首页
OALib 期刊
快速投稿通道
我的图书馆
常见问题
关于我们
关注我们+
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
LinkedIn (OALib Group)
LinkedIn (OALib Company Page)
Facebook
Twitter
全部
标题
作者
关键词
摘要
OALib Journal期刊
ISSN: 2333-9721
费用:99美元
投递稿件
为什么选择我们?
>>
- 开源期刊
- 同行审议
- 快速出刊
- 终身存储
- 免费检索
- 免费推广
- 更多...
- 搜索引擎
Computer Science
ISSN Print:
ISSN Online:
主页:
http://arxiv.org/corr
分享:
Go
The All-Seeing Eye: A Massive-Multi-Sensor Zero-Configuration Intrusion Detection System for Web Applications
Christoph Pohl
,
Hans-Joachim Hof
Fighting Spam by Breaking the Econonmy of Advertisment by Unsolicited Emails
Alexander Schmidtke
,
Hans-Joachim Hof
A case study in almost-perfect security for unconditionally secure communication
Esteban Landerreche
,
David Fernández-Duque
Asymmetric Lee Distance Codes for DNA-Based Storage
Ryan Gabrys
,
Han Mao Kiah
,
Olgica Milenkovic
A Strategy for Power System Stability Improvement via Controlled Charge/Discharge of Plug-in Electric Vehicles
Andrej Gajduk
,
Vladimir Zdraveski
,
Lasko Basnarkov
,
Mirko Todorovski
,
Ljupco Kocarev
Power Systems Without Fuel
Joshua Adam Taylor
,
Sairaj V. Dhople
,
Duncan S. Callaway
On-line direct data driven controller design approach with automatic update for some of the tuning parameters
Marko Tanaskovic
,
Lorenzo Fagiano
,
Carlo Novara
,
Manfred Morari
Secure Degrees of Freedom of One-hop Wireless Networks with No Eavesdropper CSIT
Pritam Mukherjee
,
Jianwei Xie
,
Sennur Ulukus
PALPAS - PAsswordLess PAssword Synchronization
Moritz Horsch
,
Andreas Hülsing
,
Johannes Buchmann
Dexteroid: Detecting Malicious Behaviors in Android Apps Using Reverse-Engineered Life Cycle Models
Mohsin Junaid
,
Donggang Liu
,
David Kung
Towards Forgery-Resistant Touch-based Biometric Authentication on Mobile Devices
Neil Zhenqiang Gong
,
Mathias Payer
,
Reza Moazzezi
,
Mario Frank
Combinatorial Characterizations of Algebraic Manipulation Detection Codes Involving Generalized Difference Families
Maura B. Paterson
,
Douglas R. Stinson
Reuse It Or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values
Benjamin Mood
,
Debayan Gupta
,
Kevin Butler
,
Joan Feigenbaum
Designing a Global Authentication Infrastructure
Stephanos Matsumoto
,
Raphael M. Reischuk
,
Pawel Szalachowski
,
Tiffany Hyun-Jin Kim
,
Adrian Perrig
Private reputation retrieval in public - a privacy-aware announcement scheme for VANETs
Liqun Chen
,
Qin Li
,
Keith M. Martin
,
Siaw-Lynn Ng
DCLfix: A Recommendation System for Repairing Architectural Violations
Ricardo Terra
,
Marco Tulio Valente
,
Roberto Bigonha
,
Krzysztof Czarnecki
Survey Results on Threats To External Validity, Generalizability Concerns, Data Sharing and University-Industry Collaboration in Mining Software Repository (MSR) Research
Ashish Sureka
,
Ambika Tripathi
,
Savita Dabral
Benchmarking Machine Learning Technologies for Software Defect Detection
Saiqa Aleem
,
Luiz Fernando Capretz
,
Faheem Ahmed
Approaches for Software Verification of an Emergency Recovery System for Micro Air Vehicles
Martin Becker
,
Markus Neumair
,
Alexander S?hn
,
Samarjit Chakraborty
Recovering Residual Forensic Data from Smartphone Interactions with Cloud Storage Providers
George Grispos
,
William Bradley Glisson
,
Tim Storer
Polynomial Expressions of Carries in p-ary Arithmetics
Shizuo Kaji
,
Toshiaki Maeno
,
Koji Nuida
,
Yasuhide Numata
Notes on Rainbow Distinguished Point Method
Wenhao Wang
PDF Steganography based on Chinese Remainder Theorem
Rene Ndoundam
,
Stephane Gael Raymond Ekodeck
Experimental Study of DIGIPASS GO3 and the Security of Authentication
Igor Semaev
Towards a New Paradigm for Privacy and Security in Cloud Services
Thomas Loruenser
,
Charles Bastos Rodriguez
,
Denise Demirel
,
Simone Fischer-Huebner
,
Thomas Gross
,
Thomas Langer
,
Mathieu des Noes
,
Henrich C. Poehls
,
Boris Rozenberg
,
Daniel Slamanig
Indistinguishability and semantic security for quantum encryption scheme
Chong Xiang
,
Li Yang
On the Security of MTA-OTIBASs (Multiple-TA One-Time Identity-Based Aggregate Signatures)
Lei Zhang
,
Qianhong Wu
,
Josep Domingo-Ferrer
,
Bo Qin
,
Chuanyan Hu
Buffer overflow vulnerabilities in CUDA: a preliminary analysis
Andrea Miele
On Making Emerging Trusted Execution Environments Accessible to Developers
Thomas Nyman
,
Brian McGillion
,
N. Asokan
Distribution of elliptic twins over fixed finite fields: Numerical results
David Leon Gil
Performance assessment and design of finite length LDPC codes for the Gaussian wiretap channel
Marco Baldi
,
Giacomo Ricciutelli
,
Nicola Maturo
,
Franco Chiaraluce
Generalized Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange system using arbitrary resistors
Gergely Vadai
,
Robert Mingesz
,
Zoltan Gingl
Malicious Behavior Detection using Windows Audit Logs
Konstantin Berlin
,
David Slater
,
Joshua Saxe
Test Set Diameter: Quantifying the Diversity of Sets of Test Cases
Robert Feldt
,
Simon Poulding
,
David Clark
,
Shin Yoo
Towards Enhanced Usability of IT Security Mechanisms - How to Design Usable IT Security Mechanisms Using the Example of Email Encryption
Hans-Joachim Hof
JExtract: An Eclipse Plug-in for Recommending Automated Extract Method Refactorings
Danilo Silva
,
Ricardo Terra
,
Marco Tulio Valente
Entropy Based Detection And Behavioral Analysis Of Hybrid Covert Channeling Secured Communication
Anjan K
,
Srinath N K
,
Jibi Abraham
Practical Solutions For Format-Preserving Encryption
Mor Weiss
,
Boris Rozenberg
,
Muhammad Barham
Genuine onion: Simple, Fast, Flexible, and Cheap Website Authentication
Paul Syverson
,
Griffin Boyce
Ciberseguridad Inteligente
Juan Manuel R. Mosso
Stickler: Defending Against Malicious CDNs in an Unmodified Browser
Amit Levy
,
Henry Corrigan-Gibbs
,
Dan Boneh
Open-TEE - An Open Virtual Trusted Execution Environment
Brian McGillion
,
Tanel Dettenborn
,
Thomas Nyman
,
N. Asokan
User-Centric IT Security - How to Design Usable Security Mechanisms
Hans-Joachim Hof
Formally Proved Security of Assembly Code Against Power Analysis: A Case Study on Balanced Logic
Pablo Rauzy
,
Sylvain Guilley
,
Zakaria Najm
Full-Duplex vs. Half-Duplex Secret-Key Generation
Hendrik Vogt
,
Aydin Sezgin
Secure Communication Using Electronic Identity Cards for Voice over IP Communication, Home Energy Management, and eMobility
Rainer Falk
,
Steffen Fries
,
Hans-Joachim Hof
Toward Simulation-free Estimation of Critical Clearing Time
Thanh Long Vu
,
Surour Al Araifi
,
Mohamed Elmoursi
,
Konstantin Turitsyn
Analytic MMSE Bounds in Linear Dynamic Systems with Gaussian Mixture Noise Statistics
Leila Pishdad
,
Fabrice Labeau
Direct Adaptive Controller for Uncertain MIMO Dynamic Systems with Time-varying Delay and Dead-zone Inputs
Zhijun Li
,
Ziting Chen
,
Jun Fu
,
Changyin Sun
Vulnerability Analysis and Consequences of False Data Injection Attack on Power System State Estimation
Jingwen Liang
,
Lalitha Sankar
,
Oliver Kosut
Go