives by the example of ransomware. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Athar Khodabakhsh, Sule Yildirim Yayilgan, Mohamed Abomhara, Maren Istad, Nargis Hurzuk Cyber-risk identification for a digital substation. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Gerald Palfinger, Bernd Prünster AndroPRINT: analysing the fingerprintability of the Android API. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Andrea Tundis, Gaurav Mukherjee, Max Mühlhäuser Mixed-code text analysis for the detection of online hidden propaganda. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1David Sandoval Rodríguez-Bermejo, Roumen Daton Medenou, Gerardo Ramis Pasqual De Riquelme, Jorge Maestre Vidal, Francesco Torelli, Salvador Llopis Sánchez Evaluation methodology for mission-centric cyber situational awareness capabilities. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Edward Harshany, Ryan Benton, David Bourrie, Michael Black, William Bradley Glisson DFS3: automated distributed file system storage state reconstruction. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Filipo Sharevski, Peter Jachim, Kevin Florek To tweet or not to tweet: covertly manipulating a Twitter debate on vaccines using malware-induced misperceptions. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Panagiotis I. Radoglou-Grammatikis, Panagiotis G. Sarigiannidis, George Efstathopoulos, Paris-Alexandros Karypidis, Antonios Sarigiannidis DIDEROT: an intrusion detection and prevention system for DNP3-based SCADA systems. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Niklas Bunzel, Martin Steinebach, Huajian Liu Non-blind steganalysis. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Angela Borchert, Nicolás E. Díaz Ferreyra, Maritta Heisel Balancing trust and privacy in computer-mediated introduction: featuring risk as a determinant for trustworthiness requirements elicitation. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Raphael Antonius Frick, Huajian Liu, Martin Steinebach Detecting double compression and splicing using benfords first digit law. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Liza Ahmad, Salam Ismail Rasheed Khanji, Farkhund Iqbal, Faouzi Kamoun Blockchain-based chain of custody: towards real-time tamper-proof evidence management. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Roland Bolboaca, Teri Lenard, Béla Genge, Piroska Haller Locality sensitive hashing for tampering detection in automotive systems. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Léopold Ouairy, Hélène Le Bouder, Jean-Louis Lanet Confiance: detecting vulnerabilities in Java Card applets. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Harry Halpin SoK: why Johnny can't fix PGP standardization. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Aleksandra Pawlicka, Michal Choras, Marek Pawlicki Cyberspace threats: not only hackers and criminals. Raising the awareness of selected unusual cyberspace actors - cybersecurity researchers' perspective. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Damian Puchalski, Luca Caviglione, Rafal Kozik, Adrian Marzecki, Slawomir Krawczyk, Michal Choras Stegomalware detection through structural analysis of media files. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Calvin Brierley, Jamie Pont, Budi Arief, David J. Barnes, Julio C. Hernandez-Castro PaperW8: an IoT bricking ransomware proof of concept. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Benjamin Yankson, Farkhund Iqbal, Patrick C. K. Hung 4P based forensics investigation framework for smart connected toys. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Hannes Sochor, Flavio Ferrarotti, Rudolf Ramler Automated security test generation for MQTT using attack patterns. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Amira Kchaou, Ryma Abassi, Sihem Guemara El Fatmi Towards the performance evaluation of a clustering and trust based security mechanism for VANET. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Pavlo Burda, Tzouliano Chotza, Luca Allodi, Nicola Zannone Testing the effectiveness of tailored phishing techniques in industry and academia: a field experiment. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Rosangela Casolare, Carlo De Dominicis, Fabio Martinelli, Francesco Mercaldo, Antonella Santone VisualDroid: automatic triage and detection of Android repackaged applications. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Enrico Cambiaso, Maurizio Aiello, Maurizio Mongelli, Ivan Vaccari Detection and classification of slow DoS attacks targeting network servers. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Clément Elbaz, Louis Rilling, Christine Morin Fighting N-day vulnerabilities with automated CVSS vector prediction at disclosure. Search on Bibsonomy ARES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Ferhat Karakoç, Majid Nateghizad, Zekeriya Erkin SET-OT: A Secure Equality Testing Protocol Based on Oblivious Transfer. Search on Bibsonomy ARES The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Lukas Malina, Gautam Srivastava 0001, Petr Dzurenda, Jan Hajny, Radek Fujdiak A Secure Publish/Subscribe Protocol for Internet of Things. Search on Bibsonomy ARES The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Pavlo Burda, Coen Boot, Luca Allodi Characterizing the Redundancy of DarkWeb .onion Services. Search on Bibsonomy ARES The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Raimo Kantola 6G Network Needs to Support Embedded Trust. Search on Bibsonomy ARES The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Martin Husák, Jaroslav Kaspar AIDA Framework: Real-Time Correlation and Prediction of Intrusion Detection Alerts. Search on Bibsonomy ARES The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Damjan Fujs, Anze Mihelic, Simon L. R. Vrhovec The power of interpretation: Qualitative methods in cybersecurity research. Search on Bibsonomy ARES The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Wojciech Mazurczyk, Przemyslaw Szary, Steffen Wendzel, Luca Caviglione Towards Reversible Storage Network Covert Channels. Search on Bibsonomy ARES The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #600 of 2321 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license