|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 233 occurrences of 198 keywords
|
|
|
Results
Found 979 publication records. Showing 979 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
74 | Elena Sitnikova, Trent Kroeger, Stephen C. Cook |
Software and systems engineering process capability in the South Australian defence industry. |
Innov. Syst. Softw. Eng. |
2007 |
DBLP DOI BibTeX RDF |
Software and systems engineering, Australian defence, Quality standards and models, Process improvement, Process capability |
74 | Millie Pant, Kusum Deep |
Building a Better Air Defence System Using Genetic Algorithms. |
KES (1) |
2006 |
DBLP DOI BibTeX RDF |
Air defence models, Genetic Algorithms, Optimization, Elitism, Recombination Operator |
72 | V. A. French |
Applying software engineering and process improvement to legacy defence system maintenance: an experience report. |
ICSM |
1995 |
DBLP DOI BibTeX RDF |
legacy defence system maintenance, real-time legacy defence system, project management data, software engineering, software maintenance, project management, project management, software metrics, software metrics, process improvement, inspection, software inspections, software management, statistical process control, statistical process controls, military computing |
64 | John K. Davies |
"Open and challenging research issues in dependable distributed computing" A personal view from the Defence Industry. |
SRDS |
2006 |
DBLP DOI BibTeX RDF |
|
62 | Cyril Onwubiko, Andrew P. Lenaghan |
An Evolutionary Approach in Threats Detection for Distributed Security Defence Systems. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
security defence framework, genetic algorithms, security threats |
62 | Michal Pechoucek, Martin Rehák, Vladimír Marík |
Expectations and deployment of agent technology in manufacturing and defence: case studies. |
AAMAS Industrial Applications |
2005 |
DBLP DOI BibTeX RDF |
defence applications, multi-agent systems, agents, manufacturing, production planning |
60 | T. William Olle |
Ferranti Mercury at the Norwegian Defence Research Establishment. |
History of Nordic Computing |
2003 |
DBLP DOI BibTeX RDF |
Ferranti Mercury, Norwegian Defence Research Establishment, machine language programming, Jan Garwick, SHAPE Air Defence Technical Centre |
58 | Steven R. Johnston |
The Impact of Privacy and Data Protection Legislation on the Sharing of Intrusion Detection Information. |
Recent Advances in Intrusion Detection |
2001 |
DBLP DOI BibTeX RDF |
trans-border data flow, intrusion detection. (c) Her Majesty the Queen as represented by the Minister of National Defence, acting on behalf of the Communications Security Establishment, 2001, Privacy, data protection, personal information, personal data, Canada |
52 | X. Zhang, Gabriel Dragffy, Anthony G. Pipe, Quan Min Zhu |
Artificial Innate Immune System: An Instant Defence Layer of Embryonics. |
ICARIS |
2004 |
DBLP DOI BibTeX RDF |
|
50 | Peeter Lorents, Rain Ottis, Raul Rikk |
Cyber Society and Cooperative Cyber Defence. |
HCI (14) |
2009 |
DBLP DOI BibTeX RDF |
cyber society, cooperative cyber defence, CCD COE, Knowledge, information, cyber attacks |
50 | Guy Edward Gallasch, Nimrod Lilith, Jonathan Billington, Lin Zhang, Axel Bender, Benjamin Francis |
Modelling defence logistics networks. |
Int. J. Softw. Tools Technol. Transf. |
2008 |
DBLP DOI BibTeX RDF |
Defence logistics, Modelling experience, CPN support tools, Coloured Petri nets |
48 | Stefano Bistarelli, Pamela Peretti, Irina Trubitsyna |
Answer Set Optimization for and/or Composition of CP-Nets: A Security Scenario. |
CP |
2007 |
DBLP DOI BibTeX RDF |
|
40 | Bernardt Duvenhage, J. P. Delport, Anita Louis |
A 3D visual analysis tool in support of the SANDF's growing ground based air defence simulation capability. |
Afrigraph |
2007 |
DBLP DOI BibTeX RDF |
battle field visualisation, command and control visualisation, analysis |
40 | Lakhmi C. Jain |
Knowledge-Based Intelligent Engineering Systems in Defence and Security. |
KSEM |
2007 |
DBLP DOI BibTeX RDF |
|
40 | Jian Li, Guoyin Zhang, Guo-Chang Gu |
Research and experiments of network attack defence system. |
SMC (4) |
2004 |
DBLP DOI BibTeX RDF |
|
40 | Won Shik Na, Jeom Goo Kim, Intae Ryoo |
Perimeter Defence Policy Model of Cascade MPLS VPN Networks. |
ICCSA (1) |
2004 |
DBLP DOI BibTeX RDF |
|
40 | Daryl W. Bradley, Andrew M. Tyrrell |
Multi-layered Defence Mechanisms: Architecture, Implementation and Demonstration of a Hardware Immune System. |
ICES |
2001 |
DBLP DOI BibTeX RDF |
|
38 | Xuedou Yu |
Research on Active Defence Technology with Virus Based on K-Nearest Neighbor Algorithm of Kernel. |
ESIAT (1) |
2009 |
DBLP DOI BibTeX RDF |
Active Defence, K-Nearest Neighbor Algorithm, Virus, Kernel Function |
36 | Anjali Sardana, Ramesh Chandra Joshi |
Autonomous dynamic honeypot routing mechanism for mitigating DDoS attacks in DMZ. |
ICON |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Shishir Nagaraja, Ross J. Anderson |
Dynamic Topologies for Robust Scale-Free Networks. |
BIOWIRE |
2007 |
DBLP DOI BibTeX RDF |
covert groups, security, robustness, topology, Scale-free networks |
36 | Yvonne Hitchcock, Paul Montague |
A New Elliptic Curve Scalar Multiplication Algorithm to Resist Simple Power Analysis. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
|
36 | Robert A. Ghanea-Hercock |
Assimilation and survival in cyberspace. |
AAMAS |
2002 |
DBLP DOI BibTeX RDF |
security, multi-agent systems, social-dynamics |
34 | Maj Adrian Erkelens, Stan Isbrandt, Fariya Syed |
Development of a prototype model for civilian occupational group projections. |
SCSC |
2007 |
DBLP BibTeX RDF |
civilian, defence, workforce management, projection, personnel, human resource, occupation |
34 | Michael Papasimeon, Adrian R. Pearce, Simon Goss |
The human agent virtual environment. |
AAMAS |
2007 |
DBLP DOI BibTeX RDF |
agents and cognitive models, defence, multi-agent simulation and modeling |
34 | Mukhtar S. A. Al-Hashimi |
AL-Care medical information system: developing local experience. |
ISCNZ |
1996 |
DBLP DOI BibTeX RDF |
AL-Care medical information system, health care quality, health care cost, market pressure, Bahrain Defence Force Hospital, assessment methodology, development strategy, return value, assessment study, patient information, training, user evaluation, medical information systems, developed countries, developing countries, implementation strategy, culture factors |
34 | Frederick I. Moxley |
On the specification of complex software systems. |
ICECCS |
1996 |
DBLP DOI BibTeX RDF |
complex software systems specification, Defense Information Infrastructure, Common Operating Environment, distributed heterogeneous information systems, starwars missile defence system, formal specification, requirements specification, design specification |
31 | Linjiang Xie, Feilu Hang, Wei Guo, Yao Lv, Wei Ou, C. Chandru Vignesh |
Machine learning-based security active defence model - security active defence technology in the communication network. |
Int. J. Internet Protoc. Technol. |
2022 |
DBLP DOI BibTeX RDF |
|
31 | Dov M. Gabbay, Ross Horne, Sjouke Mauw, Leendert van der Torre |
Attack-Defence Frameworks: Argumentation-Based Semantics for Attack-Defence Trees. |
GraMSec@CSF |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Jonathan Pan |
Using Malware Self-Defence Mechanism to Harden Defence and Remediation Tools. |
CoRR |
2018 |
DBLP BibTeX RDF |
|
31 | Martin Blom, Fulvio Castellacci, Arne Fevolden |
Defence firms facing liberalization: innovation and export in an agent-based model of the defence industry. |
Comput. Math. Organ. Theory |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Xuedou Yu |
Research on Active Defence Technology with Host Intrusion Based on K-Nearest Neighbor Algorithm of Kernel. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Guy Edward Gallasch, Benjamin Francis, Christopher Moon, Jonathan Billington |
Modelling personnel within a defence logistics maintenance process. |
SimuTools |
2008 |
DBLP DOI BibTeX RDF |
models of personnel, maintenance, coloured petri nets, simulation performance |
28 | Philip N. Day, Gus Ferguson, Patrik O'Brian Holt, Steven Hogg, David Gibson |
Wearable augmented virtual reality for enhancing information delivery in high precision defence assembly: an engineering case study. |
Virtual Real. |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Panos Louvieris, Andreas Gregoriades, Natasha Mashanovich, Gareth White, Robert O'Keefe, Jerry Levine, Stewart Henderson |
Agent-Based Parsimonious Decision Support Paradigm Employing Bayesian Belief Networks. |
DAMAS |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Arthur Filippidis, Russell Connell |
Integrating intelligent agents with intelligent techniques in proposed future land defence applications. |
KES |
2000 |
DBLP DOI BibTeX RDF |
|
28 | Ian Frank, David A. Basin |
Optimal Play against Best Defence: Complexity and Heuristics. |
Computers and Games |
1998 |
DBLP DOI BibTeX RDF |
complexity, heuristics, Bridge, imperfect information |
28 | R. H. Pierce, I. Marshall, S. J. Goodenough |
Object-Oriented Design of an Air-Defence Simulator. |
Ada-Europe |
1993 |
DBLP DOI BibTeX RDF |
|
24 | Yaping Jiang, Yong Gan, Jianhua Zhou, Zengyu Cai |
A Model of Intrusion Prevention Base on Immune. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Ashley Chonka, Wanlei Zhou 0001, Yang Xiang 0001 |
Defending Grid Web Services from XDoS Attacks by SOTA. |
PerCom Workshops |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Nik Looker, David Webster, Duncan Russell, Jie Xu 0007 |
Scenario Based Evaluation. |
ISORC |
2008 |
DBLP DOI BibTeX RDF |
Evaluation, SOA, Scenario |
24 | Peter Beaumont, Brahim Chaib-draa |
Multiagent Coordination Techniques for Complex Environments: The Case of a Fleet of Combat Ships. |
IEEE Trans. Syst. Man Cybern. Part C |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Jenny Ulriksson, Farshad Moradi, Mattias Liljeström, Nicholas Montgomerie-Neilson |
Building a CSCW Infrastructure Utilizing an M&S Architecture and XML. |
CDVE |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Guido Boella, Joris Hulstijn, Leendert W. N. van der Torre |
Argumentation for Access Control. |
AI*IA |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Dan Page, Martijn Stam |
On XTR and Side-Channel Analysis. |
Selected Areas in Cryptography |
2004 |
DBLP DOI BibTeX RDF |
LUC, finite field, side channel attack, power analysis, XTR |
24 | Ang Yang, Hussein A. Abbass, Ruhul A. Sarker |
Landscape Dynamics in Multi-agent Simulation Combat Systems. |
Australian Conference on Artificial Intelligence |
2004 |
DBLP DOI BibTeX RDF |
|
24 | JaeCheol Ha, Sang-Jae Moon |
Randomized Signed-Scalar Multiplication of ECC to Resist Power Attacks. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
Side-channel attack, DPA, Elliptic curve cryptosystems, SPA, Power analysis attack, Non-adjacent form |
24 | Stephen P. Wilson, John A. McDermid, Clive H. Pygott, David J. Tombs |
Assessing Complex Computer Based Systems using the Goal Structuring Notation. |
ICECCS |
1996 |
DBLP DOI BibTeX RDF |
Goal Structuring Notation, Reliability, Dependability, Assessment, Safety, Argument |
22 | Robert J. Stone, Antoinette Caird-Daley, Kevin Bessell |
SubSafe : a games-based training system for submarine safety and spatial awareness (Part 1). |
Virtual Real. |
2009 |
DBLP DOI BibTeX RDF |
Games-based training, Submarine safety, Defence simulation, Virtual environments, Serious games |
22 | Igor V. Kotenko, Alexander Ulanov |
Packet Level Simulation of Cooperative Distributed Defense against Internet Attacks. |
PDP |
2008 |
DBLP DOI BibTeX RDF |
Cooperative distributed defence, Simulation, DDoS, Network attacks |
22 | Fausto Pugnaloni, Giovanni Issini, Nam Dang Minh |
3D City Model of the Ancient Hue, Vietnam; Reconstruction of the City Environment for the Cultural Heritage Identity Conservation. |
VSMM |
2007 |
DBLP DOI BibTeX RDF |
Cultural heritage defence, Virtual environment |
22 | Petr Benda, Pavel Jisl, Michal Pechoucek, Niranjan Suri, Marco M. Carvalho |
A distributed stand-in agent based algorithm for opportunistic resource allocation. |
SAC |
2006 |
DBLP DOI BibTeX RDF |
defence applications, inaccessibility, multi-agent systems, ad-hoc networks, agents, coordination |
22 | Frank W. Moore, Oscar N. Garcia |
A New Methodology for Optimizing Evasive Maneuvers Under Uncertainty in the Extended Two-Dimensional Pursuer/Evader Problem. |
ICTAI |
1997 |
DBLP DOI BibTeX RDF |
evasive maneuver optimization, two-dimensional pursuer-evader problem, maneuver sequences, genetic programming system, competitive zero sum game, air defence, uncertainty, differential games, differential games |
16 | Baidyanath Biswas, Arunabha Mukhopadhyay, Ajay Kumar, Dursun Delen |
A hybrid framework using explainable AI (XAI) in cyber-risk management for defence and recovery against phishing attacks. |
Decis. Support Syst. |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Richa Goenka, Meenu Chawla, Namita Tiwari |
A comprehensive survey of phishing: mediums, intended targets, attack and defence techniques and a novel taxonomy. |
Int. J. Inf. Sec. |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Believe Ayodele, Victor Buttigieg |
SDN as a defence mechanism: a comprehensive survey. |
Int. J. Inf. Sec. |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Adnan Ahmad, Rawan Amjad, Amna Basharat, Asma Ahmad Farhan, Ali Ezad Abbas |
Fuzzy knowledge based intelligent decision support system for ground based air defence. |
J. Ambient Intell. Humaniz. Comput. |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Yabing Huang, Jun Zhao 0002 |
Active Interdiction Defence Scheme Against False Data-Injection Attacks: A Stackelberg Game Perspective. |
IEEE Trans. Cybern. |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Pervez Rizvi |
False statements in Egan et al.'s defence of their word adjacency network method. |
Digit. Scholarsh. Humanit. |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Feilu Hang, Linjiang Xie, Zhenhong Zhang, Wei Guo, Hanruo Li |
Research on the application of network security defence in database security services based on deep learning integrated with big data analytics. |
Int. J. Intell. Networks |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Wenfei Zhao, Kenan Teng, Jian Chen, Yan Wang |
Research on operational effectiveness of air and missile defence in maritime stronghold based on queuing theory. |
Int. J. Inf. Commun. Technol. |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Chamara Sandeepa, Bartlomiej Siniarski, Shen Wang 0006, Madhusanka Liyanage |
Rec-Def: A Recommendation-Based Defence Mechanism for Privacy Preservation in Federated Learning Systems. |
IEEE Trans. Consumer Electron. |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Canaan Yung, Hadi Mohaghegh Dolatabadi, Sarah M. Erfani, Christopher Leckie |
Round Trip Translation Defence against Large Language Model Jailbreaking Attacks. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Tarek Chaalan, Shaoning Pang, Joarder Kamruzzaman, Iqbal Gondal, Xuyun Zhang |
The Path to Defence: A Roadmap to Characterising Data Poisoning Attacks on Victim Models. |
ACM Comput. Surv. |
2024 |
DBLP DOI BibTeX RDF |
|
16 | João Almeida, Daniel Santos 0003, José Rui Figueira, Alexandre P. Francisco |
A multi-objective mixed integer linear programming model for thesis defence scheduling. |
Eur. J. Oper. Res. |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Laura Rafferty, Áine MacDermott |
Adaptive Defence of the Internet of Things (IoT) using the Belief-Desire-Intention (BDI) Model for Social Robots. |
HICSS |
2024 |
DBLP BibTeX RDF |
|
16 | Rosanna Fanni, Fernando Giancotti |
Ethical Artificial Intelligence in the Italian Defence: a Case Study. |
Digit. Soc. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | R. S. Raghav, Debnath Bhattacharyya, Dinesh Kumar Anguraj, Tai-Hoon Kim |
Correction to: A soldier bee defence mechanism for detecting impersonate sensor node in wireless sensor networks. |
Pers. Ubiquitous Comput. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | R. S. Raghav, Debnath Bhattacharyya, Dinesh Kumar Anguraj, Tai-Hoon Kim |
A soldier bee defence mechanism for detecting impersonate sensor node in wireless sensor networks. |
Pers. Ubiquitous Comput. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Safdar Hussain Javed, Maaz Bin Ahmad, Muhammad Asif 0010, Waseem Akram, Khalid Mahmood 0002, Ashok Kumar Das, Sachin Shetty |
APT Adversarial Defence Mechanism for Industrial IoT Enabled Cyber-Physical System. |
IEEE Access |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Iram Arshad, Saeed Hamood Alsamhi, Yuansong Qiao, Brian Lee 0001, Yuhang Ye |
A Novel Framework for Smart Cyber Defence: A Deep-Dive Into Deep Learning Attacks and Defences. |
IEEE Access |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Roberto Cerchione, Piera Centobelli, Antimo Angelino |
Blockchain-Based IoT Model and Experimental Platform Design in the Defence Supply Chain. |
IEEE Internet Things J. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Aaisha Makkar, Uttam Ghosh, Pradip Kumar Sharma, Amir Javed |
A Fuzzy-Based Approach to Enhance Cyber Defence Security for Next-Generation IoT. |
IEEE Internet Things J. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Izhar Ahmed Khan, Nour Moustafa, Dechang Pi, Yasir Hussain, Nauman Ali Khan |
DFF-SC4N: A Deep Federated Defence Framework for Protecting Supply Chain 4.0 Networks. |
IEEE Trans. Ind. Informatics |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Sundaresan Ramachandran, Jeet Rami, Abhinav Shah, Kyounggon Kim, Digvijaysinh Rathod |
Defence against crypto-ransomware families using dynamic binary instrumentation and DLL injection. |
Int. J. Electron. Secur. Digit. Forensics |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Melda Gelibolu Bayrakci, Ömer Faruk Baykoç |
An integrated modelling approach for an optimal location of warehouses in the defence industry organisation. |
Oper. Res. Decis. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Daniel Kelly, Frank G. Glavin, Enda Barrett |
DoWTS - Denial-of-Wallet Test Simulator: Synthetic data generation for preemptive defence. |
J. Intell. Inf. Syst. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | |
Retracted: Research on tridimensional monitoring and defence technology of substation. |
IET Circuits Devices Syst. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Kamal Mammadov, Cheng-Chew Lim, Peng Shi 0001 |
The holographic principle for the differential game of active target defence. |
Int. J. Control |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Wangkun Xu, Martin Higgins, Jianhong Wang, Imad M. Jaimoukha, Fei Teng 0005 |
Blending Data and Physics Against False Data Injection Attack: An Event-Triggered Moving Target Defence Approach. |
IEEE Trans. Smart Grid |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Xin Liu 0022, Liang Zheng, Sumi Helal, Weishan Zhang, Chunfu Jia, Jiehan Zhou |
A broad learning-based comprehensive defence against SSDP reflection attacks in IoTs. |
Digit. Commun. Networks |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Jeremy W. Bryans, Lin Shen Liew, Hoang Nga Nguyen, Giedre Sabaliauskaite, Siraj Ahmed Shaikh |
Formal Template-Based Generation of Attack-Defence Trees for Automated Security Analysis. |
Inf. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Jiefei Wei, Luyan Yao, Qinggang Meng |
Self-adaptive logit balancing for deep neural network robustness: Defence and detection of adversarial attacks. |
Neurocomputing |
2023 |
DBLP DOI BibTeX RDF |
|
16 | K. G. Maheswari, C. Siva, G. NaliniPriya |
An Optimal Cluster Based Intrusion Detection System for Defence Against Attack in Web and Cloud Computing Environments. |
Wirel. Pers. Commun. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Aoyu Wu, Dazhen Deng, Furui Cheng, Yingcai Wu, Shixia Liu, Huamin Qu |
In Defence of Visual Analytics Systems: Replies to Critics. |
IEEE Trans. Vis. Comput. Graph. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Sanyam Vyas, John Hannay, Andrew Bolton, Pete Burnap |
Automated Cyber Defence: A Review. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Nirmalendu Prakash, Ming Shan Hee, Roy Ka-Wei Lee |
TotalDefMeme: A Multi-Attribute Meme dataset on Total Defence in Singapore. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Justin McKeown |
A data-driven analysis of UK cyber defence. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Khushnaseeb Roshan, Aasim Zafar, Sheikh Burhan Ul Haque |
Untargeted White-box Adversarial Attack with Heuristic Defence Methods in Real-time Deep Learning based Network Intrusion Detection System. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Mitchell Kiely, David Bowman, Maxwell Standen, Christopher Moir |
On Autonomous Agents in a Cyber Defence Environment. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Minghang Deng, Zhong Zhang 0004, Junming Shao |
Seeing Is Not Always Believing: Invisible Collision Attack and Defence on Pre-Trained Models. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Gaolei Li, Yuanyuan Zhao, Wenqi Wei, Yuchen Liu |
Few-shot Multi-domain Knowledge Rearming for Context-aware Defence against Advanced Persistent Threats. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Myles Foley, Mia Wang, Zoe M, Chris Hicks, Vasilios Mavroudis |
Inroads into Autonomous Network Defence using Explained Reinforcement Learning. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Ricardo Ribeiro Pereira, Jacopo Bono, João Tiago Ascensão, David Aparício, Pedro Ribeiro 0004, Pedro Bizarro |
The GANfather: Controllable generation of malicious activity to improve defence systems. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Jacob Wiebe, Ranwa Al Mallah, Li Li |
Learning Cyber Defence Tactics from Scratch with Multi-Agent Reinforcement Learning. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Hassan Jalil Hadi, Yue Cao 0002, Khaleeq un Nisa, Abdul Majid Jamil, Qiang Ni |
A comprehensive survey on security, privacy issues and emerging defence technologies for UAVs. |
J. Netw. Comput. Appl. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Haftu Tasew Reda, Adnan Anwar, Abdun Naser Mahmood, Zahir Tari |
A Taxonomy of Cyber Defence Strategies Against False Data Attacks in Smart Grids. |
ACM Comput. Surv. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | S. Rameshkumar, R. Ganesan, A. Merline |
Progressive Transfer Learning-based Deep Q Network for DDOS Defence in WSN. |
Comput. Syst. Sci. Eng. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Paul D. Yoo, Zahir Tari |
Editorial Sustainable Defence and Security Systems. |
IEEE Trans. Sustain. Comput. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Shailendra Mishra |
Cyber defence using attack graphs prediction and visualisation. |
Int. J. Commun. Networks Distributed Syst. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Kirsty Paine, Ollie Whitehouse, James Sellwood, Andrew Shaw |
Indicators of Compromise (IoCs) and Their Role in Attack Defence. |
RFC |
2023 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 979 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|