The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for interception with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1968-1994 (15) 1995-1999 (19) 2000 (15) 2001-2002 (21) 2003 (21) 2004 (16) 2005 (19) 2006 (29) 2007 (23) 2008 (25) 2009 (28) 2010-2011 (31) 2012 (19) 2013 (25) 2014 (20) 2015 (19) 2016 (20) 2017 (15) 2018 (22) 2019 (32) 2020 (32) 2021 (26) 2022 (39) 2023 (38) 2024 (10)
Publication types (Num. hits)
article(230) book(1) incollection(2) inproceedings(340) phdthesis(6)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 182 occurrences of 148 keywords

Results
Found 579 publication records. Showing 579 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
129Hitesh Ballani, Paul Francis, Xinyang Zhang A study of prefix hijacking and interception in the internet. Search on Bibsonomy SIGCOMM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hijacking, routing, BGP, interception
120Leonard A. Rozendaal, Arthur J. van Soest Optical acceleration cancellation: a viable interception strategy? Search on Bibsonomy Biol. Cybern. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
107Jan Seedorf Lawful Interception in P2P-Based VoIP Systems. Search on Bibsonomy IPTComm The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
103Peter W. Battaglia, Paul R. Schrater, Daniel J. Kersten Auxiliary object knowledge influences visually-guided interception behavior. Search on Bibsonomy APGV The full citation details ... 2005 DBLP  DOI  BibTeX  RDF perceptual inference, virtual reality, bayes, interception
82Jessica Chen, Kun Wang Experiment on Embedding Interception Service into Java RMI. Search on Bibsonomy FIDJI The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Dynamic Proxy, CORBA, Reflection, Java RMI, Interceptors
78Faraz Kunwar, Felix Wong, Ridha Ben Mrad, Beno Benhabib Guidance-Based On-Line Robot Motion Planning for the Interception of Mobile Targets in Dynamic Environments. Search on Bibsonomy J. Intell. Robotic Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF moving-object interception, navigation-guidance, online trajectory planning, rendezvous-guidance, obstacle-avoidance
78Farhad Agah, Mehran Mehrandezh, Robert G. Fenton, Beno Benhabib On-Line Robotic Interception Planning Using a Rendezvous-Guidance Technique. Search on Bibsonomy J. Intell. Robotic Syst. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF moving-object interception, on-line trajectory planning, rendezvous guidance, visual servoing
78Jonathan M. Borg, Mehran Mehrandezh, Robert G. Fenton, Beno Benhabib Navigation-Guidance-Based Robotic Interception of Moving Objects in Industrial Settings. Search on Bibsonomy J. Intell. Robotic Syst. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF moving object interception, proportional navigation guidance, robot motion planning
60Steven R. Johnston Development of a Legal Framework for Intrusion Detection. Search on Bibsonomy RAID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Anti-terrorism law, criminal law, private communications, privacy, intrusion detection, wiretap, interception
52Javed I. Khan, Yihua He Embedded Data Indexing for Fast Stream Interception by Internet Appliances. Search on Bibsonomy Web Intelligence The full citation details ... 2003 DBLP  DOI  BibTeX  RDF stream interception, filtering, IPV6, network appliances
47Joshua Broadway, Benjamin P. Turnbull, Jill Slay Improving the Analysis of Lawfully Intercepted Network Packet Data Captured for Forensic Analysis. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF lawful interception, packet analysis, network, forensic computing
47Jiantao Kong, Karsten Schwan, Min Lee, Mustaque Ahamad Protectit: trusted distributed services operating on sensitive data. Search on Bibsonomy EuroSys The full citation details ... 2008 DBLP  DOI  BibTeX  RDF traffic interception, trusted data path, data protection
47Michael Rabinovich, Hua Wang DHTTP: an efficient and cache-friendly transfer protocol for the web. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF HTTP protocol, interception caching, internet, Internet, web performance
43Yarallah Koolivand, Omid Shoaei, Ali Fotowat-Ahmady, Ali Zahabi, Parviz Jabedar Maralani Nonlinearity Analysis in ISD CMOS LNA's Using Volterra Series. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF CMOS LNA, cascode, inductively source degenerated (ISD), intermodulation (IM), second order interception point (IIP2), third order interception point (IIP3), volterra kernels, volterra series, linearity, distortion
43Andres Rojas, Philip Branch, Grenville J. Armitage Predictive Lawful Interception in Mobile IPv6 Networks. Search on Bibsonomy ICON The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
43Thomas Sugar, Michael McBeath, Anthony Suluh, Keshav Mundhra Mobile robot interception using human navigational principles: Comparison of active versus passive tracking algorithms. Search on Bibsonomy Auton. Robots The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Perceptual principles, Visual servoing, Mobile robot navigation
43Zhen Liu, Jiaoying Shi, Hua Xiong, Aihong Qin Multi-stream Based Rendering Resource Interception and Reconstruction in D3DPR for High-Resolution Display. Search on Bibsonomy ICAT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
43Seongje Cho, Chulyean Chang, Joonmo Kim, Jongmoo Choi A Study on Monitoring and Protecting Computer System against Interception Threat. Search on Bibsonomy Human.Society@Internet 2003 The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
43Frieder Stolzenburg, Oliver Obst, Jan Murray Qualitative Velocity and Ball Interception. Search on Bibsonomy KI The full citation details ... 2002 DBLP  DOI  BibTeX  RDF multiagent systems, spatial reasoning, cognitive robotics
39Helen Balinsky, David Subirós Perez, Steven J. Simske System Call Interception Framework for Data Leak Prevention. Search on Bibsonomy EDOC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF data leak prevention, security, policy enforcement, system calls interception
39Chen-Liang Fang, Deron Liang, Fengyi Lin, Chien-Cheng Lin A Preliminary Study on Portable Interceptor Mechanism to SOAP. Search on Bibsonomy SNPD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Web Services, Portable, SOAP, Interceptor
39Chen-Liang Fang, Deron Liang, Fengyi Lin, Chien-Cheng Lin, William Cheng-Chung Chu A Portable Interceptor Mechanism on SOAP for Continuous Audit. Search on Bibsonomy APSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
39Shingo Miyazaki, Ikuko Kuroda, Kouichi Sakurai Toward Fair International Key Escrow. Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Key escrow/recovery system, Diffie-Hellman key distribution, Distributed Cryptography, Security policy, Trusted Third Party
35Zongyuan Sun, Jianying Yang Multi-missile interception for multi-targets: Dynamic situation assessment, target allocation and cooperative interception in groups. Search on Bibsonomy J. Frankl. Inst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
35Corentin Lavaud Reconfigurable systems for the interception of compromising sporadic signals. (Systèmes reconfigurables pour l'interception de signaux sporadiques compromettants). Search on Bibsonomy 2022   RDF
35Shangwei Niu, Dongxu Li, Haoran Ji Research on Mission Time Planning and Autonomous Interception Guidance Method for Low-Thrust Spacecraft in Long-Distance Interception. Search on Bibsonomy CACRE The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
35Charles Faure Analyse en réalité virtuelle de la coopération lors d'une interception de balle: interaction et interférence. (Analysis in virtual reality of cooperation during ball interception: interaction and interference). Search on Bibsonomy 2019   RDF
35Steredenn Daumont Techniques de démodulation aveugle en interception de signaux MIMO. (Blind demodulation techniques in MIMO signals interception). Search on Bibsonomy 2009   RDF
35Pilsung Kang 0002, Yang Cao 0001, Naren Ramakrishnan, Calvin J. Ribbens, Srinidhi Varadarajan Modular implementation of adaptive decisions in stochastic simulations. Search on Bibsonomy SAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF function call interception, modular composition, stochastic simulation, program modification
35Xing-Yun He, Kwok-Yan Lam, Siu Leung Chung, Chi-Hung Chi, Jia-Guang Sun 0001 Real-Time Emulation of Intrusion Victim in HoneyFarm. Search on Bibsonomy AWCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF interception proxy, reverse firewall, Honeypot, intrusion
30Ian R. Manchester, Emily May Peng Low, Andrey V. Savkin Interception of a moving object with a specified approach angle by a wheeled robot: Theory and experiment. Search on Bibsonomy CDC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
30Jun Yang, Min Zhang Chance Constrained Bi-level Programming Approach for Flow Interception Problem with Stochastic Users in Fuzzy Environment. Search on Bibsonomy FSKD (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30Chang-Hsien Tsai, Shih-Kun Huang Detection and Diagnosis of Control Interception. Search on Bibsonomy ICICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30Xiaoning Shan, Jindong Tan Multi-robot Coordination for Elusive Target Interception Aided by Sensor Networks. Search on Bibsonomy IROS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Dongkyoung Chwa, Junho Kang, Jin Young Choi 0002 Online trajectory planning of robot arms for interception of fast maneuvering object under torque and velocity constraints. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Part A The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Brice Canvel, Alain P. Hiltgen, Serge Vaudenay, Martin Vuagnoux Password Interception in a SSL/TLS Channel. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
30Ralf Lämmel A semantical approach to method-call interception. Search on Bibsonomy AOSD The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
30Frédéric Maire, Doug Taylor A Quadratic Programming Formulation of a Moving Ball Interception and Shooting Behaviour, and Its Application to Neural Network Control. Search on Bibsonomy RoboCup The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
26Lin Shi, Hao Chen 0002, Jianhua Sun 0002 vCUDA: GPU accelerated high performance computing in virtual machines. Search on Bibsonomy IPDPS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Jonathan P. Benson, Tony O'Donovan, Utz Roedig, Cormac J. Sreenan Opportunistic Aggregation over Duty Cycled Communications in Wireless Sensor Networks. Search on Bibsonomy IPSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF CC2420, Aggregation, TinyOS, Duty cycle
26Benjamin Chihak, Sabarish V. Babu, Timofey Grechkin, Christine Ziemer, James F. Cremer, Joseph K. Kearney, Jodie M. Plumert How do bicyclists intercept moving gaps in a virtual environment? Search on Bibsonomy APGV The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Md. Nurul Islam, Atsuhi Kara Using SCTP to Implement Multihomed Web Servers. Search on Bibsonomy DNIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Transport Protocol, Stream Control Transmission Protocol, Multihoming
26Huei-Tse Hou, Kuo-En Chang, Yao-Ting Sung Analysis of Time-Management Pattern of Interactive Behaviors during Online Project-Based Learning. Search on Bibsonomy ICALT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Wensheng Zhang 0001, Guohong Cao Optimizing tree reconfiguration to track mobile targets in sensor networks. Search on Bibsonomy ACM SIGMOBILE Mob. Comput. Commun. Rev. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Jinyi Yao, Ni Lao, Fan Yang, Yunpeng Cai, Zengqi Sun Technical Solutions of TsinghuAeolus for Robotic Soccer. Search on Bibsonomy RoboCup The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Louise E. Moser, P. M. Melliar-Smith Demonstration of Fault Tolerance for CORBA Applications. Search on Bibsonomy DISCEX (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Michael Walker 0001 On the Security of 3GPP Networks. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
26Michael Golm, Jürgen Kleinöder Jumping to the Meta Level: Behavioral Reflection Can Be Fast and Flexible. Search on Bibsonomy Reflection The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
22Guofu Xiang, Hai Jin 0001, Deqing Zou, Xinwen Zhang, Sha Wen, Feng Zhao 0003 VMDriver: A Driver-Based Monitoring Mechanism for Virtualization. Search on Bibsonomy SRDS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF VM Monitoring, Driver-based Monitroing, Event Interception, Semantic Reconstruction, Virtualization, Generality
22Koichi Onoue, Yoshihiro Oyama, Akinori Yonezawa Control of system calls from outside of virtual machines. Search on Bibsonomy SAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, virtual machine monitors, sandboxing, system call interception
22Changxi Zheng, Lusheng Ji, Dan Pei, Jia Wang 0001, Paul Francis A light-weight distributed scheme for detecting ip prefix hijacks in real-time. Search on Bibsonomy SIGCOMM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hijacking, routing, detection, BGP, interception
22Yang Yu, Fanglu Guo, Susanta Nanda, Lap-Chung Lam, Tzi-cker Chiueh A feather-weight virtual machine for windows applications. Search on Bibsonomy VEE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF namespace virtualization, virtual machine, copy on write, mobile code security, system call interception
22Zhi Li 0013, Yu-Kwong Kwok A New Multipath Routing Approach to Enhancing TCP Security in Ad Hoc Wireless Networks. Search on Bibsonomy ICPP Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF interception rates, ad hoc networks, TCP, multipath routing, wireless security
22Nishant Bawa, Sudipto Ghosh Visualizing Interactions in Distributed Java Applications. Search on Bibsonomy IWPC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF method sequence, XML, UML, Application, software visualization, distributed objects, sequence diagrams, Java RMI, test adequacy criteria, interception
22Massimo Bernaschi, Emanuele Gabrielli, Luigi V. Mancini Remus: a security-enhanced operating system. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF privileged tasks, system penetration, Access control, Linux, system calls interception
22Massimo Bernaschi, Emanuele Gabrielli, Luigi V. Mancini Operating system enhancements to prevent the misuse of system calls. Search on Bibsonomy CCS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF access control database, buffer overflow based attacks, Linux, Linux, isolation, system calls interception
17Xiang Feng, Linlong Wu, Yinan Zhao, Zhanfeng Zhao, Keyang Diao, Mojtaba Soltanalian Recurrent Waveform Optimization for Desired Range-Doppler Profile With Low Probability of Interception: A Particle Filter Approach. Search on Bibsonomy IEEE Trans. Aerosp. Electron. Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17Shlomi Hacohen, Shraga Shoval, Nir Shvalb Navigation Function for Multi-Agent Multi-Target Interception Missions. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17Xiaomin Li, Huali Wang, Zhaopei Zhang An Intrapulse Modulation Recognition Method for Low Probability of Interception Signals Based on the Coprime DTFrFT Spectral Receiver. Search on Bibsonomy Circuits Syst. Signal Process. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17Jinpeng Zhai, Jianying Yang Cooperative guidance laws for interception of active maneuvering target under information symmetric and asymmetric conditions. Search on Bibsonomy Int. J. Control The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17Yuan-An Xiao, Chenyang Yang 0002, Bo Wang 0050, Yingfei Xiong 0001 Accelerating Patch Validation for Program Repair With Interception-Based Execution Scheduling. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17Guanhua Zheng, Jitao Sang, Changsheng Xu TIF: Threshold Interception and Fusion for Compact and Fine-Grained Visual Attribution. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17Abhinav Sinha, Dwaipayan Mukherjee, Shashi Ranjan Kumar Consensus-driven Deviated Pursuit for Guaranteed Simultaneous Interception of Moving Targets. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17B. Uma Mahesh Babu, K. Giri Babu, Krishna B. T. Trajectory Interception Classification for Prediction of Collision Scope between Moving Objects. Search on Bibsonomy Scalable Comput. Pract. Exp. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17Siqing Sun, Defu Cai, Hai-Tao Zhang, Ning Xing Reinforcement Learning-Based MAS Interception in Antagonistic Environments. Search on Bibsonomy IEEE CAA J. Autom. Sinica The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17Duong Van Minh, Pham Duy Hung An Interception Tree Approach In Wheeled Soccer Robots. Search on Bibsonomy SII The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17Van Hau Le, Ti Ti Nguyen, Kim Khoa Nguyen Dual Wireless Anti-Interception for Ground Combat Vehicles. Search on Bibsonomy IEEE Trans. Veh. Technol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Aiwu Yang, Xiaolong Liang, Yueqi Hou, Maolong Lv An Autonomous Cooperative Interception Method With Angle Constraints Using a Swarm of UAVs. Search on Bibsonomy IEEE Trans. Veh. Technol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Cheng Zhong, Jie-Sheng Wang, Yu Liu Bi-LSTM fault diagnosis method for rolling bearings based on segmented interception AR spectrum analysis and information fusion. Search on Bibsonomy J. Intell. Fuzzy Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Francisco Rojo, Rafael Del Río, Richard L. Snyder, Daniele Zaccaria A novel simulation model to predict photosynthetic active radiation interception in micro-irrigated citrus production orchards based on tree spacing, canopy geometry, and row orientation. Search on Bibsonomy Comput. Electron. Agric. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Gang Zhang 0010, Huidong Ma Covariance Analysis of the Optimal Orbital Interception With Navigation Errors. Search on Bibsonomy IEEE Trans. Aerosp. Electron. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Namhoon Cho Three-Dimensional Guidance Method With Course Modification for Altitude Shaping in Endoatmospheric Interception. Search on Bibsonomy IEEE Trans. Aerosp. Electron. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Diana Cristina González, Claudio Ferreira Dias, Eduardo Rodrigues de Lima, Yonina C. Eldar, Muriel Médard, Michel Daoud Yacoub Interception Probability Versus Capacity in Wideband Systems: The Benefits of Peaky Signaling. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Yagub N. Aliyev Geometric Properties of Planar and Spherical Interception Curves. Search on Bibsonomy Axioms The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Lucas Gouvêa Meireles, Antônio Fernando Bertachini de Almeida Prado, Cristiano Fiorilo de Melo, Maria Cecília Pereira Heuristic Technique for the Search of Interception Trajectories to Asteroids with the Use of Solar Sails. Search on Bibsonomy Symmetry The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Nicolas Souli, Panayiotis Kolios, Georgios Ellinas Multi-Agent System for Rogue Drone Interception. Search on Bibsonomy IEEE Robotics Autom. Lett. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Bin Lin, Wei Xie, Yi Shi, Bin Du, Chenming Zhang, Weidong Zhang 0004 Robust Target Interception Strategy for a USV With Experimental Validation. Search on Bibsonomy IEEE Robotics Autom. Lett. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Chengcai Wang, Ao Wu, Yueqi Hou, Xiaolong Liang, Luo Xu, Xiaomo Wang Optimal deployment of swarm positions in cooperative interception of multiple UAV swarms. Search on Bibsonomy Digit. Commun. Networks The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Dan Zhao, Xinghuo Yu 0001, Guanghui Wen, Yifan Hu, Tingwen Huang Dynamic Task Allocation Algorithm for Moving Targets Interception. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Vishnu S. Chipade, Dimitra Panagou Aerial Swarm Defense Using Interception and Herding Strategies. Search on Bibsonomy IEEE Trans. Robotics The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Li-Gang Lin, Ruei-Syuan Wu, Ping-Kong Huang, Ming Xin 0001, Chin-Tien Wu, Wen-Wei Lin Fast SDDRE-Based Maneuvering-Target Interception at Prespecified Orientation. Search on Bibsonomy IEEE Trans. Control. Syst. Technol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Yan Scholten, Jan Schuchardt, Simon Geisler, Aleksandar Bojchevski, Stephan Günnemann Randomized Message-Interception Smoothing: Gray-box Certificates for Graph Neural Networks. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Francesco Intoci, Julian Sturm, Daniel Fraunholz, Apostolos Pyrgelis, Colin Barschel P3LI5: Practical and Confidential Lawful Interception on the 5G Core. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Yuan-an Xiao, Chenyang Yang 0002, Bo Wang 0050, Yingfei Xiong 0001 Accelerating Patch Validation for Program Repair with Interception-Based Execution Scheduling. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Vishnu S. Chipade, Dimitra Panagou Aerial Swarm Defense using Interception and Herding Strategies. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Xavier de Carné de Carnavalet, Paul C. van Oorschot A Survey and Analysis of TLS Interception Mechanisms and Motivations: Exploring how end-to-end TLS is made "end-to-me" for web traffic. Search on Bibsonomy ACM Comput. Surv. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Andrey A. Galyaev, Victor P. Yakhno, Pavel V. Lysenko, Leonid M. Berlin, Maksim E. Buzikov Optimization of Interception Plan for Rectilinearly Moving Targets. Search on Bibsonomy Autom. Remote. Control. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Vadim Doronin "Lawful interception - A market access barrier in the European Union"? Search on Bibsonomy Comput. Law Secur. Rev. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Dongyu Fan, Haikuo Shen, Lijing Dong Switching-aware multi-agent deep reinforcement learning for target interception. Search on Bibsonomy Appl. Intell. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Chenyan Xue, Ling Wang 0012, Daiyin Zhu Joint Aperture and Power Allocation Strategy for a Radar Network Localization System Based on Low Probability of Interception Optimization. Search on Bibsonomy Sensors The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Aakriti Agrawal, Aashay Anil Bhise, Rohitkumar Arasanipalai, Lima Agnel Tony, Shuvrangshu Jana, Debasish Ghose Accurate Estimation of 3D-Repetitive-Trajectories using Kalman Filter, Machine Learning and Curve-Fitting Method for High-speed Target Interception. Search on Bibsonomy Artificial Intelligence for Robotics and Autonomous Systems Applications The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Francesco Intoci, Julian Sturm, Daniel Fraunholz, Apostolos Pyrgelis, Colin Barschel P3LI5: Practical and confidEntial Lawful Interception on the 5G core. Search on Bibsonomy CNS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Zhengfei Qu, Junshan Luo, Shilian Wang, Wei Zhang, Ang Zhou Generalized Code Index Modulation Based on Chaotic Sequence for Anti-Interception. Search on Bibsonomy ICCT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Michael Ratzel, Mark Geiger, André Ryll RoboCup 2023 SSL Champion TIGERs Mannheim - Improved Ball Interception Trajectories. Search on Bibsonomy RoboCup The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Christian Peeters, Tyler Tucker, Anushri Jain, Kevin R. B. Butler, Patrick Traynor LeopardSeal: Detecting Call Interception via Audio Rogue Base Stations. Search on Bibsonomy MobiSys The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Casey T. Deccio W-Bad: Interception, Inspection, and Interference with Web Proxy Auto-Discovery (WPAD). Search on Bibsonomy TMA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Kelun Lei, Xin You, Hailong Yang, Zhongzhi Luan, Depei Qian BiRFIA: Selective Binary Rewriting for Function Interception on ARM. Search on Bibsonomy ICS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Ahmet Talha Çetin, Emre Koyuncu Model Predictive Control-Based Guidance with Impact Angle Constraints for Visual Quadrotor Interception. Search on Bibsonomy CoDIT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Hong Tao, Hongyan Li, Tao Song, Defu Lin, Jiao Xu Integrated Assignment and Guidance for Distributed Multi-Pursuer-Target Interception. Search on Bibsonomy CoDIT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Manoj Prabhakar K, Vipin Pavithran, Saranya Chandran, Sreelakshmi R. Syam Long-Range Stealth Mode Wi-Fi Surveillance and Interception System. Search on Bibsonomy ICCCNT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 579 (100 per page; Change: )
Pages: [1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license