The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ARES"( http://dblp.L3S.de/Venues/ARES )

URL (DBLP): http://dblp.uni-trier.de/db/conf/IEEEares

Publication years (Num. hits)
2006 (141) 2007 (155) 2008 (203) 2009 (159) 2010 (109) 2011 (145) 2012 (83) 2013 (110) 2014 (79) 2015 (97) 2016 (108) 2017 (101) 2018 (130) 2019 (108) 2020 (117) 2021 (161) 2022 (159) 2023 (156)
Publication types (Num. hits)
inproceedings(2302) proceedings(19)
Venues (Conferences, Journals, ...)
ARES(2321)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 888 occurrences of 577 keywords

Results
Found 2321 publication records. Showing 2321 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Jorge Maestre Vidal, Marco Antonio Sotelo Monge Adversarial Communication Networks Modeling for Intrusion Detection Strengthened against Mimicry. Search on Bibsonomy ARES The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Mohamed A. Abo-Soliman, Marianne A. Azer Enterprise WLAN Security Flaws: Current Attacks and relative Mitigations. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Otto Hellwig, Gerald Quirchmayr, Walter Hötzendorfer, Christof Tschohl, Edith Huber, Franz Vock, Florian Nentwich, Bettina Pospisil, Matthias Gusenbauer, Gregor Langner A GDPR compliance module for supporting the exchange of information between CERTs. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1David McLuskie, X. Belleken X.509 Certificate Error Testing. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Armin Gerl, Dirk Pohl Critical Analysis of LPL according to Articles 12 - 14 of the GDPR. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Amira Kchaou, Ryma Abassi, Sihem Guemara El Fatmi Toward a Distributed Trust Management scheme for VANET. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Khanh-Huu-The Dam, Tayssir Touili Learning Malware Using Generalized Graph Kernels. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Steffen Wendzel Get Me Cited, Scotty!: Analysis of Citations in Covert Channel/Steganography Research. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Zongze Li, Matthew Davidson, Song Fu, Sean Blanchard, Michael Lang 0003 Converting Unstructured System Logs into Structured Event List for Anomaly Detection. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Laoise Luciano, Ibrahim M. Baggili, Mateusz Topor, Peter Casey, Frank Breitinger Digital Forensics in the Next Five Years. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Nafiseh Kahani, Mehran S. Fallah A Reactive Defense Against Bandwidth Attacks Using Learning Automata. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Thomas Lorünser, Henrich C. Pöhls, Leon Sell, Thomas Laenger CryptSDLC: Embedding Cryptographic Engineering into Secure Software Development Lifecycle. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Eef van Es, Harald P. E. Vranken, Arjen Hommersom Denial-of-Service Attacks on LoRaWAN. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Tianxiang Huang, Jianying Zhou 0001, Andrei Bytes ATG: An Attack Traffic Generation Tool for Security Testing of In-vehicle CAN Bus. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Farzaneh Karegar, John Sören Pettersson, Simone Fischer-Hübner Fingerprint Recognition on Mobile Devices: Widely Deployed, Rarely Understood. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Johannes Blömer, Nils Löken Cloud Architectures for Searchable Encryption. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Florian Wendland, Christian Banse Enhancing NFV Orchestration with Security Policies. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Christian Kraetzer, Jana Dittmann Steganography by synthesis: Can commonplace image manipulations like face morphing create plausible steganographic channels? Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Daniel Guija, Muhammad Shuaib Siddiqui Identity and Access Control for micro-services based 5G NFV platforms. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Paul J. E. Velthuis, Marcel Schäfer, Martin Steinebach New authentication concept using certificates for big data analytic tools. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Preetam Mukherjee 0001, Chandan Mazumdar Attack Difficulty Metric for Assessment of Network Security. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Asanka P. Sayakkara, Nhien-An Le-Khac, Mark Scanlon Accuracy Enhancement of Electromagnetic Side-Channel Attacks on Computer Monitors. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Syed Naqvi Challenges of Cryptocurrencies Forensics: A Case Study of Investigating, Evidencing and Prosecuting Organised Cybercriminals. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1 Proceedings of the 14th International Conference on Availability, Reliability and Security, ARES 2019, Canterbury, UK, August 26-29, 2019. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Radek Fujdiak, Petr Blazek, Konstantin Mikhaylov, Lukas Malina, Petr Mlynek, Jiri Misurec, Vojtech Blazek On Track of Sigfox Confidentiality with End-to-End Encryption. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Nurefsan Sertbas, Samet Aytaç, Orhan Ermis, Fatih Alagöz, Gürkan Gür Attribute Based Content Security and Caching in Information Centric IoT. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Pontus Johnson, Robert Lagerström, Mathias Ekstedt A Meta Language for Threat Modeling and Attack Simulations. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jorrit Kronjee, Arjen Hommersom, Harald P. E. Vranken Discovering software vulnerabilities using data-flow analysis and machine learning. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Gerardo Canfora, Andrea Di Sorbo, Enrico Emanuele, Sara Forootani, Corrado Aaron Visaggio A Nlp-based Solution to Prevent from Privacy Leaks in Social Network Posts. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jacob Taylor, Benjamin P. Turnbull, Gideon Creech Volatile Memory Forensics Acquisition Efficacy: A Comparative Study Towards Analysing Firmware-Based Rootkits. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Francis N. Nwebonyi, Rolando Martins, Manuel Eduardo Correia Reputation-Based Security System For Edge Computing. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ons Chikhaoui, Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi Towards a Privacy Preserving and Flexible Scheme for Assessing the Credibility and the Accuracy of Safety Messages Exchanged in VANETs. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Marius Musch, Martin Härterich, Martin Johns Towards an Automatic Generation of Low-Interaction Web Application Honeypots. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum, Mohsen Toorani Definitions for Plaintext-Existence Hiding in Cloud Storage. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Gustavo Gonzalez Granadillo, Jose Rubio-Hernan, Joaquín García-Alfaro A Pyramidal-based Model to Compute the Impact of Cyber Security Events. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Martin Husák, Nataliia Neshenko, Morteza Safaei Pour, Elias Bou-Harb, Pavel Celeda Assessing Internet-wide Cyber Situational Awareness of Critical Sectors. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Martin Serror, Martin Henze, Sacha Hack, Marko Schuba, Klaus Wehrle Towards In-Network Security for Smart Homes. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Priya Anand, Jungwoo Ryoo Architectural Solutions to Mitigate Security Vulnerabilities in Software Systems. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Adham Albakri, Eerke A. Boiten, Rogério de Lemos Risks of Sharing Cyber Incident Information. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Owen Lo, William J. Buchanan, Douglas Carson Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ferdaous Kamoun-Abid, Amel Meddeb-Makhlouf, Faouzi Zarai, Mohsen Guizani Distributed and Cooperative firewall/controller in cloud environments. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Kalle Rindell, Jukka Ruohonen, Sami Hyrynsalmi Surveying Secure Software Development Practices in Finland. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1François Bouchaud, Gilles Grimaud, Thomas Vantroys IoT Forensic: identification and classification of evidence in criminal investigations. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ghada Elbez, Hubert B. Keller, Veit Hagenmeyer A New Classification of Attacks against the Cyber-Physical Security of Smart Grids. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Andrea Tundis, Wojciech Mazurczyk, Max Mühlhäuser A review of network vulnerabilities scanning tools: types, capabilities and functioning. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Martin Steinebach, Andre Ester, Huajian Liu Channel Steganalysis. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Nikolaos Tsinganos, Georgios Sakellariou, Panagiotis E. Fouliras, Ioannis Mavridis Towards an Automated Recognition System for Chat-based Social Engineering Attacks in Enterprise Environments. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sarita Paudel, Paul Smith 0001, Tanja Zseby Stealthy Attacks on Smart Grid PMU State Estimation. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Vida Ahmadi Mehri, Dragos Ilie, Kurt Tutschku Privacy and DRM Requirements for Collaborative Development of AI Applications. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sebastian Wandelt, Xiaoqian Sun Robustness Estimation of Infrastructure Networks: On the Usage of Degree Centrality. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Martin Salfer, Claudia Eckert 0001 Attack Graph-Based Assessment of Exploitability Risks in Automotive On-Board Networks. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Olivier Blazy, Céline Chevalier Non-Interactive Key Exchange from Identity-Based Encryption. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Gregory Blanc, Nizar Kheir, Dhouha Ayed, Vincent Lefebvre, Edgardo Montes de Oca, Pascal Bisson Towards a 5G Security Architecture: Articulating Software-Defined Security and Security as a Service. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Aapo Kalliola, Shankar Lal, Kimmo Ahola, Ian Oliver, Yoan Miche, Tuomas Aura Security Wrapper Orchestration in Cloud. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Olivier Blazy, Céline Chevalier Spreading Alerts Quietly: New Insights from Theory and Practice. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1F. R. L. Silva, P. Jacob Mission-Centric Risk Assessment to Improve Cyber Situational Awareness. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Matteo E. Bonfanti Enhancing Cybersecurity by Safeguarding Information Privacy: The European Union and the Implementation of the "Data Protection by Design" Approach. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Anika Behrens What are Security Patterns?: A Formal Model for Security and Design of Software. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jamal Toutouh, Antonio Muñoz 0001, Sergio Nesmachnow Evolution Oriented Monitoring oriented to Security Properties for Cloud Applications. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jorge Maestre Vidal, Marco Antonio Sotelo Monge, Luis Javier García-Villalba Detecting Workload-based and Instantiation-based Economic Denial of Sustainability on 5G environments. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Simon Duque Antón, Suneetha Kanoor, Daniel Fraunholz, Hans Dieter Schotten Evaluation of Machine Learning-based Anomaly Detection Algorithms on an Industrial Modbus/TCP Data Set. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mathias Gschwandtner, Lukas Demetz, Matthias Gander, Ronald Maier Integrating Threat Intelligence to Enhance an Organization's Information Security Management. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Krzysztof Cabaj, Marcin Gregorczyk, Wojciech Mazurczyk, Piotr Nowakowski, Piotr Zórawski SDN-based Mitigation of Scanning Attacks for the 5G Internet of Radio Light System. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jana Komárková, Martin Husák, Martin Lastovicka, Daniel Tovarnák CRUSOE: Data Model for Cyber Situational Awareness. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Alberto Giaretta 0001, Michele De Donno, Nicola Dragoni Adding Salt to Pepper: A Structured Security Assessment over a Humanoid Robot. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Thomas Grafenauer, Sandra König, Stefan Rass, Stefan Schauer A Simulation Tool for Cascading Effects in Interdependent Critical Infrastructures. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Alberto Bartoli, Eric Medvet, Andrea De Lorenzo, Fabiano Tarlao (In)Secure Configuration Practices of WPA2 Enterprise Supplicants. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1David Berend, Shivam Bhasin, Bernhard Jungk There Goes Your PIN: Exploiting Smartphone Sensor Fusion Under Single and Cross User Setting. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Suneel Randhawa, Benjamin P. Turnbull, Joseph Yuen, Jonathan Dean Mission-Centric Automated Cyber Red Teaming. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Wilfried Mayer, Thomas Schreiber, Edgar R. Weippl A Framework for Monitoring Net Neutrality. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mohit Sewak, Sanjay K. Sahay, Hemant Rathore An investigation of a deep learning based malware detection system. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Marco Antonio Sotelo Monge, Jorge Maestre Vidal, Luis Javier García-Villalba A novel Self-Organizing Network solution towards Crypto-ransomware Mitigation. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1William Klieber, Lori Flynn, Will Snavely, Michael Zheng Practical Precise Taint-flow Static Analysis for Android App Sets. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Daniela Yabe, Caio Augusto Rodrigues dos Santos, Lucas Miranda Assuncao, Rivalino Matias Jr. Influence Factors on the Quality of User Experience in OS Reliability: A Qualitative Experimental Study. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Gokila Dorai, Shiva Houshmand, Ibrahim M. Baggili I Know What You Did Last Summer: Your Smart Home Internet of Things and Your iPhone Forensically Ratting You Out. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1York Yannikos, Annika Schäfer, Martin Steinebach Monitoring Product Sales in Darknet Shops. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Madiha H. Syed, Eduardo B. Fernández A reference architecture for the container ecosystem. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Venu Babu Thati, Jens Vankeirsbilck, Niels Penneman, Davy Pissoort, Jeroen Boydens CDFEDT: Comparison of Data Flow Error Detection Techniques in Embedded Systems: an Empirical Study. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Tanja Hanauer, Wolfgang Hommel, Stefan Metzger, Daniela Pöhn A Process Framework for Stakeholder-specific Visualization of Security Metrics. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Diana Silvestru, Karin Rainer, Mario Springnagel The AWID prevention approach: The generation of a holistic good practice model for prevention of radicalization in youth work. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Vincent Lefebvre, Gianni Santinelli, Tilo Müller, Johannes Götzfried Universal Trusted Execution Environments for Securing SDN/NFV Operations. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Robert Annessi, Joachim Fabini, Tanja Zseby To Trust or Not to Trust: Data Origin Authentication for Group Communication in 5G Networks. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Eduardo B. Fernández, Nobukazu Yoshioka, Hironori Washizaki Evaluating the degree of security of a system built using security patterns. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hussam Jasim Mohammed, Nathan L. Clarke, Fudong Li 0001 Evidence Identification in Heterogeneous Data Using Clustering. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Nina Gerber, Verena Zimmermann, Birgit Henhapl, Sinem Emeröz, Melanie Volkamer Finally Johnny Can Encrypt: But Does This Make Him Feel More Secure? Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Alexander Aigner FALKE-MC: A Neural Network Based Approach to Locate Cryptographic Functions in Machine Code. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sebastian Doerr, Mathias Fischer 0001, Sebastian Schrittwieser, Dominik Herrmann (eds.) Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, Hamburg, Germany, August 27-30, 2018 Search on Bibsonomy ARES The full citation details ... 2018 DBLP  BibTeX  RDF
1Jonas Plum, Andreas Dewald Forensic APFS File Recovery. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Routa Moussaileb, Benjamin Bouget, Aurélien Palisse, Hélène Le Bouder, Nora Cuppens, Jean-Louis Lanet Ransomware's Early Mitigation Mechanisms. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Martin Pirker, Patrick Kochberger, Stefan Schwandter Behavioural Comparison of Systems for Anomaly Detection. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Tomás Jánský, Tomás Cejka, Martin Zádník, Václav Bartos Augmented DDoS Mitigation with Reputation Scores. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Musa G. Samaila, João B. F. Sequeiros, Mário M. Freire, Pedro R. M. Inácio Security Threats and Possible Countermeasures in IoT Applications Covering Different Industry Domains. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Henri Ruotsalainen, Stepan Grebeniuk Towards Wireless Secret key Agreement with LoRa Physical Layer. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Alan J. Michaels Improved RNS-based PRNGs. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Kai Bemmann, Johannes Blömer, Jan Bobolz, Henrik Bröcher, Denis Diemert, Fabian Eidens, Lukas Eilers, Jan Haltermann, Jakob Juhnke, Burhan Otour, Laurens Porzenheim, Simon Pukrop, Erik Schilling, Michael Schlichtig, Marcel Stienemeier Fully-Featured Anonymous Credentials with Reputation System. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ulf Kargén, Nahid Shahmehri Speeding Up Bug Finding using Focused Fuzzing. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sébanjila Kevin Bukasa, Ronan Lashermes, Jean-Louis Lanet, Axel Legay Let's shock our IoT's heart: ARMv7-M under (fault) attacks. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Florian Huber Conceptualizing the digital TAKEDOWN platforms for supporting first-line-practitioners and law enforcement agencies. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1ElMouatez Billah Karbab, Mourad Debbabi ToGather: Automatic Investigation of Android Malware Cyber-Infrastructures. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Wojciech Mazurczyk, Steffen Wendzel, Krzysztof Cabaj Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
Displaying result #701 - #800 of 2321 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license