|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 147 occurrences of 110 keywords
|
|
|
Results
Found 1184 publication records. Showing 1184 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
89 | Nong Ye, Toni Farley, Deepak Lakshminarasimhan |
An attack-norm separation approach for detecting cyber attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Frontiers ![In: Inf. Syst. Frontiers 8(3), pp. 163-177, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Computer and network security, Intrusion detection, Signal processing, Signal detection, Cyber attacks |
83 | Peeter Lorents, Rain Ottis, Raul Rikk |
Cyber Society and Cooperative Cyber Defence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (14) ![In: Internationalization, Design and Global Development, Third International Conference, IDGD 2009, Held as Part of HCI International 2009, San Diego, CA, USA, July 19-24, 2009. Proceedings, pp. 180-186, 2009, Springer, 978-3-642-02766-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
cyber society, cooperative cyber defence, CCD COE, Knowledge, information, cyber attacks |
70 | Flora S. Tsai, Kap Luk Chan |
Detecting Cyber Security Threats in Weblogs Using Probabilistic Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAISI ![In: Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings, pp. 46-57, 2007, Springer, 978-3-540-71548-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
cyber terrorism, data mining, blog, weblog, probabilistic latent semantic analysis, cyber security, cyber crime |
67 | Leonard Kwan, Pradeep Ray, Greg Stephens |
Towards a Methodology for Profiling Cyber Criminals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), Proceedings, 7-10 January 2008, Waikoloa, Big Island, HI, USA, pp. 264, 2008, IEEE Computer Society, 0-7695-3075-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
58 | Srinivas Mukkamala, Andrew H. Sung |
Computational Intelligent Techniques for Detecting Denial of Service Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEA/AIE ![In: Innovations in Applied Artificial Intelligence, 17th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, IEA/AIE 2004, Ottawa, Canada, May 17-20, 2004. Proceedings, pp. 616-624, 2004, Springer, 3-540-22007-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
53 | Ahmed Zeeshan, Anwar M. Masood, Zafar M. Faisal, Azam Kalim, Naheed Farzana |
PrISM: Automatic Detection and Prevention from Cyber Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMTIC ![In: Wireless Networks, Information Processing and Systems, International Multi Topic Conference, IMTIC 2008, Jamshoro, Pakistan, April 11-12, 2008, Revised Selected Papers, pp. 433-444, 2008, Springer, 978-3-540-89852-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Information Security Management System, Intrusion Detection, Network security, Computer Security, Intrusion Prevention |
52 | Nong Ye, Yebin Zhang, Connie M. Borror |
Robustness of the Markov-chain model for cyber-attack detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Reliab. ![In: IEEE Trans. Reliab. 53(1), pp. 116-123, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
50 | Sai Ho Kwok, Anthony C. T. Lai, Jason C. K. Yeung |
A study of online service and information exposure of public companies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD Workshop on CyberSecurity and Intelligence Informatics ![In: Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, Paris, France, June 28, 2009, pp. 85-90, 2009, ACM, 978-1-60558-669-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
malicious hackers, public company, public server, web server, ports, cyber security |
48 | Shouhuai Xu |
Collaborative Attack vs. Collaborative Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CollaborateCom ![In: Collaborative Computing: Networking, Applications and Worksharing, 4th International Conference, CollaborateCom 2008, Orlando, FL, USA, November 13-16, 2008, Revised Selected Papers, pp. 217-228, 2008, Springer / ICST, 978-3-642-03353-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
collaborative attack, collaborative defense, cyber security, cyber attack |
46 | Gregory B. White |
The Community Cyber Security Maturity Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), CD-ROM / Abstracts Proceedings, 3-6 January 2007, Waikoloa, Big Island, HI, USA, pp. 99, 2007, IEEE Computer Society, 0-7695-2755-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
43 | Natalie Granado, Gregory White 0001 |
Cyber Security and Government Fusion Centers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), Proceedings, 7-10 January 2008, Waikoloa, Big Island, HI, USA, pp. 205, 2008, IEEE Computer Society, 0-7695-3075-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
43 | Carl Livadas, Robert Walsh, David E. Lapsley, W. Timothy Strayer |
Using Machine Learning Techniques to Identify Botnet Traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: LCN 2006, The 31st Annual IEEE Conference on Local Computer Networks, Tampa, Florida, USA, 14-16 November 2006, pp. 967-974, 2006, IEEE Computer Society, 1-4244-0418-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Shangping Ren, Kevin A. Kwiat |
A Non-Intrusive Approach to Enhance Legacy Embedded Control Systems with Cyber Protection Features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 1180-1187, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
legacy control systems, behavior observation, feedback loop |
40 | Kun Xiao, Shangping Ren, Kevin A. Kwiat |
Retrofitting Cyber Physical Systems for Survivability through External Coordination. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), Proceedings, 7-10 January 2008, Waikoloa, Big Island, HI, USA, pp. 465, 2008, IEEE Computer Society, 0-7695-3075-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Jang-Se Lee, Jung-Rae Jung, Jong Sou Park, Sung-Do Chi |
Linux-Based System Modelling for Cyber-attack Simulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIS ![In: Artificial Intelligence and Simulation, 13th International Conference on AI, Simulation, and Planning in High Autonomy Systems, AIS 2004, Jeju Island, Korea, October 4-6, 2004, Revised Selected Papers, pp. 585-596, 2004, Springer, 3-540-24476-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
35 | Byoung-Joon Min, Seung Hwan Yoo, Jongho Ryu, Dong Il Seo |
Return on Security Investment Against Cyber Attacks on Availability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part II, pp. 270-278, 2006, Springer, 3-540-34072-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
34 | John Hale, Paul Brusil |
Secur(e/ity) Management: A Continuing Uphill Climb. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Netw. Syst. Manag. ![In: J. Netw. Syst. Manag. 15(4), pp. 525-553, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Security industry, Information assurance, Security management, Secure management, Security metrics, Enterprise networks |
34 | Gregory B. White, David J. DiCenso |
Information Sharing Needs for National Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 38th Hawaii International Conference on System Sciences (HICSS-38 2005), CD-ROM / Abstracts Proceedings, 3-6 January 2005, Big Island, HI, USA, 2005, IEEE Computer Society, 0-7695-2268-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Andrew H. Sung, Srinivas Mukkamala |
The Feature Selection and Intrusion Detection Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIAN ![In: Advances in Computer Science - ASIAN 2004, Higher-Level Decision Making, 9th Asian Computing Science Conference, Dedicated to Jean-Louis Lassez on the Occasion of His 5th Cycle Birthday, Chiang Mai, Thailand, December 8-10, 2004, Proceedings, pp. 468-482, 2004, Springer, 3-540-24087-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
31 | James Bret Michael, Thomas C. Wingfield, Duminda Wijesekera |
Measured Responses to Cyber Attacks Using Schmitt Analysis: A Case Study of Attack Scenarios for a Software-Intensive System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: 27th International Computer Software and Applications Conference (COMPSAC 2003): Design and Assessment of Trustworthy Software-Based Systems, 3-6 November 2003, Dallas, TX, USA, Proceedings, pp. 621-626, 2003, IEEE Computer Society, 0-7695-2020-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
31 | Jon B. Weissman, Vipin Kumar 0001, Varun Chandola, Eric Eilertson, Levent Ertöz, György J. Simon, Seonho Kim, Jinoh Kim |
DDDAS/ITR: A Data Mining and Exploration Middleware for Grid and Distributed Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (1) ![In: Computational Science - ICCS 2007, 7th International Conference Beijing, China, May 27-30, 2007, Proceedings, Part I, pp. 1222-1229, 2007, Springer, 978-3-540-72583-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Data mining, Grid Computing |
31 | Dan Li 0002, Kefei Wang, Jitender S. Deogun |
A Fuzzy Anomaly Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISI ![In: Intelligence and Security Informatics, International Workshop, WISI 2006, Singapore, April 9, 2006, Proceedings, pp. 167-168, 2006, Springer, 3-540-33361-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Abhrajit Ghosh, Larry Wong, Giovanni Di Crescenzo, Rajesh Talpade |
InFilter: Predictive Ingress Filtering to Detect Spoofed IP Traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 6-10 June 2005, Columbus, OH, USA, pp. 99-106, 2005, IEEE Computer Society, 0-7695-2328-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Srinivas Mukkamala, Andrew H. Sung |
A Comparative Study of Techniques for Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICTAI ![In: 15th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2003), 3-5 November 2003, Sacramento, California, USA, pp. 570-, 2003, IEEE Computer Society, 0-7695-2038-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
intrusion detection, information security, AI techniques |
29 | Meng Yu 0001, Peng Liu 0005, Wanyu Zang, Sushil Jajodia |
Trusted Recovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Data Management in Decentralized Systems ![In: Secure Data Management in Decentralized Systems, pp. 59-94, 2007, Springer, 978-0-387-27694-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Harjinder Singh Lallie 0001, Lynsay A. Shepherd, Jason R. C. Nurse, Arnau Erola, Gregory Epiphaniou, Carsten Maple, Xavier J. A. Bellekens |
Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 105, pp. 102248, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
25 | Harjinder Singh Lallie 0001, Lynsay A. Shepherd, Jason R. C. Nurse, Arnau Erola, Gregory Epiphaniou, Carsten Maple, Xavier J. A. Bellekens |
Cyber Security in the Age of COVID-19: A Timeline and Analysis of Cyber-Crime and Cyber-Attacks during the Pandemic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2006.11929, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
25 | Barbara Endicott-Popovsky, Julia Narvaez, Christian Seifert, Deborah A. Frincke, Lori Ross O'Neil, Chiraag Uday Aval |
Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (16) ![In: Foundations of Augmented Cognition. Neuroergonomics and Operational Neuroscience, 5th International Conference, FAC 2009 Held as Part of HCI International 2009 San Diego, CA, USA, July 19-24, 2009, Proceedings, pp. 138-147, 2009, Springer, 978-3-642-02811-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
counter-deception, honeypots, deception, drive-by-downloads, cyber-attacks |
25 | Natalia Stakhanova, Oleg Stakhanov, Ali A. Ghorbani 0001 |
A Behavioral Model of Ideologically-motivated "Snowball" Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 88-95, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
ideological attacks, conceptual model, cyber attacks |
25 | Nong Ye |
QoS-Centric Stateful Resource Management in Information Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Frontiers ![In: Inf. Syst. Frontiers 4(2), pp. 149-160, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
quality of service, internet, information systems, resource management, cyber attacks |
25 | Daniel Barbará, Julia Couto 0001, Sushil Jajodia, Ningning Wu |
ADAM: A Testbed for Exploring the Use of Data Mining in Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Rec. ![In: SIGMOD Rec. 30(4), pp. 15-24, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
intrusion detection software, data mining, pattern analysis, cyber attacks |
25 | Yang Li 0002, Li Guo 0001 |
TCM-KNN scheme for network anomaly detection using feature-based optimizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), Fortaleza, Ceara, Brazil, March 16-20, 2008, pp. 2103-2109, 2008, ACM, 978-1-59593-753-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
TCM-KNN algorithm, feature selection, network security, anomaly detection, feature weight |
25 | Rami Puzis, Marius David Klippel, Yuval Elovici, Shlomi Dolev |
Optimization of NIDS Placement for Protection of Intercommunicating Critical Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroISI ![In: Intelligence and Security Informatics, First European Conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008. Proceedings, pp. 191-203, 2008, Springer, 978-3-540-89899-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
communication infrastructure protection, NIDS placement, epidemic models |
25 | Barry E. Mullins, Timothy H. Lacey, Robert F. Mills, Joseph M. Trechter, Samuel D. Bass |
The Impact of the NSA Cyber Defense Exercise on the Curriculum at the Air Force Institute of Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), CD-ROM / Abstracts Proceedings, 3-6 January 2007, Waikoloa, Big Island, HI, USA, pp. 271, 2007, IEEE Computer Society, 0-7695-2755-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Moses Garuba, Anteneh Girma |
Impact Of External Security Measures On Data Access Implementation With Online Database Management System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Symposium on Information Technology: Coding and Computing (ITCC 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, USA, pp. 243-248, 2005, IEEE Computer Society, 0-7695-2315-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Ariel Futoransky, Fernando Miranda, José Ignacio Orlicki, Carlos Sarraute |
Simulating cyber-attacks for fun and profit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SimuTools ![In: Proceedings of the 2nd International Conference on Simulation Tools and Techniques for Communications, Networks and Systems, SimuTools 2009, Rome, Italy, March 2-6, 2009, pp. 4, 2009, ICST/ACM, 978-963-9799-45-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
0-day, network security, training, network simulation, vulnerability, exploit, penetration test, cyber-attack |
25 | Young-Gab Kim, Taek Lee, Hoh Peter In, Yoon Jung Chung, In-Jung Kim, Doo-Kwon Baik |
A Probabilistic Approach to Estimate the Damage Propagation of Cyber Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers, pp. 175-185, 2005, Springer, 3-540-33354-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Mahdi Taheri, Khashayar Khorasani, Nader Meskin |
The Security Requirement to Prevent Zero Dynamics Attacks and Perfectly Undetectable Cyber-Attacks in Cyber-Physical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CDC ![In: 62nd IEEE Conference on Decision and Control, CDC 2023, Singapore, December 13-15, 2023, pp. 7067-7072, 2023, IEEE, 979-8-3503-0124-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Qingyu Su, Handong Wang, Chaowei Sun, Bo Li, Jian Li 0026 |
Cyber-attacks against cyber-physical power systems security: State estimation, attacks reconstruction and defense strategy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Math. Comput. ![In: Appl. Math. Comput. 413, pp. 126639, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Dan Peng, Zhicai Shi, Longming Tao, Wu Ma |
Enhanced and Authenticated Deterministic Packet Marking for IP Traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APPT ![In: Advanced Parallel Processing Technologies, 7th International Symposium, APPT 2007, Guangzhou, China, November 22-23, 2007, Proceedings, pp. 508-517, 2007, Springer, 978-3-540-76836-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Keisuke Takemori, Yutaka Miyake, Chie Ishida, Iwao Sasase |
A SOC Framework for ISP Federation and Attack Forecast by Learning Propagation Patterns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE International Conference on Intelligence and Security Informatics, ISI 2007, New Brunswick, New Jersey, USA, May 23-24, 2007, Proceedings, pp. 172-179, 2007, IEEE, 1-4244-1329-X. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Kymie M. C. Tan, Kevin S. Killourhy, Roy A. Maxion |
Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 5th International Symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings, pp. 54-73, 2002, Springer, 3-540-00020-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
22 | Kristopher Daley, Ryan Larson, Jerald Dawkins |
A Structural Framework for Modeling Multi-Stage Network Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPP Workshops ![In: 31st International Conference on Parallel Processing Workshops (ICPP 2002 Workshops), 20-23 August 2002, Vancouver, BC, Canada, pp. 5-10, 2002, IEEE Computer Society, 0-7695-1680-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
22 | Greg Aaron, Katharine A. Bostik, Rod Rasmussen, Edmon Chung |
Protecting the web: phishing, malware, and other security threats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 17th International Conference on World Wide Web, WWW 2008, Beijing, China, April 21-25, 2008, pp. 1253-1254, 2008, ACM, 978-1-60558-085-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, dns |
22 | Dong-Joo Kang, Hak-Man Kim |
A Method for Determination of Key Distribution Period Using QoS Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FGCN (2) ![In: Future Generation Communication and Networking, FGCN 2007, Ramada Plaza Jeju, Jeju-Island, Korea, December 6-8, 2007, Proceedings, pp. 532-535, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Robert G. Cole, Nam Phamdo, Moheeb Abu Rajab, Andreas Terzis |
Requirements on Worm Mitigation Technologies in MANETS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PADS ![In: 19th Workshop on Parallel and Distributed Simulation, PADS 20055, Monterey, CA, USA, June 1-3, 2005, pp. 207-214, 2005, IEEE Computer Society, 0-7695-2383-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Claudio Mazzariello, Carlo Sansone |
Anomaly-Based Detection of IRC Botnets by Means of One-Class Support Vector Classifiers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIAP ![In: Image Analysis and Processing - ICIAP 2009, 15th International Conference Vietri sul Mare, Italy, September 8-11, 2009, Proceedings, pp. 883-892, 2009, Springer, 978-3-642-04145-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Syed Obaid Amin, Muhammad Shoaib Siddiqui, Choong Seon Hong |
A novel IPv6 traceback architecture using COPS protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ann. des Télécommunications ![In: Ann. des Télécommunications 63(3-4), pp. 207-221, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Network security, Network management, IPv6, DDoS, Traceback |
19 | Zonghua Zhang, Ruo Ando, Youki Kadobayashi |
Hardening Botnet by a Rational Botmaster. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers, pp. 348-369, 2008, Springer, 978-3-642-01439-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
intrusion detection, Network security, malware, botnet |
19 | Qijun Gu, Rizwan Noorani |
Towards self-propagate mal-packets in sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the First ACM Conference on Wireless Network Security, WISEC 2008, Alexandria, VA, USA, March 31 - April 02, 2008, pp. 172-182, 2008, ACM, 978-1-59593-814-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
mal-packet, sensor worm, buffer overflow, control flow |
19 | Habib Ullah Baig, Farrukh Kamran |
Detection of Port and Network Scan Using Time Independent Feature Set. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE International Conference on Intelligence and Security Informatics, ISI 2007, New Brunswick, New Jersey, USA, May 23-24, 2007, Proceedings, pp. 180-184, 2007, IEEE, 1-4244-1329-X. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Ji Wu 0006, Chaoqun Ye, Shiyao Jin |
Adversarial Organization Modeling for Network Attack/Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings, pp. 90-99, 2006, Springer, 3-540-33052-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Dong-Soo Kim, Y. J. Jung, Tai-Myung Chung |
PRISM: A Preventive and Risk-Reducing Integrated Security Management Model Using Security Label. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Supercomput. ![In: J. Supercomput. 33(1-2), pp. 103-121, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
security management, security label, ESM, ISM |
19 | Michael Atighetchi, Partha P. Pal, Franklin Webber, Christopher C. Jones |
Adaptive Use of Network-Centric Mechanisms in Cyber-Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCA ![In: 2nd IEEE International Symposium on Network Computing and Applications (NCA 2003), 16-18 April 2003, Cambridge, MA, USA, pp. 179-190, 2003, IEEE Computer Society, 0-7695-1938-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Michael Atighetchi, Partha P. Pal, Franklin Webber, Christopher C. Jones |
Adaptive Use of Network-Centric Mechanisms in Cyber-Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISORC ![In: 6th IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2003), 14-16 May 2003, Hakodate, Hokkaido, Japan, pp. 183-192, 2003, IEEE Computer Society, 0-7695-1928-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Xiangxing Kong, Zhigang Lu 0003, Xiaoqiang Guo, Jiangfeng Zhang, Huifeng Li |
Resilience Evaluation of Cyber-Physical Power System Considering Cyber Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Reliab. ![In: IEEE Trans. Reliab. 73(1), pp. 245-256, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Yajing Ma, Yuan Wang, Zhanjie Li, Xiangpeng Xie |
Event-triggered finite-time command-filtered tracking control for nonlinear time-delay cyber physical systems against cyber attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Frontiers Inf. Technol. Electron. Eng. ![In: Frontiers Inf. Technol. Electron. Eng. 25(2), pp. 225-236, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Naveen Tatipatri, S. L. Arun |
A Comprehensive Review on Cyber-Attacks in Power Systems: Impact Analysis, Detection, and Cyber Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 12, pp. 18147-18167, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Lanxin Wang, Yue Long, Tieshan Li, Hanqing Yang 0001, C. L. Philip Chen |
Asynchronous attack tolerant control for Markov jump cyber-physical systems under hybrid cyber-attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Math. Comput. ![In: Appl. Math. Comput. 470, pp. 128583, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Zhi Feng, Guoqiang Hu 0001 |
Attack-Resilient Distributed Convex Optimization of Cyber-Physical Systems Against Malicious Cyber-Attacks Over Random Digraphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 10(1), pp. 458-472, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Jinghua Guo, Lubin Li, Jingyao Wang, Keqiang Li |
Cyber-Physical System-Based Path Tracking Control of Autonomous Vehicles Under Cyber-Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Ind. Informatics ![In: IEEE Trans. Ind. Informatics 19(5), pp. 6624-6635, May 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Valentyn Sobchuk, Oleg Barabash, Andrii Musienko, Iryna Tsyganivska, Oleksandr Kurylko |
Mathematical Model of Cyber Risks Management Based on the Expansion of Piecewise Continuous Analytical Approximation Functions of Cyber Attacks in the Fourier Series. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Axioms ![In: Axioms 12(10), pp. 924, October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Zhaoxia Peng, Yingwen Zhang, Guoguang Wen, Jinhuan Wang, Tingwen Huang |
Resilient Output Consensus to Cyber-Attacks in Continuous-Time Cyber-Physical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Netw. Sci. Eng. ![In: IEEE Trans. Netw. Sci. Eng. 10(4), pp. 2190-2200, July - August 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Wende Luo, Linlin Hou, Kaibo Shi |
Event-triggered dynamic output feedback control of switched cyber-physical systems with stochastic cyber attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Syst. Control. Eng. ![In: J. Syst. Control. Eng. 237(9), pp. 1654-1667, October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Dario Stabili, Raffaele Romagnoli, Mirco Marchetti, Bruno Sinopoli, Michele Colajanni |
A multidisciplinary detection system for cyber attacks on Powertrain Cyber Physical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Gener. Comput. Syst. ![In: Future Gener. Comput. Syst. 144, pp. 151-164, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Dmytro S. Morozov, Tetiana A. Vakaliuk, Andrii A. Yefimenko, Tetiana M. Nikitchuk, Roman O. Kolomiiets |
Honeypot and cyber deception as a tool for detecting cyber attacks on critical infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
doors ![In: Proceedings of the 3rd Edge Computing Workshop, Zhytomyr, Ukraine, April 7, 2023., pp. 81-96, 2023, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
19 | Kadir Korkmaz 0001 |
Securing the blockchain against IoT cyber attacks. (Protection de la Blockchain IoT face aux cyber attaques). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2023 |
RDF |
|
19 | Akashdeep Bhardwaj, Mohammad Dahman Alshehri, Keshav Kaushik, Hasan J. Alyamani, Manoj Kumar 0009 |
Secure framework against cyber attacks on cyber-physical robotic systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Electronic Imaging ![In: J. Electronic Imaging 31(6), 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Keith S. Jones, Natalie R. Lodinger, Benjamin P. Widlus, Akbar Siami Namin, Emily Maw, Miriam Armstrong |
Grouping and Determining Perceived Severity of Cyber-Attack Consequences: Gaining Information Needed to Sonify Cyber-Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Multimodal User Interfaces ![In: J. Multimodal User Interfaces 16(4), pp. 399-412, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Abbas Nemati, Mansour Peimani, Saleh Mobayen, Sayyedjavad Sayyedfattahi |
Adaptive non-singular finite time control of nonlinear disturbed cyber-physical systems with actuator cyber-attacks and time-varying delays. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 612, pp. 1111-1126, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Yue Zhao, Chunjie Zhou, Yu-Chu Tian, Yuanqing Qin, Xiaoya Hu |
$L_2$ Gain Secure Control of Cyber-Physical Systems Under Fast Time-Varying Cyber Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Netw. Sci. Eng. ![In: IEEE Trans. Netw. Sci. Eng. 9(2), pp. 648-659, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Rasmi Vlad Mahmoud, Marios Anagnostopoulos, Jens Myrup Pedersen |
Detecting Cyber Attacks through Measurements: Learnings from a Cyber Range. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Instrum. Meas. Mag. ![In: IEEE Instrum. Meas. Mag. 25(6), pp. 31-36, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Aaisha Makkar, Jong Hyuk Park |
SecureCPS: Cognitive inspired framework for detection of cyber attacks in cyber-physical systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Process. Manag. ![In: Inf. Process. Manag. 59(3), pp. 102914, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Lijuan Zha, Rongfei Liao, Jinliang Liu, Jinde Cao, Xiangpeng Xie |
Dynamic event-triggered security control of cyber-physical systems against missing measurements and cyber-attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Neurocomputing ![In: Neurocomputing 500, pp. 405-412, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Bingjun Wan, Chengwei Xu, Rajendra Prasad Mahapatra, P. Selvaraj |
Understanding the Cyber-Physical System in International Stadiums for Security in the Network from Cyber-Attacks and Adversaries using AI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 127(2), pp. 1207-1224, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Eleftherios E. Vlahakis, Gregory M. Provan, Gordon Werner, Shanchieh Yang, Nikolaos Athanasopoulos |
Quantifying impact on safety from cyber-attacks on cyber-physical systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2211.12196, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Dario Stabili, Raffaele Romagnoli, Mirco Marchetti, Bruno Sinopoli, Michele Colajanni |
Exploring the consequences of cyber attacks on Powertrain Cyber Physical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2202.00743, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
19 | Tala Talaei Khoei, Hadjar Ould Slimane, Naima Kaabouch |
A Comprehensive Survey on the Cyber-Security of Smart Grids: Cyber-Attacks, Detection, Countermeasure Techniques, and Future Directions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2207.07738, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Bruno Fischer, Dirk Meissner, Richard Nyuur, David Sarpong |
Guest Editorial: Cyber-Attacks, Strategic Cyber-Foresight, and Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Engineering Management ![In: IEEE Trans. Engineering Management 69(6), pp. 3660-3663, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Wenli Duo, MengChu Zhou, Abdullah Abusorrah |
A Survey of Cyber Attacks on Cyber Physical Systems: Recent Advances and Challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE CAA J. Autom. Sinica ![In: IEEE CAA J. Autom. Sinica 9(5), pp. 784-800, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Maryam Farajzadeh-Zanjani, Ehsan Hallaji, Roozbeh Razavi-Far, Mehrdad Saif |
Generative-Adversarial Class-Imbalance Learning for Classifying Cyber-Attacks and Faults - A Cyber-Physical Power System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 19(6), pp. 4068-4081, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Fereidoun Moradi, Maryam Bagheri 0001, Hanieh Rahmati, Hamed Yazdi, Sara Abbaspour Asadollah, Marjan Sirjani |
Monitoring Cyber-Physical Systems Using a Tiny Twin to Prevent Cyber-Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPIN ![In: Model Checking Software - 28th International Symposium, SPIN 2022, Virtual Event, May 21, 2022, Proceedings, pp. 24-43, 2022, Springer, 978-3-031-15076-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Mahdi Taheri, Khashayar Khorasani, Nader Meskin, Iman Shames |
Data-Driven Koopman Operator Based Cyber-Attacks for Nonlinear Control Affine Cyber-Physical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CDC ![In: 61st IEEE Conference on Decision and Control, CDC 2022, Cancun, Mexico, December 6-9, 2022, pp. 6769-6775, 2022, IEEE, 978-1-6654-6761-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Kang-Di Lu, Zheng-Guang Wu |
An Ensemble Learning-Based Cyber-Attacks Detection Method of Cyber-Physical Power Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICARM ![In: International Conference on Advanced Robotics and Mechatronics , ICARM 2022, Guilin, China, July 9-11, 2022, pp. 1029-1034, 2022, IEEE, 978-1-6654-8306-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Rasim M. Alguliyev, Yadigar N. Imamverdiyev, Lyudmila V. Sukhostat |
Hybrid DeepGCL model for cyber-attacks detection on cyber-physical systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Neural Comput. Appl. ![In: Neural Comput. Appl. 33(16), pp. 10211-10226, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Amir Namavar Jahromi, Hadis Karimipour, Ali Dehghantanha, Kim-Kwang Raymond Choo |
Toward Detection and Attribution of Cyber-Attacks in IoT-Enabled Cyber-Physical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 8(17), pp. 13712-13722, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Peter R. J. Trim, Yang-Im Lee |
The Global Cyber Security Model: Counteracting Cyber Attacks through a Resilient Partnership Arrangement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Big Data Cogn. Comput. ![In: Big Data Cogn. Comput. 5(3), pp. 32, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Xinrui Liu, Yuan Meng, Peng Chang |
Node Importance Evaluation of Cyber-Physical System under Cyber-Attacks Spreading. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Complex. ![In: Complex. 2021, pp. 6641030:1-6641030:15, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Ziwen Sun, Shuguo Zhang |
Modeling of Security Risk for Industrial Cyber-Physics System under Cyber-attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPS ![In: 4th IEEE International Conference on Industrial Cyber-Physical Systems, ICPS 2021, Victoria, BC, Canada, May 10-12, 2021, pp. 361-368, 2021, IEEE, 978-1-7281-6207-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Mahdi Taheri, Khashayar Khorasani, Iman Shames, Nader Meskin |
Towards Privacy Preserving Consensus Control in Multi-Agent Cyber-Physical Systems Subject to Cyber Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECC ![In: 2021 European Control Conference, ECC 2021, Virtual Event / Delft, The Netherlands, June 29 - July 2, 2021, pp. 939-945, 2021, IEEE, 978-9-4638-4236-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Jokha Ali |
Intrusion Detection Systems Trends to Counteract Growing Cyber-Attacks on Cyber-Physical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIT ![In: 22nd International Arab Conference on Information Technology, ACIT 2021, Muscat, Oman, December 21-23, 2021, pp. 1-6, 2021, IEEE, 978-1-6654-1995-6. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Zengji Liu, Qi Wang 0035, Yi Tang 0009 |
Design of a Cosimulation Platform With Hardware-in-the-Loop for Cyber-Attacks on Cyber-Physical Power Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 8, pp. 95997-96005, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Mahdi Taheri, Khashayar Khorasani, Iman Shames, Nader Meskin |
Undetectable Cyber Attacks on Communication Links in Multi-Agent Cyber-Physical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2009.06173, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
19 | Ashraf Tantawy, Sherif Abdelwahed, Abdelkarim Erradi |
Cyber LOPA: A New Approach for CPS Safety Design in the Presence of Cyber Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2006.00165, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
19 | Sheng Xu, Yongxiang Xia, Hui-Liang Shen |
Analysis of Malware-Induced Cyber Attacks in Cyber-Physical Power Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Circuits Syst. ![In: IEEE Trans. Circuits Syst. 67-II(12), pp. 3482-3486, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Mahdi Taheri, Khashayar Khorasani, Iman Shames, Nader Meskin |
Undetectable Cyber Attacks on Communication Links in Multi-Agent Cyber-Physical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CDC ![In: 59th IEEE Conference on Decision and Control, CDC 2020, Jeju Island, South Korea, December 14-18, 2020, pp. 3764-3771, 2020, IEEE, 978-1-7281-7447-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Michaël Timbert |
Protections des processeurs contre les cyber-attaques par vérification de l'intégrité du flot d'exécution. (Protections of processors against cyber attacks by control flow checking). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2020 |
RDF |
|
19 | Rong Lai, Xiaoyu Qiu, Jiajing Wu |
Robustness of Asymmetric Cyber-Physical Power Systems Against Cyber Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 7, pp. 61342-61352, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Tianlei Zang, Shibin Gao, Baoxu Liu, Tao Huang 0002, Tao Wang 0029, Xiaoguang Wei |
Integrated fault propagation model based vulnerability assessment of the electrical cyber-physical system under cyber attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Reliab. Eng. Syst. Saf. ![In: Reliab. Eng. Syst. Saf. 189, pp. 232-241, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Arif Sari |
Turkish national cyber-firewall to mitigate countrywide cyber-attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Electr. Eng. ![In: Comput. Electr. Eng. 73, pp. 128-144, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 1184 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|