The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase cyber-security (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1999-2004 (18) 2005-2006 (20) 2007 (37) 2008 (86) 2009 (136) 2010 (145) 2011 (195) 2012 (162) 2013 (172) 2014 (204) 2015 (326) 2016 (268) 2017 (317) 2018 (423) 2019 (784) 2020 (925) 2021 (803) 2022 (846) 2023 (567) 2024 (34)
Publication types (Num. hits)
article(784) book(13) data(2) incollection(168) inproceedings(5313) phdthesis(54) proceedings(134)
Venues (Conferences, Journals, ...)
CSIIRW(348) CSCloud/EdgeCom(281) ICCSIE(256) CSIA (2)(255) CSR(253) CSIA (1)(247) CSIA(203) CSCML(202) CSCloud(201) VizSEC(157) CoRR(154) FCS(146) SciSec(134) CSNet(131) Cyber Security(125) ACeS(111) More (+10 of total 904)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 98 occurrences of 74 keywords

Results
Found 6468 publication records. Showing 6468 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
106Flora S. Tsai, Kap Luk Chan Detecting Cyber Security Threats in Weblogs Using Probabilistic Models. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cyber terrorism, data mining, blog, weblog, probabilistic latent semantic analysis, cyber security, cyber crime
91Mohamed Dâfir Ech-Cherif El Kettani, Taieb Debbagh NCSec: a national cyber security referential for the development of a code of practice in national cyber security management. Search on Bibsonomy ICEGOV The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ISO27002, cyber criminality, referential, organizational structure, cyber security
69M. Sindhu, S. Kumar Sajan, M. Sethumadhavan 0001 Error Linear Complexity Measures of Binary Multisequences. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
69N. V. Narendra Kumar, Harshit J. Shah, R. K. Shyamasundar Towards Checking Tampering of Software. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
69Asoke K. Talukder Securing Next Generation Internet Services. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
69N. Harini, C. K. Shyamala, T. R. Padmanabhan Securing Cloud Environment. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
69Rajbir Kaur, Manoj Singh Gaur, P. Lalith Suresh, Vijay Laxmi DoS Attacks in MANETs: Detection and Countermeasures. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
69Divya Shankar, Manish Agrawal, H. Raghav Rao Emergency Response to Mumbai Terror Attacks: An Activity Theory Analysis. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
69Narayanankutty Karuppath, P. Achuthan Einstein-Podolsky-Rosen Paradox and Certain Aspects of Quantum Cryptology with Some Applications. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
69Kenneth J. Giuliani, V. Kumar Murty An Examination of Identity Management Models in an Internet Setting. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
69C. Warren Axelrod, Sukumar Haldar Combined Impact of Outsourcing and Hard Times on BPO Risk and Security. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
69Himanshu Maheshwari, Harvey S. Hyman, Manish Agrawal A Comparison of Cyber-Crime Definitions in India and the United States. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
69Charulata Chaudhary, Ishupal Singh Kang Pirates of the Copyright and Cyberspace: Issues Involved. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
69Chungath Srinivasan, K. V. Lakshmy, Madathil Sethumadhavan Complexity Measures of Cryptographically Secure Boolean Functions. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
69P. Vinod 0001, Vijay Laxmi, Manoj Singh Gaur Metamorphic Malware Analysis and Detection Methods. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
69Rajarshi Chakraborty, Haricharan Rengamani, Ponnurangam Kumaraguru, H. Raghav Rao The UID Project: Lessons Learned from the West and Challenges Identified for India. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
69P. P. Amritha, T. Gireesh Kumar A Survey on Digital Image Steganographic Methods. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
69S. Sajan Kumar, M. Hari Krishna Prasad, Suresh Raju Pilli Extended Time Machine Design using Reconfigurable Computing for Efficient Recording and Retrieval of Gigabit Network Traffic. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
69Mohit Virendra, Qi Duan, Shambhu J. Upadhyaya Detecting Cheating Aggregators and Report Dropping Attacks in Wireless Sensor Networks. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
69Suja Ramachandran, R. S. Mundada, A. K. Bhattacharjee, C. S. R. C. Murthy, R. Sharma Classifying Host Anomalies: Using Ontology in Information Security Monitoring. Search on Bibsonomy Cyber Security, Cyber Crime and Cyber Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
56Mohammad Tehranipoor, Farinaz Koushanfar A Survey of Hardware Trojan Taxonomy and Detection. Search on Bibsonomy IEEE Des. Test Comput. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF hardware Trojans, Trojan taxonomy and detection, security, design and test, ICs
52Joseph Kaberuka, Christopher W. Johnson 0001 Adapting STPA-sec for Socio-technical Cyber Security Challenges in Emerging Nations: A Case Study in Risk Management for Rwandan Health Care. Search on Bibsonomy Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
52Martin Fejrskov, Jens Myrup Pedersen, Emmanouil Vasilomanolakis Cyber-security research by ISPs: A NetFlow and DNS Anonymization Policy. Search on Bibsonomy Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
52Muntaha Saleem Brexit Impact on Cyber Security of United Kingdom. Search on Bibsonomy Cyber Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
52Remy Remigius Zgraggen Cyber Security Supervision in the Insurance Sector: Smart Contracts and Chosen Issues. Search on Bibsonomy Cyber Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
52Florian Skopik, Stefan Filip Design principles for national cyber security sensor networks: Lessons learned from small-scale demonstrators. Search on Bibsonomy Cyber Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
52Meha Shukla, Shane D. Johnson, Peter Jones Does the NIS implementation strategy effectively address cyber security risks in the UK? Search on Bibsonomy Cyber Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
52Martin Gilje Jaatun, Marie Elisabeth Gaup Moe, Per Erik Nordbo Cyber Security Considerations for Self-healing Smart Grid Networks. Search on Bibsonomy Cyber Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
52Marcelo Paiva Fontenele, Lily Sun Knowledge management of cyber security expertise: an ontological approach to talent discovery. Search on Bibsonomy Cyber Security And Protection Of Digital Services The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
51David H. C. Du Cyber Security: An Obtainable Goal? Search on Bibsonomy ICDCS Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
51Gregory B. White The Community Cyber Security Maturity Model. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
51Abdul Quaiyum Ansari, Tapasya Patki, A. B. Patki, V. Kumar Integrating Fuzzy Logic and Data Mining: Impact on Cyber Security. Search on Bibsonomy FSKD (4) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
48Ashok Vaseashta, Philip Susmann, Eric Braman Cyber Security - Threat Scenarios, Policy Framework and Cyber Wargames. Search on Bibsonomy Cyber Security and Resiliency Policy Framework The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
48Sabina Barakovic, Mladen Mrkaja, Amir Husic, Adnan Kulovac, Jasmina Barakovic Husic Overview of the Current Situation in Bosnia and Herzegovina with Focus on Cyber Security and Fighting Cyber-Crime by Establishment of BIH CERT Body. Search on Bibsonomy Cyber Security and Resiliency Policy Framework The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
46Anthony M. Cresswell, Shahidul Hassan Organizational Impacts of Cyber Security Provisions: A Sociotechnical Framework. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
43Kyle E. Stewart, Jeffrey W. Humphries, Todd R. Andel Developing a virtualization platform for courses in networking, systems administration and cyber security education. Search on Bibsonomy SpringSim The full citation details ... 2009 DBLP  DOI  BibTeX  RDF network education, network training, virtualization, network simulation, cyber security
43Eugene H. Spafford Cyber Security: Assessing Our Vulnerabilities and Developing an Effective Defense. Search on Bibsonomy ISIPS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security policy, vulnerabilities, patching, cyber security, security education
42Michael E. Kuhl, Jason Kistner, Kevin Costantini, Moises Sudit Cyber attack modeling and simulation for network security analysis. Search on Bibsonomy WSC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
42Scott Dynes, Eric Goetz, Michael Freeman Cyber Security: Are Economic Incentives Adequate? Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF economic incentives, Information security, government policy
41 2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020 Search on Bibsonomy Cyber Security The full citation details ... 2020 DBLP  BibTeX  RDF
41Neeraj Jain, Balwinder Raj SOI FinFET for Computer Networks and Cyber Security Systems. Search on Bibsonomy Handbook of Computer Networks and Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
41Andrew Rae, Asma Patel Developing a security behavioural assessment approach for cyber rating UK MSBs. Search on Bibsonomy Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
41Joel Chacon, Sean McKeown, Richard Macfarlane Towards Identifying Human Actions, Intent, and Severity of APT Attacks Applying Deception Techniques - An Experiment. Search on Bibsonomy Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
41Théo Simon, Bertrand Venard Technical codes'potentialities in cybersecurity. A contextual approach on the ethics of small digital organizations in France. Search on Bibsonomy Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
41Nebrase Elmrabit, Feixiang Zhou, Fengyin Li, Huiyu Zhou 0001 Evaluation of Machine Learning Algorithms for Anomaly Detection. Search on Bibsonomy Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
41Waleed Alghamdi, Michael Schukat Slave Clock Responses to Precision Time Protocol Attacks: A Case Study. Search on Bibsonomy Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
41Enoch Agyepong, Yulia Cherdantseva, Philipp Reinecke, Pete Burnap Towards a Framework for Measuring the Performance of a Security Operations Center Analyst. Search on Bibsonomy Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
41John O'Raw, David M. Laverty Restricting Data Flows to Secure Against Remote Attack. Search on Bibsonomy Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
41Uchenna Daniel Ani, Hongmei He, Ashutosh Tiwari Vulnerability-Based Impact Criticality Estimation for Industrial Control Systems. Search on Bibsonomy Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
41Yunjia Wang, Yang Liu, Tiejun Wu, Ishbel Duncan A Cost-Effective OCR Implementation to Prevent Phishing on Mobile Platforms. Search on Bibsonomy Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
41Pascal Faurie, Arghir-Nicolae Moldovan, Irina Tal Privacy Policy - "I agree"?! - Do alternatives to text-based policies increase the awareness of the users? Search on Bibsonomy Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
41Andrew McCarthy, Benedict R. Gaster, Phil Legg Shouting Through Letterboxes: A study on attack susceptibility of voice assistants. Search on Bibsonomy Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
41Daniel Reti, Daniel Fraunholz, Janis Zemitis, Daniel Schneider 0007, Hans Dieter Schotten Deep Down the Rabbit Hole: On References in Networks of Decoy Elements. Search on Bibsonomy Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
41Johannes Mols, Emmanouil Vasilomanolakis ethVote: Towards secure voting with distributed ledgers. Search on Bibsonomy Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
41Christopher Kelly, Nikolaos Pitropakis, Sean McKeown, Costas Lambrinoudakis Testing And Hardening IoT Devices Against the Mirai Botnet. Search on Bibsonomy Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
41Pranshu Bajpai, Richard J. Enbody An Empirical Study of Key Generation in Cryptographic Ransomware. Search on Bibsonomy Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
41Martin Gilje Jaatun, Lars Bodsberg, Tor Olav Grøtan, Marie Elisabeth Gaup Moe An Empirical Study of CERT Capacity in the North Sea. Search on Bibsonomy Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
41Inger Anne Tøndel, Ravishankar Borgaonkar, Martin Gilje Jaatun, Christian Frøystad What Could Possibly Go Wrong? Smart Grid Misuse Case Scenarios. Search on Bibsonomy Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
41Tapadhir Das, Abdel Rahman Eldosouky, Shamik Sengupta Think Smart, Play Dumb: Analyzing Deception in Hardware Trojan Detection Using Game Theory. Search on Bibsonomy Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
41Timothy D. Williams Epistemological Questions for Cybersecurity. Search on Bibsonomy Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
41Gwyn Wilkinson, Phil Legg "What did you say?": Extracting unintentional secrets from predictive text learning systems. Search on Bibsonomy Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
41Fadi N. Sibai AI Crimes: A Classification. Search on Bibsonomy Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
41Sean McKeown, Gordon Russell 0001 Forensic Considerations for the High Efficiency Image File Format (HEIF). Search on Bibsonomy Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
41Katia Raya, Nicole D'Almeida, Maroun Chamoun Social big data: A Twitter text mining approach to the communication of universities during the Lebanese protests. Search on Bibsonomy Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
41Pranshu Bajpai, Richard J. Enbody Memory Forensics Against Ransomware. Search on Bibsonomy Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
41Joshua A. Sipper Cyber Threat Intelligence and the Cyber Meta-Reality and Cyber Microbiome. Search on Bibsonomy Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
41Joshua Talbot, Przemek Pikula, Craig Sweetmore, Samuel Rowe, Hanan Hindy, Christos Tachtatzis, Robert C. Atkinson, Xavier J. A. Bellekens A Security Perspective on Unikernels. Search on Bibsonomy Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
41Tharindu Ranathunga, Ramona Marfievici, Alan McGibney, Susan Rea A DLT-based Trust Framework for IoT Ecosystems. Search on Bibsonomy Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
41Felix Anda, Brett A. Becker, David Lillis, Nhien-An Le-Khac, Mark Scanlon Assessing the Influencing Factors on the Accuracy of Underage Facial Age Estimation. Search on Bibsonomy Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
41Hanlin Chen, Hongmei He, Andrew Starr 0001 An Overview of Web Robots Detection Techniques. Search on Bibsonomy Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
41Drew Malzahn, Zachary Birnbaum, Cimone Wright-Hamor Automated Vulnerability Testing via Executable Attack Graphs. Search on Bibsonomy Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
41Aikaterini Kanta, Iwen Coisel, Mark Scanlon Smarter Password Guessing Techniques Leveraging Contextual Information and OSINT. Search on Bibsonomy Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
41Xiaoyu Du, Quan Le, Mark Scanlon Automated Artefact Relevancy Determination from Artefact Metadata and Associated Timeline Events. Search on Bibsonomy Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
41Matthew Spradling, Jeremy Straub, Jay Strong Introducing & Evaluating 'Nutrition Facts' for Online Content. Search on Bibsonomy Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
41Marco M. Cook, Ioannis Stavrou, Sarah Dimmock, Chris W. Johnson 0001 Introducing a forensics data type taxonomy of acquirable artefacts from programmable logic controllers. Search on Bibsonomy Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
41Jonathan Francis Roscoe, Max Smith-Creasey Acoustic Emanation of Haptics as a Side-Channel for Gesture-Typing Attacks. Search on Bibsonomy Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
41Evangelos Moustakas, Nishtha Lamba, Dina Mahmoud, C. Ranganathan Blurring lines between fiction and reality: Perspectives of experts on marketing effectiveness of virtual influencers. Search on Bibsonomy Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
41Andrei Lima Queiroz, Brian Keegan, Susan McKeever Moving Targets: Addressing Concept Drift in Supervised Models for Hacker Communication Detection. Search on Bibsonomy Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
41Jordan Richard Schoenherr, Robert Thomson 0001 Insider Threat Detection: A Solution in Search of a Problem. Search on Bibsonomy Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
41Tolga Ünlü, Lynsay A. Shepherd, Natalie Coull, Colin McLean A Taxonomy of Approaches for Integrating Attack Awareness in Applications. Search on Bibsonomy Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
41Clemens Krueger, Sean McKeown Using Amazon Alexa APIs as a Source of Digital Evidence. Search on Bibsonomy Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
41Bertrand Venard Protection Behaviours: a diversity of individual strategies. Search on Bibsonomy Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
41Arman Zand, James Orwell, Eckhard Pfluegel A Secure Framework for Anti-Money-Laundering using Machine Learning and Secret Sharing. Search on Bibsonomy Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
41Sebastião Rogério da Silva Neto, Thomás Tabosa de Oliveira, Vanderson de Souza Sampaio, Theo Lynn, Patricia Takako Endo Platform for monitoring and clinical diagnosis of arboviruses using computational models. Search on Bibsonomy Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
41Lukas Gressl, Michael Krisper, Christian Steger, Ulrich Neffe Towards Security Attack and Risk Assessment during Early System Design. Search on Bibsonomy Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
41 2019 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Oxford, United Kingdom, June 3-4, 2019 Search on Bibsonomy Cyber Security The full citation details ... 2019 DBLP  BibTeX  RDF
41Terézia Mézesová, Hayretdin Bahsi Expert Knowledge Elicitation for Skill Level Categorization of Attack Paths. Search on Bibsonomy Cyber Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
41Belqassim Bouteghrine, Mohammed Rabiai, Camel Tanougast, Said Sadoudi Hardware Implementation of Secured Socket Communication based on Chaotic Cryptosystem. Search on Bibsonomy Cyber Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
41Leonard Renners, Felix Heine, Carsten Kleiner, Gabi Dreo Rodosek Adaptive and Intelligible Prioritization for Network Security Incidents. Search on Bibsonomy Cyber Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
41Chunlei Li 0001, Chunming Rong, Martin Gilje Jaatun A Cost-efficient Protocol for Open Blockchains. Search on Bibsonomy Cyber Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
41Nora Tomas, Jingyue Li, Huang Huang An Empirical Study on Culture, Automation, Measurement, and Sharing of DevSecOps. Search on Bibsonomy Cyber Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
41Subhi Alrubei, Jonathan Michael Rigelsford, Callum Willis, Edward Ball 0001 Ethereum Blockchain for Securing the Internet of Things: Practical Implementation and Performance Evaluation. Search on Bibsonomy Cyber Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
41Yuxiang Hong, Steven Furnell Organizational formalization and employee information security behavioral intentions based on an extended TPB model. Search on Bibsonomy Cyber Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
41Wenting Li, Haibo Cheng, Ping Wang 0003 Secure Chaotic Maps-based Authentication Scheme for Real-Time Data Access In Internet of Things. Search on Bibsonomy Cyber Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
41Jonah Burgess, Domhnall Carlin, Philip O'Kane, Sakir Sezer MANiC: Multi-step Assessment for Crypto-miners. Search on Bibsonomy Cyber Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
41Adrian J. Duncan, Sadie Creese, Michael Goldsmith A Combined Attack-Tree and Kill-Chain Approach to Designing Attack-Detection Strategies for Malicious Insiders in Cloud Computing. Search on Bibsonomy Cyber Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
41Kamalakanta Sethi, Ankit Pradhan, R. Punith, Padmalochan Bera A Scalable Attribute Based Encryption for Secure Data Storage and Access in Cloud. Search on Bibsonomy Cyber Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
41Basil Alothman Raw Network Traffic Data Preprocessing and Preparation for Automatic Analysis. Search on Bibsonomy Cyber Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
41Cyril Onwubiko, Karim Ouazzane Cyber Onboarding is 'Broken'. Search on Bibsonomy Cyber Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
41Karin Bernsmed, Martin Gilje Jaatun Threat modelling and agile software development: Identified practice in four Norwegian organisations. Search on Bibsonomy Cyber Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 6468 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license