The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for cyber with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1976-1985 (16) 1986-1989 (16) 1990-1997 (19) 1998 (19) 1999 (29) 2000 (31) 2001 (39) 2002 (117) 2003 (87) 2004 (75) 2005 (96) 2006 (108) 2007 (165) 2008 (256) 2009 (289) 2010 (522) 2011 (799) 2012 (924) 2013 (1306) 2014 (1194) 2015 (1485) 2016 (1946) 2017 (2380) 2018 (2743) 2019 (3594) 2020 (3169) 2021 (3254) 2022 (3104) 2023 (3060) 2024 (477)
Publication types (Num. hits)
article(9219) book(81) data(17) incollection(495) inproceedings(20762) phdthesis(413) proceedings(332)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 883 occurrences of 602 keywords

Results
Found 31319 publication records. Showing 31319 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
207Heum Park, SunHo Cho, Hyuk-Chul Kwon Cyber Forensics Ontology for Cyber Criminal Investigation. Search on Bibsonomy e-Forensics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF criminal investigation, cyber forensics, ontology, digital evidence, cyber crime
116Flora S. Tsai, Kap Luk Chan Detecting Cyber Security Threats in Weblogs Using Probabilistic Models. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cyber terrorism, data mining, blog, weblog, probabilistic latent semantic analysis, cyber security, cyber crime
113Peeter Lorents, Rain Ottis, Raul Rikk Cyber Society and Cooperative Cyber Defence. Search on Bibsonomy HCI (14) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cyber society, cooperative cyber defence, CCD COE, Knowledge, information, cyber attacks
80Mohamed Dâfir Ech-Cherif El Kettani, Taieb Debbagh NCSec: a national cyber security referential for the development of a code of practice in national cyber security management. Search on Bibsonomy ICEGOV The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ISO27002, cyber criminality, referential, organizational structure, cyber security
79Mi Sun Lee, Mi-Gi Han, Joo-Youn Park, Su-e Park Factors formatting perceptional impression in 3-D cyber spaces: a cross-cultural study of Korean and American users. Search on Bibsonomy SIGGRAPH Posters The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
76Jason K. Kopylec, Anita D'Amico, John R. Goodall Visualizing Cascading Failures in Critical Cyber Infrastructures. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Cyber infrastructure, infrastructure dependencies, cascading failures, situational awareness, actor-network theory
73Tomoko Itao, Tetsuya Nakamura, Masato Matsuo, Tatsuya Suda, Tomonori Aoyama Service Emergence based on Relationship among Self-Organizing Entities. Search on Bibsonomy SAINT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
70Leonard Kwan, Pradeep Ray, Greg Stephens Towards a Methodology for Profiling Cyber Criminals. Search on Bibsonomy HICSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
70Eung-Kon Kim, Jong-Chan Kim Fish Schooling Behavior Simulator for Cyber Aquarium. Search on Bibsonomy FBIT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
67Ayman Z. Faza, Sahra Sedigh, Bruce M. McMillin Reliability Analysis for the Advanced Electric Power Grid: From Cyber Control and Communication to Physical Manifestations of Failure. Search on Bibsonomy SAFECOMP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF failure propagation, cyber-physical, FACTS devices, reliability analysis, power grid
67Mads Darø Kristensen Execution plans for cyber foraging. Search on Bibsonomy Mobile Middleware The full citation details ... 2008 DBLP  DOI  BibTeX  RDF middleware, distributed computing, cyber foraging
67Nong Ye, Toni Farley, Deepak Lakshminarasimhan An attack-norm separation approach for detecting cyber attacks. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Computer and network security, Intrusion detection, Signal processing, Signal detection, Cyber attacks
67Sangho Lee, Dong Hwi Lee, Kuinam J. Kim A Conceptual Design of Knowledge-Based Real-Time Cyber-Threat Early Warning System. Search on Bibsonomy ISPA Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cyber-threat, TMS, Early-Warning, ESM
64Himanshu Maheshwari, Harvey S. Hyman, Manish Agrawal A Comparison of Cyber-Crime Definitions in India and the United States. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
61Jing Lin 0007, Sahra Sedigh, Ann Miller A General Framework for Quantitative Modeling of Dependability in Cyber-Physical Systems: A Proposal for Doctoral Research. Search on Bibsonomy COMPSAC (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
61Nian-Shing Chen, Kinshuk, Chun-Wang Wei, Yi-Ru Chen, Yu-Chun Wang Classroom Climate and Learning Effectiveness Comparison for Physical and Cyber F2F Interaction in Holistic-Blended Learning Environment. Search on Bibsonomy ICALT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
61Newton Lee 2007 World Cyber Games Grand Final in Seattle: WCG 2006 in Monaz, Italy, October 18-22, 2006. Search on Bibsonomy Comput. Entertain. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
61Nian-Shing Chen, Kinshuk, Yi-Hung Wang Cyber Schooling Framework: Improving Mobility and Situated Learning. Search on Bibsonomy ICALT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
61Hiroshi Matsuda, Yoshiaki Shindo Design and Implementation of Cyber Assistant Professor: CAP. Search on Bibsonomy ICALT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
61Han Tang, Bruce M. McMillin Security of Information Flow in the Electric Power Grid. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF information flow, confidentiality, power grid, Cyber-physical systems
59Tosiyasu L. Kunii Cyber Graphics (Keynote). Search on Bibsonomy CW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF adjunction spaces, cell attaching functions, a hierarchy of invariants, cellular spatial structures
58M. Sindhu, S. Kumar Sajan, M. Sethumadhavan 0001 Error Linear Complexity Measures of Binary Multisequences. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
58N. V. Narendra Kumar, Harshit J. Shah, R. K. Shyamasundar Towards Checking Tampering of Software. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
58Asoke K. Talukder Securing Next Generation Internet Services. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
58N. Harini, C. K. Shyamala, T. R. Padmanabhan Securing Cloud Environment. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
58Rajbir Kaur, Manoj Singh Gaur, P. Lalith Suresh, Vijay Laxmi DoS Attacks in MANETs: Detection and Countermeasures. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
58Divya Shankar, Manish Agrawal, H. Raghav Rao Emergency Response to Mumbai Terror Attacks: An Activity Theory Analysis. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
58Narayanankutty Karuppath, P. Achuthan Einstein-Podolsky-Rosen Paradox and Certain Aspects of Quantum Cryptology with Some Applications. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
58Kenneth J. Giuliani, V. Kumar Murty An Examination of Identity Management Models in an Internet Setting. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
58C. Warren Axelrod, Sukumar Haldar Combined Impact of Outsourcing and Hard Times on BPO Risk and Security. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
58Charulata Chaudhary, Ishupal Singh Kang Pirates of the Copyright and Cyberspace: Issues Involved. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
58Chungath Srinivasan, K. V. Lakshmy, Madathil Sethumadhavan Complexity Measures of Cryptographically Secure Boolean Functions. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
58P. Vinod 0001, Vijay Laxmi, Manoj Singh Gaur Metamorphic Malware Analysis and Detection Methods. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
58Rajarshi Chakraborty, Haricharan Rengamani, Ponnurangam Kumaraguru, H. Raghav Rao The UID Project: Lessons Learned from the West and Challenges Identified for India. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
58P. P. Amritha, T. Gireesh Kumar A Survey on Digital Image Steganographic Methods. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
58S. Sajan Kumar, M. Hari Krishna Prasad, Suresh Raju Pilli Extended Time Machine Design using Reconfigurable Computing for Efficient Recording and Retrieval of Gigabit Network Traffic. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
58Mohit Virendra, Qi Duan, Shambhu J. Upadhyaya Detecting Cheating Aggregators and Report Dropping Attacks in Wireless Sensor Networks. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
58Suja Ramachandran, R. S. Mundada, A. K. Bhattacharjee, C. S. R. C. Murthy, R. Sharma Classifying Host Anomalies: Using Ontology in Information Security Monitoring. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
52Bei-tseng Chu, Gail-Joon Ahn, Steven Blanchard, James Deese, Richard Kelly, Huiming Yu, Ashika Young Collegiate Cyber Game Design Criteria and Participation. Search on Bibsonomy ACIS-ICIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
52Seungbong Park, Jaemin Han, Jongsoo Yoon The New Perspective on Private Cyber Coins in Electronic Commerce: A Korean Case. Search on Bibsonomy EC-Web The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
52Nong Ye, Yebin Zhang, Connie M. Borror Robustness of the Markov-chain model for cyber-attack detection. Search on Bibsonomy IEEE Trans. Reliab. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
52Jong-Keun Lee, Min-Woo Lee, Jang-Se Lee, Sung-Do Chi, Syng-Yup Ohn Automated Cyber-attack Scenario Generation Using the Symbolic Simulation. Search on Bibsonomy AIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
52Ayaz Khan, Uffe Kock Wiil, Nasrullah Memon Digital Forensics and Crime Investigation: Legal Issues in Prosecution at National Level. Search on Bibsonomy SADFE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Cyber Laws, Electronic Devices, Digital Forensics, Digital Evidence, Forensic Analysis
52Edward A. Lee CPS foundations. Search on Bibsonomy DAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF embedded systems, cyber-physical systems
52Sai Ho Kwok, Anthony C. T. Lai, Jason C. K. Yeung A study of online service and information exposure of public companies. Search on Bibsonomy KDD Workshop on CyberSecurity and Intelligence Informatics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF malicious hackers, public company, public server, web server, ports, cyber security
49Hiroshi Matsuda, Tomomi Morita, Yoshiaki Shindo Development of Cyber Theater and Cyber Theater Scenario Language. Search on Bibsonomy ICALT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
49Ragunathan Rajkumar, Insup Lee 0001, Lui Sha, John A. Stankovic Cyber-physical systems: the next computing revolution. Search on Bibsonomy DAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF new frontiers, computer science, engineering, cyber-physical systems, grand challenges
49Don Wan Kang, Kay Huang, Jun Ohya Analysis of expressing audiences in a cyber-theater. Search on Bibsonomy ICME The full citation details ... 2005 DBLP  DOI  BibTeX  RDF audience effect, cyber-theater, virtual network environment
49A. B. Patki, S. Lakshminarayanan, S. Sivasubramanian, S. S. Sarma Cyber Crime Information System for Cyberethics Awareness. Search on Bibsonomy CW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Cyber crime services, IT Act 2000, Data overload, Fuzzy Database, Intelligent Information System
48Shouhuai Xu Collaborative Attack vs. Collaborative Defense. Search on Bibsonomy CollaborateCom The full citation details ... 2008 DBLP  DOI  BibTeX  RDF collaborative attack, collaborative defense, cyber security, cyber attack
48Franz Witzeling Demo CD "Relationship", a Demonstration. Search on Bibsonomy ICMCS, Vol. 2 The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Interface man - multimedia, cyber-office, cyber doctor, role game, search for human synergy, problem-solving and co-operation between partners and in teams, relationship between virtual reality, real life, senso-mental-identity
46Insup Lee 0001, Oleg Sokolsky Medical cyber physical systems. Search on Bibsonomy DAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF high-confidence medical systems, medical cyber-physical systems, medical device interoperability & compositionality, physiological closed loop, cyber-physical systems
45Joshua A. Sipper Cyber Threat Intelligence and the Cyber Meta-Reality and Cyber Microbiome. Search on Bibsonomy Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
45Ayman Z. Faza, Sahra Sedigh, Bruce M. McMillin Reliability Modeling for the Advanced Electric Power Grid: A Proposal for Doctoral Research. Search on Bibsonomy COMPSAC (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
45Satoshi Tanaka, Tomoko Itao, Atsushi Yamamoto, Tatsuya Suda, Shigeki Yamada The Design and Implementation of Service Emergence Platform Software. Search on Bibsonomy SAINT Workshops The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
45Tomoko Itao, Tetsuya Nakamura, Masato Matsuo, Tatsuya Suda, Tomonori Aoyama Adaptive Creation of Network Applications in the Jack-in-the-Net Architecture. Search on Bibsonomy NETWORKING The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
43Ravi Akella, Bruce M. McMillin Model-Checking BNDC Properties in Cyber-Physical Systems. Search on Bibsonomy COMPSAC (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
43Shangping Ren, Kevin A. Kwiat A Non-Intrusive Approach to Enhance Legacy Embedded Control Systems with Cyber Protection Features. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF legacy control systems, behavior observation, feedback loop
43Wen-Kung Lin, Chieh-Peng Lin, Chou-Kang Chiu Understanding Cyber Trust Using a Triadic Functioning Analysis. Search on Bibsonomy APSCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
43Yuanfang Zhang, Christopher D. Gill, Chenyang Lu 0001 Reconfigurable Real-Time Middleware for Distributed Cyber-Physical Systems with Aperiodic Events. Search on Bibsonomy ICDCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
43Kun Xiao, Shangping Ren, Kevin A. Kwiat Retrofitting Cyber Physical Systems for Survivability through External Coordination. Search on Bibsonomy HICSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
43Natalie Granado, Gregory White 0001 Cyber Security and Government Fusion Centers. Search on Bibsonomy HICSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
43David H. C. Du Cyber Security: An Obtainable Goal? Search on Bibsonomy ICDCS Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
43Michael E. Kuhl, Jason Kistner, Kevin Costantini, Moises Sudit Cyber attack modeling and simulation for network security analysis. Search on Bibsonomy WSC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
43Gregory B. White The Community Cyber Security Maturity Model. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
43Abdul Quaiyum Ansari, Tapasya Patki, A. B. Patki, V. Kumar Integrating Fuzzy Logic and Data Mining: Impact on Cyber Security. Search on Bibsonomy FSKD (4) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
43Yusuke Hideshima, Hideki Koike STARMINE: a visualization system for cyber attacks. Search on Bibsonomy APVIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF virus visualization, information visualization, intrusion detection, information security, internet worm
43Rainer Böhme, Gaurav Kataria On the Limits of Cyber-Insurance. Search on Bibsonomy TrustBus The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
43Wei Li, Lei Wang Real-Time Solution in Petroleum Industry's Cyber Data Acquisition Simulation System. Search on Bibsonomy RTCSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
43Horace Ho-Shing Ip, Ken C. K. Law, Belton Kwong Cyber Composer: Hand Gesture-Driven Intelligent Music Composition and Generation. Search on Bibsonomy MMM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
43Jang-Se Lee, Jung-Rae Jung, Jong Sou Park, Sung-Do Chi Linux-Based System Modelling for Cyber-attack Simulation. Search on Bibsonomy AIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
43Jiang Yu Zheng, Min Shi 0003 Mapping Cityscapes to Cyber Space. Search on Bibsonomy CW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
43Ninad Jog The Dimensions of the Cyber Universe. Search on Bibsonomy ECAL The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
43Kan-Min Lin, Nian-Shing Chen Exploring Learning Problems of Cyber University. Search on Bibsonomy ICALT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
42M. Luckas Performance evaluation of a formally supercomputer-based Monte Carlo program on a T800 transputer network. Search on Bibsonomy ICS The full citation details ... 1988 DBLP  DOI  BibTeX  RDF CYBER 205
40Jan Kleissl, Yuvraj Agarwal Cyber-physical energy systems: focus on smart buildings. Search on Bibsonomy DAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF LEED, ZNEB, cyber-physical, energy metering, embedded, energy management, buildings, smart grid
40Mudasser Iqbal, Hock-Beng Lim A cyber-physical middleware framework for continuous monitoring of water distribution systems. Search on Bibsonomy SenSys The full citation details ... 2009 DBLP  DOI  BibTeX  RDF scheduling, modeling, middleware, cyber-physical systems
40John A. Stankovic Cyber physical systems: aspects as a basis for robustness and openness. Search on Bibsonomy AOSD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF robustness, aspect oriented programming, openness, cyber physical systems
40Marius C. Bujorianu, Manuela-Luminita Bujorianu, Howard Barringer A Formal Framework for User Centric Control of Probabilistic Multi-agent Cyber-Physical Systems. Search on Bibsonomy CLIMA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF user centric control, stochastic model checking, multi agent systems, symmetries, bisimulation, runtime analysis, cyber-physical systems
40In-Jung Kim, Cheol Won Lee, Eul-Gyu Im Changes of Cyber-Terrorism: Autonomous Terrors and Counter-Measures. Search on Bibsonomy ICCSA (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF autogenous terror, cyber terrorism, CERT, ISAC
40Robin Snyder Combining an e-commerce simulation with a cyber-survivor exercise. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cyber-survivor exercises, e-commerce simulation
40Raquel L. Hill, Jalal Al-Muhtadi, Roy H. Campbell, Apu Kapadia, Prasad Naldurg, Anand Ranganathan A Middleware Architecture for Securing Ubiquitous Computing Cyber Infrastructures. Search on Bibsonomy IEEE Distributed Syst. Online The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Hestia, critical cyber infrastructure, security, ubiquitous computing, middleware
39Yimin Cui, Tao Zou, Lufeng Zhang, Jinjing Zhao Network security simulation and evaluation. Search on Bibsonomy CSTST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF attack impacts, cyber attack modeling, cyber attack simulation, network security evaluation, network modeling
39Massimiliano Albanese From Cyber Situational Awareness to Adaptive Cyber Defense: Leveling the Cyber Playing Field. Search on Bibsonomy From Database to Cyber Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
37Ranjan Pal, Leana Golubchik Analyzing Self-Defense Investments in Internet Security under Cyber-Insurance Coverage. Search on Bibsonomy ICDCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF cyber-insurance, Internet risks, self-defense investments, cyber-insurance coverage, co-operative and non co-operative users
37Hai Zhuge Socio-Natural Thought Semantic Link Network: A Method of Semantic Networking in the Cyber Physical Society. Search on Bibsonomy AINA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF cyber physical society, humanlevel AI, semantics, cyber physical system, semantic link network
36Jigang Liu, Tetsutaro Uehara Computer Forensics in Japan: A Preliminary Study. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
36Lim Seow San, Djasliana Binte Hussain, Lim Heng Loo, Zhuang Ronglin, Suraj Balasubramanian, Kelvin W. C. Foong, Tok Wee Wah, Muhammad Taufiq Bin Mahmud, Seah her Yuh, Lim Minmin, Emilia Joey Yim Shao'en, Jeremiah K. S. Seah, Sheryl Lim Jia Jin, Low Minghui, Lu Zhiyin Dental VR application for dental training. Search on Bibsonomy VRCAI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
36Michael G. Hinchey, Yuan-Shun Dai, James L. Rash, Walt Truszkowski, Manish Madhusoodan Bionic autonomic nervous system and self-healing for NASA ANTS-like missions. Search on Bibsonomy SAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF autonomous nano-technology swarm, reliability, autonomic computing, self-healing
36Dong Hwi Lee, Kyong Ho Choi, Kuinam J. Kim, Sang Min Park Routing Information System and HOIDS for Detection Method of Vicious Attack in Large Networks. Search on Bibsonomy ISPA Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Vicious Attack, Early Warining, Routing Information, Intrusion Detection System
36Carl Livadas, Robert Walsh, David E. Lapsley, W. Timothy Strayer Using Machine Learning Techniques to Identify Botnet Traffic. Search on Bibsonomy LCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
36Kam-Pui Chow, C. F. Chong, Pierre K. Y. Lai, Lucas Chi Kwong Hui, Kevin K. H. Pun, Wai Wan Tsang, H. W. Chan Digital Evidence Search Kit. Search on Bibsonomy SADFE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
36Quentin Jones, Sheizaf Rafaeli What Do Virtual "Tells" Tell? Placing Cybersociety Research into a Hierarchy of Social Explanation. Search on Bibsonomy HICSS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
35Rino Falcone, Munindar P. Singh, Yao-Hua Tan Introduction: Bringing Together Humans and Artificial Agents in Cyber-Societies: A New Field of Trust Research. Search on Bibsonomy Trust in Cyber-societies The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
34Ronald C. Dodge, Brian Hay, Kara L. Nance Standards-Based Cyber Exercises. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
34Nian-Shing Chen, Kinshuk, Chun-Wang Wei, Mao-Jui Wang A Framework for Social Presence in Synchronous Cyber Classrooms. Search on Bibsonomy ICALT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
34Ying Tan, Mehmet C. Vuran, Steve Goddard Spatio-Temporal Event Model for Cyber-Physical Systems. Search on Bibsonomy ICDCS Workshops The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
34Marius C. Bujorianu, Howard Barringer An Integrated Specification Logic for Cyber-Physical Systems. Search on Bibsonomy ICECCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
34Raghu K. Ganti, Yu-En Tsai, Tarek F. Abdelzaher SenseWorld: Towards Cyber-Physical Social Networks. Search on Bibsonomy IPSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Sensor map, Sensor networks, Social networking
34Samuel N. Hamilton, Wendy L. Hamilton Adversary Modeling and Simulation in Cyber Warfare. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 31319 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license