![](https://dblp.dagstuhl.de/img/logo.ua.320x120.png)
![](https://dblp.dagstuhl.de/img/dropdown.dark.16x16.png)
![](https://dblp.dagstuhl.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 26 matches
- 2017
- Akash Agrawall, Shubh Maheshwari, Projit Bandyopadhyay, Venkatesh Choppella:
Modelling and Mitigation of Cross-Origin Request Attacks on Federated Identity Management Using Cross Origin Request Policy. ICISS 2017: 263-282 - Lyes Bayou, David Espes
, Nora Cuppens-Boulahia, Frédéric Cuppens:
wIDS: A Multilayer IDS for Wireless-Based SCADA Systems. ICISS 2017: 387-404 - Anis Bkakria, Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Jean-Louis Lanet:
Experimenting Similarity-Based Hijacking Attacks Detection and Response in Android Systems. ICISS 2017: 127-145 - Payal Chaudhari
, Manik Lal Das, Dipankar Dasgupta:
Privacy-Preserving Proxy Re-encryption with Fine-Grained Access Control. ICISS 2017: 88-103 - Moumita Das, Ansuman Banerjee, Nitesh K. Singh, Bhaskar Sardar:
Performance Attacks on Branch Predictors in Embedded Processors with SMT Support. ICISS 2017: 313-322 - Jay Dave, Shweta Saharan, Parvez Faruki, Vijay Laxmi
, Manoj Singh Gaur:
Secure Random Encryption for Deduplicated Storage. ICISS 2017: 164-176 - Varun Garg, Anish Mathuria:
On Automated Detection of Multi-Protocol Attacks Using AVISPA. ICISS 2017: 179-193 - Amrita Milind Honap, Wonjun Lee:
Hiding Kernel Level Rootkits Using Buffer Overflow and Return Oriented Programming. ICISS 2017: 107-126 - Mohsin Khan, Kimmo Järvinen, Philip Ginzboorg, Valtteri Niemi:
On De-synchronization of User Pseudonyms in Mobile Networks. ICISS 2017: 347-366 - Marco Lobe Kome, Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Vincent Frey:
DIscovery and REgistration Protocol - For Device and Person Identity Management in IoT. ICISS 2017: 243-262 - Dileep Kumar Koshley, Sapana Rani, Raju Halder
:
Towards Generalization of Privacy Policy Specification and Property-Based Information Leakage. ICISS 2017: 68-87 - Mahender Kumar, Chittaranjan Padmanabha Katti, Prem Chandra Saxena:
A Secure Anonymous E-Voting System Using Identity-Based Blind Signature Scheme. ICISS 2017: 29-49 - Vineet Kumar
, Aneek Roy, Sourya Sengupta, Sourav Sen Gupta:
Parallelized Common Factor Attack on RSA. ICISS 2017: 303-312 - Luigi V. Mancini, Andrea Monti, Agostino Panico:
SOF on Trial. The Technical and Legal Value of Battlefield Digital Forensics in Court. ICISS 2017: 9-26 - Mamoru Mimura
, Hidema Tanaka:
Heavy Log Reader: Learning the Context of Cyber Attacks Automatically with Paragraph Vector. ICISS 2017: 146-163 - Bold Munkhbaatar, Mamoru Mimura
, Hidema Tanaka:
Dark Domain Name Attack: A New Threat to Domain Name System. ICISS 2017: 405-414 - Sanjeet Kumar Nayak
, Somanath Tripathy:
SEMFS: Secure and Efficient Multi-keyword Fuzzy Search for Cloud Storage. ICISS 2017: 50-67 - Son Duc Nguyen, Mamoru Mimura
, Hidema Tanaka:
Leveraging Man-in-the-middle DoS Attack with Internal TCP Retransmissions in Virtual Network. ICISS 2017: 367-386 - Sandeep Rai, Rushang Dhanesha, Sreyans Nahata, Bernard Menezes:
Malicious Application Detection on Android Smartphones with Enhanced Static-Dynamic Analysis. ICISS 2017: 194-208 - Ajinkya Rajput, K. Gopinath:
Towards a More Secure Aadhaar. ICISS 2017: 283-300 - Routhu Srinivasa Rao
, Alwyn Roshan Pais
:
An Enhanced Blacklist Method to Detect Phishing Websites. ICISS 2017: 323-333 - Mayukh Rath, Shivali Agarwal, R. K. Shyamasundar:
Semi Supervised NLP Based Classification of Malware Documents. ICISS 2017: 334-344 - Ganesh Ram Santhanam, Benjamin Holland, Suresh C. Kothari, Nikhil Ranade:
Human-on-the-Loop Automation for Detecting Software Side-Channel Vulnerabilities. ICISS 2017: 209-230 - Nachiket Trivedi
, Manik Lal Das:
MalDetec: A Non-root Approach for Dynamic Malware Detection in Android. ICISS 2017: 231-240 - Stefano Zatti:
The Protection of Space Missions: Threats and Cyber Threats. ICISS 2017: 3-8 - Rudrapatna K. Shyamasundar, Virendra Singh, Jaideep Vaidya:
Information Systems Security - 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings. Lecture Notes in Computer Science 10717, Springer 2017, ISBN 978-3-319-72597-0 [contents]
loading more results
failed to load more results, please try again later
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-12 08:40 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint