The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "CNS"( http://dblp.L3S.de/Venues/CNS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/cns

Publication years (Num. hits)
2013 (86) 2014 (79) 2015 (128) 2016 (102) 2017 (96) 2018 (86) 2019 (63) 2020 (79) 2021 (36) 2022 (62) 2023 (56)
Publication types (Num. hits)
inproceedings(862) proceedings(11)
Venues (Conferences, Journals, ...)
CNS(873)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 873 publication records. Showing 873 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Julian Chukwu, Ose Osamudiamen, Ashraf Matrawy IDSaaS in SDN: Intrusion Detection System as a service in software defined networks. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jonathan Ming, Mengjun Xie Remote live forensics for Android devices. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Paul L. Yu, Jake B. Perazzone, Brian M. Sadler, Rick S. Blum Authenticated side channel via physical layer fingerprinting. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kemal Bicakci, Davut Deniz Yavuz, Sezin Gurkan TwinCloud: Secure cloud sharing without explicit key management. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Longfei Wu, Benjamin Brandt, Xiaojiang Du, Bo Ji 0001 Analysis of clickjacking attacks and an effective defense scheme for Android devices. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mustafa Faisal, Alvaro A. Cárdenas, Avishai Wool Modeling Modbus TCP for intrusion detection. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Candace Suh-Lee, Ju-Yeon Jo, Yoohwan Kim Text mining for security threat detection discovering hidden information in unstructured log messages. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Depeng Li 0002, Rui Zhang 0007 A framework to mitigate airliner risk in air traffic management. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Moreno Ambrosin, Hossein Hosseini, Kalikinkar Mandal, Mauro Conti, Radha Poovendran Despicable me(ter): Anonymous and fine-grained metering data reporting with dishonest meters. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Hassan Takabi Firewall for brain: Towards a privacy preserving ecosystem for BCI applications. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Shan Suthaharan, Weining Shen Pairing of most relevant variables and bootstrap samples with ridge regression for data sharing. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kuan-yin Chen, Anudeep Reddy Junuthula, Ishant Kumar Siddhrau, Yang Xu 0010, H. Jonathan Chao SDNShield: Towards more comprehensive defense against DDoS attacks on SDN control plane. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Tao Li 0042, Rui Zhang 0007, Yanchao Zhang PriExpress: Privacy-preserving express delivery with fine-grained attribute-based access control. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Hanif Rahbari, Marwan Krunz Rolling preambles: Mitigating stealthy FO estimation attacks in OFDM-based 802.11 systems. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Lucas Schabhüser, Denise Demirel, Johannes Buchmann 0001 An unconditionally hiding auditing procedure for computations over distributed data. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yao Pan, Jules White, Yu Sun 0002 Assessing the threat of web worker distributed attacks. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Shashank Arora, Gaurav Varshney, Pradeep K. Atrey, Manoj Mishra SecureCEdit: An approach for secure cloud-based document editing. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Diana K. Anguiano Cervantes, Ghouri Mohammad Saaduddin, Yanyan Li, Mengjun Xie Comparison between fingerprint and behavioral biometric authentication using 2D and 3D gestures. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Shan Suthaharan A correlation-based subspace analysis for data confidentiality and classification as utility in CPS. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ahmed S. Bendary, Yahya Z. Mohasseb, Hisham Dahshan On the secure Degrees of Freedom for the K-user symmetric MIMO Wiretap MAC channel. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Pritam Mukherjee, Sennur Ulukus Covert bits through queues. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Liangxiao Xin, David Starobinski, Guevara Noubir Cascading denial of service attacks on Wi-Fi networks. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yifan Tian, Jiawei Yuan, Shucheng Yu SBPA: Social behavior based cross Social Network phishing attacks. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Per A. Hallgren, Martín Ochoa, Andrei Sabelfeld MaxPace: Speed-constrained location queries. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Xiaoyan Sun 0003, Jun Dai, Peng Liu 0005, Anoop Singhal, John Yen Towards probabilistic identification of zero-day attack paths. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jian Lin 0003, Dejun Yang, Ming Li 0044, Jia Xu 0003, Guoliang Xue BidGuard: A framework for privacy-preserving crowdsensing incentive mechanisms. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Eric Asselin, Carlos Aguilar Melchor, Gentian Jakllari Anomaly detection for web server log reduction: A simple yet efficient crawling based approach. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jaume del Olmo, Javier Rodríguez Fonollosa Strong secrecy on a class of Degraded Broadcast Channels using polar codes. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Antwane Lewis, Yanyan Li, Mengjun Xie Real time motion-based authentication for smartwatch. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Xiaoqi Yu, Nairen Cao, Jun Zhang 0049, Siu-Ming Yiu Dynamic Proofs of Retrievability with improved worst case overhead. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Curtis R. Taylor, Craig A. Shue Validating security protocols with cloud-based middleboxes. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jinling Zhang, Hong Wen 0001, Huanhuan Song, Yixin Jiang, Zhengguang Zhang, Luping Zhang, Xiping Zhu Using Basis Expansion Model for Physical Layer Authentication in Time-Variant System. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Zhexiong Wei, F. Richard Yu, Helen Tang, Chengehao Liang, Qiao Yan Securing cognitive radio vehicular Ad hoc networks with trusted lightweight cloud computing. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Vivek Venugopalan, Cameron D. Patterson, Devu Manikantan Shila Detecting and thwarting hardware trojan attacks in cyber-physical systems. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Woo-Hyun Ko, Bharadwaj Satchidanandan, P. R. Kumar 0001 Theory and implementation of dynamic watermarking for cybersecurity of advanced transportation systems. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Florian Reimair, Bernd Prünster, Andreas Reiter, Christian Ertler Applied dynamic policy selection. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Emmanouil Vasilomanolakis, Michael Stahn, Carlos Garcia Cordero, Max Mühlhäuser On probe-response attacks in Collaborative Intrusion Detection Systems. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yanyan Li, Mengjun Xie, Jiang Bian 0001 SEGAUTH: A segment-based approach to behavioral biometric authentication. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ahmed S. Mansour, Holger Boche, Rafael F. Schaefer List decoding for arbitrarily varying wiretap channels. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kevin Walsh TLS with trustworthy certificate authorities. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ah Reum Kang, Aziz Mohaisen Assessing DNS privacy under partial deployment of special-use Domain Names. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Dominik Leibenger, Jonas Fortmann, Christoph Sorge EncFS goes multi-user: Adding access control to an encrypted file system. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Eddy Caron, Arnaud Lefray, Jonathan Rouzaud-Cornabas Secured systems in Clouds with Model-Driven Orchestration. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jianli Huang, Yixin Jiang, Aidong Xu, Hong Wen 0001, Huajun Chen, Xiaobin Guo, Zewu Guan, Zhiming Wang Joint beamforming and antenna subarray formation for secrecy capacity maximization in MIMO wiretap channels. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Rui Lu, Derek Chi-Wai Pao Optimized Aho-Corasick string matching algorithm for smart phones. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Bahman Rashidi, Carol J. Fung XDroid: An Android permission control using Hidden Markov chain and online learning. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Steffen Haas, Shankar Karuppayah, Selvakumar Manickam, Max Mühlhäuser, Mathias Fischer 0001 On the resilience of P2P-based botnet graphs. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Florian Reimair, Christian Kollmann, Alexander Marsalek Emulating U2F authenticator devices. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Leonardo Babun, Hidayet Aksu, A. Selcuk Uluagac A framework for counterfeit smart grid device detection. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Pooria Madani, Natalija Vlajic Towards sequencing malicious system calls. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Siddhant Deshmukh, Henry Carter, Grant Hernandez, Patrick Traynor, Kevin R. B. Butler Efficient and secure template blinding for biometric authentication. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yi Shi 0001, Yalin E. Sagduyu Spectrum learning and access for cognitive satellite communications under jamming. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Monireh Dabaghchian, Amir Alipour-Fanid, Kai Zeng 0001, Qingsi Wang Online learning-based optimal primary user emulation attacks in cognitive radio networks. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Eunsang Cho 0001, Minkyung Park, Ted Taekyoung Kwon TwinPeaks: A new approach for certificateless public key distribution. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Christian Doerr, Mourad el Maouchi, Sille Kamoen, Jarno Moree Scan prediction and reconnaissance mitigation through commodity graphics cards. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Danda B. Rawat Analyzing energy efficient physical layer security in large-scale MIMO enabled CRN with QoS requirements. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Giovanni Di Crescenzo Server-assisted fully homomorphic computation protocols. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Key-whan Chung, Valerio Formicola, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer, Alexander Withers, Adam J. Slagell Attacking supercomputers through targeted alteration of environmental control: A data driven case study. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Dakun Shen, Ian D. Markwood, Dan Shen, Yao Liu 0007 Virtual Safe: Unauthorized movement detection for mobile devices. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mujahid Mohsin, Zahid Anwar, Ghaith Husari, Ehab Al-Shaer, Mohammad Ashiqur Rahman IoTSAT: A formal framework for security analysis of the internet of things (IoT). Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Wentao Chang, Songqing Chen ExtensionGuard: Towards runtime browser extension information leakage detection. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Zhengguang Zhang, Hong Wen 0001, Huanhuan Song, Yixin Jiang, Jinling Zhang, Xiping Zhu A MIMO cross-layer secure communication scheme based on spatial modulation. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Bo Tang 0011, Jun Yan 0007, Steven Kay, Haibo He Detection of false data injection attacks in smart grid under colored Gaussian noise. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Azeem Aqil, Ahmed Osama Fathy Atya, Srikanth V. Krishnamurthy, Paul L. Yu, Ananthram Swami, Jeff Rowe, Karl N. Levitt, Alexander Poylisher, Constantin Serban, Ritu Chadha Automated cross layer feature selection for effective intrusion detection in networked systems. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Abdallah Fayed, Tamer Khattab, Lifeng Lai On secure communication over the Z-Channel. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Wenwen Tu, Mario Goldenbaum, Lifeng Lai, H. Vincent Poor Multiple key generation with restricted public discussion structure. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Parth Pradhan, Kyatsandra G. Nagananda, Parv Venkitasubramaniam, Shalinee Kishore, Rick S. Blum GPS spoofing attack characterization and detection in smart grids. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1M. Tarek Ibn Ziad, Amr Al-Anwar 0001, Moustafa Alzantot, Mani B. Srivastava CryptoImg: Privacy preserving processing over encrypted images. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Madushanka Soysa, Pamela C. Cosman, Laurence B. Milstein Video cognitive radio networks for tactical scenarios. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Marcus Märtens, Hadi Asghari, Michel van Eeten, Piet Van Mieghem A time-dependent SIS-model for long-term computer worm evolution. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Allen T. Webb, A. L. Narasima Reddy Finding proxy users at the service using anomaly detection. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jason Gionta, William Enck, Per Larsen Preventing kernel code-reuse attacks through disclosure resistant code diversification. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sandeep Pisharody, Ankur Chowdhary, Dijiang Huang Security policy checking in distributed SDN based clouds. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Hatem Ismail, Daniel Germanus, Neeraj Suri Malicious peers eviction for P2P overlays. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ah Reum Kang, Aziz Mohaisen Automatic alerts annotation for improving DDoS mitigation systems. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Amirali Sanatinia, Guevara Noubir Honey Onions: A framework for characterizing and identifying misbehaving Tor HSDirs. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mee Lan Han, Hee Chan Han, Ah Reum Kang, Byung Il Kwak, Aziz Mohaisen, Huy Kang Kim WHAP: Web-hacking profiling using Case-Based Reasoning. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1 2016 IEEE Conference on Communications and Network Security, CNS 2016, Philadelphia, PA, USA, October 17-19, 2016 Search on Bibsonomy CNS The full citation details ... 2016 DBLP  BibTeX  RDF
1Ah Reum Kang, Aziz Mohaisen Transparency of the new gTLD's centralized zone data service: A measurement study. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jeffrey Spaulding, Ah Reum Kang, Shambhu J. Upadhyaya, Aziz Mohaisen A user study of the effectiveness of typosquatting techniques. Search on Bibsonomy CNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Laurent Chuat, Pawel Szalachowski, Adrian Perrig, Ben Laurie, Eran Messeri Efficient gossip protocols for verifying the consistency of Certificate logs. Search on Bibsonomy CNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Paul Cuff A stronger soft-covering lemma and applications. Search on Bibsonomy CNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Somayeh Salimi, Eduard A. Jorswieck, Mikael Skoglund, Panos Papadimitratos Key agreement over an interference channel with noiseless feedback: Achievable region & distributed allocation. Search on Bibsonomy CNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Bing Wang 0005, Wenjing Lou, Y. Thomas Hou 0001 Modeling the side-channel attacks in data deduplication with game theory. Search on Bibsonomy CNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Guangchi Liu, Qing Yang 0003, Honggang Wang 0001, Shaoen Wu, Mike P. Wittie Uncovering the mystery of trust in an online social network. Search on Bibsonomy CNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Pascal Urien New direction for open NFC trusted mobile applications: The MOBISIM project. Search on Bibsonomy CNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Weijie Liu, Rakesh B. Bobba, Sibin Mohan, Roy H. Campbell Inter-flow consistency: A novel SDN update abstraction for supporting inter-flow constraints. Search on Bibsonomy CNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Kai Wang, Yuqing Zhang 0001, Qixu Liu, Dan Fan A fuzzing test for dynamic vulnerability detection on Android Binder mechanism. Search on Bibsonomy CNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Simone Mutti, Enrico Bacis, Stefano Paraboschi An SELinux-based intent manager for Android. Search on Bibsonomy CNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Francesco Benedetto, Gaetano Giunta, Angelo Liguori, Arno Wacker A novel method for securing critical infrastructures by detecting hidden flows of data. Search on Bibsonomy CNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mustafa Aydin, Nazife Baykal Feature extraction and classification phishing websites based on URL. Search on Bibsonomy CNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Aida Calvino, Sara Ricci, Josep Domingo-Ferrer Privacy-preserving distributed statistical computation to a semi-honest multi-cloud. Search on Bibsonomy CNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Cornelius Saiki, Arsenia Chorti A novel physical layer authenticated encryption protocol exploiting shared randomness. Search on Bibsonomy CNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Sebastian Seeber, Lars Stiemert, Gabi Dreo Rodosek Towards an SDN-enabled IDS environment. Search on Bibsonomy CNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Xingliang Yuan, Xinyu Wang 0007, Yilei Chu, Cong Wang 0001, Chen Qian 0001 Towards a scalable, private, and searchable key-value store. Search on Bibsonomy CNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Quang Hieu Vu, Maurizio Colombo, Rasool Asal, Ali Sajjad, Fadi Ali El-Moussa, Theo Dimitrakos Secure Cloud Storage: A framework for Data Protection as a Service in the multi-cloud environment. Search on Bibsonomy CNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Onur Günlü, Gerhard Kramer, Maciej Skorski Privacy and secrecy with multiple measurements of physical and biometric identifiers. Search on Bibsonomy CNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Waqas A. Latif, Chiu C. Tan 0001 SmartArgos: Improving mobile surveillance systems with software defined networks. Search on Bibsonomy CNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Majid Gerami, Ming Xiao 0001, Somayeh Salimi, Mikael Skoglund Secure partial repair in wireless caching networks with broadcast channels. Search on Bibsonomy CNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jan-Ole Malchow, Volker Roth 0002 CryptID - distributed identity management infrastructure. Search on Bibsonomy CNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #600 of 873 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license