The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Hacker with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1962-1988 (15) 1989-1993 (16) 1994-1997 (19) 1998-2000 (21) 2001-2002 (35) 2003 (43) 2004 (29) 2005 (34) 2006 (40) 2007 (39) 2008 (50) 2009 (19) 2010 (22) 2011 (28) 2012 (22) 2013 (21) 2014 (44) 2015 (22) 2016 (29) 2017 (33) 2018 (27) 2019-2020 (42) 2021 (30) 2022 (44) 2023 (31) 2024 (8)
Publication types (Num. hits)
article(305) book(5) incollection(19) inproceedings(419) phdthesis(7) proceedings(8)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 181 occurrences of 158 keywords

Results
Found 844 publication records. Showing 763 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
110Laks V. S. Lakshmanan, Raymond T. Ng, Ganesh Ramesh On disclosure risk analysis of anonymized itemsets in the presence of prior knowledge. Search on Bibsonomy ACM Trans. Knowl. Discov. Data The full citation details ... 2008 DBLP  DOI  BibTeX  RDF anonymization, sampling, matching, correlation, frequent itemsets, bipartite graphs, belief function, hacker, prior knowledge, Disclosure risk
86Jonathan F. Spencer Using XML to map relationships in hacker forums. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF XScrape, screen scraping, tidy, data-mining, Java, XML, HTML, XPath, hacker, XSL, XHTML, forum
86Nancy A. Staudenmayer Moving away from a hacker vs. disciplined-based organizational legacy-an organization theory perspective on software processes. Search on Bibsonomy ISPW The full citation details ... 1996 DBLP  DOI  BibTeX  RDF hacker approach, disciplined-based approach, software firms, product choice, managerial challenges, software development, software processes, software development management, software products, organization theory
72Sergey Bratus, Anna Shubina, Michael E. Locasto Teaching the principles of the hacker curriculum to undergraduates. Search on Bibsonomy SIGCSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF hacker curriculum, sismat, teaching failure modes, security, networking, information assurance
58Greg Goth, Benjamin Alfonsi News. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
49Sergey Bratus What Hackers Learn that the Rest of Us Don't: Notes on Hacker Curriculum. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
46Syed A. Saleem Ethical hacking as a risk management technique. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF ethical hacker, white hat hacker, network security, information security, computer security, system security
43Thawatchai Chomsiri HTTPS Hacking Protection. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
43Laks V. S. Lakshmanan, Raymond T. Ng, Ganesh Ramesh To Do or Not To Do: The Dilemma of Disclosing Anonymized Data. Search on Bibsonomy SIGMOD Conference The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
43Julio César Hernández Castro, José María Sierra, Arturo Ribagorda, Benjamín Ramos Search Engines as a Security Threat. Search on Bibsonomy Computer The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
40Andrei Lima Queiroz, Susan McKeever, Brian Keegan Detecting Hacker Threats: Performance of Word and Sentence Embedding Models in Identifying Hacker Communications. Search on Bibsonomy AICS The full citation details ... 2019 DBLP  BibTeX  RDF
40Wael Khalifa, Kenneth Revett, Abdel-Badeeh M. Salem In the Hacker's Eye: The Neurophysiology of a Computer Hacker. Search on Bibsonomy ICGS3/e-Democracy The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
37Nir Kshetri The Simple Economics of Cybercrimes. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF vicious circle, online extortions, psychological costs and benefits, hacker, Cybercrimes
37Michael Ettredge, Vernon J. Richardson Assessing the Risk in E-commerce. Search on Bibsonomy HICSS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Electronic Commerce Risk, Hacker Attacks, Stock Market Reaction
37Xiaobing Zhang, Shyhtsun Felix Wu, Zhi Fu, Tsung-Li Wu Malicious Packet Dropping: How It Might Impact the TCP Performance and How We Can Detect It. Search on Bibsonomy ICNP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF malicious packet dropping, dropping attack, severe damage, Internet environment, statistical analysis module, session delay, Internet, statistical analysis, transport protocols, packet switching, position, router, TCP performance, telecommunication security, hacker, detection performance, packet reorderings, denial of service attacks
37Julie L. Connolly Operation chain link: the deployment of a firewall at Hanscom Air Force Base. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF operation chain link, Hanscom Air Force Base, Electronic Systems Center, unclassified network, Internet threats, network security assessments, hacker break-in, firewall development team, firewall deployment, security management, military computing
37Cindy Cullen Internet vulnerabilities of one-time passcode mechanisms. Search on Bibsonomy LCN The full citation details ... 1995 DBLP  DOI  BibTeX  RDF one-time passcode mechanisms, passive attack, one-time passcode server, hacker tools, authentication, security of data, vulnerabilities, hackers, user identification
35Joris Dormans The Hacker: New Mythical Content of Narrative Games. Search on Bibsonomy TIDSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Computer Games, Interactive Storytelling, Mythology
29Irfan A. Siddavatam, Jayant Gadge Comprehensive test mechanism to detect attack on Web Services. Search on Bibsonomy ICON The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Jayamsakthi Shanmugam, M. Ponnavaikko Risk Mitigation for Cross Site Scripting Attacks Using Signature Based Model on the Server Side. Search on Bibsonomy IMSCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Application-level web Security, cross-site scripting, security vulnerabilities
29Gregory B. Newby Paths to creativity in security careers. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Gang Tan, Yuqun Chen, Mariusz H. Jakubowski Delayed and Controlled Failures in Tamper-Resistant Software. Search on Bibsonomy Information Hiding The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Hengming Zou, Henghui Zou PDE-Based Intrusion Forecast. Search on Bibsonomy ICNC (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
29Bruce Schneier Airplane Hackers. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
23Gregory J. Conti, James Caroland Embracing the Kobayashi Maru: Why You Should Teach Your Students to Cheat. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF hacker mindset, adversary mindset, cheating exercises, ethics, cheating
23Charles Day "Compute? No, Mr. Bond, I Expect You to Die!". Search on Bibsonomy Comput. Sci. Eng. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Last Word, James Bond, Ian Fleming, Computing, engineering, science, hacker
23Raúl Rojas 0001 Reviews. Search on Bibsonomy IEEE Ann. Hist. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF early computers, history of typewriting, business data processing technology, life insurance industry, hacker pranks, geodesy, Alan Turing
23Russell D. Rosco, Marcus K. Rogers, Samuel Liles Breaking Down Stereotypes: A Call for an Ontological Model. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Deviant, Ontology, Computer, Hacker
23Julien Budynek, Eric Bonabeau, Ben Shargel Evolving computer intrusion scripts for vulnerability assessment and log analysis. Search on Bibsonomy GECCO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF script kiddies, agent-based model, log analysis, hacker, vulnerability assessment
23Nicholas Athanasiades, Randal T. Abler, John G. Levine, Henry L. Owen, George F. Riley Intrusion Detection Testing and Benchmarking Methodologies. Search on Bibsonomy IWIA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Intrusion Detection Testing, Network Attack Generation, Hacker Tools, Network Security
22Janek Gröhl, Thomas R. Else, Lina Hacker, Ellie V. Bunce, Paul W. Sweeney, Sarah E. Bohndiek Moving Beyond Simulation: Data-Driven Quantitative Photoacoustic Imaging Using Tissue-Mimicking Phantoms. Search on Bibsonomy IEEE Trans. Medical Imaging The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22John H. R. Burns, Kailey H. Pascoe, Haunani H. Kane, Joseph W. P. Nakoa, Makoa Pascoe, Sophia R. Pierucci, Riley E. Sokol, Krista A. Golgotiu, Manuela Cortes, Aralyn Hacker, Lorenzo Villela, Brianna K. Ninomoto, Kainalu Steward, Cindy Otcenasek, Clifford Kapono Community-Based Monitoring for Rapid Assessment of Nearshore Coral Reefs Amid Disturbances in Teahupo'o, Tahiti. Search on Bibsonomy Remote. Sens. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Thomas R. Else, Janek Gröhl, Lina Hacker, Sarah E. Bohndiek PATATO: a Python photoacoustic tomography analysis toolkit. Search on Bibsonomy J. Open Source Softw. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Claudio Novelli, Federico Casolari, Philipp Hacker, Giorgio Spedicato, Luciano Floridi Generative AI in EU Law: Liability, Privacy, Intellectual Property, and Cybersecurity. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Janek Gröhl, Kylie Yeung, Kevin Gu, Thomas R. Else, Monika Golinska, Ellie V. Bunce, Lina Hacker, Sarah E. Bohndiek Distribution-informed and wavelength-flexible data-driven photoacoustic oximetry. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Ahmad Rashid, Serena Hacker, Guojun Zhang, Agustinus Kristiadi, Pascal Poupart Preventing Arbitrarily High Confidence on Far-Away Data in Point-Estimated Discriminative Neural Networks. Search on Bibsonomy AISTATS The full citation details ... 2024 DBLP  BibTeX  RDF
22Florian Skopik, Arndt Bonitz, Daniel Slamanig, Markus Kirschner, Wolfgang Hacker SD4MSD: Using a Single Device for Multiple Security Domains. Search on Bibsonomy ERCIM News The full citation details ... 2023 DBLP  BibTeX  RDF
22Murray Bruce Reed, Magdalena Ponce de León, Chrysoula Vraka, Ivo Rausch, Godber Mathis Godbersen, Valentin Popper, Barbara Katharina Geist, Arkadiusz Komorowski, Lukas Nics, Clemens Schmidt, Sebastian Klug, Werner Langsteger, Georgios Karanikas, Tatjana Traub-Weidinger, Andreas Hahn 0001, Rupert Lanzenberger, Marcus Hacker Whole-body metabolic connectivity framework with functional PET. Search on Bibsonomy NeuroImage The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Hawazin Alghamdi, Olasunbo Z. Farinre, Mathew L. Kelley, Adam J. Biacchi, Dipanjan Saha, Tehseen Adel, Kerry Siebein, Angela R. Hight Walker, Christina A. Hacker, Albert F. Rigosi, Prabhakar Misra Experimental Spectroscopic Data of SnO2 Films and Powder. Search on Bibsonomy Data The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Philipp Hacker, Jürgen Neyer Substantively smart cities - Participation, fundamental rights and temporality. Search on Bibsonomy Internet Policy Rev. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Joseph Snider, Ryan J. Spence, Anne-Marie Engler, Ryan Moran, Sarah Hacker, Leanne Chukoskie, Jeanne Townsend, Linda L. Hill Distraction "Hangover": Characterization of the Delayed Return to Baseline Driving Risk After Distracting Behaviors. Search on Bibsonomy Hum. Factors The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Philipp Hacker Sustainable AI Regulation. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Philipp Hacker, Andreas Engel 0006, Marco Mauer Regulating ChatGPT and other Large Generative AI Models. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Alessandro Fabris, Nina Baranowska, Matthew J. Dennis, Philipp Hacker, Jorge Saldivar, Frederik J. Zuiderveen Borgesius, Asia J. Biega Fairness and Bias in Algorithmic Hiring. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Ömer Sen, Philipp Malskorn, Simon Glomb, Immanuel Hacker, Martin Henze, Andreas Ulbig An Approach to Abstract Multi-stage Cyberattack Data Generation for ML-Based IDS in Smart Grids. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Ahmad Rashid, Serena Hacker, Guojun Zhang, Agustinus Kristiadi, Pascal Poupart Preventing Arbitrarily High Confidence on Far-Away Data in Point-Estimated Discriminative Neural Networks. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Lennart Bader, Martin Serror, Olav Lamberts, Ömer Sen, Dennis van der Velde, Immanuel Hacker, Julian Filter, Elmar Padilla, Martin Henze Comprehensively Analyzing the Impact of Cyberattacks on Power Grids. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Janek Gröhl, Thomas R. Else, Lina Hacker, Ellie V. Bunce, Paul W. Sweeney, Sarah E. Bohndiek Moving beyond simulation: data-driven quantitative photoacoustic imaging using tissue-mimicking phantoms. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Leonard Hacker, Finn Bartels, Pierre-Etienne Martin Fine-Grained Action Detection with RGB and Pose Information using Two Stream Convolutional Networks. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Robyn Brooks, Celia Hacker, Claudia Landi 0001, Barbara I. Mahler, Elizabeth R. Stephenson Switch Points of Bi-Persistence Matching Distance. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Kelly Maggs, Celia Hacker, Bastian Rieck Simplicial Representation Learning with Neural k-forms. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Philipp Hacker AI Regulation in Europe: From the AI Act to Future Regulatory Challenges. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Philipp Hacker The European AI liability directives - Critique of a half-hearted approach and lessons for the future. Search on Bibsonomy Comput. Law Secur. Rev. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Ingrid Bauer 0001, Rafael Ziolkowski, Janine Hacker, Gerhard Schwabe Why Blockchain: A Socio-technical Perspective on the Motives of Business Consortia Members to Engage with Blockchain Technology. Search on Bibsonomy Distributed Ledger Technol. Res. Pract. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Noa Gueron-Sela, Ido Shalev, Avigail Gordon-Hacker, Alisa Egotubov, Rachel Barr Screen media exposure and behavioral adjustment in early childhood during and after COVID-19 home lockdown periods. Search on Bibsonomy Comput. Hum. Behav. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Oliver Hacker, Thomas Buchmann NICE: A Flexible Expression Language. Search on Bibsonomy MODELSWARD The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Manuel Weber, Janine Hacker, Laura Karintaus, Samuli Pekkola, Jan vom Brocke, Maija Ylinen Preparing for Cyberattacks: a Case Study of Resilience in the Health-Care Sector. Search on Bibsonomy ECIS The full citation details ... 2023 DBLP  BibTeX  RDF
22Lennart Bader, Martin Serror, Olav Lamberts, Ömer Sen, Dennis van der Velde, Immanuel Hacker, Julian Filter, Elmar Padilla, Martin Henze Comprehensively Analyzing the Impact of Cyberattacks on Power Grids. Search on Bibsonomy EuroS&P The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Philipp Hacker, Andreas Engel 0006, Marco Mauer Regulating ChatGPT and other Large Generative AI Models. Search on Bibsonomy FAccT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Antigona Selimaj, Immanuel Hacker, Ronja Steinfurth, Andreas Ulbig Optimal Time Coordination of Definite-Time Overcurrent Relays for Adaptive Protection Systems. Search on Bibsonomy ISGT EUROPE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Chunming Rong, Jiahui Geng, Thomas J. Hacker, Haakon Bryhni, Martin Gilje Jaatun OpenIaC: open infrastructure as code - the network is my computer. Search on Bibsonomy J. Cloud Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Daling Li Yi, Oleg Melnichenko, Peter Hacker, Ke Fan Satellite-Observed Time and Length Scales of Global Sea Surface Salinity Variability: A Comparison of Three Satellite Missions. Search on Bibsonomy Remote. Sens. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Angela Lausch, Michael E. Schaepman, Andrew K. Skidmore, Eusebiu Catana, Lutz Bannehr, Olaf Bastian, Erik Borg, Jan Bumberger, Peter Dietrich, Cornelia Glässer, Jörg M. Hacker, René Hofer, Thomas Jagdhuber, Sven Jany, András Jung, Arnon Karnieli, Reinhard Klenke, Toralf Kirsten, Uta Ködel, Wolfgang Kresse, Ulf Mallast, Carsten Montzka, Markus Möller, Hannes Mollenhauer, Marion Pause, Minhaz Rahman, Franziska Schrodt, Christiane Schmullius, Claudia Schütze, Peter Selsam, Ralf-Uwe Syrbe, Sina C. Truckenbrodt, Michael Vohland, Martin Volk 0002, Thilo Wellmann, Steffen Zacharias, Roland Baatz Remote Sensing of Geomorphodiversity Linked to Biodiversity - Part III: Traits, Processes and Remote Sensing Characteristics. Search on Bibsonomy Remote. Sens. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Philipp Hacker, Felix Naumann, Tobias Friedrich 0001, Stefan Grundmann, Anja Lehmann, Herbert Zech AI Compliance - Challenges of Bridging Data Science and Law. Search on Bibsonomy ACM J. Data Inf. Qual. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Olasunbo Z. Farinre, Hawazin Alghamdi, Swapnil M. Mhatre, Mathew L. Kelley, Adam J. Biacchi, Albert V. Davydov, Christina A. Hacker, Albert F. Rigosi, Prabhakar Misra Comprehensive Data via Spectroscopy and Molecular Dynamics of Chemically Treated Graphene Nanoplatelets. Search on Bibsonomy Data The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Sven Zemanek, Immanuel Hacker, Konrad Wolsing, Eric Wagner 0003, Martin Henze, Martin Serror PowerDuck: A GOOSE Data Set of Cyberattacks in Substations. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Philipp Hacker, Johann Cordes, Janina Rochon Regulating Gatekeeper AI and Data: Transparency, Access, and Fairness under the DMA, the GDPR, and beyond. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Ömer Sen, Dennis van der Velde, Maik Lühman, Florian Sprünken, Immanuel Hacker, Andreas Ulbig, Michael Andres, Martin Henze On Specification-based Cyber-Attack Detection in Smart Grids. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Stefania Ebli, Celia Hacker, Kelly Maggs Morse Theoretic Signal Compression and Reconstruction on Chain Complexes. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Philipp Hacker The European AI Liability Directives - Critique of a Half-Hearted Approach and Lessons for the Future. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Ben Craps, Marine De Clerck, Oleg Evnin, Philip Hacker, Maxim Pavlov Bounds on quantum evolution complexity via lattice cryptography. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Asilata Bapat, Robyn Brooks, Celia Hacker, Claudia Landi 0001, Barbara I. Mahler, Elizabeth R. Stephenson Computing the Matching Distance of 2-Parameter Persistence Modules from Critical Values. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Csaba Tóth, Darrick Lee, Celia Hacker, Harald Oberhauser Capturing Graphs with Hypo-Elliptic Diffusions. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Celia Hacker, Bastian Rieck On the Surprising Behaviour of node2vec. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Meike Zehlike, Alex Loosley, Håkan Jonsson, Emil Wiedemann, Philipp Hacker Beyond Incompatibility: Trade-offs between Mutually Exclusive Fairness Criteria in Machine Learning and Law. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22James P. Becker, Douglas J. Hacker Conceptual-Based Writing Exercises in a Circuit Analysis Course. Search on Bibsonomy IEEE Trans. Educ. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Ömer Sen, Dennis van der Velde, Maik Lühman, Florian Sprünken, Immanuel Hacker, Andreas Ulbig, Michael Andres, Martin Henze On specification-based cyber-attack detection in smart grids. Search on Bibsonomy Energy Inform. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Michael Itzkin, Laura J. Moore, Peter Ruggiero, Paige A. Hovenga, Sally D. Hacker Combining process-based and data-driven approaches to forecast beach and dune change. Search on Bibsonomy Environ. Model. Softw. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Satwik Dutta, Sarah Anne Tao, Jacob C. Reyna, Rebecca Elizabeth Hacker, Dwight W. Irvin, Jay F. Buzhardt, John H. L. Hansen Challenges remain in Building ASR for Spontaneous Preschool Children Speech in Naturalistic Educational Environments. Search on Bibsonomy INTERSPEECH The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Linda Achilles, Thomas Mandl 0001, Christa Womser-Hacker Thinspiration Inspired by K-pop: A Comparison of K-pop Related Thinspiration Imagery and Texts to Regular Thinspiration Content on Tumblr. Search on Bibsonomy WIS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Suzana Brown, Faheem Hussain, Emily Hacker, Maurice Bess, Achilles Vairis Evaluating Mobility and Access of Disabled Refugees in Rohingya Camps in COX'S Bazar. Search on Bibsonomy ICT4D The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Oliver Hacker, Matthias Korch, Johannes Seiferth A Motivating Case Study on Code Variant Selection by Reinforcement Learning. Search on Bibsonomy ISC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Sven Zemanek, Immanuel Hacker, Konrad Wolsing, Eric Wagner 0003, Martin Henze, Martin Serror PowerDuck: A GOOSE Data Set of Cyberattacks in Substations. Search on Bibsonomy CSET @ USENIX Security Symposium The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Thomas J. Hacker, Preston M. Smith, Dana Brunson, Lisa Arafune, Thomas E. Cheatham, Ewa Deelman Building the Research Innovation Workforce: Challenges and Recommendations from a Virtual Workshop to Advance the Research Computing Community✱. Search on Bibsonomy PEARC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Celia Hacker, Bastian Rieck On the Surprising Behaviour of \textttnode2vec. Search on Bibsonomy TAG-ML The full citation details ... 2022 DBLP  BibTeX  RDF
22Miguel Urteaga, Zach Griffith, A. Arias-Purdue, A. Carter, Petra Rowell, J. Hacker, B. Brar InP HBT Technologies for sub-THz Communications. Search on Bibsonomy VLSI Technology and Circuits The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Linda Achilles, Thomas Mandl 0001, Christa Womser-Hacker "Meanspo Please, I Want to Lose Weight": A Characterization Study of Meanspiration Content on Tumblr Based on Images and Texts. Search on Bibsonomy CLEF The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Leonard Hacker, Finn Bartels, Pierre-Etienne Martin Fine-Grained Action Detection with RGB and Pose Information using Two Stream Convolutional Networks. Search on Bibsonomy MediaEval The full citation details ... 2022 DBLP  BibTeX  RDF
22Csaba Tóth, Darrick Lee, Celia Hacker, Harald Oberhauser Capturing Graphs with Hypo-Elliptic Diffusions. Search on Bibsonomy NeurIPS The full citation details ... 2022 DBLP  BibTeX  RDF
22Felix Burkhardt, Anabell Hacker, Uwe Reichel, Hagen Wierstorf, Florian Eyben, Björn W. Schuller A Comparative Cross Language View On Acted Databases Portraying Basic Emotions Utilising Machine Learning. Search on Bibsonomy LREC The full citation details ... 2022 DBLP  BibTeX  RDF
22Janine Hacker, Kai Riemer Identification of User Roles in Enterprise Social Networks: Method Development and Application. Search on Bibsonomy Bus. Inf. Syst. Eng. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22Lina Hacker, James Joseph, Aoife M. Ivory, Mohand O. Saed, Bajram Zeqiri, Rajagopalan Srinath, Sarah E. Bohndiek A Copolymer-in-Oil Tissue-Mimicking Material With Tuneable Acoustic and Optical Characteristics for Photoacoustic Imaging Phantoms. Search on Bibsonomy IEEE Trans. Medical Imaging The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22Lara Talavera, Ana Vila-Concejo, Jody M. Webster, Courtney Smith, Stephanie Duce, Thomas E. Fellowes, Tristan Salles, Daniel Harris, Jon Hill, Will Figueira, Jörg M. Hacker Morphodynamic Controls for Growth and Evolution of a Rubble Coral Island. Search on Bibsonomy Remote. Sens. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22Oleg Melnichenko, Peter Hacker, Vasco Müller Observations of Mesoscale Eddies in Satellite SSS and Inferred Eddy Salt Transport. Search on Bibsonomy Remote. Sens. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22Anup Mohan, Ahmed S. Kaseb, Yung-Hsiang Lu, Thomas J. Hacker Adaptive Resource Management for Analyzing Video Streams from Globally Distributed Network Cameras. Search on Bibsonomy IEEE Trans. Cloud Comput. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22Nir Hacker, Boris A. Malomed Nonlinear Dynamics of Wave Packets in Tunnel-Coupled Harmonic-Oscillator Traps. Search on Bibsonomy Symmetry The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22Tim Krause, Raphael Ernst, Benedikt Klaer, Immanuel Hacker, Martin Henze Cybersecurity in Power Grids: Challenges and Opportunities. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
22Ömer Sen, Dennis van der Velde, Katharina A. Wehrmeister, Immanuel Hacker, Martin Henze, Michael Andres Towards an Approach to Contextual Detection of Multi-Stage Cyber Attacks in Smart Grids. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
22Ömer Sen, Dennis van der Velde, Philipp Linnartz, Immanuel Hacker, Martin Henze, Michael Andres, Andreas Ulbig Investigating Man-in-the-Middle-based False Data Injection in a Smart Grid Laboratory Environment. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
22Ke Liu, Felix Hacker, Chiara Daraio Robotic surfaces with reversible, spatiotemporal control for shape morphing and object manipulation. Search on Bibsonomy Sci. Robotics The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 763 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license