Results
Found 6468 publication records. Showing 6468 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
106 | Flora S. Tsai, Kap Luk Chan |
Detecting Cyber Security Threats in Weblogs Using Probabilistic Models. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
cyber terrorism, data mining, blog, weblog, probabilistic latent semantic analysis, cyber security, cyber crime |
91 | Mohamed Dâfir Ech-Cherif El Kettani, Taieb Debbagh |
NCSec: a national cyber security referential for the development of a code of practice in national cyber security management. |
ICEGOV |
2008 |
DBLP DOI BibTeX RDF |
ISO27002, cyber criminality, referential, organizational structure, cyber security |
69 | M. Sindhu, S. Kumar Sajan, M. Sethumadhavan 0001 |
Error Linear Complexity Measures of Binary Multisequences. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
69 | N. V. Narendra Kumar, Harshit J. Shah, R. K. Shyamasundar |
Towards Checking Tampering of Software. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
69 | Asoke K. Talukder |
Securing Next Generation Internet Services. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
69 | N. Harini, C. K. Shyamala, T. R. Padmanabhan |
Securing Cloud Environment. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
69 | Rajbir Kaur, Manoj Singh Gaur, P. Lalith Suresh, Vijay Laxmi |
DoS Attacks in MANETs: Detection and Countermeasures. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
69 | Divya Shankar, Manish Agrawal, H. Raghav Rao |
Emergency Response to Mumbai Terror Attacks: An Activity Theory Analysis. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
69 | Narayanankutty Karuppath, P. Achuthan |
Einstein-Podolsky-Rosen Paradox and Certain Aspects of Quantum Cryptology with Some Applications. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
69 | Kenneth J. Giuliani, V. Kumar Murty |
An Examination of Identity Management Models in an Internet Setting. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
69 | C. Warren Axelrod, Sukumar Haldar |
Combined Impact of Outsourcing and Hard Times on BPO Risk and Security. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
69 | Himanshu Maheshwari, Harvey S. Hyman, Manish Agrawal |
A Comparison of Cyber-Crime Definitions in India and the United States. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
69 | Charulata Chaudhary, Ishupal Singh Kang |
Pirates of the Copyright and Cyberspace: Issues Involved. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
69 | Chungath Srinivasan, K. V. Lakshmy, Madathil Sethumadhavan |
Complexity Measures of Cryptographically Secure Boolean Functions. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
69 | P. Vinod 0001, Vijay Laxmi, Manoj Singh Gaur |
Metamorphic Malware Analysis and Detection Methods. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
69 | Rajarshi Chakraborty, Haricharan Rengamani, Ponnurangam Kumaraguru, H. Raghav Rao |
The UID Project: Lessons Learned from the West and Challenges Identified for India. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
69 | P. P. Amritha, T. Gireesh Kumar |
A Survey on Digital Image Steganographic Methods. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
69 | S. Sajan Kumar, M. Hari Krishna Prasad, Suresh Raju Pilli |
Extended Time Machine Design using Reconfigurable Computing for Efficient Recording and Retrieval of Gigabit Network Traffic. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
69 | Mohit Virendra, Qi Duan, Shambhu J. Upadhyaya |
Detecting Cheating Aggregators and Report Dropping Attacks in Wireless Sensor Networks. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
69 | Suja Ramachandran, R. S. Mundada, A. K. Bhattacharjee, C. S. R. C. Murthy, R. Sharma |
Classifying Host Anomalies: Using Ontology in Information Security Monitoring. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
56 | Mohammad Tehranipoor, Farinaz Koushanfar |
A Survey of Hardware Trojan Taxonomy and Detection. |
IEEE Des. Test Comput. |
2010 |
DBLP DOI BibTeX RDF |
hardware Trojans, Trojan taxonomy and detection, security, design and test, ICs |
52 | Joseph Kaberuka, Christopher W. Johnson 0001 |
Adapting STPA-sec for Socio-technical Cyber Security Challenges in Emerging Nations: A Case Study in Risk Management for Rwandan Health Care. |
Cyber Security |
2020 |
DBLP DOI BibTeX RDF |
|
52 | Martin Fejrskov, Jens Myrup Pedersen, Emmanouil Vasilomanolakis |
Cyber-security research by ISPs: A NetFlow and DNS Anonymization Policy. |
Cyber Security |
2020 |
DBLP DOI BibTeX RDF |
|
52 | Muntaha Saleem |
Brexit Impact on Cyber Security of United Kingdom. |
Cyber Security |
2019 |
DBLP DOI BibTeX RDF |
|
52 | Remy Remigius Zgraggen |
Cyber Security Supervision in the Insurance Sector: Smart Contracts and Chosen Issues. |
Cyber Security |
2019 |
DBLP DOI BibTeX RDF |
|
52 | Florian Skopik, Stefan Filip |
Design principles for national cyber security sensor networks: Lessons learned from small-scale demonstrators. |
Cyber Security |
2019 |
DBLP DOI BibTeX RDF |
|
52 | Meha Shukla, Shane D. Johnson, Peter Jones |
Does the NIS implementation strategy effectively address cyber security risks in the UK? |
Cyber Security |
2019 |
DBLP DOI BibTeX RDF |
|
52 | Martin Gilje Jaatun, Marie Elisabeth Gaup Moe, Per Erik Nordbo |
Cyber Security Considerations for Self-healing Smart Grid Networks. |
Cyber Security |
2018 |
DBLP DOI BibTeX RDF |
|
52 | Marcelo Paiva Fontenele, Lily Sun |
Knowledge management of cyber security expertise: an ontological approach to talent discovery. |
Cyber Security And Protection Of Digital Services |
2016 |
DBLP DOI BibTeX RDF |
|
51 | David H. C. Du |
Cyber Security: An Obtainable Goal? |
ICDCS Workshops |
2008 |
DBLP DOI BibTeX RDF |
|
51 | Gregory B. White |
The Community Cyber Security Maturity Model. |
HICSS |
2007 |
DBLP DOI BibTeX RDF |
|
51 | Abdul Quaiyum Ansari, Tapasya Patki, A. B. Patki, V. Kumar |
Integrating Fuzzy Logic and Data Mining: Impact on Cyber Security. |
FSKD (4) |
2007 |
DBLP DOI BibTeX RDF |
|
48 | Ashok Vaseashta, Philip Susmann, Eric Braman |
Cyber Security - Threat Scenarios, Policy Framework and Cyber Wargames. |
Cyber Security and Resiliency Policy Framework |
2014 |
DBLP DOI BibTeX RDF |
|
48 | Sabina Barakovic, Mladen Mrkaja, Amir Husic, Adnan Kulovac, Jasmina Barakovic Husic |
Overview of the Current Situation in Bosnia and Herzegovina with Focus on Cyber Security and Fighting Cyber-Crime by Establishment of BIH CERT Body. |
Cyber Security and Resiliency Policy Framework |
2014 |
DBLP DOI BibTeX RDF |
|
46 | Anthony M. Cresswell, Shahidul Hassan |
Organizational Impacts of Cyber Security Provisions: A Sociotechnical Framework. |
HICSS |
2007 |
DBLP DOI BibTeX RDF |
|
43 | Kyle E. Stewart, Jeffrey W. Humphries, Todd R. Andel |
Developing a virtualization platform for courses in networking, systems administration and cyber security education. |
SpringSim |
2009 |
DBLP DOI BibTeX RDF |
network education, network training, virtualization, network simulation, cyber security |
43 | Eugene H. Spafford |
Cyber Security: Assessing Our Vulnerabilities and Developing an Effective Defense. |
ISIPS |
2008 |
DBLP DOI BibTeX RDF |
security policy, vulnerabilities, patching, cyber security, security education |
42 | Michael E. Kuhl, Jason Kistner, Kevin Costantini, Moises Sudit |
Cyber attack modeling and simulation for network security analysis. |
WSC |
2007 |
DBLP DOI BibTeX RDF |
|
42 | Scott Dynes, Eric Goetz, Michael Freeman |
Cyber Security: Are Economic Incentives Adequate? |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
economic incentives, Information security, government policy |
41 | |
2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020 |
Cyber Security |
2020 |
DBLP BibTeX RDF |
|
41 | Neeraj Jain, Balwinder Raj |
SOI FinFET for Computer Networks and Cyber Security Systems. |
Handbook of Computer Networks and Cyber Security |
2020 |
DBLP DOI BibTeX RDF |
|
41 | Andrew Rae, Asma Patel |
Developing a security behavioural assessment approach for cyber rating UK MSBs. |
Cyber Security |
2020 |
DBLP DOI BibTeX RDF |
|
41 | Joel Chacon, Sean McKeown, Richard Macfarlane |
Towards Identifying Human Actions, Intent, and Severity of APT Attacks Applying Deception Techniques - An Experiment. |
Cyber Security |
2020 |
DBLP DOI BibTeX RDF |
|
41 | Théo Simon, Bertrand Venard |
Technical codes'potentialities in cybersecurity. A contextual approach on the ethics of small digital organizations in France. |
Cyber Security |
2020 |
DBLP DOI BibTeX RDF |
|
41 | Nebrase Elmrabit, Feixiang Zhou, Fengyin Li, Huiyu Zhou 0001 |
Evaluation of Machine Learning Algorithms for Anomaly Detection. |
Cyber Security |
2020 |
DBLP DOI BibTeX RDF |
|
41 | Waleed Alghamdi, Michael Schukat |
Slave Clock Responses to Precision Time Protocol Attacks: A Case Study. |
Cyber Security |
2020 |
DBLP DOI BibTeX RDF |
|
41 | Enoch Agyepong, Yulia Cherdantseva, Philipp Reinecke, Pete Burnap |
Towards a Framework for Measuring the Performance of a Security Operations Center Analyst. |
Cyber Security |
2020 |
DBLP DOI BibTeX RDF |
|
41 | John O'Raw, David M. Laverty |
Restricting Data Flows to Secure Against Remote Attack. |
Cyber Security |
2020 |
DBLP DOI BibTeX RDF |
|
41 | Uchenna Daniel Ani, Hongmei He, Ashutosh Tiwari |
Vulnerability-Based Impact Criticality Estimation for Industrial Control Systems. |
Cyber Security |
2020 |
DBLP DOI BibTeX RDF |
|
41 | Yunjia Wang, Yang Liu, Tiejun Wu, Ishbel Duncan |
A Cost-Effective OCR Implementation to Prevent Phishing on Mobile Platforms. |
Cyber Security |
2020 |
DBLP DOI BibTeX RDF |
|
41 | Pascal Faurie, Arghir-Nicolae Moldovan, Irina Tal |
Privacy Policy - "I agree"?! - Do alternatives to text-based policies increase the awareness of the users? |
Cyber Security |
2020 |
DBLP DOI BibTeX RDF |
|
41 | Andrew McCarthy, Benedict R. Gaster, Phil Legg |
Shouting Through Letterboxes: A study on attack susceptibility of voice assistants. |
Cyber Security |
2020 |
DBLP DOI BibTeX RDF |
|
41 | Daniel Reti, Daniel Fraunholz, Janis Zemitis, Daniel Schneider 0007, Hans Dieter Schotten |
Deep Down the Rabbit Hole: On References in Networks of Decoy Elements. |
Cyber Security |
2020 |
DBLP DOI BibTeX RDF |
|
41 | Johannes Mols, Emmanouil Vasilomanolakis |
ethVote: Towards secure voting with distributed ledgers. |
Cyber Security |
2020 |
DBLP DOI BibTeX RDF |
|
41 | Christopher Kelly, Nikolaos Pitropakis, Sean McKeown, Costas Lambrinoudakis |
Testing And Hardening IoT Devices Against the Mirai Botnet. |
Cyber Security |
2020 |
DBLP DOI BibTeX RDF |
|
41 | Pranshu Bajpai, Richard J. Enbody |
An Empirical Study of Key Generation in Cryptographic Ransomware. |
Cyber Security |
2020 |
DBLP DOI BibTeX RDF |
|
41 | Martin Gilje Jaatun, Lars Bodsberg, Tor Olav Grøtan, Marie Elisabeth Gaup Moe |
An Empirical Study of CERT Capacity in the North Sea. |
Cyber Security |
2020 |
DBLP DOI BibTeX RDF |
|
41 | Inger Anne Tøndel, Ravishankar Borgaonkar, Martin Gilje Jaatun, Christian Frøystad |
What Could Possibly Go Wrong? Smart Grid Misuse Case Scenarios. |
Cyber Security |
2020 |
DBLP DOI BibTeX RDF |
|
41 | Tapadhir Das, Abdel Rahman Eldosouky, Shamik Sengupta |
Think Smart, Play Dumb: Analyzing Deception in Hardware Trojan Detection Using Game Theory. |
Cyber Security |
2020 |
DBLP DOI BibTeX RDF |
|
41 | Timothy D. Williams |
Epistemological Questions for Cybersecurity. |
Cyber Security |
2020 |
DBLP DOI BibTeX RDF |
|
41 | Gwyn Wilkinson, Phil Legg |
"What did you say?": Extracting unintentional secrets from predictive text learning systems. |
Cyber Security |
2020 |
DBLP DOI BibTeX RDF |
|
41 | Fadi N. Sibai |
AI Crimes: A Classification. |
Cyber Security |
2020 |
DBLP DOI BibTeX RDF |
|
41 | Sean McKeown, Gordon Russell 0001 |
Forensic Considerations for the High Efficiency Image File Format (HEIF). |
Cyber Security |
2020 |
DBLP DOI BibTeX RDF |
|
41 | Katia Raya, Nicole D'Almeida, Maroun Chamoun |
Social big data: A Twitter text mining approach to the communication of universities during the Lebanese protests. |
Cyber Security |
2020 |
DBLP DOI BibTeX RDF |
|
41 | Pranshu Bajpai, Richard J. Enbody |
Memory Forensics Against Ransomware. |
Cyber Security |
2020 |
DBLP DOI BibTeX RDF |
|
41 | Joshua A. Sipper |
Cyber Threat Intelligence and the Cyber Meta-Reality and Cyber Microbiome. |
Cyber Security |
2020 |
DBLP DOI BibTeX RDF |
|
41 | Joshua Talbot, Przemek Pikula, Craig Sweetmore, Samuel Rowe, Hanan Hindy, Christos Tachtatzis, Robert C. Atkinson, Xavier J. A. Bellekens |
A Security Perspective on Unikernels. |
Cyber Security |
2020 |
DBLP DOI BibTeX RDF |
|
41 | Tharindu Ranathunga, Ramona Marfievici, Alan McGibney, Susan Rea |
A DLT-based Trust Framework for IoT Ecosystems. |
Cyber Security |
2020 |
DBLP DOI BibTeX RDF |
|
41 | Felix Anda, Brett A. Becker, David Lillis, Nhien-An Le-Khac, Mark Scanlon |
Assessing the Influencing Factors on the Accuracy of Underage Facial Age Estimation. |
Cyber Security |
2020 |
DBLP DOI BibTeX RDF |
|
41 | Hanlin Chen, Hongmei He, Andrew Starr 0001 |
An Overview of Web Robots Detection Techniques. |
Cyber Security |
2020 |
DBLP DOI BibTeX RDF |
|
41 | Drew Malzahn, Zachary Birnbaum, Cimone Wright-Hamor |
Automated Vulnerability Testing via Executable Attack Graphs. |
Cyber Security |
2020 |
DBLP DOI BibTeX RDF |
|
41 | Aikaterini Kanta, Iwen Coisel, Mark Scanlon |
Smarter Password Guessing Techniques Leveraging Contextual Information and OSINT. |
Cyber Security |
2020 |
DBLP DOI BibTeX RDF |
|
41 | Xiaoyu Du, Quan Le, Mark Scanlon |
Automated Artefact Relevancy Determination from Artefact Metadata and Associated Timeline Events. |
Cyber Security |
2020 |
DBLP DOI BibTeX RDF |
|
41 | Matthew Spradling, Jeremy Straub, Jay Strong |
Introducing & Evaluating 'Nutrition Facts' for Online Content. |
Cyber Security |
2020 |
DBLP DOI BibTeX RDF |
|
41 | Marco M. Cook, Ioannis Stavrou, Sarah Dimmock, Chris W. Johnson 0001 |
Introducing a forensics data type taxonomy of acquirable artefacts from programmable logic controllers. |
Cyber Security |
2020 |
DBLP DOI BibTeX RDF |
|
41 | Jonathan Francis Roscoe, Max Smith-Creasey |
Acoustic Emanation of Haptics as a Side-Channel for Gesture-Typing Attacks. |
Cyber Security |
2020 |
DBLP DOI BibTeX RDF |
|
41 | Evangelos Moustakas, Nishtha Lamba, Dina Mahmoud, C. Ranganathan |
Blurring lines between fiction and reality: Perspectives of experts on marketing effectiveness of virtual influencers. |
Cyber Security |
2020 |
DBLP DOI BibTeX RDF |
|
41 | Andrei Lima Queiroz, Brian Keegan, Susan McKeever |
Moving Targets: Addressing Concept Drift in Supervised Models for Hacker Communication Detection. |
Cyber Security |
2020 |
DBLP DOI BibTeX RDF |
|
41 | Jordan Richard Schoenherr, Robert Thomson 0001 |
Insider Threat Detection: A Solution in Search of a Problem. |
Cyber Security |
2020 |
DBLP DOI BibTeX RDF |
|
41 | Tolga Ünlü, Lynsay A. Shepherd, Natalie Coull, Colin McLean |
A Taxonomy of Approaches for Integrating Attack Awareness in Applications. |
Cyber Security |
2020 |
DBLP DOI BibTeX RDF |
|
41 | Clemens Krueger, Sean McKeown |
Using Amazon Alexa APIs as a Source of Digital Evidence. |
Cyber Security |
2020 |
DBLP DOI BibTeX RDF |
|
41 | Bertrand Venard |
Protection Behaviours: a diversity of individual strategies. |
Cyber Security |
2020 |
DBLP DOI BibTeX RDF |
|
41 | Arman Zand, James Orwell, Eckhard Pfluegel |
A Secure Framework for Anti-Money-Laundering using Machine Learning and Secret Sharing. |
Cyber Security |
2020 |
DBLP DOI BibTeX RDF |
|
41 | Sebastião Rogério da Silva Neto, Thomás Tabosa de Oliveira, Vanderson de Souza Sampaio, Theo Lynn, Patricia Takako Endo |
Platform for monitoring and clinical diagnosis of arboviruses using computational models. |
Cyber Security |
2020 |
DBLP DOI BibTeX RDF |
|
41 | Lukas Gressl, Michael Krisper, Christian Steger, Ulrich Neffe |
Towards Security Attack and Risk Assessment during Early System Design. |
Cyber Security |
2020 |
DBLP DOI BibTeX RDF |
|
41 | |
2019 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Oxford, United Kingdom, June 3-4, 2019 |
Cyber Security |
2019 |
DBLP BibTeX RDF |
|
41 | Terézia Mézesová, Hayretdin Bahsi |
Expert Knowledge Elicitation for Skill Level Categorization of Attack Paths. |
Cyber Security |
2019 |
DBLP DOI BibTeX RDF |
|
41 | Belqassim Bouteghrine, Mohammed Rabiai, Camel Tanougast, Said Sadoudi |
Hardware Implementation of Secured Socket Communication based on Chaotic Cryptosystem. |
Cyber Security |
2019 |
DBLP DOI BibTeX RDF |
|
41 | Leonard Renners, Felix Heine, Carsten Kleiner, Gabi Dreo Rodosek |
Adaptive and Intelligible Prioritization for Network Security Incidents. |
Cyber Security |
2019 |
DBLP DOI BibTeX RDF |
|
41 | Chunlei Li 0001, Chunming Rong, Martin Gilje Jaatun |
A Cost-efficient Protocol for Open Blockchains. |
Cyber Security |
2019 |
DBLP DOI BibTeX RDF |
|
41 | Nora Tomas, Jingyue Li, Huang Huang |
An Empirical Study on Culture, Automation, Measurement, and Sharing of DevSecOps. |
Cyber Security |
2019 |
DBLP DOI BibTeX RDF |
|
41 | Subhi Alrubei, Jonathan Michael Rigelsford, Callum Willis, Edward Ball 0001 |
Ethereum Blockchain for Securing the Internet of Things: Practical Implementation and Performance Evaluation. |
Cyber Security |
2019 |
DBLP DOI BibTeX RDF |
|
41 | Yuxiang Hong, Steven Furnell |
Organizational formalization and employee information security behavioral intentions based on an extended TPB model. |
Cyber Security |
2019 |
DBLP DOI BibTeX RDF |
|
41 | Wenting Li, Haibo Cheng, Ping Wang 0003 |
Secure Chaotic Maps-based Authentication Scheme for Real-Time Data Access In Internet of Things. |
Cyber Security |
2019 |
DBLP DOI BibTeX RDF |
|
41 | Jonah Burgess, Domhnall Carlin, Philip O'Kane, Sakir Sezer |
MANiC: Multi-step Assessment for Crypto-miners. |
Cyber Security |
2019 |
DBLP DOI BibTeX RDF |
|
41 | Adrian J. Duncan, Sadie Creese, Michael Goldsmith |
A Combined Attack-Tree and Kill-Chain Approach to Designing Attack-Detection Strategies for Malicious Insiders in Cloud Computing. |
Cyber Security |
2019 |
DBLP DOI BibTeX RDF |
|
41 | Kamalakanta Sethi, Ankit Pradhan, R. Punith, Padmalochan Bera |
A Scalable Attribute Based Encryption for Secure Data Storage and Access in Cloud. |
Cyber Security |
2019 |
DBLP DOI BibTeX RDF |
|
41 | Basil Alothman |
Raw Network Traffic Data Preprocessing and Preparation for Automatic Analysis. |
Cyber Security |
2019 |
DBLP DOI BibTeX RDF |
|
41 | Cyril Onwubiko, Karim Ouazzane |
Cyber Onboarding is 'Broken'. |
Cyber Security |
2019 |
DBLP DOI BibTeX RDF |
|
41 | Karin Bernsmed, Martin Gilje Jaatun |
Threat modelling and agile software development: Identified practice in four Norwegian organisations. |
Cyber Security |
2019 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 6468 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |