default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 47 matches
- 2021
- Uche C. Agwi, Martins E. Irhebhude, Francisca Nonyelum Ogwueleka:
Video surveillance in examination monitoring. Secur. Priv. 4(2) (2021) - Humza Ahmad, Laszlo Erdodi:
Overview of phishing landscape and homographs in Arabic domain names. Secur. Priv. 4(4) (2021) - Mahdi Ajdani, Hamid Reza Ghaffary:
Introduced a new method for enhancement of intrusion detection with random forest and PSO algorithm. Secur. Priv. 4(2) (2021) - Reem Alotaibi, Tahani Alnazzawi, Nermin Hamza:
A new location-based privacy protection algorithm with deep learning. Secur. Priv. 4(1) (2021) - Yehia Ibrahim Alzoubi, Valmira H. Osmanaj, Ashraf Jaradat, Ahmad Salah Al-Ahmad:
Fog computing security and privacy for the Internet of Thing applications: State-of-the-art. Secur. Priv. 4(2) (2021) - Moses Ashawa, Sarah Morris:
Android Permission Classifier: a deep learning algorithmic framework based on protection and threat levels. Secur. Priv. 4(5) (2021) - Aditya Bahl, Aastha Sharma, Muhammad Rizwan Asghar:
Vulnerability disclosure and cybersecurity awareness campaigns on twitter during COVID-19. Secur. Priv. 4(6) (2021) - Ilija Basicevic, Nikola Blazic, Stanislav Ocovaj:
On the use of generalized entropy formulas in detection of denial-of-service attacks. Secur. Priv. 4(1) (2021) - Chukhu Chunka, Rajat Subhra Goswami, Subhasish Banerjee:
An efficient mechanism to generate dynamic keys based on genetic algorithm. Secur. Priv. 4(5) (2021) - Ricardo M. Czekster, Charles Morisset, John A. Clark, Sadegh Soudjani, Charalampos Patsios, Peter Davison:
Systematic review of features for co-simulating security incidents in Cyber-Physical Systems. Secur. Priv. 4(3) (2021) - Kamrul Faisal:
Balancing between Right to Be Forgotten and Right to Freedom of Expression in Spent Criminal Convictions. Secur. Priv. 4(4) (2021) - Saeed Banaeian Far, Azadeh Imani Rad:
Distributed auditing protocol for blockchain-based transactions using a distributed signature. Secur. Priv. 4(3) (2021) - Rui Fu, Xinyu Li:
Malicious attacks on the web and crawling of information data by Python technology. Secur. Priv. 4(5) (2021) - Fatemeh Ghiyamipour:
Secure graphical password based on cued click points using fuzzy logic. Secur. Priv. 4(2) (2021) - Cynara Justine, Rendhir R. Prasad, Ciza Thomas:
Game theoretical analysis of usable security and privacy. Secur. Priv. 4(5) (2021) - Marriette Katarahweire, Engineer Bainomugisha, Khalid A. Mughal, John Ngubiri:
Form-based security in mobile health data collection systems. Secur. Priv. 4(3) (2021) - Victor R. Kebande, Nickson M. Karie, Kim-Kwang Raymond Choo, Sadi Alawadi:
Digital forensic readiness intelligence crime repository. Secur. Priv. 4(3) (2021) - Shivansh Kumar, Ruhul Amin:
Mitigating distributed denial of service attack: Blockchain and software-defined networking based approach, network model with future research challenges. Secur. Priv. 4(4) (2021) - Shivansh Kumar, Aman Kumar Bharti, Ruhul Amin:
Decentralized secure storage of medical records using Blockchain and IPFS: A comparative analysis with future directions. Secur. Priv. 4(5) (2021) - Zhijun Li, Xuedong Jiang:
Detection and defense of network virus using data mining technology. Secur. Priv. 4(6) (2021) - Fei Liu, Hongyan Gao, Ze-Gang Wei:
Research on the game of network security attack-defense confrontation through the optimal defense strategy. Secur. Priv. 4(1) (2021) - Sheunesu M. Makura, H. S. Venter, Victor R. Kebande, Nickson M. Karie, Richard Adeyemi Ikuesan, Sadi Alawadi:
Digital forensic readiness in operational cloud leveraging ISO/IEC 27043 guidelines on security monitoring. Secur. Priv. 4(3) (2021) - Dhaneshwar Mardi, Surbhi Tanwar, Jaydeep Howlader:
Multiparty protocol that usually shuffles. Secur. Priv. 4(6) (2021) - Kanos Matyokurehwa, Norman Rudhumbu, Cross Gombiro, Chiedza Mlambo:
Cybersecurity awareness in Zimbabwean universities: Perspectives from the students. Secur. Priv. 4(2) (2021) - Nissa Mehibel, M'hamed Hamadouche:
Authenticated secret session key using elliptic curve digital signature algorithm. Secur. Priv. 4(2) (2021) - Suat Mercan, Mumin Cebe, Ramazan Savas Aygün, Kemal Akkaya, Elijah Toussaint, Dominik Danko:
Blockchain-based video forensics and integrity verification framework for wireless Internet-of-Things devices. Secur. Priv. 4(2) (2021) - Sudip Misra, Sumit Goswami, Chaynika Taneja, Pushpendu Kar:
Heterogeneous polydentate mobile chelating node to detect breach in surveillance sensor network. Secur. Priv. 4(6) (2021) - Kamrun Nahar, Asif Qumer Gill, Terry Roach:
Developing an access control management metamodel for secure digital enterprise architecture modeling. Secur. Priv. 4(4) (2021) - Oladayo Olufemi Olakanmi, Adedamola Dada:
An efficient point-to-point security solution for multihop routing in wireless sensor networks. Secur. Priv. 4(5) (2021) - Oladayo Olufemi Olakanmi, Kehinde Oluwasesan Odeyemi:
A secure and collaborative data aggregation scheme for fine-grained data distribution and management in Internet of Things. Secur. Priv. 4(1) (2021)
skipping 17 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-01-16 13:55 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint