The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for cyberattacks with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2004-2009 (15) 2011-2014 (15) 2015-2017 (23) 2018 (21) 2019 (34) 2020 (39) 2021 (61) 2022 (71) 2023 (100) 2024 (23)
Publication types (Num. hits)
article(237) incollection(4) inproceedings(156) phdthesis(5)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 22 occurrences of 19 keywords

Results
Found 402 publication records. Showing 402 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
44Shari Lawrence Pfleeger, Rachel Rue Cybersecurity Economic Issues: Clearing the Path to Good Practice. Search on Bibsonomy IEEE Softw. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
40Scott Borg Economically Complex Cyberattacks. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF cyberdefense, security, cybersecurity, cyberattack
36Lee Garber News Briefs. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Adobe Flash Player, Linked-In, Google Maps with Street View, Pandora, cloud computing, security policy, compliance, Twitter, Facebook, cybersecurity, cyberattacks, BlackBerry
36Anna Spagnolli, Mariavittoria Masotina, Annalorena Scarcia, Beatrice Zuffi, Luciano Gamberini How to get away with cyberattacks: An argumentative approach to cyberattacks' legitimization by common users. Search on Bibsonomy CHI The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Daphna Canetti, Michael L. Gross, Israel Waismel-Manor, Asaf Levanon, Hagit Cohen How Cyberattacks Terrorize: Cortisol and Personal Insecurity Jump in the Wake of Cyberattacks. Search on Bibsonomy Cyberpsychology Behav. Soc. Netw. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
22Phillip A. Laplante IT Predictions for 2008. Search on Bibsonomy IT Prof. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Matt Bishop, Deborah A. Frincke Information Assurance Education: A Work In Progress. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Eugene H. Spafford Cyber Security: Assessing Our Vulnerabilities and Developing an Effective Defense. Search on Bibsonomy ISIPS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security policy, vulnerabilities, patching, cyber security, security education
22Demetres Antoniades, Panos Trimintzios, Michalis Polychronakis, Sven Ubik, Antonis Papadogiannakis, Vladimír Smotlacha LOBSTER: a European platform for passive network traffic monitoring. Search on Bibsonomy TRIDENTCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF netork monitoring, traffic classification, distributed monitoring
22Linda Dailey Paulson News Briefs. Search on Bibsonomy Computer The full citation details ... 2007 DBLP  DOI  BibTeX  RDF optoelectronic fiber arrays, antiforensic attacks, hackers, storage technology
22Barry E. Mullins, Timothy H. Lacey, Robert F. Mills, Joseph M. Trechter, Samuel D. Bass How the Cyber Defense Exercise Shaped an Information-Assurance Curriculum. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Maziar M. Nekovee Modeling the Spread of Worm Epidemics in Vehicular Ad Hoc Networks. Search on Bibsonomy VTC Spring The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Vipin Kumar Parallel and Distributed Computing for Cybersecurity. Search on Bibsonomy IEEE Distributed Syst. Online The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Michael Atighetchi, Partha P. Pal, Franklin Webber, Richard E. Schantz, Christopher C. Jones, Joseph P. Loyall Adaptive Cyberdefense for Survival and Intrusion Tolerance. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Jalal Heidary, Soroush Oshnoei, Meysam Gheisarnejad, Mohammad Reza Khalghani, Mohammad Hassan Khooban Shipboard Microgrid Frequency Control Based on Machine Learning Under Hybrid Cyberattacks. Search on Bibsonomy IEEE Trans. Ind. Electron. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Bakht Sher Ali, Inam Ullah, Tamara Al Shloul, Izhar Ahmed Khan, Ijaz Khan, Yazeed Yasin Ghadi, Akmalbek Abdusalomov, Rashid Nasimov, Khmaies Ouahada, Habib Hamam ICS-IDS: application of big data analysis in AI-based intrusion detection systems to identify cyberattacks in ICS networks. Search on Bibsonomy J. Supercomput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Mohamed Selim Korium, Mohamed Saber, Alexander Beattie, Arun Narayanan, Subham Sahoo, Pedro H. J. Nardelli Intrusion detection system for cyberattacks in the Internet of Vehicles environment. Search on Bibsonomy Ad Hoc Networks The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Ehsan Naderi, Arash Asrari A Deep Learning Framework to Identify Remedial Action Schemes Against False Data Injection Cyberattacks Targeting Smart Power Systems. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Ehsan Naderi, Arash Asrari A Remedial Action Scheme To Mitigate Market Power Caused by Cyberattacks Targeting a Smart Distribution System. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Chenduo Ying, Ning Zheng 0001, Yiming Wu 0001, Ming Xu 0001, Wen-An Zhang 0001 Privacy-Preserving Adaptive Resilient Consensus for Multiagent Systems Under Cyberattacks. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Yuxiang Hu, Xuewu Dai, Dongliang Cui, Tianyou Chai Detection and Identification of Cyberattacks and Physical Faults in Multi-Agent Systems: A Distributed Disturbance Decoupling Observer. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18El-Nasser S. Youssef, Fabrice Labeau, Marthe Kassouf Adversarial Dynamic Load-Altering Cyberattacks Against Peak Shaving Using Residential Electric Water Heaters. Search on Bibsonomy IEEE Trans. Smart Grid The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Moatsum Alawida, Bayan Abu Shawar, Oludare Isaac Abiodun, Abid Mehmood, Abiodun Esther Omolara, Ahmad K. Al Hwaitat Unveiling the Dark Side of ChatGPT: Exploring Cyberattacks and Enhancing User Awareness. Search on Bibsonomy Inf. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Huda Lughbi, Mourad Mars, Khaled Hatem Almotairi A Novel NLP-Driven Dashboard for Interactive CyberAttacks Tweet Classification and Visualization. Search on Bibsonomy Inf. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Ishaani Priyadarshini Anomaly Detection of IoT Cyberattacks in Smart Cities Using Federated Learning and Split Learning. Search on Bibsonomy Big Data Cogn. Comput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Shian Wang, Mingfeng Shang, Raphael E. Stern Cyberattacks on Adaptive Cruise Control Vehicles: An Analytical Characterization. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Jens Frieß, Tobias Gattermayer, Nethanel Gelernter, Haya Schulmann, Michael Waidner Cloudy with a Chance of Cyberattacks: Dangling Resources Abuse on Cloud Platforms. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Ömer Sen, Tarek Hassan, Andreas Ulbig, Martin Henze Enhancing SCADA Security: Developing a Host-Based Intrusion Detection System to Safeguard Against Cyberattacks. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Daolin Wen, Xiaowu Mu Secure Dual Asynchronous Tracking Control for Markov Jump Systems Under Hybrid Cyberattacks. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Jinliang Liu, Enyu Gong, Lijuan Zha, Engang Tian, Xiangpeng Xie Interval Type-2 Fuzzy-Model-Based Filtering for Nonlinear Systems With Event-Triggering Weighted Try-Once-Discard Protocol and Cyberattacks. Search on Bibsonomy IEEE Trans. Fuzzy Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Tao Wu 0012, Jinde Cao, Ju H. Park 0001, Kaibo Shi, Lianglin Xiong, Tingwen Huang Attack-Resilient Dynamic Event-Triggered Synchronization of Fuzzy Reaction-Diffusion Dynamic Networks With Multiple Cyberattacks. Search on Bibsonomy IEEE Trans. Fuzzy Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, Timo Schenk, Adrian Lars Benjamin Iten, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller Studying the Robustness of Anti-Adversarial Federated Learning Models Detecting Cyberattacks in IoT Spectrum Sensors. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Samrat Acharya, Hafiz Anwar Ullah Khan, Ramesh Karri, Yury Dvorkin MaDEVIoT: Cyberattacks on EV Charging Can Disrupt Power Grid Operation. Search on Bibsonomy ISGT The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Jens Frieß, Tobias Gattermayer, Nethanel Gelernter, Haya Schulmann, Michael Waidner Cloudy with a Chance of Cyberattacks: Dangling Resources Abuse on Cloud Platforms. Search on Bibsonomy NSDI The full citation details ... 2024 DBLP  BibTeX  RDF
18Serhii Danchuk, Olena Geidarova, Andrii Nicheporuk, Andrzej Kwiecien Method of detecting cyberattacks on communication channels based on spectral clustering and machine learning methods. Search on Bibsonomy IntelITSIS The full citation details ... 2024 DBLP  BibTeX  RDF
18Sergii Lysenko, Oleksandr Bokhonko, Volodymyr Vorobiyov, Piotr Gaj Method for identifying cyberattacks based on the use of social engineering over the phone. Search on Bibsonomy IntelITSIS The full citation details ... 2024 DBLP  BibTeX  RDF
18Ethan Berei, M. Ajmal Khan, Ahmed Oun Machine Learning Algorithms for DoS and DDoS Cyberattacks Detection in Real-Time Environment. Search on Bibsonomy CCNC The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18He Wen, Faisal Khan 0001, Salim Ahmed, Syed Imtiaz, Efstratios N. Pistikopoulos Risk assessment of human-automation conflict under cyberattacks in process systems. Search on Bibsonomy Comput. Chem. Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Sounghwan Hwang, Minhyun Cho, Sungsoo Kim, Inseok Hwang 0002 An LMI-Based Risk Assessment of Leader-Follower Multi-Agent System Under Stealthy Cyberattacks. Search on Bibsonomy IEEE Control. Syst. Lett. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Kookyoung Han, Jin Hyuk Choi, Yunsik Choi, Gene Moo Lee, Andrew B. Whinston Security defense against long-term and stealthy cyberattacks. Search on Bibsonomy Decis. Support Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Tianci Yang, Carlos Murguia, Dragan Nesic, Chen Lv A Robust CACC Scheme Against Cyberattacks via Multiple Vehicle-to-Vehicle Networks. Search on Bibsonomy IEEE Trans. Veh. Technol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Ángel Luis Perales Gómez, Lorenzo Fernández Maimó, Alberto Huertas Celdrán, Félix J. García Clemente An interpretable semi-supervised system for detecting cyberattacks using anomaly detection in industrial scenarios. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Juan Ignacio Iturbe Araya, Helena Rifà-Pous Anomaly-based cyberattacks detection for smart homes: A systematic literature review. Search on Bibsonomy Internet Things The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Xiao Cai, Kaibo Shi, Kun She 0001, Shouming Zhong, Yeng Chai Soh, Yue Yu Reliable Sampling Mechanism for Takagi-Sugeno Fuzzy NCSs Under Deception Cyberattacks for the Application of the Inverted Pendulum System. Search on Bibsonomy IEEE Trans. Reliab. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Liang Zheng 0003, Ji Bao, Zhenyu Mei Urban traffic signal control robust optimization against Risk-averse and Worst-case cyberattacks. Search on Bibsonomy Inf. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Zhen Liu, Changzhen Hu, Chun Shan, Zheheng Peng DEFIA: Evaluate defense effectiveness by fusing behavior information of cyberattacks. Search on Bibsonomy Inf. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Ayat-Allah Bouramdane Cyberattacks in Smart Grids: Challenges and Solving the Multi-Criteria Decision-Making for Cybersecurity Options, Including Ones That Incorporate Artificial Intelligence, Using an Analytical Hierarchy Process. Search on Bibsonomy J. Cybersecur. Priv. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Sidra Abbas, Abdullah Al Hejaili, Gabriel Avelino R. Sampedro, Mideth B. Abisado, Ahmad S. Almadhor, Tariq Shahzad, Khmaies Ouahada A Novel Federated Edge Learning Approach for Detecting Cyberattacks in IoT Infrastructures. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Sami El-Ferik, Muhammad Maaruf, Fouad M. Al-Sunni, Abdul-Wahid A. Saif, Mujahed Mohammad Al-Dhaifallah Reinforcement Learning-Based Control Strategy for Multi-Agent Systems Subjected to Actuator Cyberattacks During Affine Formation Maneuvers. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Laila M. Halman, Mohammed J. F. Alenazi MCAD: A Machine Learning Based Cyberattacks Detector in Software-Defined Networking (SDN) for Healthcare Systems. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Kang Yan, Xuan Liu 0003, Yidan Lu, Zongchao Yu Thermostatically Controlled Loads in the Power System Under Cyberattacks. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Mahmoud Elsisi, Marnel Altius, Shun-Feng Su, Chun-Lien Su Robust Kalman Filter for Position Estimation of Automated Guided Vehicles Under Cyberattacks. Search on Bibsonomy IEEE Trans. Instrum. Meas. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Bowen Hu, Chunjie Zhou, Yu-Chu Tian, Xin Du, Xiaoya Hu Attack Intention Oriented Dynamic Risk Propagation of Cyberattacks on Cyber-Physical Power Systems. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Muhammad Dawood, Shanshan Tu, Chuangbai Xiao, Hisham Alasmary, Muhammad Waqas 0001, Sadaqat ur Rehman Cyberattacks and Security of Cloud Computing: A Complete Guideline. Search on Bibsonomy Symmetry The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Kousei Sakata, Shintaro Fujita, Kenji Sawada, Hiroshi Iwasawa, Hiromichi Endoh, Noritaka Matsumoto Model verification of fallback control system under cyberattacks via UPPAAL. Search on Bibsonomy Adv. Robotics The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Gurupraanesh Raman, Kangnian Liao, Jimmy Chih-Hsien Peng Improving AC Microgrid Stability Under Cyberattacks Through Timescale Separation. Search on Bibsonomy IEEE Trans. Circuits Syst. II Express Briefs The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Ehsan Naderi, Arash Asrari Experimental Validation of a Remedial Action via Hardware-in-the-Loop System Against Cyberattacks Targeting a Lab-Scale PV/Wind Microgrid. Search on Bibsonomy IEEE Trans. Smart Grid The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Mark Karanfil, Dhiaa Elhak Rebbah, Mourad Debbabi, Marthe Kassouf, Mohsen Ghafouri, El-Nasser S. Youssef, Aiman Hanna Detection of Microgrid Cyberattacks Using Network and System Management. Search on Bibsonomy IEEE Trans. Smart Grid The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Raphael Fritz, Ping Zhang 0022 Detection and Localization of Stealthy Cyberattacks in Cyber-Physical Discrete Event Systems. Search on Bibsonomy IEEE Trans. Autom. Control. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Xuhuan Xie, Yonggui Liu, Qinxue Li Neural network-based adaptive event-triggered control for cyber-physical systems under resource constraints and hybrid cyberattacks. Search on Bibsonomy Autom. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Na-Eun Park, Yu-Rim Lee, Soyoung Joo, So-Yeon Kim, Sohui Kim, Ju-Young Park, Seo-Yi Kim, Il-Gu Lee Performance evaluation of a fast and efficient intrusion detection framework for advanced persistent threat-based cyberattacks. Search on Bibsonomy Comput. Electr. Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Kang Yan, Xuan Liu 0003, Yidan Lu, Fanglu Qin A Cyber-Physical Power System Risk Assessment Model Against Cyberattacks. Search on Bibsonomy IEEE Syst. J. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Javad Khazaei, Faegheh Moazeni Neural Networks-Based Detection of Line Overflow Cyberattacks on AC State-Estimation of Smart Grids. Search on Bibsonomy IEEE Syst. J. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Haris M. Khalid, M. M. Qasaymeh, S. M. Muyeen, Mohamed Shawky El Moursi, Aoife M. Foley, Tha'er O. Sweidan, Sanjeevikumar Padmanaban WAMS Operations in Power Grids: A Track Fusion-Based Mixture Density Estimation-Driven Grid Resilient Approach Toward Cyberattacks. Search on Bibsonomy IEEE Syst. J. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Raffaele Romagnoli, Bruce H. Krogh, Dionisio de Niz, Anton D. Hristozov, Bruno Sinopoli Software Rejuvenation for Safe Operation of Cyber-Physical Systems in the Presence of Run-Time Cyberattacks. Search on Bibsonomy IEEE Trans. Control. Syst. Technol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Adem Rosic Evaluating Machine Learning Classifier Approaches, and their Accuracy for the Detection of Cyberattacks on 5G IoT Systems. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Shreyanth S Prevention of cyberattacks in WSN and packet drop by CI framework and information processing protocol using AI and Big Data. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Samrat Acharya, Hafiz Anwar Ullah Khan, Ramesh Karri, Yury Dvorkin MaDEVIoT: Cyberattacks on EV Charging Can Disrupt Power Grid Operation. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Lennart Bader, Martin Serror, Olav Lamberts, Ömer Sen, Dennis van der Velde, Immanuel Hacker, Julian Filter, Elmar Padilla, Martin Henze Comprehensively Analyzing the Impact of Cyberattacks on Power Grids. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Tianyi Li, Mingfeng Shang, Shian Wang, Raphael E. Stern Detecting stealthy cyberattacks on adaptive cruise control vehicles: A machine learning approach. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Samrat Acharya, Yury Dvorkin, Ramesh Karri Causative Cyberattacks on Online Learning-based Automated Demand Response Systems. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Kalinath Katuri, Ioannis Zografopoulos, Ha Thi Nguyen, Charalambos Konstantinou Experimental Impact Analysis of Cyberattacks in Power Systems using Digital Real-Time Testbeds. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Milad Farsi, Shuhao Bian, Nasser L. Azad, Xiaobing Shi, Andrew Walenstein An Efficient Resilient MPC Scheme via Constraint Tightening against Cyberattacks: Application to Vehicle Cruise Control. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Lucas Augusto Meyer, Sergio Romero, Gabriele Bertoli, Tom Burt, Alex Weinert, Juan Lavista Ferres How effective is multifactor authentication at deterring cyberattacks? Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Christopher Scherb, Luc Bryan Heitz, Frank Grimberg, Hermann Grieder, Marcel Maurer A Serious Game for Simulating Cyberattacks to Teach Cybersecurity. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Marcelo Godoy Simões, Mohammed S. Elmusrati, Tero Vartiainen, Mike Mekkanen, Mazaher Karimi, Sayawu Diaba, Emmanuel Anti, Wilson Lopes Enhancing data security against cyberattacks in artificial intelligence based smartgrid systems with crypto agility. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Tanushree Roy, Satadru Dey On Distinguishability of Anomalies as Physical Faults or Actuation Cyberattacks. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Sergio Bernardez Molina, Pantaleone Nespoli, Félix Gómez Mármol Tackling Cyberattacks through AI-based Reactive Systems: A Holistic Review and Future Vision. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Muriel Figueredo Franco, Fabian Künzler, Jan von der Assen, Chao Feng, Burkhard Stiller RCVaR: an Economic Approach to Estimate Cyberattacks Costs using Data from Industry Reports. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Bruno Paes Leao, Jagannadh Vempati, Siddharth Bhela, Tobias Ahlgrim, Daniel Arnold 0001 Augmented Digital Twin for Identification of Most Critical Cyberattacks in Industrial Systems. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Ángel Luis Perales Gómez, Enrique Tomás Martínez Beltrán, Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán TemporalFED: Detecting Cyberattacks in Industrial Time-Series Data Using Decentralized Federated Learning. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Zhe Wang, Tingkai Yan Federated Learning-based Vehicle Trajectory Prediction against Cyberattacks. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Hanyuan Huang, Tao Li 0016, Yong Ding, Beibei Li 0002, Ao Liu An artificial immunity based intrusion detection system for unknown cyberattacks. Search on Bibsonomy Appl. Soft Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Rehab Alanazi, Ahamed Aljuhani Anomaly Detection for Industrial Internet of Things Cyberattacks. Search on Bibsonomy Comput. Syst. Sci. Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Ishtiaq Ahmad Bajwa, Shabir Ahmad, Maqsood Mahmud, Farooq Ahmad Bajwa The impact of cyberattacks awareness on customers' trust and commitment: an empirical evidence from the Pakistani banking sector. Search on Bibsonomy Inf. Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Kristel M. de Nobrega, Anne-Françoise Rutkowski, Pieter M. A. Ribbers The Impact of Cyberattacks on Small States. Search on Bibsonomy IEEE Softw. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Mujib Jimoh Critiquing the U.S. characterization, attribution and retaliation laws and policies for cyberattacks. Search on Bibsonomy Comput. Law Secur. Rev. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Oleg Illiashenko, Vyacheslav Kharchenko, Ievgen Babeshko, Herman Fesenko, Felicita Di Giandomenico Security-Informed Safety Analysis of Autonomous Transport Systems Considering AI-Powered Cyberattacks and Protection. Search on Bibsonomy Entropy The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Qiyi Xu, Linshuai Ge Dynamic event-triggered H∞ filtering for discrete-time singular networked control system subject to cyberattacks. Search on Bibsonomy Trans. Inst. Meas. Control The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Zakwan AlArnaout, Nour Mostafa, Samer J. Alabed, Wael Hosny Fouad Aly, Ahmed Shdefat RAPT: A Robust Attack Path Tracing Algorithm to Mitigate SYN-Flood DDoS Cyberattacks. Search on Bibsonomy Sensors The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Ting Wang, Meiting Tu, Hao Lyu, Ye Li, Olivier Orfila, Guojian Zou, Dominique Gruyer Impact Evaluation of Cyberattacks on Connected and Automated Vehicles in Mixed Traffic Flow and Its Resilient and Robust Control Strategy. Search on Bibsonomy Sensors The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Jianan Zhang, Yuechao Ma, Lei Fu Adaptive memory event-triggered double asynchronous fault detection and security control for fuzzy semi-Markov jump systems under cyberattacks. Search on Bibsonomy Commun. Nonlinear Sci. Numer. Simul. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Shicheng Huo, Ya Zhang 0001, Frank L. Lewis, Changyin Sun Observer-Based Resilient Consensus Control for Heterogeneous Multiagent Systems Against Cyberattacks. Search on Bibsonomy IEEE Trans. Control. Netw. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Yan Li 0036, Feiyu Song, Jinliang Liu, Xiangpeng Xie, Engang Tian Software-Defined Event-Triggering Control for Large-Scale Networked Systems Subject to Stochastic Cyberattacks. Search on Bibsonomy IEEE Trans. Control. Netw. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Xiaoyu Guo, Zhen Dong, Chenliang Wang, Zhengtao Ding Event-Based Resilient Distributed Estimation Under Multiple Heterogeneous Cyberattacks. Search on Bibsonomy IEEE Trans. Control. Netw. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Haoyuan Sun, Hong-Gui Han, Jian Sun 0003, Hong-Yan Yang, Jun-Fei Qiao 0001 Security Control of Sampled-Data T-S Fuzzy Systems Subject to Cyberattacks and Successive Packet Losses. Search on Bibsonomy IEEE Trans. Fuzzy Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Tao Wu 0012, Sergey Gorbachev, Hak-Keung Lam, Ju H. Park 0001, Lianglin Xiong, Jinde Cao Adaptive Event-Triggered Space-Time Sampled-Data Synchronization for Fuzzy Coupled RDNNs Under Hybrid Random Cyberattacks. Search on Bibsonomy IEEE Trans. Fuzzy Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Olga Tushkanova, Dmitry Levshun, Alexander Branitskiy, Elena Fedorchenko, Evgenia Novikova, Igor V. Kotenko Detection of Cyberattacks and Anomalies in Cyber-Physical Systems: Approaches, Data Sources, Evaluation. Search on Bibsonomy Algorithms The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Lidan Liang, Jun Cheng 0004, Jinde Cao, Zheng-Guang Wu, Wu-Hua Chen Proportional-Integral Observer-Based State Estimation for Singularly Perturbed Complex Networks With Cyberattacks. Search on Bibsonomy IEEE Trans. Neural Networks Learn. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Xiaobin Gao, Feiqi Deng, Pengyu Zeng, Hongyang Zhang Adaptive Neural Event-Triggered Control of Networked Markov Jump Systems Under Hybrid Cyberattacks. Search on Bibsonomy IEEE Trans. Neural Networks Learn. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 402 (100 per page; Change: )
Pages: [1][2][3][4][5][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license