|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 233 occurrences of 198 keywords
|
|
|
Results
Found 979 publication records. Showing 979 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
74 | Elena Sitnikova, Trent Kroeger, Stephen C. Cook |
Software and systems engineering process capability in the South Australian defence industry. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Innov. Syst. Softw. Eng. ![In: Innov. Syst. Softw. Eng. 3(2), pp. 129-139, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Software and systems engineering, Australian defence, Quality standards and models, Process improvement, Process capability |
74 | Millie Pant, Kusum Deep |
Building a Better Air Defence System Using Genetic Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (1) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 10th International Conference, KES 2006, Bournemouth, UK, October 9-11, 2006, Proceedings, Part I, pp. 951-959, 2006, Springer, 3-540-46535-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Air defence models, Genetic Algorithms, Optimization, Elitism, Recombination Operator |
72 | V. A. French |
Applying software engineering and process improvement to legacy defence system maintenance: an experience report. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSM ![In: Proceedings of the International Conference on Software Maintenance, ICSM 1995, Opio (Nice), France, October 17-20, 1995, pp. 337-, 1995, IEEE Computer Society, 0-8186-7141-6. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
legacy defence system maintenance, real-time legacy defence system, project management data, software engineering, software maintenance, project management, project management, software metrics, software metrics, process improvement, inspection, software inspections, software management, statistical process control, statistical process controls, military computing |
64 | John K. Davies |
"Open and challenging research issues in dependable distributed computing" A personal view from the Defence Industry. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SRDS ![In: 25th IEEE Symposium on Reliable Distributed Systems (SRDS 2006),2-4 October 2006, Leeds, UK, pp. 341-342, 2006, IEEE Computer Society, 0-7695-2677-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
62 | Cyril Onwubiko, Andrew P. Lenaghan |
An Evolutionary Approach in Threats Detection for Distributed Security Defence Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings, pp. 696-698, 2006, Springer, 3-540-34478-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security defence framework, genetic algorithms, security threats |
62 | Michal Pechoucek, Martin Rehák, Vladimír Marík |
Expectations and deployment of agent technology in manufacturing and defence: case studies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS Industrial Applications ![In: 4rd International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), July 25-29, 2005, Utrecht, The Netherlands - Special Track for Industrial Applications, pp. 100-106, 2005, ACM, 1-59593-093-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
defence applications, multi-agent systems, agents, manufacturing, production planning |
60 | T. William Olle |
Ferranti Mercury at the Norwegian Defence Research Establishment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
History of Nordic Computing ![In: History of Nordic Computing, IFIP WG9.7 First Working Conference on the History of Nordic Computing (HiNC1), June 16-18, 2003, Trondheim, Norway, pp. 311-316, 2003, Springer, 0-387-24167-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Ferranti Mercury, Norwegian Defence Research Establishment, machine language programming, Jan Garwick, SHAPE Air Defence Technical Centre |
58 | Steven R. Johnston |
The Impact of Privacy and Data Protection Legislation on the Sharing of Intrusion Detection Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Recent Advances in Intrusion Detection ![In: Recent Advances in Intrusion Detection, 4th International Symposium, RAID 2001 Davis, CA, USA, October 10-12, 2001, Proceedings, pp. 150-171, 2001, Springer, 3-540-42702-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
trans-border data flow, intrusion detection. (c) Her Majesty the Queen as represented by the Minister of National Defence, acting on behalf of the Communications Security Establishment, 2001, Privacy, data protection, personal information, personal data, Canada |
52 | X. Zhang, Gabriel Dragffy, Anthony G. Pipe, Quan Min Zhu |
Artificial Innate Immune System: An Instant Defence Layer of Embryonics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICARIS ![In: Artificial Immune Systems, Third International Conference, ICARIS 2004, Catania, Sicily, Italy, September 13-16, 2004, pp. 302-315, 2004, Springer, 3-540-23097-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
50 | Peeter Lorents, Rain Ottis, Raul Rikk |
Cyber Society and Cooperative Cyber Defence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (14) ![In: Internationalization, Design and Global Development, Third International Conference, IDGD 2009, Held as Part of HCI International 2009, San Diego, CA, USA, July 19-24, 2009. Proceedings, pp. 180-186, 2009, Springer, 978-3-642-02766-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
cyber society, cooperative cyber defence, CCD COE, Knowledge, information, cyber attacks |
50 | Guy Edward Gallasch, Nimrod Lilith, Jonathan Billington, Lin Zhang, Axel Bender, Benjamin Francis |
Modelling defence logistics networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Softw. Tools Technol. Transf. ![In: Int. J. Softw. Tools Technol. Transf. 10(1), pp. 75-93, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Defence logistics, Modelling experience, CPN support tools, Coloured Petri nets |
48 | Stefano Bistarelli, Pamela Peretti, Irina Trubitsyna |
Answer Set Optimization for and/or Composition of CP-Nets: A Security Scenario. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CP ![In: Principles and Practice of Constraint Programming - CP 2007, 13th International Conference, CP 2007, Providence, RI, USA, September 23-27, 2007, Proceedings, pp. 773-781, 2007, Springer, 978-3-540-74969-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
40 | Bernardt Duvenhage, J. P. Delport, Anita Louis |
A 3D visual analysis tool in support of the SANDF's growing ground based air defence simulation capability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Afrigraph ![In: Proceedings of the 5th International Conference on Computer Graphics, Virtual Reality, Visualisation and Interaction in Africa, Afrigraph 2007, Grahamstown, South Africa, October 29-31, 2007, pp. 39-46, 2007, ACM, 978-1-59593-906-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
battle field visualisation, command and control visualisation, analysis |
40 | Lakhmi C. Jain |
Knowledge-Based Intelligent Engineering Systems in Defence and Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KSEM ![In: Knowledge Science, Engineering and Management, Second International Conference, KSEM 2007, Melbourne, Australia, November 28-30, 2007, Proceedings, pp. 10, 2007, Springer, 978-3-540-76718-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
40 | Jian Li, Guoyin Zhang, Guo-Chang Gu |
Research and experiments of network attack defence system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC (4) ![In: Proceedings of the IEEE International Conference on Systems, Man & Cybernetics: The Hague, Netherlands, 10-13 October 2004, pp. 3548-3553, 2004, IEEE, 0-7803-8566-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
40 | Won Shik Na, Jeom Goo Kim, Intae Ryoo |
Perimeter Defence Policy Model of Cascade MPLS VPN Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part I, pp. 1026-1034, 2004, Springer, 3-540-22054-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
40 | Daryl W. Bradley, Andrew M. Tyrrell |
Multi-layered Defence Mechanisms: Architecture, Implementation and Demonstration of a Hardware Immune System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICES ![In: Evolvable Systems: From Biology to Hardware, 4th International Conference, ICES 2001 Tokyo, Japan, October 3-5, 2001, Proceedings, pp. 140-150, 2001, Springer, 3-540-42671-X. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
38 | Xuedou Yu |
Research on Active Defence Technology with Virus Based on K-Nearest Neighbor Algorithm of Kernel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESIAT (1) ![In: 2009 International Conference on Environmental Science and Information Application Technology, ESIAT 2009, Wuhan, China, 4-5 July 2009, 3 Volumes, pp. 685-688, 2009, IEEE Computer Society, 978-0-7695-3682-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Active Defence, K-Nearest Neighbor Algorithm, Virus, Kernel Function |
36 | Anjali Sardana, Ramesh Chandra Joshi |
Autonomous dynamic honeypot routing mechanism for mitigating DDoS attacks in DMZ. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICON ![In: Proceedings of the 16th International Conference on Networks, ICON 2008, December 12-14, 2008, held at India Habitat Centre, New Delhi, India, pp. 1-7, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Shishir Nagaraja, Ross J. Anderson |
Dynamic Topologies for Robust Scale-Free Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BIOWIRE ![In: Bio-Inspired Computing and Communication, First Workshop on Bio-Inspired Design of Networks, BIOWIRE 2007, Cambridge, UK, April 2-5, 2007, Revised Selected Papers, pp. 411-426, 2007, Springer, 978-3-540-92190-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
covert groups, security, robustness, topology, Scale-free networks |
36 | Yvonne Hitchcock, Paul Montague |
A New Elliptic Curve Scalar Multiplication Algorithm to Resist Simple Power Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 7th Australian Conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002, Proceedings, pp. 214-225, 2002, Springer, 3-540-43861-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
36 | Robert A. Ghanea-Hercock |
Assimilation and survival in cyberspace. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: The First International Joint Conference on Autonomous Agents & Multiagent Systems, AAMAS 2002, July 15-19, 2002, Bologna, Italy, Proceedings, pp. 213-214, 2002, ACM. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
security, multi-agent systems, social-dynamics |
34 | Maj Adrian Erkelens, Stan Isbrandt, Fariya Syed |
Development of a prototype model for civilian occupational group projections. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCSC ![In: Proceedings of the 2007 Summer Computer Simulation Conference, SCSC 2007, San Diego, California, USA, July 16-19, 2007, pp. 14, 2007, Simulation Councils, Inc., 1-56555-316-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
civilian, defence, workforce management, projection, personnel, human resource, occupation |
34 | Michael Papasimeon, Adrian R. Pearce, Simon Goss |
The human agent virtual environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: 6th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2007), Honolulu, Hawaii, USA, May 14-18, 2007, pp. 281, 2007, IFAAMAS, 978-81-904262-7-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
agents and cognitive models, defence, multi-agent simulation and modeling |
34 | Mukhtar S. A. Al-Hashimi |
AL-Care medical information system: developing local experience. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCNZ ![In: Proceedings of the 1996 Information Systems Conference of New Zealand, ISCNZ '96, October 30-31, 1996, pp. 21-26, 1996, IEEE Computer Society, 0-8186-7710-4. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
AL-Care medical information system, health care quality, health care cost, market pressure, Bahrain Defence Force Hospital, assessment methodology, development strategy, return value, assessment study, patient information, training, user evaluation, medical information systems, developed countries, developing countries, implementation strategy, culture factors |
34 | Frederick I. Moxley |
On the specification of complex software systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICECCS ![In: 2nd IEEE International Conference on Engineering of Complex Computer Systems (ICECCS '96), 21-25 October 1996, Montreal, Canada, pp. 134-138, 1996, IEEE Computer Society, 0-8186-7614-0. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
complex software systems specification, Defense Information Infrastructure, Common Operating Environment, distributed heterogeneous information systems, starwars missile defence system, formal specification, requirements specification, design specification |
31 | Linjiang Xie, Feilu Hang, Wei Guo, Yao Lv, Wei Ou, C. Chandru Vignesh |
Machine learning-based security active defence model - security active defence technology in the communication network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Internet Protoc. Technol. ![In: Int. J. Internet Protoc. Technol. 15(3/4), pp. 169-181, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
31 | Dov M. Gabbay, Ross Horne, Sjouke Mauw, Leendert van der Torre |
Attack-Defence Frameworks: Argumentation-Based Semantics for Attack-Defence Trees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GraMSec@CSF ![In: Graphical Models for Security - 7th International Workshop, GraMSec 2020, Boston, MA, USA, June 22, 2020 Revised Selected Papers, pp. 143-165, 2020, Springer, 978-3-030-62229-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Jonathan Pan |
Using Malware Self-Defence Mechanism to Harden Defence and Remediation Tools. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1801.01970, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
31 | Martin Blom, Fulvio Castellacci, Arne Fevolden |
Defence firms facing liberalization: innovation and export in an agent-based model of the defence industry. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Math. Organ. Theory ![In: Comput. Math. Organ. Theory 20(4), pp. 430-461, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Xuedou Yu |
Research on Active Defence Technology with Host Intrusion Based on K-Nearest Neighbor Algorithm of Kernel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 411-414, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Guy Edward Gallasch, Benjamin Francis, Christopher Moon, Jonathan Billington |
Modelling personnel within a defence logistics maintenance process. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SimuTools ![In: Proceedings of the 1st International Conference on Simulation Tools and Techniques for Communications, Networks and Systems & Workshops, SimuTools 2008, Marseille, France, March 3-7, 2008, pp. 18, 2008, ICST/ACM, 978-963-9799-20-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
models of personnel, maintenance, coloured petri nets, simulation performance |
28 | Philip N. Day, Gus Ferguson, Patrik O'Brian Holt, Steven Hogg, David Gibson |
Wearable augmented virtual reality for enhancing information delivery in high precision defence assembly: an engineering case study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Virtual Real. ![In: Virtual Real. 8(3), pp. 177-184, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Panos Louvieris, Andreas Gregoriades, Natasha Mashanovich, Gareth White, Robert O'Keefe, Jerry Levine, Stewart Henderson |
Agent-Based Parsimonious Decision Support Paradigm Employing Bayesian Belief Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAMAS ![In: Defence Applications of Multi-Agent Systems, International Workshop, DAMAS 2005, Utrecht, The Netherlands, July 25, 2005, Revised and Invited Papers, pp. 24-36, 2005, Springer, 3-540-32832-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Arthur Filippidis, Russell Connell |
Integrating intelligent agents with intelligent techniques in proposed future land defence applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES ![In: Fourth International Conference on Knowledge-Based Intelligent Information Engineering Systems & Allied Technologies, KES 2000, Brighton, UK, 30 August - 1 September 2000, Proceedings, 2 Volumes, pp. 321-324, 2000, IEEE, 0-7803-6400-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
28 | Ian Frank, David A. Basin |
Optimal Play against Best Defence: Complexity and Heuristics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computers and Games ![In: Computers and Games, First International Conference, CG'98, Tsukuba, Japan, November 11-12, 1998, Proceedings, pp. 50-73, 1998, Springer, 3-540-65766-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
complexity, heuristics, Bridge, imperfect information |
28 | R. H. Pierce, I. Marshall, S. J. Goodenough |
Object-Oriented Design of an Air-Defence Simulator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ada-Europe ![In: Ada-Europe '93, 12th Ada-Europe International Conference, Ada Sans Frontières, Paris, France, June 14-18, 1993, Proceedings, pp. 114-124, 1993, Springer, 3-540-56802-6. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
24 | Yaping Jiang, Yong Gan, Jianhua Zhou, Zengyu Cai |
A Model of Intrusion Prevention Base on Immune. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 441-444, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Ashley Chonka, Wanlei Zhou 0001, Yang Xiang 0001 |
Defending Grid Web Services from XDoS Attacks by SOTA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom Workshops ![In: Seventh Annual IEEE International Conference on Pervasive Computing and Communications - Workshops (PerCom Workshops 2009), 9-13 March 2009, Galveston, TX, USA, pp. 1-6, 2009, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Nik Looker, David Webster, Duncan Russell, Jie Xu 0007 |
Scenario Based Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISORC ![In: 11th IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2008), 5-7 May 2008, Orlando, Florida, USA, pp. 148-154, 2008, IEEE Computer Society, 978-0-7695-3132-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Evaluation, SOA, Scenario |
24 | Peter Beaumont, Brahim Chaib-draa |
Multiagent Coordination Techniques for Complex Environments: The Case of a Fleet of Combat Ships. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Syst. Man Cybern. Part C ![In: IEEE Trans. Syst. Man Cybern. Part C 37(3), pp. 373-385, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Jenny Ulriksson, Farshad Moradi, Mattias Liljeström, Nicholas Montgomerie-Neilson |
Building a CSCW Infrastructure Utilizing an M&S Architecture and XML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CDVE ![In: Cooperative Design, Visualization, and Engineering, Second International Conference, CDVE 2005, Palma de Mallorca, Spain, September 18-21, 2005, Proceedings, pp. 1-13, 2005, Springer, 3-540-28948-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Guido Boella, Joris Hulstijn, Leendert W. N. van der Torre |
Argumentation for Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AI*IA ![In: AI*IA 2005: Advances in Artificial Intelligence, 9th Congress of the Italian Association for Artificial Intelligence, Milan, Italy, September 21-23, 2005, Proceedings, pp. 86-97, 2005, Springer, 3-540-29041-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Dan Page, Martijn Stam |
On XTR and Side-Channel Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 11th International Workshop, SAC 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers, pp. 54-68, 2004, Springer, 3-540-24327-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
LUC, finite field, side channel attack, power analysis, XTR |
24 | Ang Yang, Hussein A. Abbass, Ruhul A. Sarker |
Landscape Dynamics in Multi-agent Simulation Combat Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Australian Conference on Artificial Intelligence ![In: AI 2004: Advances in Artificial Intelligence, 17th Australian Joint Conference on Artificial Intelligence, Cairns, Australia, December 4-6, 2004, Proceedings, pp. 39-50, 2004, Springer, 3-540-24059-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
24 | JaeCheol Ha, Sang-Jae Moon |
Randomized Signed-Scalar Multiplication of ECC to Resist Power Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers, pp. 551-563, 2002, Springer, 3-540-00409-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Side-channel attack, DPA, Elliptic curve cryptosystems, SPA, Power analysis attack, Non-adjacent form |
24 | Stephen P. Wilson, John A. McDermid, Clive H. Pygott, David J. Tombs |
Assessing Complex Computer Based Systems using the Goal Structuring Notation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICECCS ![In: 2nd IEEE International Conference on Engineering of Complex Computer Systems (ICECCS '96), 21-25 October 1996, Montreal, Canada, pp. 498-505, 1996, IEEE Computer Society, 0-8186-7614-0. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
Goal Structuring Notation, Reliability, Dependability, Assessment, Safety, Argument |
22 | Robert J. Stone, Antoinette Caird-Daley, Kevin Bessell |
SubSafe : a games-based training system for submarine safety and spatial awareness (Part 1). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Virtual Real. ![In: Virtual Real. 13(1), pp. 3-12, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Games-based training, Submarine safety, Defence simulation, Virtual environments, Serious games |
22 | Igor V. Kotenko, Alexander Ulanov |
Packet Level Simulation of Cooperative Distributed Defense against Internet Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDP ![In: 16th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP 2008), 13-15 February 2008, Toulouse, France, pp. 565-572, 2008, IEEE Computer Society, 978-0-7695-3089-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Cooperative distributed defence, Simulation, DDoS, Network attacks |
22 | Fausto Pugnaloni, Giovanni Issini, Nam Dang Minh |
3D City Model of the Ancient Hue, Vietnam; Reconstruction of the City Environment for the Cultural Heritage Identity Conservation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VSMM ![In: Virtual Systems and Multimedia, 13th International Conference, VSMM 2007, Brisbane, Australia, September 23-26, 2007, Revised Selected Papers, pp. 13-23, 2007, Springer, 978-3-540-78565-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Cultural heritage defence, Virtual environment |
22 | Petr Benda, Pavel Jisl, Michal Pechoucek, Niranjan Suri, Marco M. Carvalho |
A distributed stand-in agent based algorithm for opportunistic resource allocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), Dijon, France, April 23-27, 2006, pp. 119-125, 2006, ACM, 1-59593-108-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
defence applications, inaccessibility, multi-agent systems, ad-hoc networks, agents, coordination |
22 | Frank W. Moore, Oscar N. Garcia |
A New Methodology for Optimizing Evasive Maneuvers Under Uncertainty in the Extended Two-Dimensional Pursuer/Evader Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICTAI ![In: 9th International Conference on Tools with Artificial Intelligence, ICTAI '97, Newport Beach, CA, USA, November 3-8, 1997, pp. 278-, 1997, IEEE Computer Society, 0-8186-8203-5. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
evasive maneuver optimization, two-dimensional pursuer-evader problem, maneuver sequences, genetic programming system, competitive zero sum game, air defence, uncertainty, differential games, differential games |
16 | Baidyanath Biswas, Arunabha Mukhopadhyay, Ajay Kumar, Dursun Delen |
A hybrid framework using explainable AI (XAI) in cyber-risk management for defence and recovery against phishing attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Decis. Support Syst. ![In: Decis. Support Syst. 177, pp. 114102, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Richa Goenka, Meenu Chawla, Namita Tiwari |
A comprehensive survey of phishing: mediums, intended targets, attack and defence techniques and a novel taxonomy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 23(2), pp. 819-848, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Believe Ayodele, Victor Buttigieg |
SDN as a defence mechanism: a comprehensive survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 23(1), pp. 141-185, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Adnan Ahmad, Rawan Amjad, Amna Basharat, Asma Ahmad Farhan, Ali Ezad Abbas |
Fuzzy knowledge based intelligent decision support system for ground based air defence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Ambient Intell. Humaniz. Comput. ![In: J. Ambient Intell. Humaniz. Comput. 15(4), pp. 2317-2340, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Yabing Huang, Jun Zhao 0002 |
Active Interdiction Defence Scheme Against False Data-Injection Attacks: A Stackelberg Game Perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Cybern. ![In: IEEE Trans. Cybern. 54(1), pp. 162-172, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Pervez Rizvi |
False statements in Egan et al.'s defence of their word adjacency network method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digit. Scholarsh. Humanit. ![In: Digit. Scholarsh. Humanit. 39(1), pp. 1-2, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Feilu Hang, Linjiang Xie, Zhenhong Zhang, Wei Guo, Hanruo Li |
Research on the application of network security defence in database security services based on deep learning integrated with big data analytics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Intell. Networks ![In: Int. J. Intell. Networks 5, pp. 101-109, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Wenfei Zhao, Kenan Teng, Jian Chen, Yan Wang |
Research on operational effectiveness of air and missile defence in maritime stronghold based on queuing theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Commun. Technol. ![In: Int. J. Inf. Commun. Technol. 24(2), pp. 200-212, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Chamara Sandeepa, Bartlomiej Siniarski, Shen Wang 0006, Madhusanka Liyanage |
Rec-Def: A Recommendation-Based Defence Mechanism for Privacy Preservation in Federated Learning Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Consumer Electron. ![In: IEEE Trans. Consumer Electron. 70(1), pp. 2716-2728, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Canaan Yung, Hadi Mohaghegh Dolatabadi, Sarah M. Erfani, Christopher Leckie |
Round Trip Translation Defence against Large Language Model Jailbreaking Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.13517, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Tarek Chaalan, Shaoning Pang, Joarder Kamruzzaman, Iqbal Gondal, Xuyun Zhang |
The Path to Defence: A Roadmap to Characterising Data Poisoning Attacks on Victim Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Comput. Surv. ![In: ACM Comput. Surv. 56(7), pp. 175:1-175:39, July 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | João Almeida, Daniel Santos 0003, José Rui Figueira, Alexandre P. Francisco |
A multi-objective mixed integer linear programming model for thesis defence scheduling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Eur. J. Oper. Res. ![In: Eur. J. Oper. Res. 312(1), pp. 92-116, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Laura Rafferty, Áine MacDermott |
Adaptive Defence of the Internet of Things (IoT) using the Belief-Desire-Intention (BDI) Model for Social Robots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 57th Hawaii International Conference on System Sciences, HICSS 2024, Hilton Hawaiian Village Waikiki Beach Resort, Hawaii, USA, January 3-6, 2024, pp. 1722-1731, 2024, ScholarSpace, 978-0-9981331-7-1. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
16 | Rosanna Fanni, Fernando Giancotti |
Ethical Artificial Intelligence in the Italian Defence: a Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digit. Soc. ![In: Digit. Soc. 2(2), pp. 29, August 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | R. S. Raghav, Debnath Bhattacharyya, Dinesh Kumar Anguraj, Tai-Hoon Kim |
Correction to: A soldier bee defence mechanism for detecting impersonate sensor node in wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pers. Ubiquitous Comput. ![In: Pers. Ubiquitous Comput. 27(3), pp. 907, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | R. S. Raghav, Debnath Bhattacharyya, Dinesh Kumar Anguraj, Tai-Hoon Kim |
A soldier bee defence mechanism for detecting impersonate sensor node in wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pers. Ubiquitous Comput. ![In: Pers. Ubiquitous Comput. 27(3), pp. 889-906, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Safdar Hussain Javed, Maaz Bin Ahmad, Muhammad Asif 0010, Waseem Akram, Khalid Mahmood 0002, Ashok Kumar Das, Sachin Shetty |
APT Adversarial Defence Mechanism for Industrial IoT Enabled Cyber-Physical System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 11, pp. 74000-74020, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Iram Arshad, Saeed Hamood Alsamhi, Yuansong Qiao, Brian Lee 0001, Yuhang Ye |
A Novel Framework for Smart Cyber Defence: A Deep-Dive Into Deep Learning Attacks and Defences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 11, pp. 88527-88548, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Roberto Cerchione, Piera Centobelli, Antimo Angelino |
Blockchain-Based IoT Model and Experimental Platform Design in the Defence Supply Chain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 10(24), pp. 22033-22039, dec15 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Aaisha Makkar, Uttam Ghosh, Pradip Kumar Sharma, Amir Javed |
A Fuzzy-Based Approach to Enhance Cyber Defence Security for Next-Generation IoT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 10(3), pp. 2079-2086, February 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Izhar Ahmed Khan, Nour Moustafa, Dechang Pi, Yasir Hussain, Nauman Ali Khan |
DFF-SC4N: A Deep Federated Defence Framework for Protecting Supply Chain 4.0 Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Ind. Informatics ![In: IEEE Trans. Ind. Informatics 19(3), pp. 3300-3309, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Sundaresan Ramachandran, Jeet Rami, Abhinav Shah, Kyounggon Kim, Digvijaysinh Rathod |
Defence against crypto-ransomware families using dynamic binary instrumentation and DLL injection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Electron. Secur. Digit. Forensics ![In: Int. J. Electron. Secur. Digit. Forensics 15(4), pp. 424-442, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Melda Gelibolu Bayrakci, Ömer Faruk Baykoç |
An integrated modelling approach for an optimal location of warehouses in the defence industry organisation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Oper. Res. Decis. ![In: Oper. Res. Decis. 33(2), 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Daniel Kelly, Frank G. Glavin, Enda Barrett |
DoWTS - Denial-of-Wallet Test Simulator: Synthetic data generation for preemptive defence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Inf. Syst. ![In: J. Intell. Inf. Syst. 60(2), pp. 325-348, April 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | |
Retracted: Research on tridimensional monitoring and defence technology of substation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Circuits Devices Syst. ![In: IET Circuits Devices Syst. 17(4), pp. 258-267, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Kamal Mammadov, Cheng-Chew Lim, Peng Shi 0001 |
The holographic principle for the differential game of active target defence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Control ![In: Int. J. Control 96(11), pp. 2725-2736, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Wangkun Xu, Martin Higgins, Jianhong Wang, Imad M. Jaimoukha, Fei Teng 0005 |
Blending Data and Physics Against False Data Injection Attack: An Event-Triggered Moving Target Defence Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Smart Grid ![In: IEEE Trans. Smart Grid 14(4), pp. 3176-3188, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Xin Liu 0022, Liang Zheng, Sumi Helal, Weishan Zhang, Chunfu Jia, Jiehan Zhou |
A broad learning-based comprehensive defence against SSDP reflection attacks in IoTs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digit. Commun. Networks ![In: Digit. Commun. Networks 9(5), pp. 1180-1189, October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Jeremy W. Bryans, Lin Shen Liew, Hoang Nga Nguyen, Giedre Sabaliauskaite, Siraj Ahmed Shaikh |
Formal Template-Based Generation of Attack-Defence Trees for Automated Security Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. ![In: Inf. 14(9), pp. 481, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Jiefei Wei, Luyan Yao, Qinggang Meng |
Self-adaptive logit balancing for deep neural network robustness: Defence and detection of adversarial attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Neurocomputing ![In: Neurocomputing 531, pp. 180-194, April 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | K. G. Maheswari, C. Siva, G. NaliniPriya |
An Optimal Cluster Based Intrusion Detection System for Defence Against Attack in Web and Cloud Computing Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 128(3), pp. 2011-2037, February 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Aoyu Wu, Dazhen Deng, Furui Cheng, Yingcai Wu, Shixia Liu, Huamin Qu |
In Defence of Visual Analytics Systems: Replies to Critics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Vis. Comput. Graph. ![In: IEEE Trans. Vis. Comput. Graph. 29(1), pp. 1026-1036, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Sanyam Vyas, John Hannay, Andrew Bolton, Pete Burnap |
Automated Cyber Defence: A Review. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2303.04926, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Nirmalendu Prakash, Ming Shan Hee, Roy Ka-Wei Lee |
TotalDefMeme: A Multi-Attribute Meme dataset on Total Defence in Singapore. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2305.17911, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Justin McKeown |
A data-driven analysis of UK cyber defence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2303.07313, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Khushnaseeb Roshan, Aasim Zafar, Sheikh Burhan Ul Haque |
Untargeted White-box Adversarial Attack with Heuristic Defence Methods in Real-time Deep Learning based Network Intrusion Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2310.03334, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Mitchell Kiely, David Bowman, Maxwell Standen, Christopher Moir |
On Autonomous Agents in a Cyber Defence Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2309.07388, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Minghang Deng, Zhong Zhang 0004, Junming Shao |
Seeing Is Not Always Believing: Invisible Collision Attack and Defence on Pre-Trained Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2309.13579, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Gaolei Li, Yuanyuan Zhao, Wenqi Wei, Yuchen Liu |
Few-shot Multi-domain Knowledge Rearming for Context-aware Defence against Advanced Persistent Threats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2306.07685, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Myles Foley, Mia Wang, Zoe M, Chris Hicks, Vasilios Mavroudis |
Inroads into Autonomous Network Defence using Explained Reinforcement Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2306.09318, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Ricardo Ribeiro Pereira, Jacopo Bono, João Tiago Ascensão, David Aparício, Pedro Ribeiro 0004, Pedro Bizarro |
The GANfather: Controllable generation of malicious activity to improve defence systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2307.13787, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Jacob Wiebe, Ranwa Al Mallah, Li Li |
Learning Cyber Defence Tactics from Scratch with Multi-Agent Reinforcement Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2310.05939, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Hassan Jalil Hadi, Yue Cao 0002, Khaleeq un Nisa, Abdul Majid Jamil, Qiang Ni |
A comprehensive survey on security, privacy issues and emerging defence technologies for UAVs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Netw. Comput. Appl. ![In: J. Netw. Comput. Appl. 213, pp. 103607, April 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Haftu Tasew Reda, Adnan Anwar, Abdun Naser Mahmood, Zahir Tari |
A Taxonomy of Cyber Defence Strategies Against False Data Attacks in Smart Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Comput. Surv. ![In: ACM Comput. Surv. 55(14s), pp. 331:1-331:37, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | S. Rameshkumar, R. Ganesan, A. Merline |
Progressive Transfer Learning-based Deep Q Network for DDOS Defence in WSN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Syst. Sci. Eng. ![In: Comput. Syst. Sci. Eng. 44(3), pp. 2379-2394, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Paul D. Yoo, Zahir Tari |
Editorial Sustainable Defence and Security Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Sustain. Comput. ![In: IEEE Trans. Sustain. Comput. 8(4), pp. 537-539, October - December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Shailendra Mishra |
Cyber defence using attack graphs prediction and visualisation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Commun. Networks Distributed Syst. ![In: Int. J. Commun. Networks Distributed Syst. 29(3), pp. 268-289, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Kirsty Paine, Ollie Whitehouse, James Sellwood, Andrew Shaw |
Indicators of Compromise (IoCs) and Their Role in Attack Defence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 9424, pp. 1-24, August 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 979 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|