![](https://dblp.dagstuhl.de/img/logo.ua.320x120.png)
![](https://dblp.dagstuhl.de/img/dropdown.dark.16x16.png)
![](https://dblp.dagstuhl.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 21 matches
- 2019
- Wei Bai, Omer Akgul, Michelle L. Mazurek:
A Qualitative Investigation of Insecure Code Propagation from Online Forums. SecDev 2019: 34-48 - Long Cheng, Hans Liljestrand, Md. Salman Ahmed
, Thomas Nyman
, Trent Jaeger, N. Asokan
, Danfeng Yao
:
Exploitation Techniques and Defenses for Data-Oriented Attacks. SecDev 2019: 114-128 - Sharmin Afrose, Sazzadur Rahaman, Danfeng Yao
:
CryptoAPI-Bench: A Comprehensive Benchmark on Java Cryptographic API Misuses. SecDev 2019: 49-61 - Kinan Dak Albab
, Rawane Issa, Andrei Lapets
, Peter Flockhart, Lucy Qin, Ira Globus-Harris:
Tutorial: Deploying Secure Multi-Party Computation on the Web Using JIFF. SecDev 2019: 3 - Abdulrahman A. Alnaim:
Using Rules Engine in the Automation of System Security Review. SecDev 2019: 142 - Benjamin M. Brosgol, Claire Dross, Yannick Moy:
Tutorial: A Practical Introduction to Formal Development and Verification of High-Assurance Software with SPARK. SecDev 2019: 1-2 - Chien-An Chen:
With Great Abstraction Comes Great Responsibility: Sealing the Microservices Attack Surface. SecDev 2019: 144 - Raimil Cruz, Éric Tanter:
Polymorphic Relaxed Noninterference. SecDev 2019: 101-113 - Samuel Denard, Susan A. Mengel, Atila Ertas, Stephen Ekwaro-Osire
:
Development Cycle Estimation Modeling. SecDev 2019: 146 - Yongkui Han, Pankil Shah, Van Nguyen, Ling Ma, Richard Livingston:
OpenOSC: Open Source Object Size Checking Library With Built-in Metrics. SecDev 2019: 143 - Kyle Hogan, Hoda Maleki, Reza Rahaeimehr, Ran Canetti, Marten van Dijk
, Jason Hennessey, Mayank Varia, Haibin Zhang:
On the Universally Composable Security of OpenStack. SecDev 2019: 20-33 - Andrei Lapets
, Kinan Dak Albab
, Rawane Issa, Lucy Qin, Mayank Varia, Azer Bestavros, Frederick Jansen:
Role-Based Ecosystem for the Design, Development, and Deployment of Secure Multi-Party Data Analytics Applications. SecDev 2019: 129-140 - Kenneth L. McMillan, Lenore D. Zuck:
Compositional Testing of Internet Protocols. SecDev 2019: 161-174 - Vivek V. Menon, Gaurav Kolhe, Andrew G. Schmidt, Joshua S. Monson, Matthew French, Yinghua Hu
, Peter A. Beerel, Pierluigi Nuzzo:
System-Level Framework for Logic Obfuscation with Quantified Metrics for Evaluation. SecDev 2019: 89-100 - Abhishek Pathak, Kaarthik Sivakumar, Mazhar Haque, Prasanna Ganesan:
Multi-Cluster Visualization and Live Reporting of Static Analysis Security Testing (SAST) Warnings. SecDev 2019: 145 - Abhishek Pathak, Kaarthik Sivakumar, Jin Sheng, Anlu Yan, Mazhar Haque:
Effective Static Analysis Enforcement in Complex Cloud Native Dockerized Systems. SecDev 2019: 141 - Remo Schweizer, Stephan Neuhaus:
Downright: A Framework and Toolchain for Privilege Handling. SecDev 2019: 76-88 - Paul Syverson, Matthew Traudt:
Self-Authenticating Traditional Domain Names. SecDev 2019: 147-160 - Nicola Tuveri
, Billy Bob Brumley
:
Start Your ENGINEs: Dynamically Loadable Contemporary Crypto. SecDev 2019: 4-19 - Tuba Yavuz:
Detecting Callback Related Deep Vulnerabilities in Linux Device Drivers. SecDev 2019: 62-75 - 2019 IEEE Cybersecurity Development, SecDev 2019, Tysons Corner, VA, USA, September 23-25, 2019. IEEE 2019, ISBN 978-1-5386-7289-1 [contents]
loading more results
failed to load more results, please try again later
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-28 18:57 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint