Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 27 matches
- 2013
- Jun Ai, Feng Zheng, Jingwei Shang:
Shortening the Cycle of Software Reliability Testing with Fuzzy Discrimination. SERE 2013: 21-29 - Ahmed Aleroud, George Karabatis:
Toward Zero-Day Attack Identification Using Linear Data Transformation Techniques. SERE 2013: 159-168 - Raymond Canzanese, Moshe Kam, Spiros Mancoridis:
Multi-channel Change-Point Malware Detection. SERE 2013: 70-79 - Cuiting Chen, Hans-Gerhard Gross, Andy Zaidman:
Improving Service Diagnosis through Increased Monitoring Granularity. SERE 2013: 129-138 - Borting Chen, Chien-Yu Lai, Yu-Lun Huang:
A Performance Mapping Model for Physical-to-Virtual Migration. SERE 2013: 90-98 - Kai Chen, Yingjun Zhang, Yifeng Lian:
Vulnerability-Based Backdoors: Threats from Two-step Trojans. SERE 2013: 169-177 - Liang Cheng, Yang Zhang, Zhihui Han:
Quantitatively Measure Access Control Mechanisms across Different Operating Systems. SERE 2013: 50-59 - Birhanu Eshete, Adolfo Villafiorita, Komminist Weldemariam, Mohammad Zulkernine:
Confeagle: Automated Analysis of Configuration Vulnerabilities in Web Applications. SERE 2013: 188-197 - Zebao Gao, Zhenyu Chen, Yang Feng, Bin Luo:
Mining Sequential Patterns of Predicates for Fault Localization and Understanding. SERE 2013: 109-118 - Chia-Wei Hsu, Fan-Syun Shih, Chi-Wei Wang, Shiuhpyng Winston Shieh:
Divergence Detector: A Fine-Grained Approach to Detecting VM-Awareness Malware. SERE 2013: 80-89 - Shih-Kun Huang, Han-Lin Lu, Wai-Meng Leong, Huan Liu:
CRAXweb: Automatic Web Application Testing and Attack Generation. SERE 2013: 208-217 - Christian Jung, Denis Feth, Christian Seise:
Context-Aware Policy Enforcement for Android. SERE 2013: 40-49 - Patrick Kamongi, Srujan Kotikela, Krishna Kavi, Mahadevan Gomathisankaran, Anoop Singhal:
VULCAN: Vulnerability Assessment Framework for Cloud Computing. SERE 2013: 218-226 - Toshio Kaneishi, Tadashi Dohi:
Software Reliability Modeling and Evaluation under Incomplete Knowledge on Fault Distribution. SERE 2013: 3-12 - Hsu-Fang Lai, Yu-Sung Wu, Yu-Jui Cheng:
Exploiting Neigborhood Similarity for Virtual Machine Migration over Wide-Area Network. SERE 2013: 149-158 - Qiuying Li, Lei Luo, Jun Ai:
The Determination Method for Software Reliability Qualitative Indices. SERE 2013: 237-245 - Hsiao-Ying Lin, Li-Ping Tung, Bao-Shuh Paul Lin:
An Empirical Study on Data Retrievability in Decentralized Erasure Code Based Distributed Storage Systems. SERE 2013: 30-39 - Ryan K. McLean, Mark D. Silvius, Kenneth M. Hopkinson:
Method for Evaluating k-Means Clustering for Increased Reliability in Cognitive Radio Networks. SERE 2013: 99-108 - Samir Ouchani, Otmane Aït Mohamed, Mourad Debbabi:
A Security Risk Assessment Framework for SysML Activity Diagrams. SERE 2013: 227-236 - Hossain Shahriar, Komminist Weldemariam, Thibaud Lutellier, Mohammad Zulkernine:
A Model-Based Detection of Vulnerable and Malicious Browser Extensions. SERE 2013: 198-207 - Angelos Stavrou:
Programming on Android: Best Practices for Security and Reliability. SERE 2013: 1-2 - Yin-Chang Sung, Michael Cheng Yi Cho, Chi-Wei Wang, Chia-Wei Hsu, Shiuhpyng Winston Shieh:
Light-Weight CSRF Protection by Labeling User-Created Contents. SERE 2013: 60-69 - Manghui Tu, Liangliang Xiao, Dianxiang Xu:
Maximizing the Availability of Replicated Services in Widely Distributed Systems Considering Network Availability. SERE 2013: 178-187 - Pingjian Wang, Lei Wang, Ji Xiang, Peng Liu, Neng Gao, Jiwu Jing:
MJBlocker: A Lightweight and Run-Time Malicious JavaScript Extensions Blocker. SERE 2013: 119-128 - Shunkun Yang, Minyan Lu, Lin Ge:
Bayesian Network Based Software Reliability Prediction by Dynamic Simulation. SERE 2013: 13-20 - Yanjun Zuo:
Moving and Relocating: A Logical Framework of Service Migration for Software System Survivability. SERE 2013: 139-148 - IEEE 7th International Conference on Software Security and Reliability, SERE 2013, Gaithersburg, MD, USA, June 18-20, 2013. IEEE 2013, ISBN 978-1-4799-0406-8 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-08-07 07:14 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint