The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase cyber-attacks (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1998-2003 (22) 2004-2005 (27) 2006 (15) 2007 (21) 2008 (26) 2009-2010 (25) 2011-2012 (27) 2013 (26) 2014 (28) 2015 (43) 2016 (55) 2017 (64) 2018 (80) 2019 (105) 2020 (100) 2021 (144) 2022 (170) 2023 (159) 2024 (47)
Publication types (Num. hits)
article(613) data(1) incollection(10) inproceedings(540) phdthesis(20)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 147 occurrences of 110 keywords

Results
Found 1184 publication records. Showing 1184 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
89Nong Ye, Toni Farley, Deepak Lakshminarasimhan An attack-norm separation approach for detecting cyber attacks. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Computer and network security, Intrusion detection, Signal processing, Signal detection, Cyber attacks
83Peeter Lorents, Rain Ottis, Raul Rikk Cyber Society and Cooperative Cyber Defence. Search on Bibsonomy HCI (14) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cyber society, cooperative cyber defence, CCD COE, Knowledge, information, cyber attacks
70Flora S. Tsai, Kap Luk Chan Detecting Cyber Security Threats in Weblogs Using Probabilistic Models. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cyber terrorism, data mining, blog, weblog, probabilistic latent semantic analysis, cyber security, cyber crime
67Leonard Kwan, Pradeep Ray, Greg Stephens Towards a Methodology for Profiling Cyber Criminals. Search on Bibsonomy HICSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
58Srinivas Mukkamala, Andrew H. Sung Computational Intelligent Techniques for Detecting Denial of Service Attacks. Search on Bibsonomy IEA/AIE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
53Ahmed Zeeshan, Anwar M. Masood, Zafar M. Faisal, Azam Kalim, Naheed Farzana PrISM: Automatic Detection and Prevention from Cyber Attacks. Search on Bibsonomy IMTIC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Information Security Management System, Intrusion Detection, Network security, Computer Security, Intrusion Prevention
52Nong Ye, Yebin Zhang, Connie M. Borror Robustness of the Markov-chain model for cyber-attack detection. Search on Bibsonomy IEEE Trans. Reliab. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
50Sai Ho Kwok, Anthony C. T. Lai, Jason C. K. Yeung A study of online service and information exposure of public companies. Search on Bibsonomy KDD Workshop on CyberSecurity and Intelligence Informatics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF malicious hackers, public company, public server, web server, ports, cyber security
48Shouhuai Xu Collaborative Attack vs. Collaborative Defense. Search on Bibsonomy CollaborateCom The full citation details ... 2008 DBLP  DOI  BibTeX  RDF collaborative attack, collaborative defense, cyber security, cyber attack
46Gregory B. White The Community Cyber Security Maturity Model. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
43Natalie Granado, Gregory White 0001 Cyber Security and Government Fusion Centers. Search on Bibsonomy HICSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
43Carl Livadas, Robert Walsh, David E. Lapsley, W. Timothy Strayer Using Machine Learning Techniques to Identify Botnet Traffic. Search on Bibsonomy LCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
40Shangping Ren, Kevin A. Kwiat A Non-Intrusive Approach to Enhance Legacy Embedded Control Systems with Cyber Protection Features. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF legacy control systems, behavior observation, feedback loop
40Kun Xiao, Shangping Ren, Kevin A. Kwiat Retrofitting Cyber Physical Systems for Survivability through External Coordination. Search on Bibsonomy HICSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
40Jang-Se Lee, Jung-Rae Jung, Jong Sou Park, Sung-Do Chi Linux-Based System Modelling for Cyber-attack Simulation. Search on Bibsonomy AIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
35Byoung-Joon Min, Seung Hwan Yoo, Jongho Ryu, Dong Il Seo Return on Security Investment Against Cyber Attacks on Availability. Search on Bibsonomy ICCSA (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34John Hale, Paul Brusil Secur(e/ity) Management: A Continuing Uphill Climb. Search on Bibsonomy J. Netw. Syst. Manag. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Security industry, Information assurance, Security management, Secure management, Security metrics, Enterprise networks
34Gregory B. White, David J. DiCenso Information Sharing Needs for National Security. Search on Bibsonomy HICSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
34Andrew H. Sung, Srinivas Mukkamala The Feature Selection and Intrusion Detection Problems. Search on Bibsonomy ASIAN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
31James Bret Michael, Thomas C. Wingfield, Duminda Wijesekera Measured Responses to Cyber Attacks Using Schmitt Analysis: A Case Study of Attack Scenarios for a Software-Intensive System. Search on Bibsonomy COMPSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
31Jon B. Weissman, Vipin Kumar 0001, Varun Chandola, Eric Eilertson, Levent Ertöz, György J. Simon, Seonho Kim, Jinoh Kim DDDAS/ITR: A Data Mining and Exploration Middleware for Grid and Distributed Computing. Search on Bibsonomy International Conference on Computational Science (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Data mining, Grid Computing
31Dan Li 0002, Kefei Wang, Jitender S. Deogun A Fuzzy Anomaly Detection System. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
31Abhrajit Ghosh, Larry Wong, Giovanni Di Crescenzo, Rajesh Talpade InFilter: Predictive Ingress Filtering to Detect Spoofed IP Traffic. Search on Bibsonomy ICDCS Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
31Srinivas Mukkamala, Andrew H. Sung A Comparative Study of Techniques for Intrusion Detection. Search on Bibsonomy ICTAI The full citation details ... 2003 DBLP  DOI  BibTeX  RDF intrusion detection, information security, AI techniques
29Meng Yu 0001, Peng Liu 0005, Wanyu Zang, Sushil Jajodia Trusted Recovery. Search on Bibsonomy Secure Data Management in Decentralized Systems The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Harjinder Singh Lallie 0001, Lynsay A. Shepherd, Jason R. C. Nurse, Arnau Erola, Gregory Epiphaniou, Carsten Maple, Xavier J. A. Bellekens Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Search on Bibsonomy Comput. Secur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
25Harjinder Singh Lallie 0001, Lynsay A. Shepherd, Jason R. C. Nurse, Arnau Erola, Gregory Epiphaniou, Carsten Maple, Xavier J. A. Bellekens Cyber Security in the Age of COVID-19: A Timeline and Analysis of Cyber-Crime and Cyber-Attacks during the Pandemic. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
25Barbara Endicott-Popovsky, Julia Narvaez, Christian Seifert, Deborah A. Frincke, Lori Ross O'Neil, Chiraag Uday Aval Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks. Search on Bibsonomy HCI (16) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF counter-deception, honeypots, deception, drive-by-downloads, cyber-attacks
25Natalia Stakhanova, Oleg Stakhanov, Ali A. Ghorbani 0001 A Behavioral Model of Ideologically-motivated "Snowball" Attacks. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ideological attacks, conceptual model, cyber attacks
25Nong Ye QoS-Centric Stateful Resource Management in Information Systems. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2002 DBLP  DOI  BibTeX  RDF quality of service, internet, information systems, resource management, cyber attacks
25Daniel Barbará, Julia Couto 0001, Sushil Jajodia, Ningning Wu ADAM: A Testbed for Exploring the Use of Data Mining in Intrusion Detection. Search on Bibsonomy SIGMOD Rec. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF intrusion detection software, data mining, pattern analysis, cyber attacks
25Yang Li 0002, Li Guo 0001 TCM-KNN scheme for network anomaly detection using feature-based optimizations. Search on Bibsonomy SAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF TCM-KNN algorithm, feature selection, network security, anomaly detection, feature weight
25Rami Puzis, Marius David Klippel, Yuval Elovici, Shlomi Dolev Optimization of NIDS Placement for Protection of Intercommunicating Critical Infrastructures. Search on Bibsonomy EuroISI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF communication infrastructure protection, NIDS placement, epidemic models
25Barry E. Mullins, Timothy H. Lacey, Robert F. Mills, Joseph M. Trechter, Samuel D. Bass The Impact of the NSA Cyber Defense Exercise on the Curriculum at the Air Force Institute of Technology. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Moses Garuba, Anteneh Girma Impact Of External Security Measures On Data Access Implementation With Online Database Management System. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Ariel Futoransky, Fernando Miranda, José Ignacio Orlicki, Carlos Sarraute Simulating cyber-attacks for fun and profit. Search on Bibsonomy SimuTools The full citation details ... 2009 DBLP  DOI  BibTeX  RDF 0-day, network security, training, network simulation, vulnerability, exploit, penetration test, cyber-attack
25Young-Gab Kim, Taek Lee, Hoh Peter In, Yoon Jung Chung, In-Jung Kim, Doo-Kwon Baik A Probabilistic Approach to Estimate the Damage Propagation of Cyber Attacks. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Mahdi Taheri, Khashayar Khorasani, Nader Meskin The Security Requirement to Prevent Zero Dynamics Attacks and Perfectly Undetectable Cyber-Attacks in Cyber-Physical Systems. Search on Bibsonomy CDC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Qingyu Su, Handong Wang, Chaowei Sun, Bo Li, Jian Li 0026 Cyber-attacks against cyber-physical power systems security: State estimation, attacks reconstruction and defense strategy. Search on Bibsonomy Appl. Math. Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Dan Peng, Zhicai Shi, Longming Tao, Wu Ma Enhanced and Authenticated Deterministic Packet Marking for IP Traceback. Search on Bibsonomy APPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Keisuke Takemori, Yutaka Miyake, Chie Ishida, Iwao Sasase A SOC Framework for ISP Federation and Attack Forecast by Learning Propagation Patterns. Search on Bibsonomy ISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Kymie M. C. Tan, Kevin S. Killourhy, Roy A. Maxion Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits. Search on Bibsonomy RAID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
22Kristopher Daley, Ryan Larson, Jerald Dawkins A Structural Framework for Modeling Multi-Stage Network Attacks. Search on Bibsonomy ICPP Workshops The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
22Greg Aaron, Katharine A. Bostik, Rod Rasmussen, Edmon Chung Protecting the web: phishing, malware, and other security threats. Search on Bibsonomy WWW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, dns
22Dong-Joo Kang, Hak-Man Kim A Method for Determination of Key Distribution Period Using QoS Function. Search on Bibsonomy FGCN (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Robert G. Cole, Nam Phamdo, Moheeb Abu Rajab, Andreas Terzis Requirements on Worm Mitigation Technologies in MANETS. Search on Bibsonomy PADS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Claudio Mazzariello, Carlo Sansone Anomaly-Based Detection of IRC Botnets by Means of One-Class Support Vector Classifiers. Search on Bibsonomy ICIAP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Syed Obaid Amin, Muhammad Shoaib Siddiqui, Choong Seon Hong A novel IPv6 traceback architecture using COPS protocol. Search on Bibsonomy Ann. des Télécommunications The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Network security, Network management, IPv6, DDoS, Traceback
19Zonghua Zhang, Ruo Ando, Youki Kadobayashi Hardening Botnet by a Rational Botmaster. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF intrusion detection, Network security, malware, botnet
19Qijun Gu, Rizwan Noorani Towards self-propagate mal-packets in sensor networks. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF mal-packet, sensor worm, buffer overflow, control flow
19Habib Ullah Baig, Farrukh Kamran Detection of Port and Network Scan Using Time Independent Feature Set. Search on Bibsonomy ISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Ji Wu 0006, Chaoqun Ye, Shiyao Jin Adversarial Organization Modeling for Network Attack/Defense. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Dong-Soo Kim, Y. J. Jung, Tai-Myung Chung PRISM: A Preventive and Risk-Reducing Integrated Security Management Model Using Security Label. Search on Bibsonomy J. Supercomput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security management, security label, ESM, ISM
19Michael Atighetchi, Partha P. Pal, Franklin Webber, Christopher C. Jones Adaptive Use of Network-Centric Mechanisms in Cyber-Defense. Search on Bibsonomy NCA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
19Michael Atighetchi, Partha P. Pal, Franklin Webber, Christopher C. Jones Adaptive Use of Network-Centric Mechanisms in Cyber-Defense. Search on Bibsonomy ISORC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
19Xiangxing Kong, Zhigang Lu 0003, Xiaoqiang Guo, Jiangfeng Zhang, Huifeng Li Resilience Evaluation of Cyber-Physical Power System Considering Cyber Attacks. Search on Bibsonomy IEEE Trans. Reliab. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Yajing Ma, Yuan Wang, Zhanjie Li, Xiangpeng Xie Event-triggered finite-time command-filtered tracking control for nonlinear time-delay cyber physical systems against cyber attacks. Search on Bibsonomy Frontiers Inf. Technol. Electron. Eng. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Naveen Tatipatri, S. L. Arun A Comprehensive Review on Cyber-Attacks in Power Systems: Impact Analysis, Detection, and Cyber Security. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Lanxin Wang, Yue Long, Tieshan Li, Hanqing Yang 0001, C. L. Philip Chen Asynchronous attack tolerant control for Markov jump cyber-physical systems under hybrid cyber-attacks. Search on Bibsonomy Appl. Math. Comput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Zhi Feng, Guoqiang Hu 0001 Attack-Resilient Distributed Convex Optimization of Cyber-Physical Systems Against Malicious Cyber-Attacks Over Random Digraphs. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Jinghua Guo, Lubin Li, Jingyao Wang, Keqiang Li Cyber-Physical System-Based Path Tracking Control of Autonomous Vehicles Under Cyber-Attacks. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Valentyn Sobchuk, Oleg Barabash, Andrii Musienko, Iryna Tsyganivska, Oleksandr Kurylko Mathematical Model of Cyber Risks Management Based on the Expansion of Piecewise Continuous Analytical Approximation Functions of Cyber Attacks in the Fourier Series. Search on Bibsonomy Axioms The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Zhaoxia Peng, Yingwen Zhang, Guoguang Wen, Jinhuan Wang, Tingwen Huang Resilient Output Consensus to Cyber-Attacks in Continuous-Time Cyber-Physical Systems. Search on Bibsonomy IEEE Trans. Netw. Sci. Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Wende Luo, Linlin Hou, Kaibo Shi Event-triggered dynamic output feedback control of switched cyber-physical systems with stochastic cyber attacks. Search on Bibsonomy J. Syst. Control. Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Dario Stabili, Raffaele Romagnoli, Mirco Marchetti, Bruno Sinopoli, Michele Colajanni A multidisciplinary detection system for cyber attacks on Powertrain Cyber Physical Systems. Search on Bibsonomy Future Gener. Comput. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Dmytro S. Morozov, Tetiana A. Vakaliuk, Andrii A. Yefimenko, Tetiana M. Nikitchuk, Roman O. Kolomiiets Honeypot and cyber deception as a tool for detecting cyber attacks on critical infrastructure. Search on Bibsonomy doors The full citation details ... 2023 DBLP  BibTeX  RDF
19Kadir Korkmaz 0001 Securing the blockchain against IoT cyber attacks. (Protection de la Blockchain IoT face aux cyber attaques). Search on Bibsonomy 2023   RDF
19Akashdeep Bhardwaj, Mohammad Dahman Alshehri, Keshav Kaushik, Hasan J. Alyamani, Manoj Kumar 0009 Secure framework against cyber attacks on cyber-physical robotic systems. Search on Bibsonomy J. Electronic Imaging The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Keith S. Jones, Natalie R. Lodinger, Benjamin P. Widlus, Akbar Siami Namin, Emily Maw, Miriam Armstrong Grouping and Determining Perceived Severity of Cyber-Attack Consequences: Gaining Information Needed to Sonify Cyber-Attacks. Search on Bibsonomy J. Multimodal User Interfaces The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Abbas Nemati, Mansour Peimani, Saleh Mobayen, Sayyedjavad Sayyedfattahi Adaptive non-singular finite time control of nonlinear disturbed cyber-physical systems with actuator cyber-attacks and time-varying delays. Search on Bibsonomy Inf. Sci. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Yue Zhao, Chunjie Zhou, Yu-Chu Tian, Yuanqing Qin, Xiaoya Hu $L_2$ Gain Secure Control of Cyber-Physical Systems Under Fast Time-Varying Cyber Attacks. Search on Bibsonomy IEEE Trans. Netw. Sci. Eng. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Rasmi Vlad Mahmoud, Marios Anagnostopoulos, Jens Myrup Pedersen Detecting Cyber Attacks through Measurements: Learnings from a Cyber Range. Search on Bibsonomy IEEE Instrum. Meas. Mag. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Aaisha Makkar, Jong Hyuk Park SecureCPS: Cognitive inspired framework for detection of cyber attacks in cyber-physical systems. Search on Bibsonomy Inf. Process. Manag. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Lijuan Zha, Rongfei Liao, Jinliang Liu, Jinde Cao, Xiangpeng Xie Dynamic event-triggered security control of cyber-physical systems against missing measurements and cyber-attacks. Search on Bibsonomy Neurocomputing The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Bingjun Wan, Chengwei Xu, Rajendra Prasad Mahapatra, P. Selvaraj Understanding the Cyber-Physical System in International Stadiums for Security in the Network from Cyber-Attacks and Adversaries using AI. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Eleftherios E. Vlahakis, Gregory M. Provan, Gordon Werner, Shanchieh Yang, Nikolaos Athanasopoulos Quantifying impact on safety from cyber-attacks on cyber-physical systems. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Dario Stabili, Raffaele Romagnoli, Mirco Marchetti, Bruno Sinopoli, Michele Colajanni Exploring the consequences of cyber attacks on Powertrain Cyber Physical Systems. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  BibTeX  RDF
19Tala Talaei Khoei, Hadjar Ould Slimane, Naima Kaabouch A Comprehensive Survey on the Cyber-Security of Smart Grids: Cyber-Attacks, Detection, Countermeasure Techniques, and Future Directions. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Bruno Fischer, Dirk Meissner, Richard Nyuur, David Sarpong Guest Editorial: Cyber-Attacks, Strategic Cyber-Foresight, and Security. Search on Bibsonomy IEEE Trans. Engineering Management The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Wenli Duo, MengChu Zhou, Abdullah Abusorrah A Survey of Cyber Attacks on Cyber Physical Systems: Recent Advances and Challenges. Search on Bibsonomy IEEE CAA J. Autom. Sinica The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Maryam Farajzadeh-Zanjani, Ehsan Hallaji, Roozbeh Razavi-Far, Mehrdad Saif Generative-Adversarial Class-Imbalance Learning for Classifying Cyber-Attacks and Faults - A Cyber-Physical Power System. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Fereidoun Moradi, Maryam Bagheri 0001, Hanieh Rahmati, Hamed Yazdi, Sara Abbaspour Asadollah, Marjan Sirjani Monitoring Cyber-Physical Systems Using a Tiny Twin to Prevent Cyber-Attacks. Search on Bibsonomy SPIN The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Mahdi Taheri, Khashayar Khorasani, Nader Meskin, Iman Shames Data-Driven Koopman Operator Based Cyber-Attacks for Nonlinear Control Affine Cyber-Physical Systems. Search on Bibsonomy CDC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Kang-Di Lu, Zheng-Guang Wu An Ensemble Learning-Based Cyber-Attacks Detection Method of Cyber-Physical Power Systems. Search on Bibsonomy ICARM The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Rasim M. Alguliyev, Yadigar N. Imamverdiyev, Lyudmila V. Sukhostat Hybrid DeepGCL model for cyber-attacks detection on cyber-physical systems. Search on Bibsonomy Neural Comput. Appl. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Amir Namavar Jahromi, Hadis Karimipour, Ali Dehghantanha, Kim-Kwang Raymond Choo Toward Detection and Attribution of Cyber-Attacks in IoT-Enabled Cyber-Physical Systems. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Peter R. J. Trim, Yang-Im Lee The Global Cyber Security Model: Counteracting Cyber Attacks through a Resilient Partnership Arrangement. Search on Bibsonomy Big Data Cogn. Comput. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Xinrui Liu, Yuan Meng, Peng Chang Node Importance Evaluation of Cyber-Physical System under Cyber-Attacks Spreading. Search on Bibsonomy Complex. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Ziwen Sun, Shuguo Zhang Modeling of Security Risk for Industrial Cyber-Physics System under Cyber-attacks. Search on Bibsonomy ICPS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Mahdi Taheri, Khashayar Khorasani, Iman Shames, Nader Meskin Towards Privacy Preserving Consensus Control in Multi-Agent Cyber-Physical Systems Subject to Cyber Attacks. Search on Bibsonomy ECC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Jokha Ali Intrusion Detection Systems Trends to Counteract Growing Cyber-Attacks on Cyber-Physical Systems. Search on Bibsonomy ACIT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Zengji Liu, Qi Wang 0035, Yi Tang 0009 Design of a Cosimulation Platform With Hardware-in-the-Loop for Cyber-Attacks on Cyber-Physical Power Systems. Search on Bibsonomy IEEE Access The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Mahdi Taheri, Khashayar Khorasani, Iman Shames, Nader Meskin Undetectable Cyber Attacks on Communication Links in Multi-Agent Cyber-Physical Systems. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
19Ashraf Tantawy, Sherif Abdelwahed, Abdelkarim Erradi Cyber LOPA: A New Approach for CPS Safety Design in the Presence of Cyber Attacks. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
19Sheng Xu, Yongxiang Xia, Hui-Liang Shen Analysis of Malware-Induced Cyber Attacks in Cyber-Physical Power Systems. Search on Bibsonomy IEEE Trans. Circuits Syst. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Mahdi Taheri, Khashayar Khorasani, Iman Shames, Nader Meskin Undetectable Cyber Attacks on Communication Links in Multi-Agent Cyber-Physical Systems. Search on Bibsonomy CDC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Michaël Timbert Protections des processeurs contre les cyber-attaques par vérification de l'intégrité du flot d'exécution. (Protections of processors against cyber attacks by control flow checking). Search on Bibsonomy 2020   RDF
19Rong Lai, Xiaoyu Qiu, Jiajing Wu Robustness of Asymmetric Cyber-Physical Power Systems Against Cyber Attacks. Search on Bibsonomy IEEE Access The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Tianlei Zang, Shibin Gao, Baoxu Liu, Tao Huang 0002, Tao Wang 0029, Xiaoguang Wei Integrated fault propagation model based vulnerability assessment of the electrical cyber-physical system under cyber attacks. Search on Bibsonomy Reliab. Eng. Syst. Saf. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Arif Sari Turkish national cyber-firewall to mitigate countrywide cyber-attacks. Search on Bibsonomy Comput. Electr. Eng. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 1184 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license