The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for defence with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1963-1995 (18) 1996-1998 (18) 1999-2000 (20) 2001-2002 (31) 2003 (19) 2004 (23) 2005 (36) 2006 (28) 2007 (44) 2008 (44) 2009 (24) 2010 (25) 2011 (27) 2012 (61) 2013 (31) 2014 (43) 2015 (27) 2016 (51) 2017 (32) 2018 (76) 2019 (57) 2020 (56) 2021 (51) 2022 (59) 2023 (65) 2024 (13)
Publication types (Num. hits)
article(374) book(1) incollection(12) inproceedings(571) phdthesis(17) proceedings(4)
Venues (Conferences, Journals, ...)
CoRR(64) SEDA(49) CISDA(37) Synth.(20) J. Oper. Res. Soc.(16) DAMAS(12) CyCon(10) SoSE(10) IEEE Access(7) SAFECOMP(7) ARES(6) HICSS(6) MESAS(6) Sensors(6) WSC(6) AAMAS(5) More (+10 of total 545)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 233 occurrences of 198 keywords

Results
Found 979 publication records. Showing 979 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
74Elena Sitnikova, Trent Kroeger, Stephen C. Cook Software and systems engineering process capability in the South Australian defence industry. Search on Bibsonomy Innov. Syst. Softw. Eng. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Software and systems engineering, Australian defence, Quality standards and models, Process improvement, Process capability
74Millie Pant, Kusum Deep Building a Better Air Defence System Using Genetic Algorithms. Search on Bibsonomy KES (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Air defence models, Genetic Algorithms, Optimization, Elitism, Recombination Operator
72V. A. French Applying software engineering and process improvement to legacy defence system maintenance: an experience report. Search on Bibsonomy ICSM The full citation details ... 1995 DBLP  DOI  BibTeX  RDF legacy defence system maintenance, real-time legacy defence system, project management data, software engineering, software maintenance, project management, project management, software metrics, software metrics, process improvement, inspection, software inspections, software management, statistical process control, statistical process controls, military computing
64John K. Davies "Open and challenging research issues in dependable distributed computing" A personal view from the Defence Industry. Search on Bibsonomy SRDS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
62Cyril Onwubiko, Andrew P. Lenaghan An Evolutionary Approach in Threats Detection for Distributed Security Defence Systems. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security defence framework, genetic algorithms, security threats
62Michal Pechoucek, Martin Rehák, Vladimír Marík Expectations and deployment of agent technology in manufacturing and defence: case studies. Search on Bibsonomy AAMAS Industrial Applications The full citation details ... 2005 DBLP  DOI  BibTeX  RDF defence applications, multi-agent systems, agents, manufacturing, production planning
60T. William Olle Ferranti Mercury at the Norwegian Defence Research Establishment. Search on Bibsonomy History of Nordic Computing The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Ferranti Mercury, Norwegian Defence Research Establishment, machine language programming, Jan Garwick, SHAPE Air Defence Technical Centre
58Steven R. Johnston The Impact of Privacy and Data Protection Legislation on the Sharing of Intrusion Detection Information. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2001 DBLP  DOI  BibTeX  RDF trans-border data flow, intrusion detection. (c) Her Majesty the Queen as represented by the Minister of National Defence, acting on behalf of the Communications Security Establishment, 2001, Privacy, data protection, personal information, personal data, Canada
52X. Zhang, Gabriel Dragffy, Anthony G. Pipe, Quan Min Zhu Artificial Innate Immune System: An Instant Defence Layer of Embryonics. Search on Bibsonomy ICARIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
50Peeter Lorents, Rain Ottis, Raul Rikk Cyber Society and Cooperative Cyber Defence. Search on Bibsonomy HCI (14) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cyber society, cooperative cyber defence, CCD COE, Knowledge, information, cyber attacks
50Guy Edward Gallasch, Nimrod Lilith, Jonathan Billington, Lin Zhang, Axel Bender, Benjamin Francis Modelling defence logistics networks. Search on Bibsonomy Int. J. Softw. Tools Technol. Transf. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Defence logistics, Modelling experience, CPN support tools, Coloured Petri nets
48Stefano Bistarelli, Pamela Peretti, Irina Trubitsyna Answer Set Optimization for and/or Composition of CP-Nets: A Security Scenario. Search on Bibsonomy CP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
40Bernardt Duvenhage, J. P. Delport, Anita Louis A 3D visual analysis tool in support of the SANDF's growing ground based air defence simulation capability. Search on Bibsonomy Afrigraph The full citation details ... 2007 DBLP  DOI  BibTeX  RDF battle field visualisation, command and control visualisation, analysis
40Lakhmi C. Jain Knowledge-Based Intelligent Engineering Systems in Defence and Security. Search on Bibsonomy KSEM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
40Jian Li, Guoyin Zhang, Guo-Chang Gu Research and experiments of network attack defence system. Search on Bibsonomy SMC (4) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
40Won Shik Na, Jeom Goo Kim, Intae Ryoo Perimeter Defence Policy Model of Cascade MPLS VPN Networks. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
40Daryl W. Bradley, Andrew M. Tyrrell Multi-layered Defence Mechanisms: Architecture, Implementation and Demonstration of a Hardware Immune System. Search on Bibsonomy ICES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
38Xuedou Yu Research on Active Defence Technology with Virus Based on K-Nearest Neighbor Algorithm of Kernel. Search on Bibsonomy ESIAT (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Active Defence, K-Nearest Neighbor Algorithm, Virus, Kernel Function
36Anjali Sardana, Ramesh Chandra Joshi Autonomous dynamic honeypot routing mechanism for mitigating DDoS attacks in DMZ. Search on Bibsonomy ICON The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
36Shishir Nagaraja, Ross J. Anderson Dynamic Topologies for Robust Scale-Free Networks. Search on Bibsonomy BIOWIRE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF covert groups, security, robustness, topology, Scale-free networks
36Yvonne Hitchcock, Paul Montague A New Elliptic Curve Scalar Multiplication Algorithm to Resist Simple Power Analysis. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
36Robert A. Ghanea-Hercock Assimilation and survival in cyberspace. Search on Bibsonomy AAMAS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF security, multi-agent systems, social-dynamics
34Maj Adrian Erkelens, Stan Isbrandt, Fariya Syed Development of a prototype model for civilian occupational group projections. Search on Bibsonomy SCSC The full citation details ... 2007 DBLP  BibTeX  RDF civilian, defence, workforce management, projection, personnel, human resource, occupation
34Michael Papasimeon, Adrian R. Pearce, Simon Goss The human agent virtual environment. Search on Bibsonomy AAMAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF agents and cognitive models, defence, multi-agent simulation and modeling
34Mukhtar S. A. Al-Hashimi AL-Care medical information system: developing local experience. Search on Bibsonomy ISCNZ The full citation details ... 1996 DBLP  DOI  BibTeX  RDF AL-Care medical information system, health care quality, health care cost, market pressure, Bahrain Defence Force Hospital, assessment methodology, development strategy, return value, assessment study, patient information, training, user evaluation, medical information systems, developed countries, developing countries, implementation strategy, culture factors
34Frederick I. Moxley On the specification of complex software systems. Search on Bibsonomy ICECCS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF complex software systems specification, Defense Information Infrastructure, Common Operating Environment, distributed heterogeneous information systems, starwars missile defence system, formal specification, requirements specification, design specification
31Linjiang Xie, Feilu Hang, Wei Guo, Yao Lv, Wei Ou, C. Chandru Vignesh Machine learning-based security active defence model - security active defence technology in the communication network. Search on Bibsonomy Int. J. Internet Protoc. Technol. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
31Dov M. Gabbay, Ross Horne, Sjouke Mauw, Leendert van der Torre Attack-Defence Frameworks: Argumentation-Based Semantics for Attack-Defence Trees. Search on Bibsonomy GraMSec@CSF The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
31Jonathan Pan Using Malware Self-Defence Mechanism to Harden Defence and Remediation Tools. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
31Martin Blom, Fulvio Castellacci, Arne Fevolden Defence firms facing liberalization: innovation and export in an agent-based model of the defence industry. Search on Bibsonomy Comput. Math. Organ. Theory The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Xuedou Yu Research on Active Defence Technology with Host Intrusion Based on K-Nearest Neighbor Algorithm of Kernel. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Guy Edward Gallasch, Benjamin Francis, Christopher Moon, Jonathan Billington Modelling personnel within a defence logistics maintenance process. Search on Bibsonomy SimuTools The full citation details ... 2008 DBLP  DOI  BibTeX  RDF models of personnel, maintenance, coloured petri nets, simulation performance
28Philip N. Day, Gus Ferguson, Patrik O'Brian Holt, Steven Hogg, David Gibson Wearable augmented virtual reality for enhancing information delivery in high precision defence assembly: an engineering case study. Search on Bibsonomy Virtual Real. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Panos Louvieris, Andreas Gregoriades, Natasha Mashanovich, Gareth White, Robert O'Keefe, Jerry Levine, Stewart Henderson Agent-Based Parsimonious Decision Support Paradigm Employing Bayesian Belief Networks. Search on Bibsonomy DAMAS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Arthur Filippidis, Russell Connell Integrating intelligent agents with intelligent techniques in proposed future land defence applications. Search on Bibsonomy KES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
28Ian Frank, David A. Basin Optimal Play against Best Defence: Complexity and Heuristics. Search on Bibsonomy Computers and Games The full citation details ... 1998 DBLP  DOI  BibTeX  RDF complexity, heuristics, Bridge, imperfect information
28R. H. Pierce, I. Marshall, S. J. Goodenough Object-Oriented Design of an Air-Defence Simulator. Search on Bibsonomy Ada-Europe The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
24Yaping Jiang, Yong Gan, Jianhua Zhou, Zengyu Cai A Model of Intrusion Prevention Base on Immune. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Ashley Chonka, Wanlei Zhou 0001, Yang Xiang 0001 Defending Grid Web Services from XDoS Attacks by SOTA. Search on Bibsonomy PerCom Workshops The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Nik Looker, David Webster, Duncan Russell, Jie Xu 0007 Scenario Based Evaluation. Search on Bibsonomy ISORC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Evaluation, SOA, Scenario
24Peter Beaumont, Brahim Chaib-draa Multiagent Coordination Techniques for Complex Environments: The Case of a Fleet of Combat Ships. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Part C The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Jenny Ulriksson, Farshad Moradi, Mattias Liljeström, Nicholas Montgomerie-Neilson Building a CSCW Infrastructure Utilizing an M&S Architecture and XML. Search on Bibsonomy CDVE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Guido Boella, Joris Hulstijn, Leendert W. N. van der Torre Argumentation for Access Control. Search on Bibsonomy AI*IA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Dan Page, Martijn Stam On XTR and Side-Channel Analysis. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF LUC, finite field, side channel attack, power analysis, XTR
24Ang Yang, Hussein A. Abbass, Ruhul A. Sarker Landscape Dynamics in Multi-agent Simulation Combat Systems. Search on Bibsonomy Australian Conference on Artificial Intelligence The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24JaeCheol Ha, Sang-Jae Moon Randomized Signed-Scalar Multiplication of ECC to Resist Power Attacks. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Side-channel attack, DPA, Elliptic curve cryptosystems, SPA, Power analysis attack, Non-adjacent form
24Stephen P. Wilson, John A. McDermid, Clive H. Pygott, David J. Tombs Assessing Complex Computer Based Systems using the Goal Structuring Notation. Search on Bibsonomy ICECCS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Goal Structuring Notation, Reliability, Dependability, Assessment, Safety, Argument
22Robert J. Stone, Antoinette Caird-Daley, Kevin Bessell SubSafe : a games-based training system for submarine safety and spatial awareness (Part 1). Search on Bibsonomy Virtual Real. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Games-based training, Submarine safety, Defence simulation, Virtual environments, Serious games
22Igor V. Kotenko, Alexander Ulanov Packet Level Simulation of Cooperative Distributed Defense against Internet Attacks. Search on Bibsonomy PDP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cooperative distributed defence, Simulation, DDoS, Network attacks
22Fausto Pugnaloni, Giovanni Issini, Nam Dang Minh 3D City Model of the Ancient Hue, Vietnam; Reconstruction of the City Environment for the Cultural Heritage Identity Conservation. Search on Bibsonomy VSMM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Cultural heritage defence, Virtual environment
22Petr Benda, Pavel Jisl, Michal Pechoucek, Niranjan Suri, Marco M. Carvalho A distributed stand-in agent based algorithm for opportunistic resource allocation. Search on Bibsonomy SAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF defence applications, inaccessibility, multi-agent systems, ad-hoc networks, agents, coordination
22Frank W. Moore, Oscar N. Garcia A New Methodology for Optimizing Evasive Maneuvers Under Uncertainty in the Extended Two-Dimensional Pursuer/Evader Problem. Search on Bibsonomy ICTAI The full citation details ... 1997 DBLP  DOI  BibTeX  RDF evasive maneuver optimization, two-dimensional pursuer-evader problem, maneuver sequences, genetic programming system, competitive zero sum game, air defence, uncertainty, differential games, differential games
16Baidyanath Biswas, Arunabha Mukhopadhyay, Ajay Kumar, Dursun Delen A hybrid framework using explainable AI (XAI) in cyber-risk management for defence and recovery against phishing attacks. Search on Bibsonomy Decis. Support Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Richa Goenka, Meenu Chawla, Namita Tiwari A comprehensive survey of phishing: mediums, intended targets, attack and defence techniques and a novel taxonomy. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Believe Ayodele, Victor Buttigieg SDN as a defence mechanism: a comprehensive survey. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Adnan Ahmad, Rawan Amjad, Amna Basharat, Asma Ahmad Farhan, Ali Ezad Abbas Fuzzy knowledge based intelligent decision support system for ground based air defence. Search on Bibsonomy J. Ambient Intell. Humaniz. Comput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Yabing Huang, Jun Zhao 0002 Active Interdiction Defence Scheme Against False Data-Injection Attacks: A Stackelberg Game Perspective. Search on Bibsonomy IEEE Trans. Cybern. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Pervez Rizvi False statements in Egan et al.'s defence of their word adjacency network method. Search on Bibsonomy Digit. Scholarsh. Humanit. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Feilu Hang, Linjiang Xie, Zhenhong Zhang, Wei Guo, Hanruo Li Research on the application of network security defence in database security services based on deep learning integrated with big data analytics. Search on Bibsonomy Int. J. Intell. Networks The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Wenfei Zhao, Kenan Teng, Jian Chen, Yan Wang Research on operational effectiveness of air and missile defence in maritime stronghold based on queuing theory. Search on Bibsonomy Int. J. Inf. Commun. Technol. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Chamara Sandeepa, Bartlomiej Siniarski, Shen Wang 0006, Madhusanka Liyanage Rec-Def: A Recommendation-Based Defence Mechanism for Privacy Preservation in Federated Learning Systems. Search on Bibsonomy IEEE Trans. Consumer Electron. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Canaan Yung, Hadi Mohaghegh Dolatabadi, Sarah M. Erfani, Christopher Leckie Round Trip Translation Defence against Large Language Model Jailbreaking Attacks. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Tarek Chaalan, Shaoning Pang, Joarder Kamruzzaman, Iqbal Gondal, Xuyun Zhang The Path to Defence: A Roadmap to Characterising Data Poisoning Attacks on Victim Models. Search on Bibsonomy ACM Comput. Surv. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16João Almeida, Daniel Santos 0003, José Rui Figueira, Alexandre P. Francisco A multi-objective mixed integer linear programming model for thesis defence scheduling. Search on Bibsonomy Eur. J. Oper. Res. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Laura Rafferty, Áine MacDermott Adaptive Defence of the Internet of Things (IoT) using the Belief-Desire-Intention (BDI) Model for Social Robots. Search on Bibsonomy HICSS The full citation details ... 2024 DBLP  BibTeX  RDF
16Rosanna Fanni, Fernando Giancotti Ethical Artificial Intelligence in the Italian Defence: a Case Study. Search on Bibsonomy Digit. Soc. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16R. S. Raghav, Debnath Bhattacharyya, Dinesh Kumar Anguraj, Tai-Hoon Kim Correction to: A soldier bee defence mechanism for detecting impersonate sensor node in wireless sensor networks. Search on Bibsonomy Pers. Ubiquitous Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16R. S. Raghav, Debnath Bhattacharyya, Dinesh Kumar Anguraj, Tai-Hoon Kim A soldier bee defence mechanism for detecting impersonate sensor node in wireless sensor networks. Search on Bibsonomy Pers. Ubiquitous Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Safdar Hussain Javed, Maaz Bin Ahmad, Muhammad Asif 0010, Waseem Akram, Khalid Mahmood 0002, Ashok Kumar Das, Sachin Shetty APT Adversarial Defence Mechanism for Industrial IoT Enabled Cyber-Physical System. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Iram Arshad, Saeed Hamood Alsamhi, Yuansong Qiao, Brian Lee 0001, Yuhang Ye A Novel Framework for Smart Cyber Defence: A Deep-Dive Into Deep Learning Attacks and Defences. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Roberto Cerchione, Piera Centobelli, Antimo Angelino Blockchain-Based IoT Model and Experimental Platform Design in the Defence Supply Chain. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Aaisha Makkar, Uttam Ghosh, Pradip Kumar Sharma, Amir Javed A Fuzzy-Based Approach to Enhance Cyber Defence Security for Next-Generation IoT. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Izhar Ahmed Khan, Nour Moustafa, Dechang Pi, Yasir Hussain, Nauman Ali Khan DFF-SC4N: A Deep Federated Defence Framework for Protecting Supply Chain 4.0 Networks. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Sundaresan Ramachandran, Jeet Rami, Abhinav Shah, Kyounggon Kim, Digvijaysinh Rathod Defence against crypto-ransomware families using dynamic binary instrumentation and DLL injection. Search on Bibsonomy Int. J. Electron. Secur. Digit. Forensics The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Melda Gelibolu Bayrakci, Ömer Faruk Baykoç An integrated modelling approach for an optimal location of warehouses in the defence industry organisation. Search on Bibsonomy Oper. Res. Decis. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Daniel Kelly, Frank G. Glavin, Enda Barrett DoWTS - Denial-of-Wallet Test Simulator: Synthetic data generation for preemptive defence. Search on Bibsonomy J. Intell. Inf. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16 Retracted: Research on tridimensional monitoring and defence technology of substation. Search on Bibsonomy IET Circuits Devices Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Kamal Mammadov, Cheng-Chew Lim, Peng Shi 0001 The holographic principle for the differential game of active target defence. Search on Bibsonomy Int. J. Control The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Wangkun Xu, Martin Higgins, Jianhong Wang, Imad M. Jaimoukha, Fei Teng 0005 Blending Data and Physics Against False Data Injection Attack: An Event-Triggered Moving Target Defence Approach. Search on Bibsonomy IEEE Trans. Smart Grid The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Xin Liu 0022, Liang Zheng, Sumi Helal, Weishan Zhang, Chunfu Jia, Jiehan Zhou A broad learning-based comprehensive defence against SSDP reflection attacks in IoTs. Search on Bibsonomy Digit. Commun. Networks The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Jeremy W. Bryans, Lin Shen Liew, Hoang Nga Nguyen, Giedre Sabaliauskaite, Siraj Ahmed Shaikh Formal Template-Based Generation of Attack-Defence Trees for Automated Security Analysis. Search on Bibsonomy Inf. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Jiefei Wei, Luyan Yao, Qinggang Meng Self-adaptive logit balancing for deep neural network robustness: Defence and detection of adversarial attacks. Search on Bibsonomy Neurocomputing The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16K. G. Maheswari, C. Siva, G. NaliniPriya An Optimal Cluster Based Intrusion Detection System for Defence Against Attack in Web and Cloud Computing Environments. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Aoyu Wu, Dazhen Deng, Furui Cheng, Yingcai Wu, Shixia Liu, Huamin Qu In Defence of Visual Analytics Systems: Replies to Critics. Search on Bibsonomy IEEE Trans. Vis. Comput. Graph. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Sanyam Vyas, John Hannay, Andrew Bolton, Pete Burnap Automated Cyber Defence: A Review. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Nirmalendu Prakash, Ming Shan Hee, Roy Ka-Wei Lee TotalDefMeme: A Multi-Attribute Meme dataset on Total Defence in Singapore. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Justin McKeown A data-driven analysis of UK cyber defence. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Khushnaseeb Roshan, Aasim Zafar, Sheikh Burhan Ul Haque Untargeted White-box Adversarial Attack with Heuristic Defence Methods in Real-time Deep Learning based Network Intrusion Detection System. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Mitchell Kiely, David Bowman, Maxwell Standen, Christopher Moir On Autonomous Agents in a Cyber Defence Environment. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Minghang Deng, Zhong Zhang 0004, Junming Shao Seeing Is Not Always Believing: Invisible Collision Attack and Defence on Pre-Trained Models. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Gaolei Li, Yuanyuan Zhao, Wenqi Wei, Yuchen Liu Few-shot Multi-domain Knowledge Rearming for Context-aware Defence against Advanced Persistent Threats. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Myles Foley, Mia Wang, Zoe M, Chris Hicks, Vasilios Mavroudis Inroads into Autonomous Network Defence using Explained Reinforcement Learning. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Ricardo Ribeiro Pereira, Jacopo Bono, João Tiago Ascensão, David Aparício, Pedro Ribeiro 0004, Pedro Bizarro The GANfather: Controllable generation of malicious activity to improve defence systems. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Jacob Wiebe, Ranwa Al Mallah, Li Li Learning Cyber Defence Tactics from Scratch with Multi-Agent Reinforcement Learning. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Hassan Jalil Hadi, Yue Cao 0002, Khaleeq un Nisa, Abdul Majid Jamil, Qiang Ni A comprehensive survey on security, privacy issues and emerging defence technologies for UAVs. Search on Bibsonomy J. Netw. Comput. Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Haftu Tasew Reda, Adnan Anwar, Abdun Naser Mahmood, Zahir Tari A Taxonomy of Cyber Defence Strategies Against False Data Attacks in Smart Grids. Search on Bibsonomy ACM Comput. Surv. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16S. Rameshkumar, R. Ganesan, A. Merline Progressive Transfer Learning-based Deep Q Network for DDOS Defence in WSN. Search on Bibsonomy Comput. Syst. Sci. Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Paul D. Yoo, Zahir Tari Editorial Sustainable Defence and Security Systems. Search on Bibsonomy IEEE Trans. Sustain. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Shailendra Mishra Cyber defence using attack graphs prediction and visualisation. Search on Bibsonomy Int. J. Commun. Networks Distributed Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Kirsty Paine, Ollie Whitehouse, James Sellwood, Andrew Shaw Indicators of Compromise (IoCs) and Their Role in Attack Defence. Search on Bibsonomy RFC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 979 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license