default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 29 matches
- 2019
- Kunbolat Algazy, Rustem Biyashev, Nursulu Kapalova, Ludmila K. Babenko, Evgeniya Ishchukova, Saule Nyssanbayeva:
Investigation of the different implementations for the new cipher Qamal. SIN 2019: 8:1-8:8 - Abdul Ashraf, Ron Poet:
Is it better to choose seen or unseen distracters for graphical passwords. SIN 2019: 28:1-28:4 - Liudmila Babenko, Ilya Pisarev, Elena Popova:
Cryptographic protocols implementation security verification of the electronic voting system based on blind intermediaries. SIN 2019: 27:1-27:5 - Elena Basan, Oleg B. Makarevich, Evgeny Abramov, Dmitry Popov:
Analysis of the initial security of the robotics system. SIN 2019: 11:1-11:8 - Stanislav L. Belyakov, Alexander V. Bozhenyuk, Olesiya Kosenko, Evgeny Kosenko:
Evaluation of information reliability of complex systems using intuitionistic fuzzy graphs. SIN 2019: 20:1-20:4 - Stanislav L. Belyakov, Alexander V. Bozhenyuk, Marina Savelyeva, Marina Belyakova:
Safety analysis of the flow of cartographic data with defects. SIN 2019: 22:1-22:4 - Kirill Borisov, Irina Lubushkina, Sergey Panasenko:
Adaptation of an authentication protocol based on asymmetric keys for use in UAV C2 link security systems. SIN 2019: 21:1-21:4 - Denis Chernov, Alexey Sychugov:
Method of identifying and assessing of automated process control systems vulnerable elements. SIN 2019: 19:1-19:4 - Mohamed Amine Daoud, Youcef Dahmani, Kadda Mostefaoui:
IDS-DL: A description language for detection system in cloud computing. SIN 2019: 12:1-12:8 - Hope Nkiruka Eke, Andrei Petrovski, Hatem Ahriz:
The use of machine learning algorithms for detecting advanced persistent threats. SIN 2019: 5:1-5:8 - Evgeniya Ishchukova, Ekaterina Maro, Gennady Veselov:
Development of information security quest based on use of information and communication technologies. SIN 2019: 10:1-10:5 - Antonina Komarova, Anatoly Korobeynikov:
Combined authentication schemes with increasing level of resistance and methods for improving the security of electronic signature schemes: kombinirovannye skhemy autentifikacii s povyshennym urovnem stojkosti i metody povysheniya bezopasnosti skhem elektronnoj podpisi. SIN 2019: 3:1-3:8 - Igor V. Kotenko, Nikolay Komashinsky:
Combining spark and snort technologies for detection of network attacks and anomalies: assessment of performance for the big data framework. SIN 2019: 16:1-16:8 - Igor V. Kotenko, Igor Saenko, Yury Sineshchuk, Valery Kuvatov, Oleg Chudakov:
Optimization of the cyber security system structure based on accounting of the prevented damage cost. SIN 2019: 7:1-7:8 - Andrey V. Krasovsky, Ekaterina A. Maro:
Actual and historical state of side channel attacks theory. SIN 2019: 13:1-13:7 - Vasiliy M. Krundyshev, Maxim O. Kalinin:
Hybrid neural network framework for detection of cyber attacks at smart infrastructures. SIN 2019: 9:1-9:7 - Vitaly V. Lapshichyov, Oleg B. Makarevich:
TLS certificate as a sign of establishing a connection with the network Tor. SIN 2019: 14:1-14:6 - Dmitriy Levonevskiy, Fedor Novikov, Ludmila N. Fedorchenko, Irina Afanasieva:
Verification of internet protocol properties using cooperating automaton objects. SIN 2019: 25:1-25:4 - Karim Lounis, Mohammad Zulkernine:
Bad-token: denial of service attacks on WPA3. SIN 2019: 15:1-15:8 - Valeriy O. Osipyan, Kirill I. Litvinov, R. Kh. Bagdasaryan, E. P. Lukashchik, S. G. Sinitsa, A. S. Zhuk:
Development of information security system mathematical models by the solutions of the multigrade Diophantine equation systems. SIN 2019: 18:1-18:8 - Ekaterina Pakulova, Artem Ryndin, Oleg Basov:
Multi-path multimodal authentication system for remote information system. SIN 2019: 26:1-26:4 - Andrey N. Ragozin, V. F. Telezhkin, P. S. Podkorytov:
Forecasting complex multi-component time series within systems designed to detect anomalies in dataflows of industrial automated systems. SIN 2019: 2:1-2:5 - Anil K. Saini, Shreyansh Sharma, Palash Jain, Vikash Sharma, Arvind Kumar Khandelwal:
A secure priority vehicle movement based on blockchain technology in connected vehicles. SIN 2019: 17:1-17:8 - Alexey Nikolaevich Shniperov, Aleksandra Vladimirovna Prokofieva:
Steganalysis method of static JPEG images based on artificial immune system. SIN 2019: 4:1-4:7 - Alexander N. Sokolov, Andrey N. Ragozin, Ilya A. Pyatnitsky, Sergei K. Alabugin:
Applying of digital signal processing techniques to improve the performance of machine learning-based cyber attack detection in industrial control system. SIN 2019: 23:1-23:4 - Yaroslav Tarasov, Ekaterina Pakulova, Oleg Basov:
Modeling of low-rate DDoS-attacks. SIN 2019: 24:1-24:4 - Alexander N. Tselykh, Vladislav Vasilev, Larisa A. Tselykh:
Managing influence in complex systems to ensure safety of their operation. SIN 2019: 1:1-1:6 - Vyacheslav V. Zolotarev, Alina O. Povazhnyuk, Ekaterina A. Maro:
Liveness detection methods implementation to face identification reinforcement in gaming services. SIN 2019: 6:1-6:6 - Oleg B. Makarevich, Dmitry Popov, Ludmila K. Babenko, Pete Burnap, Atilla Elçi, Ron Poet, Jaideep Vaidya, Mehmet A. Orgun, Manoj Singh Gaur, Rajveer Singh Shekhawat:
Proceedings of the 12th International Conference on Security of Information and Networks, SIN 2019, Sochi, Russian Federation, September 12-15, 2019. ACM 2019, ISBN 978-1-4503-7242-8 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-10 12:52 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint