The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for cyberattack with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2000-2015 (17) 2016-2018 (26) 2019 (18) 2020 (26) 2021 (35) 2022 (44) 2023 (49) 2024 (16)
Publication types (Num. hits)
article(154) inproceedings(76) phdthesis(1)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 18 occurrences of 13 keywords

Results
Found 231 publication records. Showing 231 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
47David Elliott Deterring Strategic Cyberattack. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF cyberattack deterrence, cyberwar, nuclear deterrence versus cyber deterrence, cyber security
47Nong Ye, Toni Farley A Scientific Approach to Cyberattack Detection. Search on Bibsonomy Computer The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Cyberattack detection, Attack-norm separation, Signal detection models, Detection systems, Security and privacy
40Katia P. Maxwell, Levi Seibert Cyberattack Repository: A Web Application for the Selection and Composition of Cyberattack Models. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
28Shari Lawrence Pfleeger, Rachel Rue Cybersecurity Economic Issues: Clearing the Path to Good Practice. Search on Bibsonomy IEEE Softw. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Pythagoras Petratos Weather, Information Security, and Markets. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Marc Donner Cyberassault on Estonia. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27James A. Lewis Cyberwar Thresholds and Effects. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Cyberconflict, cyberwar, thresholds, cyberattack
27Cynthia E. Irvine, Charles C. Palmer Call in the Cyber National Guard! Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF preparedness, network security, computer security, cybersecurity, security & privacy, national security, cyberattack
27Scott Borg Economically Complex Cyberattacks. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF cyberdefense, security, cybersecurity, cyberattack
27Salvatore J. Stolfo Worm and Attack Early Warning. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF worminator, stealth, scan, probe, cyberattack
20Dimmiti Srinivasa Rao, Emerson Ajith Jubilson Cyberattack defense mechanism using deep learning techniques in software-defined networks. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
20Weiping Ding 0001, Ibrahim Alrashdi, Hossam Hawash, Mohamed Abdel-Basset DeepSecDrive: An explainable deep learning framework for real-time detection of cyberattack in in-vehicle networks. Search on Bibsonomy Inf. Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
20Manish Kumar 0009, Changjong Kim, Yongseok Son, Sushil Kumar Singh 0001, Sunggon Kim Empowering Cyberattack Identification in IoHT Networks With Neighborhood-Component-Based Improvised Long Short-Term Memory. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
20Xinrong Zhang, Ye-Hwa Chen, Dongsheng Zhang, Ruiying Zhao, Lei Guo 0013 A game-theoretic approach of cyberattack resilient constraint-following control for cyber-physical systems. Search on Bibsonomy Ad Hoc Networks The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
20Huda Lughbi, Mourad Mars, Khaled Hatem Almotairi CybAttT: A Dataset of Cyberattack News Tweets for Enhanced Threat Intelligence. Search on Bibsonomy Data The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
20Rong Zeng, Yijia Cao, Yong Li 0016, Sijia Hu, Xia Shao, Liwei Xie, Liang Hou, Long Zhao, Mohammad Shahidehpour A General Real-Time Cyberattack Risk Assessment Method for Distribution Network Involving the Influence of Feeder Automation System. Search on Bibsonomy IEEE Trans. Smart Grid The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
20Zimin Jiang, Peng Zhang 0015, Yifan Zhou Differential Duffing Oscillator-Based Cyberattack Detection for Inverters. Search on Bibsonomy IEEE Trans. Smart Grid The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
20Abdullahi Bamigbade, Yury Dvorkin, Ramesh Karri Cyberattack on Phase-Locked Loops in Inverter-Based Energy Resources. Search on Bibsonomy IEEE Trans. Smart Grid The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
20Mahdi Taheri, Khashayar Khorasani, Iman Shames, Nader Meskin Cyberattack and Machine-Induced Fault Detection and Isolation Methodologies for Cyber-Physical Systems. Search on Bibsonomy IEEE Trans. Control. Syst. Technol. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
20Thavavel Vaiyapuri, K. Shankar 0002, Surendran Rajendran, Sachin Kumar 0001, Vimal Gaur, Deepak Gupta 0002, Meshal Alharbi Automated cyberattack detection using optimal ensemble deep learning model. Search on Bibsonomy Trans. Emerg. Telecommun. Technol. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
20Phai Vu Dinh, Quang Uy Nguyen, Dinh Thai Hoang, Diep N. Nguyen, Son Pham Bao, Eryk Dutkiewicz Twin Auto-Encoder Model for Learning Separable Representation in Cyberattack Detection. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
20Mohamed H. Behiry, Mohammed Aly Cyberattack detection in wireless sensor networks using a hybrid feature reduction technique with AI and machine learning methods. Search on Bibsonomy J. Big Data The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
20Alex Vakulov Protecting Life-Saving Medical Devices from Cyberattack. Search on Bibsonomy Commun. ACM The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
20Pradeep Kumar Mallaiah, Ankit Yadav, Gelli Ravikumar Data Integrity and Cyberattack Detection using Dynamic Watermarking for Resilient Microgrids. Search on Bibsonomy ISGT The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
20Hossein Amini, Ali Mehrizi-Sani, Chen-Ching Liu Substation Cyberattack Detection and Mitigation in a High-Noise Environment. Search on Bibsonomy ISGT The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
20Mohammad Ashraf Hossain Sadi, Tianqi Hong, Mohd. Hasan Ali Deep Reinforcement Learning-Based Cyberattack Mitigation for Smart Voltage Source Converter-Enabled Power Grid. Search on Bibsonomy ISGT The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
20Anuoluwapo O. Aluko, Remmy Musumpuka, David G. Dorrell Cyberattack-Resilient Secondary Frequency Control Scheme for Stand-Alone Microgrids. Search on Bibsonomy IEEE Trans. Ind. Electron. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Haixia Hou, Daojun Liang, Mingqiang Zhang, Dongfeng Yuan A Densely Stacked Attention Method for Cyberattack Detection. Search on Bibsonomy J. Inf. Sci. Eng. The full citation details ... 2023 DBLP  BibTeX  RDF
20Weiping Ding 0001, Mohamed Abdel-Basset, Reda Mohamed DeepAK-IoT: An effective deep learning model for cyberattack detection in IoT networks. Search on Bibsonomy Inf. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Muhammad Zia, M. Faisal Amjad, Zafar Iqbal, Abdul Rehman Javed, Thippa Reddy Gadekallu Circumventing Google Play vetting policies: a stealthy cyberattack that uses incremental updates to breach privacy. Search on Bibsonomy J. Ambient Intell. Humaniz. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Matej Rabzelj, Ciril Bohak, Leon Stefanic Juznic, Andrej Kos, Urban Sedlar Cyberattack Graph Modeling for Visual Analytics. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Thunchanok Kaewnukultorn, Sergio B. Sepulveda, Robert Broadwater, Dan Zhu, Nektarios Georgios Tsoutsos, Steven Hegedus Smart PV Inverter Cyberattack Detection Using Hardware-in-the-Loop Test Facility. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Tran Viet Khoa, Dinh Thai Hoang, Nguyen Linh Trung, Cong T. Nguyen, Tran Thi Thuy Quynh, Diep N. Nguyen, Nguyen Viet Ha 0001, Eryk Dutkiewicz Deep Transfer Learning: A Novel Collaborative Learning Model for Cyberattack Detection Systems in IoT Networks. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Wen-Chung Shih, Chao-Tung Yang, Cheng-Tian Jiang, Endah Kristiani Implementation and visualization of a netflow log data lake system for cyberattack detection using distributed deep learning. Search on Bibsonomy J. Supercomput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Amirhossein Ahmadi, Mojtaba Nabipour, Saman Taheri, Behnam Mohammadi-Ivatloo, Vahid Vahidinasab A New False Data Injection Attack Detection Model for Cyberattack Resilient Energy Forecasting. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Zhi Lian, Peng Shi 0001, Cheng-Chew Lim Adaptive Resilient Control for Cyber-Physical Systems Under Cyberattack and Input Saturation. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Fazlullah Khan, Ryan Alturki, Md. Arafatur Rahman, Spyridon Mastorakis, Imran Razzak, Syed Tauhid Ullah Shah Trustworthy and Reliable Deep-Learning-Based Cyberattack Detection in Industrial IoT. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Fazlullah Khan, Mian Ahmad Jan, Ryan Alturki, Mohammad Dahman Alshehri, Syed Tauhid Ullah Shah, Ateeq Ur Rehman 0001 A Secure Ensemble Learning-Based Fog-Cloud Approach for Cyberattack Detection in IoMT. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Song Deng, Jiantang Zhang, Di Wu 0056, Yi He 0007, Xiangpeng Xie, Xindong Wu 0001 A Quantitative Risk Assessment Model for Distribution Cyber-Physical System Under Cyberattack. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Fangyu Li, Junnuo Lin, Honggui Han FSL: federated sequential learning-based cyberattack detection for Industrial Internet of Things. Search on Bibsonomy Ind. Artif. Intell. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Iain Nash Smart Device Manufacturer Liability and Redress for Third-Party Cyberattack Victims. Search on Bibsonomy Eur. J. Law Technol. The full citation details ... 2023 DBLP  BibTeX  RDF
20Vasiliy M. Krundyshev, Georgi A. Markov, Maxim O. Kalinin, P. V. Sem'yanov, Alexey G. Busygin Cyberattack Detection in the Industrial Internet of Things Based on the Computation Model of Hierarchical Temporal Memory. Search on Bibsonomy Autom. Control. Comput. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Onur Toker Asymptotic Performance Limitations in Cyberattack Detection. Search on Bibsonomy IEEE Open J. Circuits Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Justin Raynor, Tarik Crnovrsanin, Sara Di Bartolomeo, Laura South, David Saffo, Cody Dunne The State of the Art in BGP Visualization Tools: A Mapping of Visualization Techniques to Cyberattack Types. Search on Bibsonomy IEEE Trans. Vis. Comput. Graph. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Ömer Sen, Philipp Malskorn, Simon Glomb, Immanuel Hacker, Martin Henze, Andreas Ulbig An Approach to Abstract Multi-stage Cyberattack Data Generation for ML-Based IDS in Smart Grids. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Sanchita Ghosh, Nutan Saha, Tanushree Roy A Cyberattack Detection-Isolation Scheme For CAV Under Changing Driving Environment. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Md Habibor Rahman, Thorsten Wuest, Mohammed Shafae Review, Meta-Taxonomy, and Use Cases of Cyberattack Taxonomies of Manufacturing Cybersecurity Threat Attributes and Countermeasures. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Muhammad Akbar Husnoo, Adnan Anwar, Haftu Tasew Reda, Nasser Hosseinzadeh, Shama Naz Islam, Abdun Naser Mahmood, Robin Doss FeDiSa: A Semi-asynchronous Federated Learning Framework for Power System Fault and Cyberattack Discrimination. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Reza Fayyazi, Shanchieh Jay Yang On the Uses of Large Language Models to Interpret Ambiguous Cyberattack Descriptions. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Navid Aftabi, Dan Li 0030, Paritosh Ramanan A Variational Autoencoder Framework for Robust, Physics-Informed Cyberattack Recognition in Industrial Cyber-Physical Systems. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Erol Gelenbe, Mert Nakip Real-Time Cyberattack Detection with Offline and Online Learning. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Ruochen Wu Research on Virus Cyberattack-Defense Based on Electromagnetic Radiation. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Abdullah Alshehri 0001, Nayeem Khan, Ali Alowayr, Mohammed Yahya Alghamdi Cyberattack Detection Framework Using Machine Learning and User Behavior Analytics. Search on Bibsonomy Comput. Syst. Sci. Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Manal Abdullah Alohali, Muna Elsadig, Fahd N. Al-Wesabi, Mesfer Al Duhayyim, Anwer Mustafa Hilal, Abdelwahed Motwakel Blockchain Assisted Optimal Machine Learning Based Cyberattack Detection and Classification Scheme. Search on Bibsonomy Comput. Syst. Sci. Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Maha Sabir, Jawad Ahmad, Daniyal M. Alghazzawi A Lightweight Deep Autoencoder Scheme for Cyberattack Detection in the Internet of Things. Search on Bibsonomy Comput. Syst. Sci. Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Abdul Razaque, Joon Yoo, Gulnara Bektemyssova, Majid Alshammari, Tolganay T. Chinibayeva, Saule Amanzholova, Aziz Alotaibi, Dauren Umutkulov Efficient Internet-of-Things Cyberattack Depletion Using Blockchain-Enabled Software-Defined Networking and 6G Network Technology. Search on Bibsonomy Sensors The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Nihar Ranjan Pradhan, Akhilendra Pratap Singh, S. V. Sudha, K. Hemant Kumar Reddy, Diptendu Sinha Roy Performance Evaluation and Cyberattack Mitigation in a Blockchain-Enabled Peer-to-Peer Energy Trading Framework. Search on Bibsonomy Sensors The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Omar A. Alzubi, Issa Qiqieh, Jafar Ahmad Abed Alzubi Fusion of deep learning based cyberattack detection and classification model for intelligent systems. Search on Bibsonomy Clust. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Anwer Mustafa Hilal, Manal Abdullah Alohali, Fahd N. Al-Wesabi, Nadhem Nemri, Hasan J. Alyamani, Deepak Gupta 0002 Enhancing quality of experience in mobile edge computing using deep learning based data offloading and cyberattack detection technique. Search on Bibsonomy Clust. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Refat Othman, Barbara Russo VULDAT: Automated Vulnerability Detection from Cyberattack Text. Search on Bibsonomy SAMOS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Phan The Duy, Tuan-Dung Tran, Hoang Nguyen Duy, Hien Do Hoang, Van-Hau Pham DeFL-BC: Empowering Reliable Cyberattack Detection through Decentralized Federated Learning and Poisoning Attack Defense. Search on Bibsonomy RIVF The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Shilpa Narasimhan, Nael H. El-Farra, Matthew J. Ellis A Reachable Set-Based Cyberattack Detection Scheme for Dynamic Processes. Search on Bibsonomy ACC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Brayden Sundberg, Davood Babaei Pourkargar Cyberattack awareness and resiliency of integrated moving horizon estimation and model predictive control of complex process networks. Search on Bibsonomy ACC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Erol Gelenbe, Mert Nakip Real-Time Cyberattack Detection with Offline and Online Learning. Search on Bibsonomy LANMAN The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Mahshid Rahimifard, Amir Mohammad Moradi Sizkouhi, Rastko R. Selmic Cyberattack Detection for a Class of Nonlinear Multi-Agent Systems Using Set-Membership Fuzzy Filtering. Search on Bibsonomy CDC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Sinnott Murphy, Richard Macwan, Vivek Kumar Singh, Chin-Yao Chang A randomization-based, zero-trust cyberattack detection method for hierarchical systems. Search on Bibsonomy SecDev The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Muhammad Akbar Husnoo, Adnan Anwar, Haftu Tasew Reda, Nasser Hosseinzadeh, Shama Naz Islam, Abdun Naser Mahmood, Robin Doss FeDiSa: A Semi-asynchronous Federated Learning Framework for Power System Fault and Cyberattack Discrimination. Search on Bibsonomy INFOCOM Workshops The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Amani Abou Rida, Rabih Amhaz, Pierre Parrend Metrics for Evaluating Interface Explainability Models for Cyberattack Detection in IoT Data. Search on Bibsonomy CCE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Nitin Naik, Paul Jenkins, Paul Grace, Shaligram Prajapat, Dishita Naik, Jingping Song, Jian Xu, Ricardo M. Czekster Cyberattack Analysis Utilising Attack Tree with Weighted Mean Probability and Risk of Attack. Search on Bibsonomy UKCI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Barnett Yang, Matthew J. Hoffman 0002, Nathanael J. K. Brown Bayesian Networks for Interpretable Cyberattack Detection. Search on Bibsonomy HICSS The full citation details ... 2023 DBLP  BibTeX  RDF
20Yidian Gao, Kaiqi Sun, Wei Qiu 0002, Zhaohao Ding, Ke-Jun Li, Yahui Li Data-Driven Based FDIAs Detection and Sensitive Feature Identification for Cyberattack Defending of Renewable Energy. Search on Bibsonomy IAS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Olha Mykhaylova, Taras Fedynyshyn, Anastasiia Datsiuk, Bohdan Fihol, Hennadii Hulak Mobile Application as a Critical Infrastructure Cyberattack Surface. Search on Bibsonomy CPITS II The full citation details ... 2023 DBLP  BibTeX  RDF
20Van Loi Cao, Manh Tuan Nguyen, Trang Dang Le Dinh Few-Shot Learning with Discriminative Representation for Cyberattack Detection. Search on Bibsonomy KSE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Alvi Jawad, Jason Jaskolka Single and Combined Cyberattack Impact on Industrial Wastewater Systems. Search on Bibsonomy DSA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Shangrui Zhao, Qingyue Wu, Yueyi Zhang, Jinran Wu, Xi-An Li An asymmetric bisquare regression for mixed cyberattack-resilient load forecasting. Search on Bibsonomy Expert Syst. Appl. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Shaharyar Khan, Stuart E. Madnick Protecting Chiller Systems from Cyberattack Using a Systems Thinking Approach. Search on Bibsonomy Network The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Zsombor Petho, Zsolt Szalay, Árpád Török Safety risk focused analysis of V2V communication especially considering cyberattack sensitive network performance and vehicle dynamics factors. Search on Bibsonomy Veh. Commun. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Ayei E. Ibor, Florence A. Oladeji, Olusoji B. Okunoye, Charles Onuwa Uwadia Novel adaptive cyberattack prediction model using an enhanced genetic algorithm and deep learning (AdacDeep). Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Mansi Girdhar, Yongsik You, Tai-Jin Song, Subhadip Ghosh, Junho Hong Post-Accident Cyberattack Event Analysis for Connected and Automated Vehicles. Search on Bibsonomy IEEE Access The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Lei Cui 0006, Lei Guo 0019, Longxiang Gao, Borui Cai, Youyang Qu, Yipeng Zhou, Shui Yu 0001 A Covert Electricity-Theft Cyberattack Against Machine Learning-Based Detection Models. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Hassan Haes Alhelou, Paul Cuffe A Dynamic-State-Estimator-Based Tolerance Control Method Against Cyberattack and Erroneous Measured Data for Power Systems. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Mohamed Abdel-Basset, Nour Moustafa, Hossam Hawash Privacy-Preserved Cyberattack Detection in Industrial Edge of Things (IEoT): A Blockchain-Orchestrated Federated Learning Approach. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Christophe Ponsard, Philippe Massonet, Valéry Ramon Towards Model-Driven DevSecOps for Cyberattack Prevention, Detection and Recovery. Search on Bibsonomy ERCIM News The full citation details ... 2022 DBLP  BibTeX  RDF
20Sara Nieves Matheu, Enrique Mármol Campos, José Luis Hernández Ramos, Antonio F. Skarmeta, Gianmarco Baldini Federated Cyberattack Detection for Internet of Things-Enabled Smart Cities. Search on Bibsonomy Computer The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Peng An, Zhiyuan Wang, Chunjiong Zhang Ensemble unsupervised autoencoders and Gaussian mixture model for cyberattack detection. Search on Bibsonomy Inf. Process. Manag. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Tran Viet Khoa, Do Hai Son, Dinh Thai Hoang, Nguyen Linh Trung, Tran Thi Thuy Quynh, Diep N. Nguyen, Nguyen Viet Ha 0001, Eryk Dutkiewicz Collaborative Learning for Cyberattack Detection in Blockchain Networks. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Mojtaba Dezvarei, Kevin Tomsovic, Jinyuan Stella Sun, Seddik M. Djouadi Exploring Physical-Based Constraints in Short-Term Load Forecasting: A Defense Mechanism Against Cyberattack. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Muhammad Sami Irfan, Mizanur Rahman, Travis Atkison, Sagar Dasgupta, Alexander M. Hainen Reinforcement Learning based Cyberattack Model for Adaptive Traffic Signal Controller in Connected Transportation Systems. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Osman Boyaci, Mohammad Rasoul Narimani, Katherine R. Davis 0001, Erchin Serpedin Infinite Impulse Response Graph Neural Networks for Cyberattack Localization in Smart Grids. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Ömer Sen, Chijioke Eze, Andreas Ulbig, Antonello Monti On Holistic Multi-Step Cyberattack Detection via a Graph-based Correlation Approach. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Omanshu Thapliyal, Inseok Hwang 0002 Data-driven Cyberattack Synthesis against Network Control Systems. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Mahshid Rahimifard, Amir Mohammad Moradi Sizkouhi, Rastko R. Selmic Cyberattack Detection for Nonlinear Leader-Following Multi-Agent Systems Using Set-Membership Fuzzy Filtering. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Jeongha Park, Hyuk-Yoon Kwon Cyberattack detection model using community detection and text analysis on social media. Search on Bibsonomy ICT Express The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Md. Mamunur Rashid 0001, Joarder Kamruzzaman, Mohammad Mehedi Hassan, Tasadduq Imam, Santoso Wibowo, Steven Gordon, Giancarlo Fortino Adversarial training for deep learning-based cyberattack detection in IoT-based smart city applications. Search on Bibsonomy Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Viktor Engström, Robert Lagerström Two decades of cyberattack simulations: A systematic literature review. Search on Bibsonomy Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Sergio López Bernal, Alberto Huertas Celdrán, Gregorio Martínez Pérez Neuronal Jamming cyberattack over invasive BCIs affecting the resolution of tasks requiring visual capabilities. Search on Bibsonomy Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Yonghyun Jo, Oongjae Choi, Jiwoon You, Youngkyun Cha, Dong Hoon Lee Cyberattack Models for Ship Equipment Based on the MITRE ATT&CK Framework. Search on Bibsonomy Sensors The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Sergii Lysenko, Kira Bobrovnikova, Vyacheslav Kharchenko, Oleg Savenko IoT Multi-Vector Cyberattack Detection Based on Machine Learning Algorithms: Traffic Features Analysis, Experiments, and Efficiency. Search on Bibsonomy Algorithms The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20David Arnold 0006, John Ford, Jafar Saniie Machine Learning Models for Cyberattack Detection in Industrial Control Systems. Search on Bibsonomy EIT The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Utku Tefek, Ertem Esiner, Lin Wei, Yih-Chun Hu TASC: Transparent, Agnostic, Secure Channel for CBTC Under Failure or Cyberattack. Search on Bibsonomy RSSRail The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 231 (100 per page; Change: )
Pages: [1][2][3][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license