default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 18 matches
- 2011
- Sergey Butakov, Craig Barber, Vadim Diagilev, Alexey Mikhailov:
Architecture of Plagiarism Detection Service that Does Not Violate Intellectual Property of the Student. WOSIS 2011: 123-131 - Jaime Devesa, Xabier Cantero, Gonzalo Álvarez Marañón, Pablo García Bringas:
An efficient Security Solution for Dealing with Shortened URL Analysis. WOSIS 2011: 70-79 - Jérôme Dossogne, Stephane Fernandes Medeiros:
Enhancing Cryptographic Code against Side Channel Cryptanalysis with Aspects. WOSIS 2011: 39-48 - Waldo Rocha Flores, Mathias Ekstedt:
Information Security Governance Analysis Using Probabilistic Relational Models. WOSIS 2011: 142-150 - Alban Gabillon:
A Privacy Model for Social Networks. WOSIS 2011: 80-90 - Angel Gallego, Antonio Santos-Olmo, Luis Enrique Sánchez, Eduardo Fernández-Medina:
Automated Security Metrics in ISMSs to Discover the Level of Security of OSs and DBMSs. WOSIS 2011: 159-166 - Hannes Holm, Teodor Sommestad, Ulrik Franke, Mathias Ekstedt:
Expert Assessment on the Probability of Successful Remote Code Execution Attacks. WOSIS 2011: 49-58 - Ye Hou, Ping Gao, Richard Heeks:
The Influence of Institutional Forces on Employee Compliance with Information Security Policies. WOSIS 2011: 132-141 - Haibo Hu, Dan Yang, Hong Xiang, Li Fu, Chunxiao Ye, Ren Li:
Towards a Semantic Web-enabled Knowledge Base to Elicit Security Requirements for Misuse Cases. WOSIS 2011: 103-112 - HonGian Karen Lu:
Accessing Cloud through API in a More Secure and Usable Way. WOSIS 2011: 25-38 - Jezabel Molina-Gil, Pino Caballero-Gil, Cándido Caballero-Gil:
Enhancing Cooperation in Wireless Vehicular Networks. WOSIS 2011: 91-102 - Santiago Moral-García, Santiago Moral-Rubio, Eduardo Fernández-Medina:
Security Pattern Mining: Systematic Review and Proposal. WOSIS 2011: 13-24 - Roberto Ortiz, Santiago Moral-Rubio, Javier Garzás, Eduardo Fernández-Medina:
Towards a Pattern-based Security Methodology to Build Secure Information Systems. WOSIS 2011: 59-69 - Antonio Santos-Olmo, Luis Enrique Sánchez, Eduardo Fernández-Medina, Mario Piattini:
Desirable Characteristics for an ISMS oriented to SMEs. WOSIS 2011: 151-158 - Oscar Rebollo, Daniel Mellado, Eduardo Fernández-Medina:
A Comparative Review of Cloud Security Proposals with ISO/IEC 27002. WOSIS 2011: 3-12 - Dina Satybaldina, Altynbek Sharipbayev, Aigul Adamova:
Implementation of the Finite Automaton Public Key Cryptosystem on FPGA. WOSIS 2011: 167-173 - Min-Hua Shao, Yi-Ping Lee, Yen-Fen Hou, Cheng-Yi Ho:
A Trusted Routing Based Service Discovery Protocol with Backup Nodes in MANETs. WOSIS 2011: 115-122 - David Garcia Rosado, Luis Enrique Sánchez, Jan Jürjens:
WOSIS 2011 - Proceedings of the 8th International Workshop on Security in Information Systems, In conjunction with ICEIS 2011, Beijing, China, 8-9 June, 2011. SciTePress 2011, ISBN 978-989-8425-61-4 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-13 20:48 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint