|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 131 occurrences of 84 keywords
|
|
|
Results
Found 5667 publication records. Showing 5667 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
83 | Rose K. Shumba |
Towards a more effective way of teaching a cybersecurity basics course. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGCSE Bull. ![In: ACM SIGCSE Bull. 36(4), pp. 108-111, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
security, tools, cybersecurity, exercises |
80 | Wesley Chou |
Cybersecurity Costs: Balancing Blanket Security with Real-World Practicality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IT Prof. ![In: IT Prof. 9(2), pp. 16-20, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
63 | Shari Lawrence Pfleeger, Rachel Rue |
Cybersecurity Economic Issues: Clearing the Path to Good Practice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Softw. ![In: IEEE Softw. 25(1), pp. 35-42, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
63 | Linda Wilbanks |
Cybersecurity: Welcome to My World. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IT Prof. ![In: IT Prof. 9(2), pp. 61-64, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
63 | Richard A. Kemmerer |
Cybersecurity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE ![In: Proceedings of the 25th International Conference on Software Engineering, May 3-10, 2003, Portland, Oregon, USA, pp. 705-717, 2003, IEEE Computer Society, 0-7695-1877-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
53 | Sangmi Chai, Raj Sharman, Smitha Patil, Shruta Satam, H. Raghav Rao, Shambhu J. Upadhyaya |
Surface Transportation and Cyber-Infrastructure: An Exploratory Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE International Conference on Intelligence and Security Informatics, ISI 2007, New Brunswick, New Jersey, USA, May 23-24, 2007, Proceedings, pp. 124-128, 2007, IEEE, 1-4244-1329-X. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
51 | Solange Ghernaouti-Helie |
A National Strategy for an Effective Cybersecurity Approach and Culture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: ARES 2010, Fifth International Conference on Availability, Reliability and Security, 15-18 February 2010, Krakow, Poland, pp. 370-373, 2010, IEEE Computer Society, 978-0-7695-3965-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Cybersecurity strategy, national cybersecurity action plan, organisational structures, cybersecurtiy culture, building human capacities, cooperation and coordination, proactive and reactive measures |
48 | Kwan-Liu Ma |
Guest Editor's Introduction: Visualization for Cybersecurity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Computer Graphics and Applications ![In: IEEE Computer Graphics and Applications 26(2), pp. 26-27, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
visualization, cybersecurity |
41 | Kashif Naseer Qureshi, Garret O'Keeffe, Shane O'Farrell, Graham Costelloe |
Cybersecurity Standards and Policies for CPS in IoE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cybersecurity Vigilance and Security Engineering of Internet of Everything ![In: Cybersecurity Vigilance and Security Engineering of Internet of Everything - Technology, Communications and Computing, pp. 177-192, 2024, Springer, 978-3-031-45161-4. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
41 | John Morris, Stefan Tatschner, Michael P. Heinl, Patrizia Heinl, Thomas Newe, Sven Plaga |
Cybersecurity as a Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cybersecurity Vigilance and Security Engineering of Internet of Everything ![In: Cybersecurity Vigilance and Security Engineering of Internet of Everything - Technology, Communications and Computing, pp. 141-161, 2024, Springer, 978-3-031-45161-4. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
41 | Saleem Iqbal, Saqib Majeed, Syed Amad Hussain Shah |
Future Cybersecurity Challenges for IoE Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cybersecurity Vigilance and Security Engineering of Internet of Everything ![In: Cybersecurity Vigilance and Security Engineering of Internet of Everything - Technology, Communications and Computing, pp. 75-86, 2024, Springer, 978-3-031-45161-4. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
41 | Faisal Rehman, Hanan Sharif, Muhammad Anwar, Naveed Riaz |
Big Data Analytics for Cybersecurity in IoE Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cybersecurity Vigilance and Security Engineering of Internet of Everything ![In: Cybersecurity Vigilance and Security Engineering of Internet of Everything - Technology, Communications and Computing, pp. 163-176, 2024, Springer, 978-3-031-45161-4. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
41 | Bahareh Pahlevanzadeh, Sima Ahmadpour |
Cybersecurity Threats and Attacks in IoE Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cybersecurity Vigilance and Security Engineering of Internet of Everything ![In: Cybersecurity Vigilance and Security Engineering of Internet of Everything - Technology, Communications and Computing, pp. 21-39, 2024, Springer, 978-3-031-45161-4. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
41 | Richard Bean 0001, Yanjun Zhang, Ryan K. L. Ko, Xinyu Mao, Guangdong Bai |
Preserving the Privacy and Cybersecurity of Home Energy Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emerging Trends in Cybersecurity Applications ![In: Emerging Trends in Cybersecurity Applications, pp. 301-322, 2023, Springer International Publishing, 978-3-031-09639-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
41 | Richard Bean 0001, Yanjun Zhang, Ryan K. L. Ko, Xinyu Mao, Guangdong Bai |
Preserving the Privacy and Cybersecurity of Home Energy Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emerging Trends in Cybersecurity Applications ![In: Emerging Trends in Cybersecurity Applications, pp. 323-343, 2023, Springer International Publishing, 978-3-031-09639-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
41 | Razvan Beuran, Zhenguo Hu, Youmeizi Zeng, Yasuo Tan |
Artificial Intelligence for Cybersecurity Education and Training. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Artificial Intelligence and Cybersecurity ![In: Artificial Intelligence and Cybersecurity: Theory and Applications, pp. 103-123, 2023, Springer International Publishing, 978-3-031-15029-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
41 | Petri Vähäkainu, Martti Lehto |
Use of Artificial Intelligence in a Cybersecurity Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Artificial Intelligence and Cybersecurity ![In: Artificial Intelligence and Cybersecurity: Theory and Applications, pp. 3-27, 2023, Springer International Publishing, 978-3-031-15029-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
41 | Jiao Yin 0003, MingJian Tang 0001, Jinli Cao, Mingshan You, Hua Wang 0002 |
Cybersecurity Applications in Software: Data-Driven Software Vulnerability Assessment and Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emerging Trends in Cybersecurity Applications ![In: Emerging Trends in Cybersecurity Applications, pp. 371-389, 2023, Springer International Publishing, 978-3-031-09639-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
41 | Stefan Varga, Teodor Sommestad, Joel Brynielsson |
Automation of Cybersecurity Work. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Artificial Intelligence and Cybersecurity ![In: Artificial Intelligence and Cybersecurity: Theory and Applications, pp. 67-101, 2023, Springer International Publishing, 978-3-031-15029-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
41 | Frédéric Tronnier, Sebastian Pape 0001, Sascha Löbner, Kai Rannenberg |
A Discussion on Ethical Cybersecurity Issues in Digital Service Chains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cybersecurity of Digital Service Chains ![In: Cybersecurity of Digital Service Chains - Challenges, Methodologies, and Tools, pp. 222-256, 2022, Springer, 978-3-031-04035-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
41 | Denitsa Kozhuharova, Atanas Kirov, Zhanin Al-Shargabi |
Ethics in Cybersecurity. What Are the Challenges We Need to Be Aware of and How to Handle Them? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cybersecurity of Digital Service Chains ![In: Cybersecurity of Digital Service Chains - Challenges, Methodologies, and Tools, pp. 202-221, 2022, Springer, 978-3-031-04035-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
41 | Veenu Rani, Munish Kumar, Ajay Mittal, Krishan Kumar 0001 |
Artificial Intelligence for Cybersecurity: Recent Advancements, Challenges and Opportunities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities ![In: Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities, pp. 73-88, 2022, Springer, 978-3-030-96736-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
41 | Reza M. Parizi, Ali Dehghantanha, Amin Azmoodeh, Kim-Kwang Raymond Choo |
Blockchain in Cybersecurity Realm: An Overview. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Blockchain Cybersecurity, Trust and Privacy ![In: Blockchain Cybersecurity, Trust and Privacy, pp. 1-5, 2020, Springer, 978-3-030-38180-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
41 | Igor V. Kotenko, Igor Saenko 0001, Alexander Branitskiy |
Machine Learning and Big Data Processing for Cybersecurity Data Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Science in Cybersecurity and Cyberthreat Intelligence ![In: Data Science in Cybersecurity and Cyberthreat Intelligence, pp. 61-85, 2020, Springer, 978-3-030-38787-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
41 | Mike Johnstone, Matthew Peacock |
Seven Pitfalls of Using Data Science in Cybersecurity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Science in Cybersecurity and Cyberthreat Intelligence ![In: Data Science in Cybersecurity and Cyberthreat Intelligence, pp. 115-129, 2020, Springer, 978-3-030-38787-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
41 | Leonid I. Perlovsky, Olexander Shevchenko |
Dynamic Logic Machine Learning for Cybersecurity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cybersecurity Systems for Human Cognition Augmentation ![In: Cybersecurity Systems for Human Cognition Augmentation, pp. 85-98, 2014, Springer, 978-3-319-10373-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
41 | Bruce McCormick 0002 |
Applying Cognitive Memory to CyberSecurity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Network Science and Cybersecurity ![In: Network Science and Cybersecurity, pp. 63-73, 2014, Springer, 978-1-4614-7596-5. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
41 | Fred B. Schneider, Deirdre K. Mulligan |
A Doctrinal Thesis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 9(4), pp. 3-4, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
cybersecurity policy, public cybersecurity, deterrence through accountability |
38 | Feisal Keblawi, Dick Sullivan |
The Case for Flexible NIST Security Standards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 40(6), pp. 19-26, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
standards, security and privacy, cybersecurity |
38 | Susan Landau 0001, Martin R. Stytz, Carl E. Landwehr, Fred B. Schneider |
Overview of Cyber Security: A Crisis of Prioritization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 3(3), pp. 9-11, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
President’s Information Technology Advisory Committee, PITAC, PITAC report, cybersecurity |
38 | Carl E. Landwehr |
Changing the Puzzle Pieces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 3(1), pp. 3-4, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
security, cyberinfrastructure, cybersecurity |
38 | Scott Borg |
Economically Complex Cyberattacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 3(6), pp. 64-67, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
cyberdefense, security, cybersecurity, cyberattack |
38 | Amruth N. Kumar, Rose K. Shumba, Bina Ramamurthy, Lawrence D'Antonio |
Emerging areas in computer science education. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 36th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2005, St. Louis, Missouri, USA, February 23-27, 2005, pp. 453-454, 2005, ACM, 1-58113-997-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
wireless networking, grid computing, artificial intelligence, robotics, bioinformatics, cybersecurity |
35 | Wayne Jones, Al Gallo |
A Process-Based Approach to Handling Risks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IT Prof. ![In: IT Prof. 9(2), pp. 10-15, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Bill Neugent |
Bill Neugent MITRE Fellow, Chief Engineer Information Security Division. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDOC ![In: 11th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2007), 15-19 October 2007, Annapolis, Maryland, USA, 2007, IEEE Computer Society, 0-7695-2891-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Cynthia E. Irvine |
Teaching Constructive Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 1(6), pp. 59-61, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
31 | Ibrahim Tariq Javed, Kashif Naseer Qureshi |
Role of Blockchain for IoE Infrastructures and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cybersecurity Vigilance and Security Engineering of Internet of Everything ![In: Cybersecurity Vigilance and Security Engineering of Internet of Everything - Technology, Communications and Computing, pp. 127-139, 2024, Springer, 978-3-031-45161-4. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
31 | Amna Khatoon, Asad Ullah, Muhammad Yasir |
Machine Learning-Based Detection and Prevention Systems for IoE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cybersecurity Vigilance and Security Engineering of Internet of Everything ![In: Cybersecurity Vigilance and Security Engineering of Internet of Everything - Technology, Communications and Computing, pp. 109-125, 2024, Springer, 978-3-031-45161-4. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
31 | Abeer Iftikhar, Kashif Naseer Qureshi |
Future Privacy and Trust Challenges for IoE Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cybersecurity Vigilance and Security Engineering of Internet of Everything ![In: Cybersecurity Vigilance and Security Engineering of Internet of Everything - Technology, Communications and Computing, pp. 193-218, 2024, Springer, 978-3-031-45161-4. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
31 | Fasee Ullah, Asad Ullah |
Networking and Security Architectures for IoE Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cybersecurity Vigilance and Security Engineering of Internet of Everything ![In: Cybersecurity Vigilance and Security Engineering of Internet of Everything - Technology, Communications and Computing, pp. 89-107, 2024, Springer, 978-3-031-45161-4. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
31 | Raja Waseem Anwar, Kashif Naseer Qureshi |
Attack Detection Mechanisms for Internet of Everything (IoE) Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cybersecurity Vigilance and Security Engineering of Internet of Everything ![In: Cybersecurity Vigilance and Security Engineering of Internet of Everything - Technology, Communications and Computing, pp. 41-55, 2024, Springer, 978-3-031-45161-4. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
31 | Kashif Naseer Qureshi, Thomas Newe, Gwanggil Jeon, Abdellah Chehri |
Internet of Everything: Evolution and Fundamental Concepts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cybersecurity Vigilance and Security Engineering of Internet of Everything ![In: Cybersecurity Vigilance and Security Engineering of Internet of Everything - Technology, Communications and Computing, pp. 3-20, 2024, Springer, 978-3-031-45161-4. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
31 | Hilary Meagher, Lubna Luxmi Dhirani |
Cyber-Resilience, Principles, and Practices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cybersecurity Vigilance and Security Engineering of Internet of Everything ![In: Cybersecurity Vigilance and Security Engineering of Internet of Everything - Technology, Communications and Computing, pp. 57-74, 2024, Springer, 978-3-031-45161-4. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
31 | Yuxiao Zhang, Qingfeng Chen, Xinkun Hao, Haiming Pan, Qian Yu, Kexin Huang |
Defense Against Adversarial Attack on Knowledge Graph Embedding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emerging Trends in Cybersecurity Applications ![In: Emerging Trends in Cybersecurity Applications, pp. 441-461, 2023, Springer International Publishing, 978-3-031-09639-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
31 | João Marques-Silva 0002, Nuno Souto |
A Secured 5G Network Slices Auction Broker. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emerging Trends in Cybersecurity Applications ![In: Emerging Trends in Cybersecurity Applications, pp. 123-136, 2023, Springer International Publishing, 978-3-031-09639-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
31 | Sairath Bhattacharjya, Hossein Saiedian |
End-to-End Security for IoT Communications: A Practical Implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emerging Trends in Cybersecurity Applications ![In: Emerging Trends in Cybersecurity Applications, pp. 21-43, 2023, Springer International Publishing, 978-3-031-09639-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
31 | Selahattin Hürol Türen, Md. Rafiqul Islam 0001, Kenneth Eustace |
Analysing the Threat Landscape Inside the Dark Web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emerging Trends in Cybersecurity Applications ![In: Emerging Trends in Cybersecurity Applications, pp. 95-122, 2023, Springer International Publishing, 978-3-031-09639-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
31 | Ly Vu, Quang Uy Nguyen, Dinh Thai Hoang, Diep N. Nguyen, Eryk Dutkiewicz |
A Novel Transfer Learning Model for Intrusion Detection Systems in IoT Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emerging Trends in Cybersecurity Applications ![In: Emerging Trends in Cybersecurity Applications, pp. 45-65, 2023, Springer International Publishing, 978-3-031-09639-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
31 | Jose Rubio-Hernan, Luca De Cicco, Joaquín García-Alfaro |
Non-stationary Watermark-Based Attack Detection to Protect Cyber-Physical Control Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emerging Trends in Cybersecurity Applications ![In: Emerging Trends in Cybersecurity Applications, pp. 347-370, 2023, Springer International Publishing, 978-3-031-09639-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
31 | Nuno Realista, Francisco Palma, Carlos Serrão, Luís Nunes, Ana de Almeida 0002 |
Improving Android Application Quality Through Extendable, Automated Security Testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emerging Trends in Cybersecurity Applications ![In: Emerging Trends in Cybersecurity Applications, pp. 251-274, 2023, Springer International Publishing, 978-3-031-09639-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
31 | Nourhène Ben Rabah, Hanen Idoudi |
A Machine Learning Framework for Intrusion Detection in VANET Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emerging Trends in Cybersecurity Applications ![In: Emerging Trends in Cybersecurity Applications, pp. 209-227, 2023, Springer International Publishing, 978-3-031-09639-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
31 | Yvette Colomb, Peter White, Rafiqul Islam 0002, Abeer Alsadoon |
Applying Zero Trust Architecture and Probability-Based Authentication to Preserve Security and Privacy of Data in the Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emerging Trends in Cybersecurity Applications ![In: Emerging Trends in Cybersecurity Applications, pp. 137-169, 2023, Springer International Publishing, 978-3-031-09639-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
31 | Jinming Ma, Tianbing Xia, Janusz R. Getta |
The Implementation of Uncertainty Models for Fraud Detection on Mobile Advertising. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emerging Trends in Cybersecurity Applications ![In: Emerging Trends in Cybersecurity Applications, pp. 231-249, 2023, Springer International Publishing, 978-3-031-09639-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
31 | Chao Chen, Ugur-Ilker Atmaca, Konstantinos Koufos, Mehrdad Dianati, Carsten Maple |
Analysing Cyber Attacks and Risks in V2X-Assisted Autonomous Highway Merging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emerging Trends in Cybersecurity Applications ![In: Emerging Trends in Cybersecurity Applications, pp. 191-208, 2023, Springer International Publishing, 978-3-031-09639-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
31 | Yulliwas Ameur, Samia Bouzefrane 0001, Vincent Audigier |
Application of Homomorphic Encryption in Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emerging Trends in Cybersecurity Applications ![In: Emerging Trends in Cybersecurity Applications, pp. 391-410, 2023, Springer International Publishing, 978-3-031-09639-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
31 | Germán E. Rodríguez, Jenny G. Torres, Eduardo Benavides-Astudillo |
DataCookie: Sorting Cookies Using Data Mining for Prevention of Cross-Site Scripting (XSS). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emerging Trends in Cybersecurity Applications ![In: Emerging Trends in Cybersecurity Applications, pp. 171-188, 2023, Springer International Publishing, 978-3-031-09639-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
31 | Rachana Yogesh Patil, Yogesh H. Patil, Aparna Bannore, Arijit Karati, Renu Kachhoriya, Manjiri Ranjanikar |
A Provably Secure Data Sharing Scheme for Smart Gas Grid in Fog Computing Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emerging Trends in Cybersecurity Applications ![In: Emerging Trends in Cybersecurity Applications, pp. 277-299, 2023, Springer International Publishing, 978-3-031-09639-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
31 | Fadi Mohsen, Adel Shtayyeh, Marten Struijk, Riham Naser, Lena Mohammad |
An Approach to Guide Users Towards Less Revealing Internet Browsers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emerging Trends in Cybersecurity Applications ![In: Emerging Trends in Cybersecurity Applications, pp. 69-94, 2023, Springer International Publishing, 978-3-031-09639-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
31 | Cathryn Peoples, Adrian Moore 0001, Nektarios Georgalas |
The Design of Ethical Service-Level Agreements to Protect Cyber Attackers and Attackees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emerging Trends in Cybersecurity Applications ![In: Emerging Trends in Cybersecurity Applications, pp. 413-440, 2023, Springer International Publishing, 978-3-031-09639-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
31 | Osman Salem, Ahmed Mehaoua |
Ephemeral Elliptic Curve Diffie-Hellman to Secure Data Exchange in Internet of Medical Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emerging Trends in Cybersecurity Applications ![In: Emerging Trends in Cybersecurity Applications, pp. 3-20, 2023, Springer International Publishing, 978-3-031-09639-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
31 | Hannu Turtiainen, Andrei Costin, Alex Polyakov, Timo Hämäläinen 0002 |
Offensive Machine Learning Methods and the Cyber Kill Chain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Artificial Intelligence and Cybersecurity ![In: Artificial Intelligence and Cybersecurity: Theory and Applications, pp. 125-145, 2023, Springer International Publishing, 978-3-031-15029-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
31 | Zhechen Zhu, Asoke K. Nandi |
Artificial Intelligence Enabled Radio Signal Intelligence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Artificial Intelligence and Cybersecurity ![In: Artificial Intelligence and Cybersecurity: Theory and Applications, pp. 247-278, 2023, Springer International Publishing, 978-3-031-15029-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
31 | Dvir Ben Or, Michael Kolomenkin, Tanya Osokin, Gil Shabat, Hanan Shteingart |
Deep Learning Quantile Regression for Robustness, Confidence and Planning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Artificial Intelligence and Cybersecurity ![In: Artificial Intelligence and Cybersecurity: Theory and Applications, pp. 279-289, 2023, Springer International Publishing, 978-3-031-15029-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
31 | Tuomo Sipola, Tero Kokkonen, Mika Karjalainen |
Model Fooling Threats Against Medical Imaging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Artificial Intelligence and Cybersecurity ![In: Artificial Intelligence and Cybersecurity: Theory and Applications, pp. 291-301, 2023, Springer International Publishing, 978-3-031-15029-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
31 | Kirsi Helkala, James Cook, George Lucas, Frank Pasquale, Gregory M. Reichberg, Henrik Syse |
AI in Cyber Operations: Ethical and Legal Considerations for End-Users. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Artificial Intelligence and Cybersecurity ![In: Artificial Intelligence and Cybersecurity: Theory and Applications, pp. 185-206, 2023, Springer International Publishing, 978-3-031-15029-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
31 | Martin Lundgren, Ali Padyab |
A Review of Cyber Threat (Artificial) Intelligence in Security Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Artificial Intelligence and Cybersecurity ![In: Artificial Intelligence and Cybersecurity: Theory and Applications, pp. 29-45, 2023, Springer International Publishing, 978-3-031-15029-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
31 | Stuart Millar, Niall McLaughlin, Jesús Martínez del Rincón, Paul Miller 0003 |
Android Malware Detection Using Deep Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Artificial Intelligence and Cybersecurity ![In: Artificial Intelligence and Cybersecurity: Theory and Applications, pp. 209-246, 2023, Springer International Publishing, 978-3-031-15029-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
31 | Minna Kilpala, Tommi Kärkkäinen, Timo Hämäläinen 0002 |
Differential Privacy: An Umbrella Review. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Artificial Intelligence and Cybersecurity ![In: Artificial Intelligence and Cybersecurity: Theory and Applications, pp. 167-183, 2023, Springer International Publishing, 978-3-031-15029-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
31 | Douglas L. Van Bossuyt, Nikolaos Papakonstantinou, Britta Hale, Jarno Salonen, Bryan O'Halloran |
Model Based Resilience Engineering for Design and Assessment of Mission Critical Systems Containing Artificial Intelligence Components. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Artificial Intelligence and Cybersecurity ![In: Artificial Intelligence and Cybersecurity: Theory and Applications, pp. 47-66, 2023, Springer International Publishing, 978-3-031-15029-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
31 | Hannu Turtiainen, Andrei Costin, Timo Hämäläinen 0002 |
Defensive Machine Learning Methods and the Cyber Defence Chain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Artificial Intelligence and Cybersecurity ![In: Artificial Intelligence and Cybersecurity: Theory and Applications, pp. 147-163, 2023, Springer International Publishing, 978-3-031-15029-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
31 | Pawel Szynkiewicz |
Signature-Based Detection of Botnet DDoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cybersecurity of Digital Service Chains ![In: Cybersecurity of Digital Service Chains - Challenges, Methodologies, and Tools, pp. 120-135, 2022, Springer, 978-3-031-04035-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
31 | Alessandro Carrega, Giovanni Grieco, Domenico Striccoli, Manos Papoutsakis, Tomas Lima, José Ignacio Carretero, Matteo Repetto |
A Reference Architecture for Management of Security Operations in Digital Service Chains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cybersecurity of Digital Service Chains ![In: Cybersecurity of Digital Service Chains - Challenges, Methodologies, and Tools, pp. 1-31, 2022, Springer, 978-3-031-04035-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
31 | Joanna Kolodziej, Cornelio Hopmann, Giovanni Coppa, Daniel Grzonka, Adrian Widlak |
Intelligent Transportation Systems - Models, Challenges, Security Aspects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cybersecurity of Digital Service Chains ![In: Cybersecurity of Digital Service Chains - Challenges, Methodologies, and Tools, pp. 56-82, 2022, Springer, 978-3-031-04035-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
31 | Andrzej Wilczynski, Joanna Kolodziej |
Blockchain-Based Task and Information Management in Computational Cloud Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cybersecurity of Digital Service Chains ![In: Cybersecurity of Digital Service Chains - Challenges, Methodologies, and Tools, pp. 162-201, 2022, Springer, 978-3-031-04035-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
31 | Markus Wurzenberger, Max Landauer, Agron Bajraktari, Florian Skopik |
Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cybersecurity of Digital Service Chains ![In: Cybersecurity of Digital Service Chains - Challenges, Methodologies, and Tools, pp. 136-161, 2022, Springer, 978-3-031-04035-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
31 | Mateusz Krzyszton, Marcin Lew, Michal Marks |
NAD: Machine Learning Based Component for Unknown Attack Detection in Network Traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cybersecurity of Digital Service Chains ![In: Cybersecurity of Digital Service Chains - Challenges, Methodologies, and Tools, pp. 83-102, 2022, Springer, 978-3-031-04035-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
31 | Florian Skopik, Markus Wurzenberger, Max Landauer |
Detecting Unknown Cyber Security Attacks Through System Behavior Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cybersecurity of Digital Service Chains ![In: Cybersecurity of Digital Service Chains - Challenges, Methodologies, and Tools, pp. 103-119, 2022, Springer, 978-3-031-04035-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
31 | Matteo Repetto, Alessandro Carrega |
Monitoring Network Flows in Containerized Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cybersecurity of Digital Service Chains ![In: Cybersecurity of Digital Service Chains - Challenges, Methodologies, and Tools, pp. 32-55, 2022, Springer, 978-3-031-04035-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
31 | Amani Abou Rida, Rabih Amhaz, Pierre Parrend |
Anomaly Detection on Static and Dynamic Graphs Using Graph Convolutional Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities ![In: Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities, pp. 227-248, 2022, Springer, 978-3-030-96736-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
31 | Francesco Colace, Massimo De Santo, Francesco Marongiu, Domenico Santaniello, Alfredo Troiano |
Secure Medical Data Sharing Through Blockchain and Decentralized Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities ![In: Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities, pp. 249-262, 2022, Springer, 978-3-030-96736-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
31 | Passent Mohammed El-Kafrawy, Mohamed Bennawy |
Walk Through Event Stream Processing Architecture, Use Cases and Frameworks Survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities ![In: Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities, pp. 57-71, 2022, Springer, 978-3-030-96736-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
31 | Mario Casillo, Francesco Colace, Angelo Lorusso, Francesco Marongiu, Domenico Santaniello |
An IoT-Based System for Expert User Supporting to Monitor, Manage and Protect Cultural Heritage Buildings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities ![In: Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities, pp. 143-154, 2022, Springer, 978-3-030-96736-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
31 | Ashutosh Kumar, Aditya Upadhyay, Neha Mishra, Srawan Nath, Kalu Ram Yadav, Gajanand Sharma |
Privacy and Security Concerns in Edge Computing-Based Smart Cities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities ![In: Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities, pp. 89-110, 2022, Springer, 978-3-030-96736-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
31 | Dmitry Kushnir, Maxim Kovtsur, Ammar Muthanna, Anastasiia Kistruga, Mark Akilov, Anton Batalov |
Developing Instrument for Investigation of Blockchain Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities ![In: Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities, pp. 123-141, 2022, Springer, 978-3-030-96736-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
31 | Johannes Meister, Kim Ho Yeap, Magdalene Wan Ching Goh, Humaira Nisar, Johannes Fischer 0005, Hans Meier |
The Design of a Pheromone-Based Robotic Varroa Trap for Beekeeping Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities ![In: Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities, pp. 21-56, 2022, Springer, 978-3-030-96736-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
31 | Kriti Aggarwal, Sunil K. Singh 0002, Muskaan Chopra, Sudhakar Kumar, Francesco Colace |
Deep Learning in Robotics for Strengthening Industry 4.0.: Opportunities, Challenges and Future Directions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities ![In: Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities, pp. 1-19, 2022, Springer, 978-3-030-96736-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
31 | Nidhee Kamble |
Commercializing Blockchain in a Smart City: Autonomous Vehicles, Cryptocurrency, and Contract Law. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities ![In: Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities, pp. 155-170, 2022, Springer, 978-3-030-96736-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
31 | Alberto Huertas Celdrán, Pedro Miguel Sánchez Sánchez, Fabio Sisi, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller |
Creation of a Dataset Modeling the Behavior of Malware Affecting the Confidentiality of Data Managed by IoT Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities ![In: Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities, pp. 193-225, 2022, Springer, 978-3-030-96736-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
31 | Jasmeen Kaur Chahal, Vidhyotma Gandhi, Payal Kaushal |
A Taxonomy of DDoS Defense Mechanism in Software Defined Networking (SDN). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities ![In: Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities, pp. 111-122, 2022, Springer, 978-3-030-96736-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
31 | Phuc Do |
Finding All Shortest Meaningful Meta-Paths Between Two Vertices of a Secured Large Heterogeneous Information Network Using Distributed Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities ![In: Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities, pp. 171-192, 2022, Springer, 978-3-030-96736-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
31 | Alessandra Di Pierro, Pasquale Malacaria, Rajagopal Nagarajan (eds.) |
From Lambda Calculus to Cybersecurity Through Program Analysis - Essays Dedicated to Chris Hankin on the Occasion of His Retirement ![Search on Bibsonomy](Pics/bibsonomy.png) |
From Lambda Calculus to Cybersecurity Through Program Analysis ![Springer, 978-3-030-41102-2 The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Kevin Tiba, Reza M. Parizi, Qi Zhang 0009, Ali Dehghantanha, Hadis Karimipour, Kim-Kwang Raymond Choo |
Secure Blockchain-Based Traffic Load Balancing Using Edge Computing and Reinforcement Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Blockchain Cybersecurity, Trust and Privacy ![In: Blockchain Cybersecurity, Trust and Privacy, pp. 99-128, 2020, Springer, 978-3-030-38180-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Kelly Click, Amritraj Singh, Reza M. Parizi, Gautam Srivastava 0001, Ali Dehghantanha |
Immutable and Secure IP Address Protection Using Blockchain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Blockchain Cybersecurity, Trust and Privacy ![In: Blockchain Cybersecurity, Trust and Privacy, pp. 233-246, 2020, Springer, 978-3-030-38180-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Amritraj Singh, Reza M. Parizi, Meng Han, Ali Dehghantanha, Hadis Karimipour, Kim-Kwang Raymond Choo |
Public Blockchains Scalability: An Examination of Sharding and Segregated Witness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Blockchain Cybersecurity, Trust and Privacy ![In: Blockchain Cybersecurity, Trust and Privacy, pp. 203-232, 2020, Springer, 978-3-030-38180-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Md. Nazmul Islam, Sandip Kundu |
IoT Security, Privacy and Trust in Home-Sharing Economy via Blockchain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Blockchain Cybersecurity, Trust and Privacy ![In: Blockchain Cybersecurity, Trust and Privacy, pp. 33-50, 2020, Springer, 978-3-030-38180-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Randhir Kumar, Rakesh Tripathi |
Secure Healthcare Framework Using Blockchain and Public Key Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Blockchain Cybersecurity, Trust and Privacy ![In: Blockchain Cybersecurity, Trust and Privacy, pp. 185-202, 2020, Springer, 978-3-030-38180-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Gautam Srivastava 0001, Reza M. Parizi, Ali Dehghantanha |
The Future of Blockchain Technology in Healthcare Internet of Things Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Blockchain Cybersecurity, Trust and Privacy ![In: Blockchain Cybersecurity, Trust and Privacy, pp. 161-184, 2020, Springer, 978-3-030-38180-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Liyuan Liu, Meng Han, Yiyun Zhou, Reza M. Parizi, Mohammed Korayem |
Blockchain-Based Certification for Education, Employment, and Skill with Incentive Mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Blockchain Cybersecurity, Trust and Privacy ![In: Blockchain Cybersecurity, Trust and Privacy, pp. 269-290, 2020, Springer, 978-3-030-38180-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Melody Moh, David Nguyen, Teng-Sheng Moh, Brian Khieu |
Blockchain for Efficient Public Key Infrastructure and Fault-Tolerant Distributed Consensus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Blockchain Cybersecurity, Trust and Privacy ![In: Blockchain Cybersecurity, Trust and Privacy, pp. 69-97, 2020, Springer, 978-3-030-38180-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Gabriel Bello, Alfredo J. Perez |
On the Application of Financial Security Standards in Blockchain Platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Blockchain Cybersecurity, Trust and Privacy ![In: Blockchain Cybersecurity, Trust and Privacy, pp. 247-267, 2020, Springer, 978-3-030-38180-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 5667 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|