Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Fadoua Ghourabi, Kazuko Takahashi |
What Does Qualitative Spatial Knowledge Tell About Origami Geometric Folds? |
AISC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Pedro Quaresma |
Automatic Deduction in an AI Geometry Book. |
AISC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Shaofan Liu, Jie Luo 0004 |
FMUS2: An Efficient Algorithm to Compute Minimal Unsatisfiable Subsets. |
AISC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Jose Divasón, Jesús Aransay |
A Formal Proof of the Computation of Hermite Normal Form in a General Setting. |
AISC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Martin Strecker |
Deciding Extended Modal Logics by Combining State Space Generation and SAT Solving. |
AISC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Changbo Chen, Wenyuan Wu |
Revealing Bistability in Neurological Disorder Models By Solving Parametric Polynomial Systems Geometrically. |
AISC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Dongchen Jiang, Xiaoyu Chen 0001, Xin Yang |
A Chinese New Word Detection Approach Based on Independence Testing. |
AISC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Sólrún Halla Einarsdóttir, Moa Johansson, Johannes Åman Pohjola |
Into the Infinite - Theory Exploration for Coinduction. |
AISC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Yu Wang, Wenyuan Wu, Bican Xia |
Early Ending in Homotopy Path-Tracking for Real Roots. |
AISC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Zoltán Kovács |
Discovering Geometry Theorems in Regular Polygons. |
AISC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Pengcheng Peng, Chenqi Mou, Wei-Tek Tsai |
Game-Theoretic Analysis on the Number of Participants in the Software Crowdsourcing Contest. |
AISC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Xiaoyu Chen 0001, Haotian Shuai, Dongming Wang 0001, Jing Yang 0039 |
LaTEX: A Linear Algebra Textbook System. |
AISC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Wei Su 0008, Chuan Cai, Jinzhao Wu |
The Accessibility of Mathematical Formulas for the Visually Impaired in China. |
AISC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Jacques D. Fleuriot, Dongming Wang 0001, Jacques Calmet (eds.) |
Artificial Intelligence and Symbolic Computation - 13th International Conference, AISC 2018, Suzhou, China, September 16-19, 2018, Proceedings |
AISC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Francisco Botana, Zoltán Kovács, Tomás Recio |
Towards an Automated Geometer. |
AISC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | James H. Davenport |
Methodologies of Symbolic Computation. |
AISC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | David Braun, Nicolas Magaud, Pascal Schreck |
Formalizing Some "Small" Finite Models of Projective Geometry in Coq. |
AISC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Ilias S. Kotsireas, Jing Yang 0039 |
Autocorrelation via Runs. |
AISC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Alan Bundy, Kwabena Nuamah, Christopher Lucas 0001 |
Automated Reasoning in the Age of the Internet. |
AISC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Tianshu Song, Feng Zhu 0005, Ke Xu 0001 |
Specialty-Aware Task Assignment in Spatial Crowdsourcing. |
AISC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Yaqing Jiang, Petros Papapanagiotou, Jacques D. Fleuriot |
Machine Learning for Inductive Theorem Proving. |
AISC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | John Shield, Bradley D. Hopkins, Mark R. Beaumont, Chris North 0002 |
Hardware Trojans - A Systemic Threat. |
AISC |
2015 |
DBLP BibTeX RDF |
|
1 | Tristan Newby, Duncan A. Grove, Alex Murray, Chris A. Owen, Jim McCarthy, Chris J. North |
Annex: A Middleware for Constructing High-Assurance Software Systems. |
AISC |
2015 |
DBLP BibTeX RDF |
|
1 | David Myers, Ernest Foo, Kenneth Radke |
Internet-wide Scanning Taxonomy and Framework. |
AISC |
2015 |
DBLP BibTeX RDF |
|
1 | Binbin Di, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong |
Correcting flaws in Mitchell's analysis of EPBC. |
AISC |
2015 |
DBLP BibTeX RDF |
|
1 | Dilshan Jayarathna, Udaya Kiran Tupakula, Vijay Varadharajan |
Hypervisor-based Security Architecture to Protect Web Applications. |
AISC |
2015 |
DBLP BibTeX RDF |
|
1 | Toby J. Richer, Grant Neale, Grant Osborne |
On the E ectiveness of Virtualisation Assisted View Comparison for Rootkit Detection. |
AISC |
2015 |
DBLP BibTeX RDF |
|
1 | Ian Welch, Xun Yi (eds.) |
13th Australasian Information Security Conference, AISC 2015, Sydney, Australia, January 2015 |
AISC |
2015 |
DBLP BibTeX RDF |
|
1 | Nicholas R. Rodofile, Kenneth Radke, Ernest Foo |
Real-Time and Interactive Attacks on DNP3 Critical Infrastructure Using Scapy. |
AISC |
2015 |
DBLP BibTeX RDF |
|
1 | Adrian Herrera, Ben Cheney |
JMD: A Hybrid Approach for Detecting Java Malware. |
AISC |
2015 |
DBLP BibTeX RDF |
|
1 | Deepa Mani, Alireza Heravi, Kim-Kwang Raymond Choo, Sameera Mubarak |
Information Privacy Concerns of Real Estate Customers and Information Security in the Real Estate Industry: an Empirical Analysis. |
AISC |
2015 |
DBLP BibTeX RDF |
|
1 | Nishchal Kush, Ejaz Ahmed, Mark Branagan, Ernest Foo |
Poisoned GOOSE: Exploiting the GOOSE Protocol. |
AISC |
2014 |
DBLP BibTeX RDF |
|
1 | Janaka Seneviratne, Udaya Parampalli, Lars Kulik |
An Authorised Pseudonym System for Privacy Preserving Location Proof Architectures. |
AISC |
2014 |
DBLP BibTeX RDF |
|
1 | Kamini Bajaj, Josef Pieprzyk |
A Case Study of User-Level Spam Filtering. |
AISC |
2014 |
DBLP BibTeX RDF |
|
1 | Dilshan Jayarathna, Udaya Kiran Tupakula, Vijay Varadharajan |
Hypervisor-based Security Architecture for Validating DNS Services (Poster). |
AISC |
2014 |
DBLP BibTeX RDF |
|
1 | Ali Al-Hamdan, Harry Bartlett, Ed Dawson, Leonie Simpson, Kenneth Koon-Ho Wong |
Weak key-IV Pairs in the A5/1 Stream Cipher. |
AISC |
2014 |
DBLP BibTeX RDF |
|
1 | Sajal Bhatia, Nishchal Kush, Chris I. Djamaludin, Ayodeji James Akande, Ernest Foo |
Practical Modbus Flooding Attack and Detection. |
AISC |
2014 |
DBLP BibTeX RDF |
|
1 | Udaya Parampalli, Ian Welch (eds.) |
Twelfth Australasian Information Security Conference, AISC 2014, Auckland, New Zealand, January 2014 |
AISC |
2014 |
DBLP BibTeX RDF |
|
1 | Masood Mansoori, Ian Welch, Qiang Fu 0011 |
YALIH, Yet Another Low Interaction Honeyclient. |
AISC |
2014 |
DBLP BibTeX RDF |
|
1 | Sui-Guan Teo, Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson |
Algebraic analysis of Trivium-like ciphers (Poster). |
AISC |
2014 |
DBLP BibTeX RDF |
|
1 | Kenneth Radke, Colin Boyd, Juanma González Nieto, Mark Manulis, Douglas Stebila |
Formalising Human Recognition: a Fundamental Building Block for Security Proofs. |
AISC |
2014 |
DBLP BibTeX RDF |
|
1 | Juana Sendra, David Gómez 0002, Valerio Morán |
Rational Conchoid and Offset Constructions: Algorithms and Implementation. |
AISC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Volker Sorge |
Combining Systems for Mathematical Creativity (Invited Talk). |
AISC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Oumaima Boussarsar, Imen Boukhris, Zied Elouedi |
A Direct Propagation Method in Singly Connected Causal Belief Networks with Conditional Distributions for all Causes. |
AISC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Salvador Lucas, José Meseguer 0001 |
Models for Logics and Conditional Constraints in Automated Proofs of Termination. |
AISC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Carlos Gamallo-Chicano, Eugenio Roanes-Lozano, Carlos Gamallo-Amat |
A Rule-Based Expert System for Vaginal Cytology Diagnosis. |
AISC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Belaïd Benhamou |
Dynamic Symmetry Breaking in Itemset Mining. |
AISC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Uwe Egly, Martin Kronegger, Florian Lonsing, Andreas Pfandler |
Conformant Planning as a Case Study of Incremental QBF Solving. |
AISC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Gonzalo A. Aranda-Corral, Jacques Calmet, Francisco J. Martín-Mateos (eds.) |
Artificial Intelligence and Symbolic Computation - 12th International Conference, AISC 2014, Seville, Spain, December 11-13, 2014. Proceedings |
AISC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Salvador Lucas |
Using Representation Theorems for Proving Polynomials Non-negative. |
AISC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jesús Aransay-Azofra, Jose Divasón, Jónathan Heras, Laureano Lambán, María Vico Pascual, Ángel Luis Rubio, Julio Rubio 0001 |
Obtaining an ACL2 Specification from an Isabelle/HOL Theory. |
AISC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | José-Luis Ruiz-Reina |
Proving and Computing: Applying Automated Reasoning to the Verification of Symbolic Computation Systems (Invited Talk). |
AISC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Frédéric Lardeux, Éric Monfroy |
From Declarative Set Constraint Models to "Good" SAT Instances. |
AISC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Lubjana Beshaj, Tony Shaska |
Decomposition of Some Jacobian Varieties of Dimension 3. |
AISC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Eugenio Roanes-Lozano, Antonio Hernando |
A Simple GUI for Developing Applications That Use Mathematical Software Systems. |
AISC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Maricarmen Martínez, Ulf Krumnack, Alan Smaill, Tarek Richard Besold, Ahmed M. H. Abdel-Fattah, Martin Schmidt 0002, Helmar Gust, Kai-Uwe Kühnberger, Markus Guhe, Alison Pease |
Algorithmic Aspects of Theory Blending. |
AISC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Amira Essaid, Arnaud Martin, Grégory Smits, Boutheina Ben Yaghlane |
A Distance-Based Decision in the Credal Level. |
AISC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Shutaro Inoue, Yosuke Sato |
A Mathematical Hierarchy of Sudoku Puzzles and Its Computation by Boolean Gröbner Bases. |
AISC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | David J. Jeffrey |
Multivalued Elementary Functions in Computer-Algebra Systems. |
AISC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ali Al-Hamdan, Harry Bartlett, Ed Dawson, Leonie Simpson, Kenneth Koon-Ho Wong |
Slid Pairs in the Initialisation of the A5/1 Stream Cipher. |
AISC |
2013 |
DBLP BibTeX RDF |
|
1 | Hadi Mohammadzadeh 0002, Masood Mansoori, Ian Welch |
Evaluation of Fingerprinting Techniques and a Windows-based Dynamic Honeypot. |
AISC |
2013 |
DBLP BibTeX RDF |
|
1 | Aswami Ariffin, Kim-Kwang Raymond Choo, Jill Slay |
Digital Camcorder Forensics. |
AISC |
2013 |
DBLP BibTeX RDF |
|
1 | Maryam Rajabzadeh Asaar, Ali Vardasbi, Mahmoud Salmasizadeh |
Non-Delegatable Strong Designated Verifier Signature Using a Trusted Third Party without Pairings. |
AISC |
2013 |
DBLP BibTeX RDF |
|
1 | Van Lam Le, Ian Welch, Xiaoying Gao, Peter Komisarczuk |
Anatomy of Drive-by Download Attack. |
AISC |
2013 |
DBLP BibTeX RDF |
|
1 | Russell Paulet, Xun Yi |
Cryptanalysis of Brenner et al.'s Somewhat Homomorphic Encryption Scheme. |
AISC |
2013 |
DBLP BibTeX RDF |
|
1 | Clark D. Thomborson, Udaya Parampalli (eds.) |
Eleventh Australasian Information Security Conference, AISC 2013, Adelaide, Australia, February 2013 |
AISC |
2013 |
DBLP BibTeX RDF |
|
1 | Thomas H. Morris, Rayford B. Vaughn, Elena Sitnikova |
Advances in the Protection of Critical Infrastructure by Improvement in Industrial Control System Security. |
AISC |
2013 |
DBLP BibTeX RDF |
|
1 | Tansu Alpcan |
A Decision and Game Theoretic Approach to Networked System Security with Applications to Power Grid (Invited Lecture). |
AISC |
2013 |
DBLP BibTeX RDF |
|
1 | Duncan A. Grove, Alex Murray, Damien Gerhardy, Benjamin P. Turnbull, Troy Tobin, Christopher Moir |
An Overview of the Parallax BattleMind v1.5 for Computer Network Defence. |
AISC |
2013 |
DBLP BibTeX RDF |
|
1 | Younes Seifi, Suriadi Suriadi, Ernest Foo, Colin Boyd |
Analysis of Object-Specific Authorization Protocol (OSAP) using Coloured Petri Nets. |
AISC |
2012 |
DBLP BibTeX RDF |
|
1 | Vorapong Suppakitpaisarn, Masato Edahiro, Hiroshi Imai |
Fast Elliptic Curve Cryptography Using Minimal Weight Conversion of d Integers. |
AISC |
2012 |
DBLP BibTeX RDF |
|
1 | Chris Mills, Colin J. Fidge, Diane Corney |
Tool-Supported Dataflow Analysis of a Security-Critical Embedded Device. |
AISC |
2012 |
DBLP BibTeX RDF |
|
1 | Kaleb Lee, Juan Manuel González Nieto, Colin Boyd |
Improving the Efficiency of RFID Authentication with Pre-Computation. |
AISC |
2012 |
DBLP BibTeX RDF |
|
1 | Christophe Hauser, Frédéric Tronel, Jason Reid, Colin J. Fidge |
A taint marking approach to confidentiality violation detection. |
AISC |
2012 |
DBLP BibTeX RDF |
|
1 | Mohammad Ali Orumiehchiha, Josef Pieprzyk, Ron Steinfeld |
Cryptanalysis of RC4-Based Hash Function. |
AISC |
2012 |
DBLP BibTeX RDF |
|
1 | Peter Hyun-Jeen Lee, Udaya Parampalli, Shivaramakrishnan Narayan |
E cient Identity-based Signcryption without Random Oracles. |
AISC |
2012 |
DBLP BibTeX RDF |
|
1 | Josef Pieprzyk, Clark D. Thomborson (eds.) |
Tenth Australasian Information Security Conference, AISC 2012, Melbourne, Australia, January 2012 |
AISC |
2012 |
DBLP BibTeX RDF |
|
1 | Kenneth Radke, Colin Boyd, Juan Manuel González Nieto, Margot Brereton |
Towards a Secure Human-and-Computer Mutual Authentication Protocol. |
AISC |
2012 |
DBLP BibTeX RDF |
|
1 | Ali Al-Hamdan, Harry Bartlett, Leonie Simpson, Ed Dawson, Kenneth Koon-Ho Wong |
State convergence in the initialisation of the Sfinks stream cipher. |
AISC |
2012 |
DBLP BibTeX RDF |
|
1 | Christopher Doble, Colin J. Fidge, Diane Corney |
Data Flow Analysis of Embedded Program Expressions. |
AISC |
2012 |
DBLP BibTeX RDF |
|
1 | Colin Boyd, Josef Pieprzyk (eds.) |
Ninth Australasian Information Security Conference, AISC 2011, Perth, Australia, January 2011 |
AISC |
2011 |
DBLP BibTeX RDF |
|
1 | Yun Bai 0001, Khaled M. Khan |
A Modal Logic for Information System Security. |
AISC |
2011 |
DBLP BibTeX RDF |
|
1 | Van Lam Le, Ian Welch, Xiaoying Gao, Peter Komisarczuk |
Identification of Potential Malicious Web Pages. |
AISC |
2011 |
DBLP BibTeX RDF |
|
1 | Toru Nakamura, Shunsuke Inenaga, Kensuke Baba, Daisuke Ikeda, Hiroto Yasuura |
An Anonymous Authentication Protocol with Single-database PIR. |
AISC |
2011 |
DBLP BibTeX RDF |
|
1 | Thorsten Ries, Radu State, Andriy Panchenko 0001 |
Comparison of Low-Latency Anonymous Communication Systems - Practical Usage and Performance. |
AISC |
2011 |
DBLP BibTeX RDF |
|
1 | Günther Lackner, Peter Teufl |
IEEE 802.11 Chipset Fingerprinting by the Measurement of Timing Characteristics. |
AISC |
2011 |
DBLP BibTeX RDF |
|
1 | Andrea Agnesse, Marco Pedicini |
Cube Attack in Finite Fields of Higher Order. |
AISC |
2011 |
DBLP BibTeX RDF |
|
1 | Malcolm Corney, George M. Mohay, Andrew J. Clark |
Detection of Anomalies from User Profiles Generated from System Logs. |
AISC |
2011 |
DBLP BibTeX RDF |
|
1 | Scott Campbell, Steve Chan, Jason Lee |
Detection of Fast Flux Service Networks. |
AISC |
2011 |
DBLP BibTeX RDF |
|
1 | Md. Golam Kaosar, Russell Paulet, Xun Yi |
Secure Two-Party Association Rule Mining. |
AISC |
2011 |
DBLP BibTeX RDF |
|
1 | Ben Palmer, Kris Bubendorfer, Ian Welch |
Development and Evaluation of a Secure, Privacy Preserving Combinatorial Auction. |
AISC |
2011 |
DBLP BibTeX RDF |
|
1 | Georg Lippold, Juanma González Nieto |
Certificateless Key Agreement in the Standard Model. |
AISC |
2010 |
DBLP BibTeX RDF |
|
1 | Douglas Stebila, Poornaprajna Udupi, Sheueling Chang Shantz |
Multi-Factor Password-Authenticated Key Exchange. |
AISC |
2010 |
DBLP BibTeX RDF |
|
1 | Ed Dawson, Jason Reid, Farzad Salim, Mark Burdon |
Information Sharing in the 21st century: Progress and Challenges. |
AISC |
2010 |
DBLP BibTeX RDF |
|
1 | Farzad Salim, Jason Reid, Ed Dawson |
An Administrative Model for UCON ABC. |
AISC |
2010 |
DBLP BibTeX RDF |
|
1 | Kimmo Halunen, Juha Kortelainen, Tuomas Kortelainen |
Combinatorial Multicollision Attacks on Generalized Iterated Hash Functions. |
AISC |
2010 |
DBLP BibTeX RDF |
|
1 | Maolin Tang, Colin J. Fidge |
Reconstruction of Falsified Computer Logs for Digital Forensics Investigations. |
AISC |
2010 |
DBLP BibTeX RDF |
|
1 | Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson |
An Analysis of the RC4 Family of Stream Ciphers against Algebraic Attacks. |
AISC |
2010 |
DBLP BibTeX RDF |
|
1 | Peishun Wang, Huaxiong Wang, Josef Pieprzyk |
Secure Coprocessor-based Private Information Retrieval without Periodical Preprocessing. |
AISC |
2010 |
DBLP BibTeX RDF |
|
1 | Natascha Chrobok, Andrew Trotman, Richard A. O'Keefe |
Advantages and vulnerabilities of pull-based email-delivery. |
AISC |
2010 |
DBLP BibTeX RDF |
|