The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase cyber-attack (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2000-2004 (17) 2005-2007 (17) 2008-2009 (18) 2010-2011 (17) 2012-2013 (23) 2014-2015 (30) 2016 (24) 2017 (43) 2018 (43) 2019 (39) 2020 (59) 2021 (62) 2022 (86) 2023 (71) 2024 (17)
Publication types (Num. hits)
article(256) data(2) incollection(2) inproceedings(301) phdthesis(5)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 48 occurrences of 34 keywords

Results
Found 566 publication records. Showing 566 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
85Jong-Keun Lee, Min-Woo Lee, Jang-Se Lee, Sung-Do Chi, Syng-Yup Ohn Automated Cyber-attack Scenario Generation Using the Symbolic Simulation. Search on Bibsonomy AIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
80Nong Ye, Toni Farley, Deepak Lakshminarasimhan An attack-norm separation approach for detecting cyber attacks. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Computer and network security, Intrusion detection, Signal processing, Signal detection, Cyber attacks
78Jung-Ho Eom, Young-Ju Han, Tai-Myoung Chung Modeling Active Cyber Attack for Network Vulnerability Assessment. Search on Bibsonomy ISPA Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
74Ahmed Zeeshan, Anwar M. Masood, Zafar M. Faisal, Azam Kalim, Naheed Farzana PrISM: Automatic Detection and Prevention from Cyber Attacks. Search on Bibsonomy IMTIC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Information Security Management System, Intrusion Detection, Network security, Computer Security, Intrusion Prevention
70Nong Ye, Yebin Zhang, Connie M. Borror Robustness of the Markov-chain model for cyber-attack detection. Search on Bibsonomy IEEE Trans. Reliab. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
61Jang-Se Lee, Jung-Rae Jung, Jong Sou Park, Sung-Do Chi Linux-Based System Modelling for Cyber-attack Simulation. Search on Bibsonomy AIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
58Peeter Lorents, Rain Ottis, Raul Rikk Cyber Society and Cooperative Cyber Defence. Search on Bibsonomy HCI (14) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cyber society, cooperative cyber defence, CCD COE, Knowledge, information, cyber attacks
53Michael E. Kuhl, Jason Kistner, Kevin Costantini, Moises Sudit Cyber attack modeling and simulation for network security analysis. Search on Bibsonomy WSC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
48Yimin Cui, Tao Zou, Lufeng Zhang, Jinjing Zhao Network security simulation and evaluation. Search on Bibsonomy CSTST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF attack impacts, cyber attack modeling, cyber attack simulation, network security evaluation, network modeling
44Kun Xiao, Shangping Ren, Kevin A. Kwiat Retrofitting Cyber Physical Systems for Survivability through External Coordination. Search on Bibsonomy HICSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
44Yusuke Hideshima, Hideki Koike STARMINE: a visualization system for cyber attacks. Search on Bibsonomy APVIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF virus visualization, information visualization, intrusion detection, information security, internet worm
44Carl Livadas, Robert Walsh, David E. Lapsley, W. Timothy Strayer Using Machine Learning Techniques to Identify Botnet Traffic. Search on Bibsonomy LCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
43Sung-Do Chi, Jong Sou Park, Ki-Chan Jung, Jang-Se Lee Network Security Modeling and Cyber Attack Simulation Methodology. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
40Shangping Ren, Kevin A. Kwiat A Non-Intrusive Approach to Enhance Legacy Embedded Control Systems with Cyber Protection Features. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF legacy control systems, behavior observation, feedback loop
40Gregory B. White The Community Cyber Security Maturity Model. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
35Abhrajit Ghosh, Larry Wong, Giovanni Di Crescenzo, Rajesh Talpade InFilter: Predictive Ingress Filtering to Detect Spoofed IP Traffic. Search on Bibsonomy ICDCS Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
34Jong Sou Park, Jang-Se Lee, Hwan Kuk Kim, Jeong-Rye Jeong, Dong-Bok Yeom, Sung-Do Chi SECUSIM: A Tool for the Cyber-Attack Simulation. Search on Bibsonomy ICICS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
32Scott O'Hare, Steven Noel, Kenneth Prole A Graph-Theoretic Visualization Approach to Network Risk Analysis. Search on Bibsonomy VizSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF exploit analysis, visualization, network security, situational awareness, attack graph, vulnerability assessment
30Felicia R. Doswell A case study on computer security for non-expert computer user. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF intrusion detection, computer security
28Sunu Mathew, Richard Giomundo, Shambhu J. Upadhyaya, Moises Sudit, Adam Stotz Understanding multistage attacks by attack-track based visualization of heterogeneous event streams. Search on Bibsonomy VizSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF attack tracks, visualization, intrusion detection
28Steven Cheung, Ulf Lindqvist, Martin W. Fong Modeling Multistep Cyber Attacks for Scenario Recognition. Search on Bibsonomy DISCEX (1) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Kyungho Son, Byungik Kim, Taejin Lee 0002 Cyber-attack group analysis method based on association of cyber-attack information. Search on Bibsonomy KSII Trans. Internet Inf. Syst. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
26Varun Dutt, Amanjot Kaur Cyber security: testing the effects of attack strategy, similarity, and experience on cyber attack detection. Search on Bibsonomy Int. J. Trust. Manag. Comput. Commun. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
24Ariel Futoransky, Fernando Miranda, José Ignacio Orlicki, Carlos Sarraute Simulating cyber-attacks for fun and profit. Search on Bibsonomy SimuTools The full citation details ... 2009 DBLP  DOI  BibTeX  RDF 0-day, network security, training, network simulation, vulnerability, exploit, penetration test, cyber-attack
24Shouhuai Xu Collaborative Attack vs. Collaborative Defense. Search on Bibsonomy CollaborateCom The full citation details ... 2008 DBLP  DOI  BibTeX  RDF collaborative attack, collaborative defense, cyber security, cyber attack
22Rami Puzis, Marius David Klippel, Yuval Elovici, Shlomi Dolev Optimization of NIDS Placement for Protection of Intercommunicating Critical Infrastructures. Search on Bibsonomy EuroISI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF communication infrastructure protection, NIDS placement, epidemic models
22Georgia Frantzeskou, Efstathios Stamatatos, Stefanos Gritzalis, Sokratis K. Katsikas Source Code Author Identification Based on N-gram Author Profiles. Search on Bibsonomy AIAI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Georgia Frantzeskou, Efstathios Stamatatos, Stefanos Gritzalis, Sokratis K. Katsikas Effective identification of source code authors using byte-level information. Search on Bibsonomy ICSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF software forensics, source code authorship identification
21Yong-Jun You, Sung-Do Chi SIMVA: simulation-based network vulnerability analysis system. Search on Bibsonomy SpringSim The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SES/MB, vulnerability analysis system, simulation, network security, DEVS
19Abbas Nemati, Saleh Mobayen, Seyed Hossein Rouhani, Chun-Lien Su Design of nonsingular second-order terminal sliding mode controller for cyber-physical systems with time-delays and cyber-attack on actuators. Search on Bibsonomy Int. J. Syst. Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Efe C. Balta, Michael Pease, James R. Moyne, Kira Barton, Dawn M. Tilbury Digital Twin-Based Cyber-Attack Detection Framework for Cyber-Physical Manufacturing Systems. Search on Bibsonomy IEEE Trans Autom. Sci. Eng. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Fadwa M. Alrowais, Heba G. Mohamed, Fahd N. Al-Wesabi, Mesfer Al Duhayyim, Anwer Mustafa Hilal, Abdelwahed Motwakel Cyber attack detection in healthcare data using cyber-physical system with optimized algorithm. Search on Bibsonomy Comput. Electr. Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Buxiang Zhou, Binjie Sun, Tianlei Zang, Yating Cai, Jiale Wu, Huan Luo Security Risk Assessment Approach for Distribution Network Cyber Physical Systems Considering Cyber Attack Vulnerabilities. Search on Bibsonomy Entropy The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Hamed Kazemi, Khashayar Khorasani Sensor Cyber-Attack and Fault Detection and Isolation of Nonlinear Cyber-Physical Systems. Search on Bibsonomy CCTA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Ali Eslami, Khashayar Khorasani Cyber-Attack Detection by Using Event-Based Control in Multi-Agent Cyber-Physical Systems. Search on Bibsonomy ECC The full citation details ... 2023 DBLP  BibTeX  RDF
19Youngmi Baek, Seo Hee Park Adaptive and Lightweight Cyber-Attack Detection in Modern Automotive Cyber-Physical Systems. Search on Bibsonomy CCNC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Romain Thibert, Gregory Faraut, Saïd Amari Construction of Model-based Diagnosis of Cyber-Attack in Cyber-Physical Systems Using Labeled Petri Nets. Search on Bibsonomy ETFA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Keith S. Jones, Natalie R. Lodinger, Benjamin P. Widlus, Akbar Siami Namin, Emily Maw, Miriam Armstrong Grouping and Determining Perceived Severity of Cyber-Attack Consequences: Gaining Information Needed to Sonify Cyber-Attacks. Search on Bibsonomy J. Multimodal User Interfaces The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Henry Akwetey Matey, Paul Danquah, Godfred Yaw Koi-Akrofi Predicting Cyber-Attack using Cyber Situational Awareness: The Case of Independent Power Producers (IPPs). Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  BibTeX  RDF
19Muhammad Mudassar Yamin, Basel Katt Use of cyber attack and defense agents in cyber ranges: A case study. Search on Bibsonomy Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Yang-Cheng Huang, Jun-Yi Li, Hong-Xia Rao, Hui Chen Finite-time Cluster Synchronization Control of Cyber-Physical Systems under Cyber Attack. Search on Bibsonomy ICCA The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Sahin Kara Siber güvenlik analizi için yeni bir siber saldırı simülatörü geliştirilmesi (Design and implementation of a new cyber attack simulator for cyber security analysis) Search on Bibsonomy 2022   RDF
19Mohammad Ghiasi, Moslem Dehghani, Taher Niknam, Abdollah Kavousi-Fard, Pierluigi Siano, Hassan Haes Alhelou Cyber-Attack Detection and Cyber-Security Enhancement in Smart DC-Microgrid Based on Blockchain Technology and Hilbert Huang Transform. Search on Bibsonomy IEEE Access The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Lei Li, Wenting Wang, Qiang Ma, Kunpeng Pan, Xin Liu, Lin Lin, Jian Li 0026 Cyber attack estimation and detection for cyber-physical power systems. Search on Bibsonomy Appl. Math. Comput. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Tanushree Roy, Satadru Dey Security of Distributed Parameter Cyber-Physical Systems: Cyber-Attack Detection in Linear Parabolic PDEs. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
19Lei Wang 0132, Pengcheng Xu 0006, Zhaoyang Qu, Xiaoyong Bo, Yunchang Dong, Zhenming Zhang, Yang Li 0011 Coordinated Cyber-Attack Detection Model of Cyber-Physical Power System Based on the Operating State Data Link. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
19Ahmad Ali AlZubi, Mohammed Al-Maitah, Abdulaziz Alarifi Cyber-attack detection in healthcare using cyber-physical system and machine learning techniques. Search on Bibsonomy Soft Comput. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Suyun Lee, Sunjae Jung, Youngmi Baek Cyber-attack detection for automotive cyber-physical systems. Search on Bibsonomy BuildSys@SenSys The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Haicheng Tu, Yongxiang Xia, Chi K. Tse, Xi Chen 0014 A Hybrid Cyber Attack Model for Cyber-Physical Power Systems. Search on Bibsonomy IEEE Access The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Mahdi Taheri, Khashayar Khorasani, Iman Shames, Nader Meskin Cyber Attack and Machine Induced Fault Detection and Isolation Methodologies for Cyber-Physical Systems. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
19Hetong Jiang, Taejun Choi, Ryan K. L. Ko Pandora: A Cyber Range Environment for the Safe Testing and Deployment of Autonomous Cyber Attack Tools. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
19Hetong Jiang, Taejun Choi, Ryan K. L. Ko Pandora: A Cyber Range Environment for the Safe Testing and Deployment of Autonomous Cyber Attack Tools. Search on Bibsonomy SSCC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Romuald Hoffmann Stochastic Model of the Simple Cyber Kill Chain: Cyber Attack Process as a Regenerative Process. Search on Bibsonomy CISIM The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Dan Ye 0001, Shengping Luo A co-design methodology for cyber-physical systems under actuator fault and cyber attack. Search on Bibsonomy J. Frankl. Inst. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Marco A. Gamarra, Sachin Shetty, Oscar R. González, Laurent Njilla, Marcus Pendleton, Charles A. Kamhoua Dual Redundant Cyber-Attack Tolerant Control Systems Strategy for Cyber-Physical Systems. Search on Bibsonomy ICC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Xiaochen Hao, Mingsong Lv, Jiesheng Zheng, Zhengkui Zhang, Wang Yi 0001 Integrating Cyber-Attack Defense Techniques into Real-Time Cyber-Physical Systems. Search on Bibsonomy ICCD The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Barry M. Horowitz Policy Issues Regarding Implementations of Cyber Attack Resilience Solutions for Cyber Physical Systems. Search on Bibsonomy AAAI Spring Symposia The full citation details ... 2018 DBLP  BibTeX  RDF
19Roland E. Haas, Dietmar P. F. Möller Automotive connectivity, cyber attack scenarios and automotive cyber security. Search on Bibsonomy EIT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Yinan Wang, Wei Li 0114, Gangfeng Yan, Sumian Song Towards a framework for cyber attack impact analysis of electric cyber physical systems. Search on Bibsonomy ICIT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Ming Feng, Hao Xu 0002 Deep reinforecement learning based optimal defense for cyber-physical system in presence of unknown cyber-attack. Search on Bibsonomy SSCI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Koustav Sadhukhan, Arvind Mallari Rao, Tarun Yadav Cyber Attack Thread: A Control-flow Based Approach to Deconstruct and Mitigate Cyber Threats. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
19Sujit Rokka Chhetri, Arquimedes Canedo, Mohammad Abdullah Al Faruque KCAD: kinetic cyber-attack detection method for cyber-physical additive manufacturing systems. Search on Bibsonomy ICCAD The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Julian Droogan, Lise Waldek Where are All the Cyber Terrorists? From Waiting for Cyber Attack to Understanding Audiences. Search on Bibsonomy CCC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
19Cheolhyeon Kwon, Inseok Hwang 0002 Hybrid robust controller design: Cyber attack attenuation for Cyber-Physical Systems. Search on Bibsonomy CDC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
19Gabriel Jakobson Mission-centricity in cyber security: Architecting cyber attack resilient missions. Search on Bibsonomy CyCon The full citation details ... 2013 DBLP  BibTeX  RDF
19Varun Dutt, Young-Suk Ahn, Cleotilde Gonzalez Cyber Situation Awareness: Modeling the Security Analyst in a Cyber-Attack Scenario through Instance-Based Learning. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
19Ana Maria Pirca, Harjinder Singh Lallie 0001 An empirical evaluation of the effectiveness of attack graphs and MITRE ATT&CK matrices in aiding cyber attack perception amongst decision-makers. Search on Bibsonomy Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Dengfeng Pan, Xiaohua Ge, Derui Ding, Qing-Long Han Simultaneous Cyber Attack Estimation and Radar Spoofing Attack Detection for Connected Automated Vehicles. Search on Bibsonomy IECON The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura Cyber Attack Stage Tracing System based on Attack Scenario Comparison. Search on Bibsonomy ICISSP The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Jiming Qi, Jiazheng Zhang, Qingxia Liu, Bang Wang A Flow Attack Strategy based on Critical Links for Cyber-attack. Search on Bibsonomy TrustCom The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Moslem Dehghani, Mohammad Ghiasi, Taher Niknam, Abdollah Kavousi-Fard, Elham Tajik, Sanjeevikumar Padmanaban, Hamdulah Aliev Cyber Attack Detection Based on Wavelet Singular Entropy in AC Smart Islands: False Data Injection Attack. Search on Bibsonomy IEEE Access The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19P. Varsha Suresh, Minu Lalitha Madhavu Insider Attack: Internal Cyber Attack Detection Using Machine Learning. Search on Bibsonomy ICCCNT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Nikolaos Polatidis, Elias Pimenidis, Michalis Pavlidis, Spyridon Papastergiou, Haralambos Mouratidis From product recommendation to cyber-attack prediction: generating attack graphs and predicting future attacks. Search on Bibsonomy Evol. Syst. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Nikolaos Polatidis, Elias Pimenidis, Michalis Pavlidis, Spyridon Papastergiou, Haralambos Mouratidis From product recommendation to cyber-attack prediction: Generating attack graphs and predicting future attacks. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
19Harjinder Singh Lallie 0001, Kurt Debattista, Jay Bal An Empirical Evaluation of the Effectiveness of Attack Graphs and Fault Trees in Cyber-Attack Perception. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Ercan Nurcan Yilmaz, Serkan Gönen Attack detection/prevention system against cyber attack in industrial control systems. Search on Bibsonomy Comput. Secur. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Bao U. Nguyen A Simultaneous Cyber-attack and a Missile Attack. Search on Bibsonomy SIMULTECH The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
19Wenjun Sun, Liqun Lv, Yang Su, Xu An Wang 0001 Cyber-Attack Risks Analysis Based on Attack-Defense Trees. Search on Bibsonomy EIDWT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Kevin L. McLaughlin Cyber Attack! Is a Counter Attack Warranted? Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
17Clayton Bolz, Gordon W. Romney, Brandon L. Rogers Safely train security engineers regarding the dangers presented by denial of service attacks. Search on Bibsonomy SIGITE Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF DoS lab, isolated lab, network security, information technology, DDoS
13Yacov Y. Haimes, Joost R. Santos, Kenneth G. Crowther, Matthew Henry, Chenyang Lian, Zhenyu Yan 0001 Risk Analysis in Interdependent Infrastructures. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF interdependent systems, systems engineering, Risk analysis
13Yih Huang, David Arsenault, Arun Sood Securing DNS Services through System Self Cleansing and Hardware Enhancements. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Norman F. Schneidewind Reliability - Security Model. Search on Bibsonomy ICECCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Integration of security and reliability, Conditional probability of security failures, Policy implications resulting from model results
13Jeffery E. Payne Regulation and Information Security: Can Y2K Lessons Help Us? Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Sarbannes Oxley, software regulation, Y2K lessons, software security
13Andrew K. Wright, John A. Kinast, Joe McCarty Low-Latency Cryptographic Protection for SCADA Communications. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
13Sung-Do Chi, Jong Sou Park, Jang-Se Lee A Role of DEVS Simulation for Information Assurance. Search on Bibsonomy WISA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
13Axel W. Krings, Paul W. Oman A Simple GSPN for Modeling Common Mode Failures in Critical Infrastructures. Search on Bibsonomy HICSS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
13John J. Shaw Predicting the Impact of Cyber-Attacks on BMC3 Enterprises. Search on Bibsonomy DISCEX (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
13Sepideh Bahadoripour, Hadis Karimipour, Amir Namavar Jahromi, Anik Islam An explainable multi-modal model for advanced cyber-attack detection in industrial control systems. Search on Bibsonomy Internet Things The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Marzieh Samimiat, Ali-Akbar Ahmadi Secure message recovery in presence of the cyber-attack using discrete-time chaotic modulation approach. Search on Bibsonomy Inf. Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Hui Ge, Lei Zhao, Dong Yue 0001, Xiangpeng Xie, Linghai Xie, Sergey Gorbachev, Iakov Korovin, Yuan Ge A game theory based optimal allocation strategy for defense resources of smart grid under cyber-attack. Search on Bibsonomy Inf. Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Saad Hammood Mohammed, Abdulmajeed Al-Jumaily, Jit Singh Mandeep Singh, Víctor P. Gil Jiménez, Aqeel S. Jaber, Yaseein Soubhi Hussein, Mudhar Mustafa Abdul Kader Al-Najjar, Dhiya Al-Jumeily A Review on the Evaluation of Feature Selection Using Machine Learning for Cyber-Attack Detection in Smart Grid. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Mengni Du, Xiangpeng Xie, Hui Wang, Jianwei Xia, Jiayue Sun Relaxed Set-Membership Estimation and Cyber Attack Detection for LPV Systems Under Multiple Attacks via A Switching-Type Scheme Design. Search on Bibsonomy IEEE Trans. Instrum. Meas. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Esma Uflaz, Sukru Ilke Sezer, Ahmet Lutfi Tunçel, Muhammet Aydin, Emre Akyuz, Özcan Arslan Quantifying potential cyber-attack risks in maritime transportation under Dempster-Shafer theory FMECA and rule-based Bayesian network modelling. Search on Bibsonomy Reliab. Eng. Syst. Saf. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Ahmed H. El-Ebiary, Mahmoud Abdallah Attia, Fathy H. Awad, Mostafa I. Marei, Mohamed Mokhtar Kalman Filters Based Distributed Cyber-Attack Mitigation Layers for DC Microgrids. Search on Bibsonomy IEEE Trans. Circuits Syst. I Regul. Pap. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Zhaoyuan Wang, Siqi Bu Design and Defense of Modal Resonance-Oriented Cyber-Attack Against Wide-Area Damping Control. Search on Bibsonomy IEEE Trans. Smart Grid The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Yang Xia, Yan Xu 0005, Suman Mondal, Amit Kumar Gupta A Transfer Learning-Based Method for Cyber-Attack Tolerance in Distributed Control of Microgrids. Search on Bibsonomy IEEE Trans. Smart Grid The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Tanushree Roy, Sara Sattarzadeh, Satadru Dey Cyber-Attack Detection in Socio-Technical Transportation Systems Exploiting Redundancies Between Physical and Social Data. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Tosin Ige, Christopher Kiekintveld, Aritran Piplai An Investigation into the Performances of the State-of-the-art Machine Learning Approaches for Various Cyber-attack Detection: A Survey. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Ezekia Gilliard, Jinshuo Liu, Ahmed Abubakar Aliyu Knowledge graph reasoning for cyber attack detection. Search on Bibsonomy IET Commun. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 566 (100 per page; Change: )
Pages: [1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license