The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for CSR with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1989-1992 (23) 1993-1995 (15) 1996-2001 (18) 2002-2004 (17) 2005-2006 (73) 2007 (48) 2008 (59) 2009 (43) 2010 (50) 2011 (45) 2012 (35) 2013 (56) 2014 (52) 2015 (50) 2016 (58) 2017 (41) 2018 (46) 2019 (44) 2020 (50) 2021 (141) 2022 (106) 2023 (134) 2024 (10)
Publication types (Num. hits)
article(111) incollection(2) inproceedings(1075) phdthesis(1) proceedings(25)
Venues (Conferences, Journals, ...)
CSR(841) ICS-CSR(57) HLT(17) CoRR(12) EUROSPEECH(8) ICSLP(7) ICASSP(6) CIARP(5) HICSS(5) HPC(5) Int. J. Technol. Manag.(4) Kybernetes(4) ICDAR(3) ICEEG(3) ICPADS(3) ICPP(3) More (+10 of total 217)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 183 occurrences of 146 keywords

Results
Found 1215 publication records. Showing 1214 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
100Amparo Varona, Inés Torres Integrating High and Low Smoothed LMs in a CSR System. Search on Bibsonomy CIARP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
97Bernhard Gramlich, Salvador Lucas Simple termination of context-sensitive rewriting. Search on Bibsonomy ACM SIGPLAN Workshop on Rule-Based Programming The full citation details ... 2002 DBLP  DOI  BibTeX  RDF automatic proofs of termination, context-sensitive rewriting, modular program analysis and verification, declarative programming, evaluation strategies
97Salvador Lucas Termination of (Canonical) Context-Sensitive Rewriting. Search on Bibsonomy RTA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF (infinitary) normalization, termination, term rewriting
83Junfeng Dong, Xiaohui Yu 0001 CSR+-tree: Cache-conscious Indexing for High-dimensional Similarity Search. Search on Bibsonomy SSDBM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
81Fan Li 0001, Yu Wang 0003 Circular Sailing Routing for Wireless Networks. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
81Raúl Gutiérrez, Salvador Lucas, Xavier Urbain Usable Rules for Context-Sensitive Rewrite Systems. Search on Bibsonomy RTA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF termination, term rewriting, Dependency pairs
81Beatriz Alarcón, Salvador Lucas Termination of Innermost Context-Sensitive Rewriting Using Dependency Pairs. Search on Bibsonomy FroCoS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
81Salvador Lucas mu-term: A Tool for Proving Termination of Context-Sensitive Rewriting. Search on Bibsonomy RTA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
81Cristina Borralleras, Salvador Lucas, Albert Rubio Recursive Path Orderings Can Be Context-Sensitive. Search on Bibsonomy CADE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
77Karmele López de Ipiña, Manuel Graña, Nerea Ezeiza, M. Hernández, Ekaitz Zulueta, Aitzol Ezeiza, C. Tovar Selection of Lexical Units for Continuous Speech Recognition of Basque. Search on Bibsonomy CIARP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Lexical Units, aglutinative languages, CSR
76Richard Gerber 0001, Insup Lee 0001 A Layered Approach to Automating the Verification of Real-Time Systems. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1992 DBLP  DOI  BibTeX  RDF CSR Application Language, high-level language constructs, periodic processes, configuration schema, CCSR process algebra, resource-based computation model, prioritized transition system, reachability analyzer, CCSR semantics, exception state, multisensor robot example, calculus of communicating systems, real-time systems, real-time systems, verification, formal specification, formal verification, specification, exception handling, exception handling, interrupts, correctness, deadlines, high level languages, timeouts, communication links, system resources, layered approach
67Daniel Zinn, Shawn Bowers, Timothy M. McPhillips, Bertram Ludäscher X-CSR: Dataflow Optimization for Distributed XML Process Pipelines. Search on Bibsonomy ICDE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
67Christine Bassem, Azer Bestavros CSR: Constrained Selfish Routing in Ad-Hoc Networks. Search on Bibsonomy WASA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
67Charu C. Aggarwal, David P. Olshefski, Debanjan Saha, Zon-Yin Shae, Philip S. Yu CSR: Speaker Recognition from Compressed VoIP Packet Stream. Search on Bibsonomy ICME The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
67Amparo Varona, Inés Torres Scaling Acoustic and Language Model Probabilities in a CSR System. Search on Bibsonomy CIARP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
64Beatriz Alarcón, Raúl Gutiérrez, Salvador Lucas Context-Sensitive Dependency Pairs. Search on Bibsonomy FSTTCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF program analysis, termination, term rewriting, Dependency pairs
51Vassilis Spiliopoulos, Alexandros G. Valarakos, George A. Vouros CSR: Discovering Subsumption Relations for the Alignment of Ontologies. Search on Bibsonomy ESWC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ontology alignment, subsumption, supervised machine learning
51Sterling Stuart Stein, Nazli Goharian On the Mapping of Index Compression Techniques on CSR Information Retrieval. Search on Bibsonomy ITCC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
51CSR Prabhu, R. Venkateswara Gandhi, Ajeet K. Jain, Vaibhav Sanjay Lalka, Sree Ganesh Thottempudi, PVRD Prasad Rao A Novel Approach to Extend KM Models with Object Knowledge Model (OKM) and Kafka for Big Data and Semantic Web with Greater Semantics. Search on Bibsonomy CISIS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
48V. Ramasubramanian 0001, Kaustubh Kulkarni, Bernhard Kaemmerer Acoustic modeling by phoneme templates and modified one-pass DP decoding for continuous speech recognition. Search on Bibsonomy ICASSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
48Farid Jaddi, Béatrice Paillassa An Adaptive Hierarchical Extension of DSR: The Cluster Source Routing. Search on Bibsonomy SNPD The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
48Salvador Lucas Termination of Rewriting With Strategy Annotations. Search on Bibsonomy LPAR The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Rewriting strategies, termination
48Jonathan Allan, Tony Allen, Nasser Sherkat, Peter Halstead Automated Assessment: It's Assessment Jim But Not As We Know It. Search on Bibsonomy ICDAR The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
48Wing Seong Wong, Nasser Sherkat, Tony Allen Contextual Focus for Improved Recognition of Hand-Filled Forms. Search on Bibsonomy ICDAR The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
48Clayton D. Stafford, Johannes de Haan Delivering Marketing Expertise to the Front Lines. Search on Bibsonomy IEEE Expert The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
47Jian Li, Wengeng Shi Model of CSR in Chinese Medicine E-commerce Firm: Strategic Management Perspective. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF medicinet, model, E-commerce, CSR
38Anura De Zoysa, Nobyuki Takaoka, Yuqian Zhang Impact of corporate social responsibility (CSR) awareness, affordability and management system sophistication on CSR performance. Search on Bibsonomy Ind. Manag. Data Syst. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
38Jianhua Gao, Weixing Ji, Jie Liu, Senhao Shao, Yizhuo Wang, Feng Shi 0009 AMF-CSR: Adaptive Multi-Row Folding of CSR for SpMV on GPU. Search on Bibsonomy ICPADS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
38Evangelos Markopoulos, Alexandra Staggl, Emma Luisa Gann, Hannu Vanharanta Beyond Corporate Social Responsibility (CSR): Democratizing CSR Towards Environmental, Social and Governance Compliance. Search on Bibsonomy AHFE (18) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
38Sungwon Chung, Sun Young Lee Visual CSR Messages and the Effects of Emotional Valence and Arousal on Perceived CSR Motives, Attitude, and Behavioral Intentions. Search on Bibsonomy Commun. Res. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
38Xiaokang Li, Victor Chang 0001 The Influential Factors of CSR and the Future of CSR in China. Search on Bibsonomy Int. J. Organ. Collect. Intell. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
38Kazuya Uekado, Ling Feng, Masaaki Suzuki, Hayato Ohwada Classification of CSR Using Latent Dirichlet Allocation and Analysis of the Relationship Between CSR and Corporate Value. Search on Bibsonomy PKAW The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
38Yanhai Zhao, Guoxing Zhang, Wei Hou Will CSR pay in the financial sector? An empirical study of a commercial bank's CSR orientation, corporate reputation and customer loyalty in western China. Search on Bibsonomy LISS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
38Warren Burt Barry Truax: Song of Songs Compact disc, 1994, CSR-CD 9401; available from Cambridge Street Records, 4346 Cambridge St., Burnaby, British Columbia V5C 1H4, Canada; fax (604) 299-3864; World Wide Web http: //www.sfu.ca/∼truax/csr.htmlChristian Calon Les corps éblouis Compact disc, 1998, Empreintes DIGITALes IMED 9838; available from DIFFUSION i MéDIA, 4580 avenue de Lorimier, Montreal, Quebec H2H 2B5, Canada; electronic mail dim@cam.org; World Wide Web http: //www.cam.org/∼dim/. Search on Bibsonomy Comput. Music. J. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
35 IEEE International Conference on Cyber Security and Resilience, CSR 2023, Venice, Italy, July 31 - Aug. 2, 2023 Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Ann Marie Reinhold, Travis Weber, Colleen Lemak, Derek Reimanis, Clemente Izurieta New Version, New Answer: Investigating Cybersecurity Static-Analysis Tool Findings. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Silvia Bonomi, Marco Cuoci, Simone Lenti A Semi-automatic Approach for Enhancing the Quality of Automatically Generated Inventories. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Rikard Höglund, Marco Tiloca, Simon Bouget, Shahid Raza Key Update for the IoT Security Standard OSCORE. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Valeria Bonagura, Stefano Panzieri, Federica Pascucci, Leonardo Badia A Game of Age of Incorrect Information Against an Adversary Injecting False Data. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Beny Nugraha, Krishna Yadav, Parag Patil, Thomas Bauschert Improving the Detection of Unknown DDoS Attacks through Continual Learning. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Saeid Sheikhi, Panos Kostakos 0001 Cyber threat hunting using unsupervised federated learning and adversary emulation. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Mohammed Mynuddin, Sultan Uddin Khan, Mahmoud Nabil Mahmoud Trojan Triggers for Poisoning Unmanned Aerial Vehicles Navigation: A Deep Learning Approach. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Mateusz D. Zych, Vasileios Mavroeidis, Konstantinos Fysarakis, Manos Athanatos Reviewing BPMN as a Modeling Notation for CACAO Security Playbooks. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Chrysoula Oikonomou, Ilias Iliopoulos, Dimosthenis Ioannidis, Dimitrios Tzovaras A Multi-Class Intrusion Detection System Based on Continual Learning. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Massinissa Chelghoum, Gueltoum Bendiab, Mohamed Benmohammed, Stavros Shiaeles, Emanuele Bellini 0001 BTV2P: Blockchain-based Trust Model for Secure Vehicles and Pedestrians Networks. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Katsuyuki Umezawa, Sven Wohlgemuth, Keisuke Hasegawa, Kazuo Takaragi Evaluation of Applying LDA to Redacted Documents in Security and Safety Analysis. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Kamal Taha Proactive Measures for Cyber-Physical Systems Cybersecurity. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Jipeng Hou, Lei Xu 0016, Liehuang Zhu, Peng Jiang, Shaorui Song HSchain: Anonymous Permissioned Blockchain with Enhanced Auditability. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Vrizlynn L. L. Thing Deepfake Detection with Deep Learning: Convolutional Neural Networks versus Transformers. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Daniel Machooka, Xiaohong Yuan, Albert C. Esterline A Survey of Attacks and Defenses for Deep Neural Networks. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Andrey Plotnikov, Alla Levina Algorithm for simplifying the SHA-256 operations tree. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Marwan Omar, Stavros Shiaeles VulDetect: A novel technique for detecting software vulnerabilities using Language Models. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Stefano Perone, Luca Faramondi, Roberto Setola Default Credentials Vulnerability: The Case Study of Exposed IP Cams. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Prathibha Keshavamurthy, Sarvesh Kulkarni Early Detection of Reconnaissance Attacks on IoT Devices by Analyzing Performance and Traffic Characteristics. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Ievgen Kabin, Zoya Dyka, Peter Langendoerfer Randomized Addressing Countermeasures are Inefficient Against Address-Bit SCA. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Jorge Casajús-Setién, Concha Bielza, Pedro Larrañaga Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Maria Nintsiou, Elisavet Grigoriou, Paris-Alexandros Karypidis, Theocharis Saoulidis, Eleftherios Fountoukidis, Panagiotis G. Sarigiannidis Threat intelligence using Digital Twin honeypots in Cybersecurity. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Tanwir Ahmad, Dragos Truscan Efficient Early Anomaly Detection of Network Security Attacks Using Deep Learning. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35David Soler, Carlos Dafonte, Francisco Javier Nóvoa, Manuel Fernández-Veiga, Ana Fernández Vilas, Rebeca P. Díaz Redondo Qerberos: A Protocol for Secure Distribution of QRNG Keys. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Vida Ahmadi Mehri, Patrik Arlos, Emiliano Casalicchio Automated Patch Management: An Empirical Evaluation Study. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Kabid Hassan Shibly, Md Delwar Hossain, Hiroyuki Inoue, Yuzo Taenaka, Youki Kadobayashi A Feature-Aware Semi-Supervised Learning Approach for Automotive Ethernet. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Mohamed Faisal Elrawy, Lenos Hadjidemetriou, Christos Laoudias, Maria K. Michael Modelling and Analysing Security Threats Targeting Protective Relay Operations in Digital Substations. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Aman Srivastava, Nitesh Kumar, Anand Handa, Sandeep K. Shukla Ransomware Detection based on Network Behavior using Machine Learning and Hidden Markov Model with Gaussian Emission. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Nishanth Laxman, Daniel Krohmer, Markus Damm, Reinhard Schwarz, Pablo Oliveira Antonino Understanding Resilience: Looking at Frameworks & Standards - A Systematic Study from Cyber Perspective. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Ekzhin Ear, Jose L. C. Remy, Shouhuai Xu Towards Automated Cyber Range Design: Characterizing and Matching Demands to Supplies. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Sandip Roy 0002, Benjamin Drozdenko Control-Implications-Based Side-Channel Monitoring for Embedded Systems. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Nahid Ferdous Aurna, Md Delwar Hossain, Yuzo Taenaka, Youki Kadobayashi Federated Learning-Based Credit Card Fraud Detection: Performance Analysis with Sampling Methods and Deep Learning Algorithms. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Sara Tehranipoor, Nima Karimian, Jack Edmonds 0002 Breaking AES-128: Machine Learning-Based SCA Under Different Scenarios and Devices. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Jan von der Assen, Alberto Huertas Celdrán, Nicolas Huber, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller Moving Target Defense Strategy Selection against Malware in Resource-Constrained Devices. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Callum Aitchison, Basel Halak, Alexander Serb, Themis Prodromakis A PUF Based on the Non-Linearity of Memristors. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Hadi El Karhani, Riad Al Jamal, Yorgo Bou Samra, Imad H. Elhajj, Ayman I. Kayssi Phishing and Smishing Detection Using Machine Learning. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Myria Bouhaddi, Kamel Adi Mitigating Membership Inference Attacks in Machine Learning as a Service. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Panagiotis Savvidis, Nikolaos Vakakis, Antonis Voulgaridis, Emanuele Bellini 0001, Dimosthenis Ioannidis, Konstantinos Votis, Dimitrios Tzovaras Towards a Hybrid Multi-Layer Blockchain-Based Energy Trading Market for Microgrids. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Luca Faramondi, Francesco Flammini, Simone Guarino, Roberto Setola Evaluating Machine Learning Approaches for Cyber and Physical Anomalies in SCADA Systems. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Omer Subasi, Joseph B. Manzano, Kevin Barker Denial of Service Attack Detection via Differential Analysis of Generalized Entropy Progressions. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Daniele Granata, Massimiliano Rak, Francesco Grimaldi Attacking a packet Analyzer: Caronte case study. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Ioannis Siachos, Konstantinos Kaltakis, Konstantina Papachristopoulou, Ioannis Giannoulakis, Emmanouil Kafetzakis Comparison of Machine Learning Algorithms Trained Under Differential Privacy for Intrusion Detection Systems. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Fabio Martinelli, Francesco Mercaldo, Antonella Santone A Driver Detection Method by Means of Explainable Deep Learning. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Maryam Zahid, Alessio Bucaioni, Francesco Flammini Trustworthiness-Related Risks in Autonomous Cyber-Physical Production Systems - A Survey. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Sotirios Nikoletos, Stefanos Vlachos, Efstathios Zaragkas, Costas Vassilakis, Christos Tryfonopoulos, Paraskevi Raftopoulou RoG§: A Pipeline for Automated Sensitive Data Identification and Anonymisation. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Khaled Alotaibi, Rafat Rob, Dana Nour, Doaa Zamzami Detecting Subspace Malicious Vectors Attack Against Smart Grid Using Sequence-Alignment Method. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Alessandro Bellini, Emanuele Bellini 0001, Massimo Bertini, Doaa Almhaithawi, Stefano Cuomo Multi-party Computation for Privacy and Security in Machine Learning: a Practical Review. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Alberto Pedrouzo-Ulloa, Jan Ramon, Fernando Pérez-González, Siyanna Lilova, Patrick Duflot, Zakaria Chihani, Nicola Gentili, Paola Ulivi, Mohammad Ashadul Hoque, Twaha Mukammel, Zeev Pritzker, Augustin Lemesle, Jaime Loureiro-Acuña, Xavier Martínez, Gonzalo Jiménez-Balsa Introducing the TRUMPET project: TRUstworthy Multi-site Privacy Enhancing Technologies. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Khatereh Ahmadi, Reza Javidan DDoS Attack Detection in a Real Urban IoT Environment Using Federated Deep Learning. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Luke Vandenberghe, Hari Manassery Koduvely, Maria Pospelova Detecting Internal Reconnaissance Behavior Through Classification of Command Collections. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Luís Oliveira, Andrzej Chmielewski, Paulina Rutecka, Karina Cicha, Mariia Rizun, Nuno Torres, Pedro Pinto 0001 Assessing Cybersecurity Hygiene and Cyber Threats Awareness in the Campus - A Case Study of Higher Education Institutions in Portugal and Poland. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Orkhan Gasimov, Risto Vaarandi, Mauno Pihelgas Comparative Analysis of Pattern Mining Algorithms for Event Logs. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Mohamed Amine Ben Farah, M. Omar Al-Kadri, Yussuf Ahmed, Raouf Abouzariba, Xavier J. A. Bellekens Cyber Incident Scenarios in the Maritime Industry: Risk Assessment and Mitigation Strategies. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Aleksandra Pawlicka, Damian Puchalski, Marek Pawlicki, Rafal Kozik, Michal Choras How to secure the IoT-based surveillance systems in an ELEGANT way. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Kyriaki Tsantikidou, Dimitrios Boufeas, Nicolas Sklavos 0001 Area-Delay Efficient Security Scheme for Smart Hospital Systems. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Pandu Ranga Reddy Konala, Vimal Kumar, David Bainbridge 0001 SoK: Static Configuration Analysis in Infrastructure as Code Scripts. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Alberto Pedrouzo-Ulloa, Aymen Boudguiga, Olive Chakraborty, Renaud Sirdey, Oana Stan, Martin Zuber Practical Multi-Key Homomorphic Encryption for More Flexible and Efficient Secure Federated Average Aggregation. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Yashovardhan Sharma, Eleonora Giunchiglia, Simon Birnbach, Ivan Martinovic To TTP or not to TTP?: Exploiting TTPs to Improve ML-based Malware Detection. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Rob Van Kranenburg, Rohit Bohara, Raphael Yahalom, Mirko Ross Cyber Resilience, Societal Situational Awareness for SME. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Waldemar Cruz, Laurent D. Michel, Benjamin Drozdenko, Steven Roodbeen ML and Network Traces to M.A.R.S. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Ortal Dayan, Lior Wolf, Fang Wang, Yaniv Harel Optimizing AI for Mobile Malware Detection by Self-Built-Dataset GAN Oversampling and LGBM. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Evangelos Dragonas, Costas Lambrinoudakis IoT Forensics: Analysis of Ajax Systems' mobile app for the end user. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Sevasti Grigoriadou, Panagiotis I. Radoglou-Grammatikis, Panagiotis G. Sarigiannidis, Ioannis Makris, Thomas Lagkas, Vasileios Argyriou, Anastasios Lytos, Eleftherios Fountoukidis Hunting IoT Cyberattacks With AI - Powered Intrusion Detection. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Abubakr Ibrahim, Mohamed Mejri, Fehmi Jaafar An Explainable Artificial Intelligence Approach for a Trustworthy Spam Detection. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Marcus L. Green, Priya Dozier Understanding Human Factors of Cybersecurity: Drivers of Insider Threats. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 1214 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license