The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for DSC with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1988-2000 (15) 2001-2004 (18) 2005-2006 (22) 2007-2008 (33) 2009-2010 (20) 2011-2013 (20) 2014-2016 (133) 2017 (193) 2018 (213) 2019 (146) 2020 (75) 2021 (161) 2022 (145) 2023 (130) 2024 (5)
Publication types (Num. hits)
article(92) inproceedings(1223) proceedings(14)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 70 occurrences of 62 keywords

Results
Found 1330 publication records. Showing 1329 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
36Chi-Kuan Chiu, Hsiao-Hsien Chang, Ching-Hao Mao, Te-En Wei Counterfeit Fingerprint Detection of Outbound HTTP Traffic with Graph Edit Distance. Search on Bibsonomy DSC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
36Kota Sasa, Hiroaki Kikuchi Impact Assessment of Password Reset PRMitM Attack with Two-Factor Authentication. Search on Bibsonomy DSC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
36Mahmoud Ammar, Mahdi Washha, Gowri Sankar Ramachandran, Bruno Crispo SlimIoT: Scalable Lightweight Attestation Protocol for the Internet of Things. Search on Bibsonomy DSC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
36Rua-Huan Tsaih, Shin-Ying Huang, Mao-Ci Lian, Yennun Huang ANN Mechanism for Network Traffic Anomaly Detection in the Concept Drifting Environment. Search on Bibsonomy DSC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
36Albert Guan, Chin-Laung Lei Efficient Key Agreement Protocol for Smart Sensors. Search on Bibsonomy DSC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
36Sen Wang, J. Morris Chang Differentially Private Principal Component Analysis Over Horizontally Partitioned Data. Search on Bibsonomy DSC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
36Jihun Kim, Jeonghun Cho, Daejin Park Low-Power Command Protection Using SHA-CRC Inversion-Based Scrambling Technique for CAN-Integrated Automotive Controllers. Search on Bibsonomy DSC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
36Rui Policarpo Duarte, Horácio C. Neto Stochastic Processors on FPGAs to Compute Sensor Data Towards Fault-Tolerant IoT Systems. Search on Bibsonomy DSC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
36Alexander Yohan, Nai-Wei Lo An Over-the-Blockchain Firmware Update Framework for IoT Devices. Search on Bibsonomy DSC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
36Chung-Kuan Chen, Shang-Kuei Chen, Shiuhpyng Winston Shieh Mitigating Over-Permissible Transfer for Control Flow Integrity. Search on Bibsonomy DSC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
36Wei-Chieh Chao, Si-Chen Lin, Yi-Hsien Chen, Chin-Wei Tien, Chun-Ying Huang Design and Implement Binary Fuzzing Based on Libfuzzer. Search on Bibsonomy DSC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
36Mingbo Zhang, Saman A. Zonouz Use-After-Free Mitigation via Protected Heap Allocation. Search on Bibsonomy DSC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
36Wei-Ho Chung, Mu-En Wu, Yeong-Luh Ueng, Yi-Hsuan Su Forged Seal Imprint Identification Based on Regression Analysis on Imprint Borders and Metrics Comparisons. Search on Bibsonomy DSC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
36Yoshihiro Oyama Skipping Sleeps in Dynamic Analysis of Multithreaded Malware. Search on Bibsonomy DSC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
36Mohamed Elsabagh, Ryan Johnson 0002, Angelos Stavrou Resilient and Scalable Cloned App Detection Using Forced Execution and Compression Trees. Search on Bibsonomy DSC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
36Cheng-Hsu Lin, Chi-Yu Li 0001, Kuochen Wang Setting Malicious Flow Entries Against SDN Operations: Attacks and Countermeasures. Search on Bibsonomy DSC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
36Kai Qian, Reza M. Parizi, Dan Chia-Tien Lo OWASP Risk Analysis Driven Security Requirements Specification for Secure Android Mobile Software Development. Search on Bibsonomy DSC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
36Po-Wen Chi, Ming-Hung Wang A Lightweight Compound Defense Framework Against Injection Attacks in IIoT. Search on Bibsonomy DSC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
36Chi Ho Lau, Alan Kai-Hau Yeung, Fan Yan Blockchain-Based Authentication in IoT Networks. Search on Bibsonomy DSC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
36Matthew Hagan, Fahad Siddiqui 0001, Sakir Sezer, BooJoong Kang, Kieran McLaughlin Enforcing Policy-Based Security Models for Embedded SoCs within the Internet of Things. Search on Bibsonomy DSC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
36Caiqin Nong, Shaohua Tang, Yuanyuan Zhang A Privacy-Preserving Metro Passenger Flow Acquisition and Query System Based on Crowd-Sensing. Search on Bibsonomy DSC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
36Antonino Rullo, Elisa Bertino, Domenico Saccà PAST: Protocol-Adaptable Security Tool for Heterogeneous IoT Ecosystems. Search on Bibsonomy DSC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
36Mordechai Guri, Yosef A. Solewicz, Yuval Elovici MOSQUITO: Covert Ultrasonic Transmissions Between Two Air-Gapped Computers Using Speaker-to-Speaker Communication. Search on Bibsonomy DSC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
36Harpreet Kaur Dhaliwal, Chung-Horng Lung Load Balancing Using ECMP in Multi-Stage Clos Topology in a Datacenter. Search on Bibsonomy DSC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
36Ian Perry, Lutzu Li, Christopher Sweet, Shao-Hsuan Su, Fu-Yuan Cheng, Shanchieh Jay Yang, Ahmet Okutan Differentiating and Predicting Cyberattack Behaviors Using LSTM. Search on Bibsonomy DSC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
36Daniel Fleck, Angelos Stavrou, George Kesidis, Neda Nasiriani, Yuquan Shan, Takis Konstantopoulos Moving-Target Defense Against Botnet Reconnaissance and an Adversarial Coupon-Collection Model. Search on Bibsonomy DSC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
36Helei Cui, Cong Wang 0001, Yu Hua 0001, Yuefeng Du 0001, Xingliang Yuan A Bandwidth-Efficient Middleware for Encrypted Deduplication. Search on Bibsonomy DSC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
36Wu-Chuan Yang, Lien-Yuan Ting, Tzu-Chun Kuo On the Authentication of Certificateless RSA Public Key. Search on Bibsonomy DSC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
36Toshihiro Yamauchi, Yohei Akao, Ryota Yoshitani, Yuichi Nakamura 0005, Masaki Hashimoto Additional Kernel Observer to Prevent Privilege Escalation Attacks by Focusing on System Call Privilege Changes. Search on Bibsonomy DSC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
36Koichi Funaya, Samir Bajaj, Kumar Sharad, Alok Srivastava Optimizing the Sequence of Vulnerability Scanning Injections. Search on Bibsonomy DSC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
36Jonghyeon Park, Hyunsu Mun, Youngseok Lee 0002 Improving Tor Hidden Service Crawler Performance. Search on Bibsonomy DSC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
36Jia-Ning Luo, Ming-Hour Yang Offline Transferable E-Cash Mechanism. Search on Bibsonomy DSC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
36Chia-Min Lai, Bo-Ching Huang, Shin-Ying Huang, Ching-Hao Mao, Hahn-Ming Lee Detection of DNS Tunneling by Feature-Free Mechanism. Search on Bibsonomy DSC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
36Chih-Hung Wang An Identity-Based Fair Contract Signing Protocol Constructed by the Confirmation Signature. Search on Bibsonomy DSC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
36Tzung-Han Jeng, Yi-Ming Chen 0008, Chien-Chih Chen, Chuan-Chiang Huang, Kuo-Sen Chou CC-Tracker: Interaction Profiling Bipartite Graph Mining for Malicious Network Activity Detection. Search on Bibsonomy DSC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
36Chung-Kuan Chen, E.-Lin Ho, Shiuhpyng Winston Shieh DeepMemIntrospect: Recognizing Data Structures in Memory with Neural Networks. Search on Bibsonomy DSC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
36Ruei-Hau Hsu, Chun-I Fan, Tony Q. S. Quek, Jemin Lee CORE: Cooperative Encryption with its Applications to Controllable Security Services. Search on Bibsonomy DSC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
36Tien-Ho Chang, Jiunn-Wu Lin, Chia-Mei Chen, Gu Hsin Lai The Method of Capturing the Encrypted Password Packets of WPA & WPA2, Automatic, Semi-Automatic or Manual? Search on Bibsonomy DSC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
36 Second IEEE International Conference on Data Science in Cyberspace, DSC 2017, Shenzhen, China, June 26-29, 2017 Search on Bibsonomy DSC The full citation details ... 2017 DBLP  BibTeX  RDF
36 IEEE Conference on Dependable and Secure Computing, DSC 2017, Taipei, Taiwan, August 7-10, 2017 Search on Bibsonomy DSC The full citation details ... 2017 DBLP  BibTeX  RDF
36Zihan Liu, Wei Lu Fast Copy-Move Detection of Digital Audio. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Ronghuan Yu, Wei Xie, Lingda Wu, Hongxing Hao Research on Multi-resolution Isosurface Extraction Method for 3D Scalar Field. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Ping Zhang 0020, Honggang Hu Permutation-Based Tweakable On-line Cipher with Improved Security Guarantees. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Huaquan Hu, Lingda Wu, Ronghuan Yu Interactive Network Clustering Layout Method Based on Implicit Connection. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Kai Fan 0001, Qi Luo, Hui Li 0006, Yintang Yang Cloud-Based Lightweight RFID Mutual Authentication Protocol. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Hua Zhang, Fang Lou, Yunsheng Fu, Zhihong Tian A Conditional Probability Computation Method for Vulnerability Exploitation Based on CVSS. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Yundong Fan, Xiaoping Wu, Jiasheng Wang Multi-authority Attribute-Based Encryption Access Control Scheme with Hidden Policy and Constant Length Ciphertext for Cloud Storage. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Weijie Li, Guohong Liao, Yamin Wen, Zheng Gong SpongeMPH: A New Multivariate Polynomial Hash Function based on the Sponge Construction. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Ye Wang 0015, Yanchun Zhang, Bin Zhou 0004, Yan Jia 0001 Semi-Supervised Collective Matrix Factorization for Topic Detection and Document Clustering. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Chan Gao, Chung-Huang Yang File-Based Encryption with SM4. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Yuxiang Xie, Xidao Luan, Jingmeng He, Lili Zhang, Xin Zhang 0029, Chen Li A Movie Summary Generation System. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Zhongwen Zhao, Huanghuang Guo Visualization Study of High-Dimensional Data Classification Based on PCA-SVM. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Fenghua Li, Fangxin Xiong, Chao Li 0027, Lihua Yin, Guozhen Shi, Boxiu Tian SRAM: A State-Aware Risk Assessment Model for Intrusion Response. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Hui Yan, Junfeng Wang, Chensen Xia Research and Application of the Test Data Visualization. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Yaqing Fan, Zhenhua Liu 0001 Verifiable Attribute-Based Multi-keyword Search over Encrypted Cloud Data in Multi-owner Setting. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Dongqing Wang, Yueming Lu, Jiefu Gan An Information Security Evaluation Method Based on Entropy Theory and Improved TOPSIS. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Ping Zhang 0020, Honggang Hu, Xianjun Hu, Xiaolong Yang New Pseudorandom Number Generators from Block Ciphers. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Chunkai Zhang, Guoquan Wang, Ying Zhou, Jiayao Jiang A New Approach for Imbalanced Data Classification Based on Minimize Loss Learning. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Jiajia Zhang, Hong Liu Building Endgame Data set to Improve Opponent Modeling Approach. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Junfeng Tu, Yucong Duan Detecting Congestion and Detour of Taxi Trip via GPS Data. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Yingmei Wei, Xiaolei Du Two-Layer Network Visualization for Comprehensive Analysis. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Hao Zhou, Wei Zhang 0122, Fengqiong Wei, Yunfang Chen Analysis of Android Malware Family Characteristic Based on Isomorphism of Sensitive API Call Graph. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Dongfang Li, Zhaoguo Wang, Lixin Li, Zhihua Wang, Yucheng Wang, Yibo Xue FgDetector: Fine-Grained Android Malware Detection. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Eric Golinko, Thomas Sonderman, Xingquan Zhu 0001 CNFL: Categorical to Numerical Feature Learning for Clustering and Classification. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Jinlin Wang, Hongli Zhang 0001, Binxing Fang, Xing Wang, Lin Ye A Survey on Data Cleaning Methods in Cyberspace. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Hao Ge, Jinchao Huang 0001, Chong Di, Jianhua Li 0001, Shenghong Li 0001 Learning Automata Based Approach for Influence Maximization Problem on Social Networks. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Liang Liu 0011, Bin Chen 0003, Bo Qu, Lingnan He, Xiaogang Qiu Data Driven Modeling of Continuous Time Information Diffusion in Social Networks. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Yan Zhang, Chong Di, Zhuoran Han, Yichen Li, Shenghong Li 0001 An Adaptive Honeypot Deployment Algorithm Based on Learning Automata. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Chi Fei, Bin Liu 0016, Nenghai Yu Extracting Sift Keypoints in DCT Domain. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Chengsen Ru, Shasha Li 0001, Jintao Tang, Yi Gao, Ting Wang 0009 Open Relation Extraction Based on Core Dependency Phrase Clustering. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Yaqian Kang, Zhenhua Liu A Fully Secure Verifiable and Outsourced Decryption Ranked Searchable Encryption Scheme Supporting Synonym Query. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Lili Zhou, Jinna Lv, Bin Wu 0001 Social Network Construction of the Role Relation in Unstructured Data Based on Multi-view. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Zhikun Chen, Weizhong Qiang ISLUS: An Immediate and Safe Live Update System for C Program. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Weihao Li, Ben Niu 0001, Hui Li 0006 Privacy Preservation Strategy in Time-Sensitive LBSs. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Sheng Zhang 0022, Hui Wang 0030, Xin Zhang 0018, Jiajun Cheng, Pei Li 0001, Zhaoyun Ding Embedding-Based Feature Extraction Methods for Chinese Sentiment Classification. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Runhe Li, Dong Zheng 0001, Yinghui Zhang 0002, Haonan Su, Menglei Yang, Pengzhen Lang Attribute-Based Encryption with Multi-keyword Search. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Yue Miao, Changbing Tang, Jianfeng Lu 0002, Xiang Li 0010 Zero-Determinant Strategy for Cooperation Enforcement in Crowdsourcing. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Zhiguo Liu, Ni Zhang, Qiu Tang, Ningning Song, Zengming Yu, Hongbin Zhang Saving Energy on Processor Micro-Architecture Level for Big Data Stream Mobile Computing. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Liehuang Zhu, Cong Guo 0001, Zijian Zhang 0001, Wei Fu, Rixin Xu A Novel Contributory Cross-Domain Group Password-Based Authenticated Key Exchange Protocol with Adaptive Security. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Xin-long Song, Chung-Huang Yang Mobile Device Management System Based on AOSP and SELinux. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Lijuan Guo, Xuelian Li, Xiaolin Lv, Juntao Gao Anonymous Fair Exchange Protocol with a Semitrusted Third Party. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Ye Li, Zoe Lin Jiang, Xuan Wang 0002, Siu-Ming Yiu, Qing Liao 0001 Outsourced Privacy-Preserving C4.5 Algorithm over Arbitrarily Partitioned Databases. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Chunkai Zhang, Jianwei Guo, Junru Lu Research on Classification Method of High-Dimensional Class-Imbalanced Data Sets Based on SVM. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Jun Ren, Jinbo Xiong, Zhiqiang Yao, Rong Ma, Mingwei Lin DPLK-Means: A Novel Differential Privacy K-Means Mechanism. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Liangxuan Zhang, Hui Li 0006, Yinghui Zhang 0002, Fawad Khan Privacy-Preserving Attribute-Based Encryption Supporting Expressive Access Structures. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Chengxiang Liu, Wei Xiong Research on the Space-Based Integrated Information Network Evolution Model Visualization Methods Based on the Super Network Theory. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Wenxing Lu, Xiao Wei Spatio-temporal Distribution Pattern of Cable Car Passenger Flow in Panholidays: A Case Study of Huangshan Scenic Area. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Jiale Wang, Guohui Li A Multi-modal Hashing Learning Framework for Automatic Image Annotation. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Qisi Liu, Liudong Xing, Chaonan Wang Framework of Probabilistic Risk Assessment for Security and Reliability. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Jiantao Wang An Arithmetic View on Generating Necklaces. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Cuicui Su, Yongzhi Wang 0001, Yulong Shen, Ke Cheng, Jiawen Ma Improving Database Storage Usability with the Cloud-Based Architecture. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Ce Yang, Weiming Zhang 0001, Nenghai Yu Range Queries on Two Column Data. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Yang Sun, Wei Xiong Analysis of Network Attack and Defense Game with the Average Recovery Time as the Quantitative Indicators of the Payment Function. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Chao Yuan, Yueming Lu, Jiefu Gan Evaluating Network Equipment Information Security Based on D-S Evidence Theory and Principal Components Analysis. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Tinghai Pang, Lei Duan, Jesse Li-Ling, Guozhu Dong Mining Similarity-Aware Distinguishing Sequential Patterns from Biomedical Sequences. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Huang Neng Construction of High-Availability Bank System in Virtualized Environments. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Ruohan Cao, Yueming Lu On Study of Physical-Layer Attack Detection for Large Volumes of Data. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Rongchao Yin, Peng Li 0021, Bin Wang 0004 Sentiment Lexical-Augmented Convolutional Neural Networks for Sentiment Analysis. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Shudong Li, Zhou Yan, Xiaobo Wu, Aiping Li, Bin Zhou 0004 A Method of Emotional Analysis of Movie Based on Convolution Neural Network and Bi-directional LSTM RNN. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Fenghua Li, Zifu Li, Weili Han, Ting Wu 0001, Lihua Chen, Yunchuan Guo Cyberspace-Oriented Access Control: Model and Policies. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
Displaying result #801 - #900 of 1329 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license