The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase Cyber-crime (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1998-2002 (15) 2003-2006 (16) 2007-2009 (35) 2010 (21) 2011 (47) 2012 (26) 2013 (22) 2014-2015 (23) 2016-2017 (31) 2018 (17) 2019-2020 (24) 2021 (28) 2022 (33) 2023 (47) 2024 (3)
Publication types (Num. hits)
article(58) book(1) incollection(20) inproceedings(296) proceedings(13)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 40 occurrences of 24 keywords

Results
Found 388 publication records. Showing 388 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
343Heum Park, SunHo Cho, Hyuk-Chul Kwon Cyber Forensics Ontology for Cyber Criminal Investigation. Search on Bibsonomy e-Forensics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF criminal investigation, cyber forensics, ontology, digital evidence, cyber crime
107Himanshu Maheshwari, Harvey S. Hyman, Manish Agrawal A Comparison of Cyber-Crime Definitions in India and the United States. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
106Flora S. Tsai, Kap Luk Chan Detecting Cyber Security Threats in Weblogs Using Probabilistic Models. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cyber terrorism, data mining, blog, weblog, probabilistic latent semantic analysis, cyber security, cyber crime
88M. Sindhu, S. Kumar Sajan, M. Sethumadhavan 0001 Error Linear Complexity Measures of Binary Multisequences. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
88N. V. Narendra Kumar, Harshit J. Shah, R. K. Shyamasundar Towards Checking Tampering of Software. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
88Asoke K. Talukder Securing Next Generation Internet Services. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
88N. Harini, C. K. Shyamala, T. R. Padmanabhan Securing Cloud Environment. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
88Rajbir Kaur, Manoj Singh Gaur, P. Lalith Suresh, Vijay Laxmi DoS Attacks in MANETs: Detection and Countermeasures. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
88Divya Shankar, Manish Agrawal, H. Raghav Rao Emergency Response to Mumbai Terror Attacks: An Activity Theory Analysis. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
88Narayanankutty Karuppath, P. Achuthan Einstein-Podolsky-Rosen Paradox and Certain Aspects of Quantum Cryptology with Some Applications. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
88Kenneth J. Giuliani, V. Kumar Murty An Examination of Identity Management Models in an Internet Setting. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
88C. Warren Axelrod, Sukumar Haldar Combined Impact of Outsourcing and Hard Times on BPO Risk and Security. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
88Charulata Chaudhary, Ishupal Singh Kang Pirates of the Copyright and Cyberspace: Issues Involved. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
88Chungath Srinivasan, K. V. Lakshmy, Madathil Sethumadhavan Complexity Measures of Cryptographically Secure Boolean Functions. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
88P. Vinod 0001, Vijay Laxmi, Manoj Singh Gaur Metamorphic Malware Analysis and Detection Methods. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
88Rajarshi Chakraborty, Haricharan Rengamani, Ponnurangam Kumaraguru, H. Raghav Rao The UID Project: Lessons Learned from the West and Challenges Identified for India. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
88P. P. Amritha, T. Gireesh Kumar A Survey on Digital Image Steganographic Methods. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
88S. Sajan Kumar, M. Hari Krishna Prasad, Suresh Raju Pilli Extended Time Machine Design using Reconfigurable Computing for Efficient Recording and Retrieval of Gigabit Network Traffic. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
88Mohit Virendra, Qi Duan, Shambhu J. Upadhyaya Detecting Cheating Aggregators and Report Dropping Attacks in Wireless Sensor Networks. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
88Suja Ramachandran, R. S. Mundada, A. K. Bhattacharjee, C. S. R. C. Murthy, R. Sharma Classifying Host Anomalies: Using Ontology in Information Security Monitoring. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
81H. C. Lee Cyber crime and challenges for crime investigation in the information era. Search on Bibsonomy ISI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
68Kam-Pui Chow, C. F. Chong, Pierre K. Y. Lai, Lucas Chi Kwong Hui, Kevin K. H. Pun, Wai Wan Tsang, H. W. Chan Digital Evidence Search Kit. Search on Bibsonomy SADFE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
62Da-Yu Kao, Shiuh-Jeng Wang, Frank Fu-Yuan Huang Digitized Forensic Investigation at P2P Copyright Controversy, Infringement. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF P2P Model, Copyright Protection, Digital Content, Forensic Analysis, Cyber-crime
57Ed Gabrys The International Dimensions of Cyber-Crime, Part 2: A Look at the Council of Europe's Cyber-Crime Convention and the Need for an International Regime to Fight Cyber-Crime. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
51A. B. Patki, S. Lakshminarayanan, S. Sivasubramanian, S. S. Sarma Cyber Crime Information System for Cyberethics Awareness. Search on Bibsonomy CW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Cyber crime services, IT Act 2000, Data overload, Fuzzy Database, Intelligent Information System
47Jigang Liu, Tetsutaro Uehara Computer Forensics in Japan: A Preliminary Study. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
47Abdul Quaiyum Ansari, Tapasya Patki, A. B. Patki, V. Kumar Integrating Fuzzy Logic and Data Mining: Impact on Cyber Security. Search on Bibsonomy FSKD (4) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
39Kweku Kwakye Arthur, Martin S. Olivier, Hein S. Venter, Jan H. P. Eloff Considerations Towards a Cyber Crime Profiling System. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
38Michael Mundt, Harald Baier Cyber Crime Undermines Data Privacy Efforts - On the Balance Between Data Privacy and Security. Search on Bibsonomy ICDF2C The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
38Indira Mahalingam Carr, Katherine S. Williams Draft Cyber-Crime Convention: Criminalization and The Council of Europe (Draft) Convention on Cyber-Crime. Search on Bibsonomy Comput. Law Secur. Rev. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
32Clare Chambers, Umut Turksen E-Banking and e-Fraud: A Comparison Investigation in Jamaica and the UK. Search on Bibsonomy ICDS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF E-fraud, E-commerce, E-banking, Cyber crime
32Chun Wei, Alan P. Sprague, Gary Warner Clustering malware-generated spam emails with a novel fuzzy string matching algorithm. Search on Bibsonomy SAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF data mining, spam, electronic mail, forensics, cyber crime
32Chun Wei, Alan P. Sprague, Gary Warner, Anthony Skjellum Mining spam email to identify common origins for forensic application. Search on Bibsonomy SAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF data mining, spam, electronic mail, forensic analysis, cyber crime
32Chun Wei, Alan P. Sprague, Gary Warner Detection of networks blocks used by the Storm Worm botnet. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF data mining, spam, electronic mail, forensic analysis, cyber crime
32Enid Mumford Problems, knowledge, solutions: solving complex problems (invited session). Search on Bibsonomy ICIS The full citation details ... 1998 DBLP  BibTeX  RDF methods, solutions, problems, cyber crime, drugs
32Harjinder Singh Lallie 0001, Lynsay A. Shepherd, Jason R. C. Nurse, Arnau Erola, Gregory Epiphaniou, Carsten Maple, Xavier J. A. Bellekens Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Search on Bibsonomy Comput. Secur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
32Harjinder Singh Lallie 0001, Lynsay A. Shepherd, Jason R. C. Nurse, Arnau Erola, Gregory Epiphaniou, Carsten Maple, Xavier J. A. Bellekens Cyber Security in the Age of COVID-19: A Timeline and Analysis of Cyber-Crime and Cyber-Attacks during the Pandemic. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
32Raghu Santanam 0001, M. Sethumadhavan 0001, Mohit Virendra (eds.) Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives. Search on Bibsonomy 2011 DBLP  DOI  BibTeX  RDF
32Peter Adewale Amosun, Olugbenga Adedayo Ige, Kim-Kwang Raymond Choo Impact of a participatory cyber crime prevention programme on secondary school students' attainment in crime prevention concepts in civic education and social studies. Search on Bibsonomy Educ. Inf. Technol. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
32Kit Burden, Creole Palmer Internet crime: Cyber Crime - A new breed of criminal? Search on Bibsonomy Comput. Law Secur. Rev. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
32Peter Csonka Internet Crima: The Draft Council of Europe Convention on Cyber-Crime: A Response to the Challenge of Crime in the Age of the Internet? Search on Bibsonomy Comput. Law Secur. Rev. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
29Felicia R. Doswell A case study on computer security for non-expert computer user. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF intrusion detection, computer security
29Georgia Frantzeskou, Efstathios Stamatatos, Stefanos Gritzalis, Sokratis K. Katsikas Source Code Author Identification Based on N-gram Author Profiles. Search on Bibsonomy AIAI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Paulo Veríssimo Thou Shalt Not Trust non-Trustworthy Systems. Search on Bibsonomy ICDCS Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Georgia Frantzeskou, Efstathios Stamatatos, Stefanos Gritzalis, Sokratis K. Katsikas Effective identification of source code authors using byte-level information. Search on Bibsonomy ICSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF software forensics, source code authorship identification
26Ramesh Chandra, Vaibhav Bhatnagar Cyber-squatting: a cyber crime more than an unethical act. Search on Bibsonomy Int. J. Soc. Comput. Cyber Phys. Syst. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
26Matthew Hull, Thaddeus Eze, Lee Speakman Policing The Cyber Threat: Exploring the Threat from Cyber Crime and the Ability of Local Law Enforcement to Respond. Search on Bibsonomy EISIC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26Minhee Joo, Junwoo Seo, Junhyoung Oh, Mookyu Park, Kyungho Lee Situational Awareness Framework for Cyber Crime Prevention Model in Cyber Physical System. Search on Bibsonomy ICUFN The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26Sabina Barakovic, Mladen Mrkaja, Amir Husic, Adnan Kulovac, Jasmina Barakovic Husic Overview of the Current Situation in Bosnia and Herzegovina with Focus on Cyber Security and Fighting Cyber-Crime by Establishment of BIH CERT Body. Search on Bibsonomy Cyber Security and Resiliency Policy Framework The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
26Poonam Kumar, Saurabh Mittal The Perpetration and Prevention of Cyber Crime: An Analysis of Cyber Terrorism in India. Search on Bibsonomy Int. J. Technoethics The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
26Susan Haugen E-government, cyber-crime and cyber-terrorism: a population at risk. Search on Bibsonomy Electron. Gov. an Int. J. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Talania Grobler, Buks Louwrens Digital Forensic Readiness as a Component of Information Security Best Practice. Search on Bibsonomy SEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Ming-Yuh Huang Critical Information Assurance Challenges for Modern Large-Scale Infrastructures. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Swati Sharma, Varsha Sharma IGO_CM: An Improved Grey-Wolf Optimization Based Classification Model for Cyber Crime Data Analysis Using Machine Learning. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Sanjay Goel, Paulo Roberto Nunes de Souza (eds.) Digital Forensics and Cyber Crime - 14th EAI International Conference, ICDF2C 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part I Search on Bibsonomy ICDF2C (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Sanjay Goel, Paulo Roberto Nunes de Souza (eds.) Digital Forensics and Cyber Crime - 14th EAI International Conference, ICDF2C 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part II Search on Bibsonomy ICDF2C (2) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19V. S. Nageswara Rao Kadiyala, Ripon Patgiri Chapter Seventeen - An investigation on socio-cyber crime graph. Search on Bibsonomy Adv. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Yijun Cai, Dian Li, Yuyue Wang 0002 Social IoT data mining and cyber-crime forensics under complex cloud environment. Search on Bibsonomy Internet Technol. Lett. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Abdulelah Alshammari, Vladlena Benson, Luciano C. Batista Emotional Cost of Cyber Crime and Cybersecurity Protection Motivation Behaviour: A Systematic Literature Review. Search on Bibsonomy PACIS The full citation details ... 2023 DBLP  BibTeX  RDF
19Dimitrios Georgoulias, Ricardo Yaben, Emmanouil Vasilomanolakis Cheaper than you thought? A dive into the darkweb market of cyber-crime products. Search on Bibsonomy ARES The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Sanjay Goel, Pavel Gladyshev, Akatyev Nikolay, George Markowsky, Daryl Johnson (eds.) Digital Forensics and Cyber Crime - 13th EAI International Conference, ICDF2C 2022, Boston, MA, November 16-18, 2022, Proceedings Search on Bibsonomy ICDF2C The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Rasheed Yousef, Mahmoud Jazzar, Amna Eleyan, Tarek Bejaoui A Machine Learning Framework & Development for Insider Cyber-crime Threats Detection. Search on Bibsonomy SmartNets The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Bart Somers, Asanka P. Sayakkara, Darren R. Hayes, Nhien-An Le-Khac Finding Forensic Artefacts in Long-Term Frequency Band Occupancy Measurements Using Statistics and Machine Learning. Search on Bibsonomy ICDF2C (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Jia Hu, Weina Niu, Qingjun Yuan, Lingfeng Yao, Junpeng He, Yanfeng Zhang, Xiaosong Zhang 0001 DEML: Data-Enhanced Meta-Learning Method for IoT APT Traffic Detection. Search on Bibsonomy ICDF2C (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Xubo Yang, Linsen Li, Cunqing Hua, Changhao Yao CCBA: Code Poisoning-Based Clean-Label Covert Backdoor Attack Against DNNs. Search on Bibsonomy ICDF2C (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Zeshan Pang, Yuyuan Sun, Shasha Guo, Yuliang Lu Backdoor Learning on Siamese Networks Using Physical Triggers: FaceNet as a Case Study. Search on Bibsonomy ICDF2C (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19John Jankura, Hannah Catallo-Stooks, Ibrahim M. Baggili, Golden Richard Catch Me if You Can: Analysis of Digital Devices and Artifacts Used in Murder Cases. Search on Bibsonomy ICDF2C (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Cheuk Yu Ip, Fu Kay Frankie Li, Yi Anson Lam, Siu Ming Yiu Removing Noise (Opinion Messages) for Fake News Detection in Discussion Forum Using BERT Model. Search on Bibsonomy ICDF2C (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Xiao Yang, Gaolei Li, Meng Han Persistent Clean-Label Backdoor on Graph-Based Semi-supervised Cybercrime Detection. Search on Bibsonomy ICDF2C (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Michael Mundt, Harald Baier Enhancing Incident Management by an Improved Understanding of Data Exfiltration: Definition, Evaluation, Review. Search on Bibsonomy ICDF2C (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Joseph Brown, Ibrahim Baggili Retruth Reconnaissance: A Digital Forensic Analysis of Truth Social. Search on Bibsonomy ICDF2C (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Michael Madden 0003, Dan Szafaran, Philomena Gray, Justin Pelletier, Ted Selker A Canary in the Voting Booth: Attacks on a Virtual Voting Machine. Search on Bibsonomy ICDF2C (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Xiaohong Fan, Ye Huang, Xue Wang, Ziran Nie, Zhenyang Yu, Xuhui Cheng, Xiaoyi Duan Research on Feature Selection Algorithm of Energy Curve. Search on Bibsonomy ICDF2C (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Shuai Ren, Yuxiao Li, Bo Li, Hao Gong, Qiuyu Feng A Multi-carrier Information Hiding Algorithm Based on Layered Compression of 3D Point Cloud Model. Search on Bibsonomy ICDF2C (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Shuai Ren, Liming Ma, Qiuyu Feng A Multi-carrier Information Hiding Algorithm Based on Dual 3D Model Spectrum Analysis. Search on Bibsonomy ICDF2C (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Shuai Ren, Bo Li, Shengxia Liu An Information Hiding Algorithm Based on Multi-carrier Fusion State Partitioning of 3D Models. Search on Bibsonomy ICDF2C (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Paul Stenzel, Nhien-An Le-Khac Identify Users on Dating Applications: A Forensic Perspective. Search on Bibsonomy ICDF2C (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Yi Shen, Yuhan Zhang, Yuwei Li, Wanmeng Ding, Miao Hu, Yang Li, Cheng Huang 0003, Jie Wang IoT Malicious Traffic Detection Based on Federated Learning. Search on Bibsonomy ICDF2C (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Xiaoyi Duan, Ye Huang, Yuting Wang, Yu Gu, Jianmin Tong, Zunyang Wang, Ronglei Hu Power Analysis Attack Based on GA-Based Ensemble Learning. Search on Bibsonomy ICDF2C (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Shuai Ren, Hao Gong, Huirong Cheng, Zejing Cheng Point Cloud Model Information Hiding Algorithm Based on Multi-scale Transformation and Composite Operator. Search on Bibsonomy ICDF2C (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Clinton Walker, Ibrahim Baggili, Hao Wang Decoding HDF5: Machine Learning File Forensics and Data Injection. Search on Bibsonomy ICDF2C (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Lilian Noronha Nassif, Jonny Silva de Oliveira Learning Framework for Guessing Alphanumeric Passwords on Mobile Phones Based on User Context and Fragment Semantics. Search on Bibsonomy ICDF2C (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Zhiqiang Wang 0006, Zhuoyue Wang, Ying Zhang An Android Malware Detection Method Based on Optimized Feature Extraction Using Graph Convolutional Network. Search on Bibsonomy ICDF2C (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Zhi Lu, Haochen Dou, Songfeng Lu, Xueming Tang, Junjun Wu, Samir Mohammed Umran A PUF Based Audio Fingerprint Based for Device Authentication and Tamper Location. Search on Bibsonomy ICDF2C (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Songshou Dong, Yanqing Yao, Yihua Zhou 0001, Yuguang Yang 0001 Improvement of an Identity-Based Aggregate Signature Protocol from Lattice. Search on Bibsonomy ICDF2C (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Songshou Dong, Yanqing Yao, Yihua Zhou, Yuguang Yang 0001 Lattice-Based Secret Sharing Scheme (Chinese Remainder Theorem). Search on Bibsonomy ICDF2C (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Ivan Cvitic, Dragan Perakovic A Quantum Physics Approach for Enabling Information-Theoretic Secure Communication Channels. Search on Bibsonomy ICDF2C (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Hassan Jalil Hadi, Yue Cao, Mohammed Ali Alshara, Naveed Ahmad, Muhammad Saqib Riaz, Jun Li Quantum Computing Challenges and Impact on Cyber Security. Search on Bibsonomy ICDF2C (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Josep Pegueroles Valles, Sebastien Kanj Bongard, Arnau Estebanell Castellví XSS Vulnerability Test Enhancement for Progressive Web Applications. Search on Bibsonomy ICDF2C (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Quan Hong, Jiaqi Li, Xizhong Guo, Pan Xie, Lidong Zhai Assessing the Effectiveness of Deception-Based Cyber Defense with CyberBattleSim. Search on Bibsonomy ICDF2C (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Weimiao Feng, Rui Hu, Cong Zhou, Lei Yu DynVMDroid: Android App Protection via Code Disorder and Dynamic Recovery. Search on Bibsonomy ICDF2C (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Steven Seiden, Ibrahim M. Baggili, Aisha I. Ali-Gombe I've Got You, Under My Skin: Biohacking Augmentation Implant Forensics. Search on Bibsonomy ICDF2C (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Abdul Majid Jamil, Hassan Jalil Hadi, Sifan Li, Yue Cao 0002, Naveed Ahmed, Faisal Bashir Hussain, Chakkaphong Suthaputchakun, Xinyuan Wang Detection of Targeted Attacks Using Medium-Interaction Honeypot for Unmanned Aerial Vehicle. Search on Bibsonomy ICDF2C (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Yiran Li Power Analysis Attack Based on BS-XGboost Scheme. Search on Bibsonomy ICDF2C (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Yintong Yan, Lu Yu, Taiyan Wang, Yuwei Li, Zulie Pan Optir-SBERT: Cross-Architecture Binary Code Similarity Detection Based on Optimized LLVM IR. Search on Bibsonomy ICDF2C (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Ruipeng Zhang, Mengjun Xie ForensiQ: A Knowledge Graph Question Answering System for IoT Forensics. Search on Bibsonomy ICDF2C (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Chenxin Zhou, Cheng Huang 0003, Yanghao Wang, Zheng Zuo APTBert: Abstract Generation and Event Extraction from APT Reports. Search on Bibsonomy ICDF2C (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Aleck Nash, Hudan Studiawan, George Grispos, Kim-Kwang Raymond Choo Security Analysis of Google Authenticator, Microsoft Authenticator, and Authy. Search on Bibsonomy ICDF2C (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Martin Husák, Shanchieh Jay Yang, Joseph Khoury, Dorde Klisura, Elias Bou-Harb Unraveling Network-Based Pivoting Maneuvers: Empirical Insights and Challenges. Search on Bibsonomy ICDF2C (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Aleck Nash, Kim-Kwang Raymond Choo Password Managers and Vault Application Security and Forensics: Research Challenges and Future Opportunities. Search on Bibsonomy ICDF2C (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 388 (100 per page; Change: )
Pages: [1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license