The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "TrustCom"( http://dblp.L3S.de/Venues/TrustCom )

URL (DBLP): http://dblp.uni-trier.de/db/conf/trustcom

Publication years (Num. hits)
2011 (259) 2012 (292) 2014 (131) 2020 (265) 2021 (213) 2022 (220)
Publication types (Num. hits)
inproceedings(1374) proceedings(6)
Venues (Conferences, Journals, ...)
TrustCom(1380)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 1380 publication records. Showing 1380 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Aakanksha Sharma, Venki Balasubramanian, Alireza Jolfaei Security Challenges and Solutions for 5G HetNet. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Wanrong Zhao, Hossain Shahriar, Victor Clincy, Md. Zakirul Alam Bhuiyan Security and Privacy Analysis of mhealth Application: A Case Study. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Muhammad Shadi Hajar, M. Omar Al-Kadri, Harsha K. Kalutarage LTMS: A Lightweight Trust Management System for Wireless Medical Sensor Networks. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Jordan Stobbs, Biju Issac 0001, Seibu Mary Jacob Phishing Web Page Detection Using Optimised Machine Learning. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Xiaomei Liu, Xin Tang Image Authentication using QR Code Watermarking Approach based on Image Segmentation. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Hubert Kyeremateng-Boateng, Marvin A. Conn, Darsana Josyula, Manohar Mareboyana Prediction of Radio Frequency Spectrum Occupancy. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Yen-Ting Lee, Tao Ban, Tzu-Ling Wan, Shin-Ming Cheng, Ryoichi Isawa, Takeshi Takahashi 0001, Daisuke Inoue Cross Platform IoT- Malware Family Classification based on Printable Strings. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Fariha Tasmin Jaigirdar, Carsten Rudolph, Chris Bain Prov-IoT: A Security-Aware IoT Provenance Model. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Przemyslaw Kubiak 0001, Miroslaw Kutylowski Preventing a Fork in a Blockchain - David Fighting Goliath. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Xiaoying Qiu, Guangda Li, Xuan Sun, Zhiguo Du Exploiting User Selection Algorithm for Securing Wireless Communication Networks. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Zhaoli Liu, Qindong Sun, Zhihai Yang, Kun Jiang 0001, Jinpei Yan Fined-grained Aspect Extraction from Online Reviews for Decision Support. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Zhongkai Tong, Ziyuan Zhu, Zhanpeng Wang, Limin Wang, Yusha Zhang, Yuxin Liu Cache side-channel attacks detection based on machine learning. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Markus Knecht, Burkhard Stiller SCUR: Smart Contracts with a Static Upper-bound on Resource Usage. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Syed W. Shah, Naeem Firdous Syed, Arash Shaghaghi, Adnan Anwar, Zubair A. Baig, Robin Doss Towards a Lightweight Continuous Authentication Protocol for Device-to-Device Communication. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Syed Ghazanfar Abbas, Muhammad Husnain, Ubaid Ullah Fayyaz, Farrukh Shahzad, Ghalib A. Shah, Kashif Zafar IoT-Sphere: A Framework To Secure IoT Devices From Becoming Attack Target And Attack Source. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Eric Klieme, Jonathan Wilke, Niklas van Dornick, Christoph Meinel FIDOnuous: A FIDO2/WebAuthn Extension to Support Continuous Web Authentication. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Dawei Wang, Xiao Chen 0003, Haiqin Wu, Ruozhou Yu, Yishi Zhao A Blockchain-based Vehicle-trust Management Framework Under a Crowdsourcing Environment. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Zhanpeng Wang, Ziyuan Zhu, Limin Wang, Zhongkai Tong, Chao Yan SCPORAM: a hardware support scheme for protecting memory access patterns. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Shin-Ying Huang, Tao Ban Monitoring Social Media for Vulnerability-Threat Prediction and Topic Analysis. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Haibo Chen 0005, Dalin Zhang 0004, Jinfu Chen 0001, Wei Lin, Dengzhou Shi, Zian Zhao An Automatic Vulnerability Classification System for IoT Softwares. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Vasileios Kouliaridis, Georgios Kambourakis, Tao Peng 0011 Feature importance in Android malware detection. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Yunan Zhang 0002, Aidong Xu, Yixin Jiang Scalable and Accurate Binary Search Method based on Simhash and Partial Trace. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Munir Geden, Kasper Rasmussen TRUVIN: Lightweight Detection of Data-Oriented Attacks Through Trusted Value Integrity. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Ning Zhang, Zhiqiang Lv, Yanlin Zhang, Haiyang Li, Yixin Zhang, Weiqing Huang Novel design of Hardware Trojan: A generic approach for defeating testability based detection. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Zhihao Zheng, Zhenfu Cao, Jiachen Shen Practical and Secure Circular Range Search on Private Spatial Data. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Syed Ghazanfar Abbas, Fabiha Hashmat, Ghalib A. Shah A Multi-Layer Industrial-IoT Attack Taxonomy: Layers, Dimensions, Techniques and Application. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Adnan Anwar, S. M. Abu Adnan Abir Measurement Unit Placement Against Injection Attacks for the Secured Operation of an IIoT-based Smart Grid. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Jack Hance, Jeremy Straub Use of Bash History Novelty Detection for Identification of Similar Source Attack Generation. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Amr Megahed, Qi Han 0002 Face2Face Manipulation Detection Based on Histogram of Oriented Gradients. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Rafael Belchior, Benedikt Putz, Günther Pernul, Miguel Correia 0001, André Vasconcelos 0001, Sérgio Guerreiro 0001 SSIBAC: Self-Sovereign Identity Based Access Control. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Chengqian Guo, Quanwei Cai 0001, Qiongxiao Wang, Jingqiang Lin Extending Registration and Authentication Processes of FIDO2 External Authenticator with QR Codes. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Giulio Zizzo, Chris Hankin, Sergio Maffeis, Kevin Jones Adversarial Attacks on Time-Series Intrusion Detection for Industrial Control Systems. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Qi Feng, Debiao He, Min Luo 0002, Zengxiang Li, Kim-Kwang Raymond Choo Practical Secure Two-Party EdDSA Signature Generation with Key Protection and Applications in Cryptocurrency. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Mingfu Xue, Zhiyu Wu, Can He, Jian Wang 0038, Weiqiang Liu 0001 Active DNN IP Protection: A Novel User Fingerprint Management and DNN Authorization Control Technique. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Tao Sun 0002, Jing Yang, Wenjie Zhong CPN Model Checking Method of Concurrent Software Based on State Space Pruning. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Minghui Li, Yang Li 0103, Liming Fang 0001 ELPPS: An Enhanced Location Privacy Preserving Scheme in Mobile Crowd-Sensing Network Based on Edge Computing. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Jiangchang Cheng, Yinglong Dai, Yao Yuan, Hongli Zhu A Simple Analysis of Multimodal Data Fusion. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Amjad Qashlan, Priyadarsi Nanda, Xiangjian He Security and Privacy Implementation in Smart Home: Attributes Based Access Control and Smart Contracts. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Yipeng Zhang, Zhonghao Sun, Liqun Yang, Zhoujun Li 0001, Qiang Zeng 0001, Yueying He, Xiaoming Zhang 0001 A11 Your PLCs Belong to Me: ICS Ransomware Is Realistic. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Dapeng Qu, Jiankun Zhang, Zhenhuan Hou, Ming Wan, Bo Dong A Trust Routing Scheme based on Identification of Non-complete Cooperative Nodes in Mobile Peer-to-Peer Networks. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Yuqing Pan, Xi Xiao, Guangwu Hu, Bin Zhang 0048, Qing Li 0006, Haitao Zheng 0002 ALBFL: A Novel Neural Ranking Model for Software Fault Localization via Combining Static and Dynamic Features. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Ronghai Yang, Jia Liu 0017, Liang Gu, Yurong Chen Search & Catch: Detecting Promotion Infection in the Underground through Search Engines. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Jinshan Shi, Ru Li 0004 Permission Token Segmentation Scheme based on Blockchain Access Control. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Min Li, Haroon Elahi, Tao Peng 0011, Fang Qi, Guojun Wang 0001 A Function-Centric Risk Assessment Approach for Android Applications. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Tianlin Huo, Wenhao Wang 0001, Pei Zhao, Yufeng Li, Tingting Wang, Mingshu Li 0001 TEADS: A Defense-aware Framework for Synthesizing Transient Execution Attacks. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Xiaohui Wu, Yeping He, Qiming Zhou, Hengtai Ma, Liang He, Wenhao Wang 0001, Liheng Chen Partial-SMT: Core-scheduling Protection Against SMT Contention-based Attacks. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Fan Yan, Jia Liu 0017, Liang Gu, Zelong Chen A Semi-Supervised Learning Scheme to Detect Unknown DGA Domain Names based on Graph Analysis. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Md. Atik Shahriar, Faisal Haque Bappy, A. K. M. Fakhrul Hossain, Dayamoy Datta Saikat, Md. Sadek Ferdous, Mohammad Jabed Morshed Chowdhury, Md. Zakirul Alam Bhuiyan Modelling Attacks in Blockchain Systems using Petri Nets. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Rohan Dahiya, Frank Jiang 0001, Robin Doss A Feedback-Driven Lightweight Reputation Scheme for IoV. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Eduardo Gomes, Igor Zavalyshyn, Nuno Santos 0001, João Silva, Axel Legay Flowverine: Leveraging Dataflow Programming for Building Privacy-Sensitive Android Applications. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Tran Phuong Thao, Hoang-Quoc Nguyen-Son, Rie Shigetomi Yamaguchi, Toshiyuki Nakata 0001 Boosting Homograph Attack Classification Using Ensemble Learning and N-gram Model. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Yuzong Hu, Futai Zou, Linsen Li, Ping Yi Traffic Classification of User Behaviors in Tor, I2P, ZeroNet, Freenet. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Lei Xu 0012, Lin Chen 0009, Zhimin Gao, Han-Yee Kim, Taeweon Suh, Weidong Shi FPGA based Blockchain System for Industrial IoT. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Haibo Chen 0005, Junzuo Chen, Jinfu Chen 0001, Shang Yin, Yiming Wu, Jiaping Xu An Automatic Vulnerability Scanner for Web Applications. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Tong Liu, Xiaochen Yuan Image Self-Recovery Based on Authentication Feature Extraction. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Wenjuan Li 0001, Weizhi Meng 0001, Hui Zhu Towards Collaborative Intrusion Detection Enhancement against Insider Attacks with Multi-Level Trust. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Lorena González-Manzano, Sergio Bernardez, José María de Fuentes SmartLED: Smartphone-based covert channels leveraging the notification LED. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Han Zhang, Ming Liu 0021, Zihan Yue, Zhi Xue, Yong Shi 0009, Xiangjian He A PHP and JSP Web Shell Detection System With Text Processing Based On Machine Learning. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Hoang Hai Nguyen, David M. Nicol Estimating Loss Due to Cyber-attack in the Presence of Uncertainty. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Shan Liang, Yuewu Wang, Lingguang Lei, Jiwu Jing, Quan Zhou SecureESFS: Sharing Android External Storage Files in A Securer Way. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Navoda Senavirathne, Vicenç Torra On the Role of Data Anonymization in Machine Learning Privacy. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Zhichao Wang, Yiwei Shan, Zhi Yang, Ruoyi Wang, Shuang Song Semantic redirection obfuscation: A control flow obfuscation based on Android Runtime. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Nour Moustafa, Mohiuddin Ahmed, Sherif Ahmed Data Analytics-enabled Intrusion Detection: Evaluations of ToN IoT Linux Datasets. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Zhicheng Song, Pushpendu Kar Name-Signature Lookup System: A Security Enhancement to Named Data Networking. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Manasi Mittal, Muhammad Rizwan Asghar, Arvind K. Tripathi Do My Emotions Influence What I Share? Analysing the Effects of Emotions on Privacy Leakage in Twitter. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Oleg Schell, Marcel Kneib VALID: Voltage-Based Lightweight Intrusion Detection for the Controller Area Network. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Li Jian, Fei Rong, Tang Yu A novel Q-Learning Algorithm Based on the Stochastic Environment Path Planning Problem. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Peilun Wu, Nour Moustafa, Shiyi Yang, Hui Guo Densely Connected Residual Network for Attack Recognition. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Meng Li, Qi Zhong, Leo Yu Zhang, Yajuan Du, Jun Zhang 0010, Yong Xiang 0001 Protecting the Intellectual Property of Deep Neural Networks with Watermarking: The Frequency Domain Approach. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Ting Su 0009, Jiahe Shi, Yongkang Tang, Shaoqing Li Golden-Chip-Free Hardware Trojan Detection Through Thermal Radiation Comparison in Vulnerable Areas. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Wen Huang 0002, Shijie Zhou, Tianqing Zhu, Yongjian Liao, Chunjiang Wu, Shilin Qiu Improving Laplace Mechanism of Differential Privacy by Personalized Sampling. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Andreas Aigner, Abdelmajid Khelil A Scoring System to efficiently measure Security in Cyber-Physical Systems. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Ren Yang, Xuebin Ma, Xiangyu Bai, Xiangdong Su Differential Privacy Images Protection Based on Generative Adversarial Network. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Hugo Sbaï, Jassim Happa, Michael Goldsmith, Samy Meftali Dataset Construction and Analysis of Screenshot Malware. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Yu Ding, Shupeng Wang, Jian Xing, Xiaoyu Zhang 0002, ZiSen Oi, Ge Fu, Qian Qiang, Haoliang Sun, Jianyu Zhang Malware Classification on Imbalanced Data through Self-Attention. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Guojun Wang 0001, Ryan K. L. Ko, Md. Zakirul Alam Bhuiyan, Yi Pan 0001 (eds.) 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Guangzhou, China, December 29, 2020 - January 1, 2021 Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Tiago Fernandes, Luis Dias, Miguel Correia 0001 C2BID: Cluster Change-Based Intrusion Detection. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Gerald Palfinger, Bernd Prünster, Dominik Julian Ziegler AndroTIME: Identifying Timing Side Channels in the Android API. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Tomoaki Mimoto, Shinsaku Kiyomoto, Koji Kitamura, Atsuko Miyaji A Practical Privacy-Preserving Algorithm for Document Data. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Enzo Tartaglione, Marco Grangetto A non-discriminatory approach to ethical deep learning. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Weizheng Wang, Huakun Huang, Lejun Zhang, Zhaoyang Han, Chen Qiu, Chunhua Su BlockSLAP: Blockchain-based Secure and Lightweight Authentication Protocol for Smart Grid. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Xuewei Feng, Dongxia Wang 0001, Zhechao Lin, Xiaohui Kuang, Gang Zhao Enhancing Randomization Entropy of x86-64 Code while Preserving Semantic Consistency. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Liu Liu 0008, Chao Chen 0015, Jun Zhang 0010, Olivier Y. de Vel, Yang Xiang 0001 Doc2vec-based Insider Threat Detection through Behaviour Analysis of Multi-source Security Logs. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Immanuel Kunz, Angelika Schneider, Christian Banse Privacy Smells: Detecting Privacy Problems in Cloud Architectures. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Jinfang Sheng, Yan Hu, Kerong Guan, Bin Wang 0017, Xiaoxia Pan, Wenjun Kang Robustness analysis and defence strategy of an interdependent networks model based on closeness centrality. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Tao Peng 0011, Jierong Liu, Jianer Chen, Guojun Wang 0001 A Privacy-Preserving Crowdsensing System with Muti-Blockchain. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Tianyi Zhang, Jian Wang 0038 Secure Outsourcing Algorithms of Modular Exponentiations in Edge Computing. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Alban Siffer, Pierre-Alain Fouque, Alexandre Termier, Christine Largouët Netspot: a simple Intrusion Detection System with statistical learning. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Xueying Han, Rongchao Yin, Zhigang Lu 0002, Bo Jiang, Yuling Liu, Song Liu, Chonghua Wang, Ning Li STIDM: A Spatial and Temporal Aware Intrusion Detection Model. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Wei Ren 0002 A Symmetric Uniform Formula and Sole Index Method for Sieving (Twin) Primes. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Hui Kang, Shengquan Chen, Lingfeng Lu, Chenkun Meng Research and Improvement of Community Discovery Algorithm Based on Spark for Large Scale Complicated Networks. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Yu Fu, Siming Tong, Xiangyu Guo, Liang Cheng 0004, Yang Zhang 0021, Dengguo Feng Improving the Effectiveness of Grey-box Fuzzing By Extracting Program Information. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Thomas Hupperich, Katharina Dassel On the Usefulness of User Nudging and Strength Indication Concerning Unlock Pattern Security. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Xiaonan Song, Aimin Yu, Haibo Yu, Shirun Liu, Xin Bai, Lijun Cai, Dan Meng Program Slice based Vulnerable Code Clone Detection. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Jingxiang Zeng, Xiaofan Nie, Liwei Chen, Jinfeng Li, Gewangzi Du, Gang Shi An Efficient Vulnerability Extrapolation Using Similarity of Graph Kernel of PDGs. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Zhujun Zhang, Dali Zhu, Wei Fan QPBFT: Practical Byzantine Fault Tolerance Consensus Algorithm Based on Quantified-role. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Luqi Zhu, Jin Wang 0009, Lianmin Shi, Jingya Zhou, Kejie Lu, Jianping Wang 0001 Secure Coded Matrix Multiplication against Cooperative Attack in Edge Computing. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Handong Cui, Tsz Hon Yuen Address-based Signature. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Zhiyu Xu, Lin Yang, Ziyuan Wang, Sheng Wen, Rob Hanson, Shiping Chen 0001, Yang Xiang 0001 BHDA - A Blockchain-Based Hierarchical Data Access Model for Financial Services. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Tao Zhang, Zelei Cheng, Yi Qin, Qiang Li, Lin Shi Deep Learning for Password Guessing and Password Strength Evaluation, A Survey. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #600 of 1380 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license