×

Found 433 Documents (Results 1–100)

How vulnerable is an undirected planar graph with respect to max flow. (English) Zbl 07745700

Mavronicolas, Marios (ed.), Algorithms and complexity. 13th international conference, CIAC 2023, Larnaca, Cyprus, June 13–16, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13898, 82-96 (2023).
MSC:  68Wxx
PDFBibTeX XMLCite
Full Text: DOI arXiv

A vulnerability in implementations of SHA-3, SHAKE, EdDSA, and other NIST-approved algorithms. (English) Zbl 07745599

Rosulek, Mike (ed.), Topics in cryptology – CT-RSA 2023. Cryptographers’ track at the RSA conference 2023, San Francisco, CA, USA, April 24–27, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13871, 3-28 (2023).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Spreadability and vulnerability via attributes for systems described by cellular automata: application to wildfire. (English) Zbl 1523.37092

Chopard, Bastien (ed.) et al., Cellular automata. 15th international conference on cellular automata for research and industry, ACRI 2022, Geneva, Switzerland, September 12–15, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13402, 223-234 (2022).
PDFBibTeX XMLCite
Full Text: DOI

SparrowHawk: memory safety flaw detection via data-driven source code annotation. (English) Zbl 1490.68081

Yu, Yu (ed.) et al., Information security and cryptology. 17th international conference, Inscrypt 2021, virtual event, August 12–14, 2021. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13007, 129-148 (2021).
MSC:  68N30 68N15
PDFBibTeX XMLCite
Full Text: DOI

Smart Internet probing: scanning using adaptive machine learning. (English) Zbl 07526415

Kamhoua, Charles A. (ed.) et al., Game theory and machine learning for cyber security. Piscataway, NJ: IEEE Press; Hoboken, NJ: John Wiley & Sons. 411-437 (2021).
MSC:  68M25 68T05 91A80
PDFBibTeX XMLCite
Full Text: DOI

Stable structure on safe set problems in vertex-weighted graphs. II: Recognition and complexity. (English) Zbl 07636219

Adler, Isolde (ed.) et al., Graph-theoretic concepts in computer science. 46th international workshop, WG 2020, Leeds, UK, June 24–26, 2020. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 12301, 364-375 (2020).
MSC:  68R10
PDFBibTeX XMLCite
Full Text: DOI

Analysis of critical damage in the communication network. II: Guaranteed functional performance estimates. (English. Russian original) Zbl 1459.94005

J. Comput. Syst. Sci. Int. 59, No. 6, 918-927 (2020); translation from Izv. Ross. Akad. Nauk, Teor. Sist. Upr. 2020, No. 6, 109-119 (2020).
MSC:  94A05
PDFBibTeX XMLCite
Full Text: DOI

A network-based analysis of the preterm adolescent brain using PCA and graph theory. (English) Zbl 1457.92093

Bonet-Carne, Elisenda (ed.) et al., Computational diffusion MRI. MICCAI workshop, Shenzhen, China, October 17, 2019. Cham: Springer. Math. Vis., 173-181 (2020).
PDFBibTeX XMLCite
Full Text: DOI Link

Optimization of the GIS-based DRASTIC model for groundwater vulnerability assessment. (English) Zbl 1436.90160

Bennis, Fouad (ed.) et al., Nature-inspired methods for metaheuristics optimization. Algorithms and applications in science and engineering. Cham: Springer. Model. Optim. Sci. Technol. 16, 489-502 (2020).
MSC:  90C59 91B76
PDFBibTeX XMLCite
Full Text: DOI

On the complexity of color-avoiding site and bond percolation. (English) Zbl 1444.68150

Catania, Barbara (ed.) et al., SOFSEM 2019: theory and practice of computer science. 45th international conference on current trends in theory and practice of computer science, Nový Smokovec, Slovakia, January 27–30, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11376, 354-367 (2019).
MSC:  68R10 68M15 68Q25
PDFBibTeX XMLCite
Full Text: DOI arXiv

Measuring economic vulnerability: a structural equation modeling approach. (English) Zbl 1436.62684

Greselin, Francesca (ed.) et al., Statistical learning of complex data. Selected papers of the 11th scientific meeting of the Classification and Data Analysis Group of the Italian Statistical Society (CLADAG 2017), Milan, Italy, September 13–15, 2017. Cham: Springer. Stud. Classification Data Anal. Knowl. Organ., 95-102 (2019).
MSC:  62P20 62H20
PDFBibTeX XMLCite
Full Text: DOI Link

Parameterized complexity of safe set. (English) Zbl 1525.68090

Heggernes, Pinar (ed.), Algorithms and complexity. 11th international conference, CIAC 2019, Rome, Italy, May 27–29, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11485, 38-49 (2019).
MSC:  68R10 05C85 68Q27
PDFBibTeX XMLCite
Full Text: DOI arXiv

An approach to the analysis of possible structural damages in multicommodity network systems. (English. Russian original) Zbl 1453.90038

Comput. Math. Math. Phys. 59, No. 9, 1562-1574 (2019); translation from Zh. Vychisl. Mat. Mat. Fiz. 59, No. 9, 1626-1638 (2019).
MSC:  90B10 90C35 91A80
PDFBibTeX XMLCite
Full Text: DOI

Virtual security evaluation. An operational methodology for side-channel leakage detection at source-code level. (English) Zbl 1461.94085

Carlet, Claude (ed.) et al., Codes, cryptology and information security. Third international conference, C2SI 2019, Rabat, Morocco, April 22–24, 2019. Proceedings – in honor of Said el Hajji. Cham: Springer. Lect. Notes Comput. Sci. 11445, 3-12 (2019).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Author

all top 5

Serial

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software