The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase cyber-security (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1999-2004 (18) 2005-2006 (20) 2007 (37) 2008 (86) 2009 (136) 2010 (145) 2011 (195) 2012 (162) 2013 (172) 2014 (204) 2015 (326) 2016 (268) 2017 (317) 2018 (423) 2019 (784) 2020 (925) 2021 (803) 2022 (846) 2023 (567) 2024 (34)
Publication types (Num. hits)
article(784) book(13) data(2) incollection(168) inproceedings(5313) phdthesis(54) proceedings(134)
Venues (Conferences, Journals, ...)
CSIIRW(348) CSCloud/EdgeCom(281) ICCSIE(256) CSIA (2)(255) CSR(253) CSIA (1)(247) CSIA(203) CSCML(202) CSCloud(201) VizSEC(157) CoRR(154) FCS(146) SciSec(134) CSNet(131) Cyber Security(125) ACeS(111) More (+10 of total 904)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 98 occurrences of 74 keywords

Results
Found 6468 publication records. Showing 6468 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
41Peyman Kabiri, Mahdieh Chavoshi Destructive Attacks Detection and Response System for Physical Devices in Cyber-Physical Systems. Search on Bibsonomy Cyber Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
41Kalle Rindell, Johannes Holvitie Security Risk Assessment and Management as Technical Debt. Search on Bibsonomy Cyber Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
41Mahin Talukder, Syed Islam, Paolo Falcarin Analysis of Obfuscated Code with Program Slicing. Search on Bibsonomy Cyber Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
41Yogesh Patel 0001, Karim Ouazzane, Vassil T. Vassilev, Ibrahim Faruqi, George L. Walker Keystroke Dynamics using Auto Encoders. Search on Bibsonomy Cyber Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
41Yunjia Wang, Ishbel Duncan A Novel Method to Prevent Phishing by using OCR Technology. Search on Bibsonomy Cyber Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
41Marios Ioannou, Eliana Stavrou, Maria Bada Cybersecurity Culture in Computer Security Incident Response Teams: Investigating difficulties in communication and coordination. Search on Bibsonomy Cyber Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
41J. D. Work In wolf's clothing: Complications of threat emulation in contemporary cyber intelligence practice. Search on Bibsonomy Cyber Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
41George O. M. Yee Attack Surface Identification and Reduction Model Applied in Scrum. Search on Bibsonomy Cyber Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
41Suleiman Y. Yerima, Sarmadullah Khan Longitudinal performance analysis of machine learning based Android malware detectors. Search on Bibsonomy Cyber Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
41Zirak Allaf, Mo Adda, Alexander E. Gegov TrapMP: Malicious Process Detection By Utilising Program Phase Detection. Search on Bibsonomy Cyber Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
41Ruitao Kee, Jovan Sie, Rhys Wong, Chern Nam Yap Arithmetic Circuit Homomorphic Encryption and Multiprocessing Enhancements. Search on Bibsonomy Cyber Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
41Sikha Bagui, Debarghya Nandi, Subhash C. Bagui, Robert Jamie White Classifying Phishing Email Using Machine Learning and Deep Learning. Search on Bibsonomy Cyber Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
41Pranshu Bajpai, Tyler Olsen, Seth Edgar, Rob McCurdy, Richard J. Enbody BATSense: Anomalous Security Event Detection using TBATS Machine Learning. Search on Bibsonomy Cyber Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
41Kamalakanta Sethi, Rahul Kumar, Lingaraj Sethi, Padmalochan Bera, Prashanta Kumar Patra A Novel Machine Learning Based Malware Detection and Classification Framework. Search on Bibsonomy Cyber Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
41Aunshul Rege, Katorah Williams, Alyssa Mendlein A Social Engineering Course Project for Undergraduate Students Across Multiple Disciplines. Search on Bibsonomy Cyber Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
41Martin Lundgren, Erik Bergström Security-Related Stress: A Perspective on Information Security Risk Management. Search on Bibsonomy Cyber Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
41 2018 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Glasgow, Scotland, United Kingdom, June 11-12, 2018 Search on Bibsonomy Cyber Security The full citation details ... 2018 DBLP  BibTeX  RDF
41Rajesh Ganesan, Ankit Shah 0002 A Strategy for Effective Alert Analysis at a Cyber Security Operations Center. Search on Bibsonomy From Database to Cyber Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
41Mirko Bottarelli, Gregory Epiphaniou, Dhouha Kbaier Ben Ismail, Petros Karadimas, Haider M. Al-Khateeb Quantisation feasibility and performance of RSS-based secret key extraction in VANETs. Search on Bibsonomy Cyber Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
41Baskoro Adi Pratomo, Pete Burnap, George Theodorakopoulos 0001 Unsupervised Approach for Detecting Low Rate Attacks on Network Traffic with Autoencoder. Search on Bibsonomy Cyber Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
41Daniel Fraunholz, Daniel Krohmer, Hans Dieter Schotten, Carolina Nogueira Introducing Falcom: A Multifunctional High-Interaction Honeypot Framework for Industrial and Embedded Applications. Search on Bibsonomy Cyber Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
41Halldis Sohoel, Martin Gilje Jaatun, Colin Boyd OWASP Top 10 - Do Startups Care? Search on Bibsonomy Cyber Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
41Andre Sorensen, Maxime Jerome Remy, Nicolaj Kjettrup, Rasmi Vlad Mahmoud, Jens Myrup Pedersen An Approach to Detect and Prevent Cybercrime in Large Complex Networks. Search on Bibsonomy Cyber Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
41Domhnall Carlin, Philip O'Kane, Sakir Sezer Dynamic Opcode Analysis of Ransomware. Search on Bibsonomy Cyber Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
41Egon Kidmose, Matija Stevanovic, Jens Myrup Pedersen Detection of Malicious domains through lexical analysis. Search on Bibsonomy Cyber Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
41Paul A. Wortman, Fatemeh Tehranipoor, John A. Chandy An Adversarial Risk-based Approach for Network Architecture Security Modeling and Design. Search on Bibsonomy Cyber Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
41Kimberly Tam, Kevin D. Jones Cyber-Risk Assessment for Autonomous Ships. Search on Bibsonomy Cyber Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
41Farhad Foroughi, Peter Luksch 0001 Observation Measures to Profile User Security Behaviour. Search on Bibsonomy Cyber Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
41Andres Robles-Durazno, Naghmeh Moradpoor, James McWhinnie, Gordon Russell 0001 A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system. Search on Bibsonomy Cyber Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
41Sean McKeown, Gordon Russell 0001, Petra Leimich Reducing the Impact of Network Bottlenecks on Remote Contraband Detection. Search on Bibsonomy Cyber Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
41Santhosh Parampottupadam, Arghir-Nicolae Moldovan Cloud-based Real-time Network Intrusion Detection Using Deep Learning. Search on Bibsonomy Cyber Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
41Bob Duncan Attackers Constantly Threaten the Survival of Organisations, but there is a New Shark in the Water: Carcharodon Carcharias Moderator Europa Universalis. Search on Bibsonomy Cyber Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
41Vladimir Eliseev, Olga Eliseeva Lightweight Distributed Attack Detection and Prevention for the Safe Internet of Things. Search on Bibsonomy Cyber Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
41Anastasios Balaskas, Virginia N. L. Franqueira Analytical Tools for Blockchain: Review, Taxonomy and Open Challenges. Search on Bibsonomy Cyber Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
41Dimitrios Kavallieros, Christina Chalanouli, Georgios Kokkinis, Anastasios Panathanasiou, Efthimios Lissaris, Georgios Leventakis, Georgios Giataganas, Georgios Germanos Searching for crime on the web: Legal and Ethical perspectives. Search on Bibsonomy Cyber Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
41Martin Trae Span, Logan O. Mailloux, Michael R. Grimaila, William Bill Young A Systems Security Approach for Requirements Analysis of Complex Cyber-Physical Systems. Search on Bibsonomy Cyber Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
41Sean McKeown, Gordon Russell 0001, Petra Leimich Sub-file Hashing Strategies for Fast Contraband Detection. Search on Bibsonomy Cyber Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
41Ensar Seker, Hasan Huseyin Ozbenli The Concept of Cyber Defence Exercises (CDX): Planning, Execution, Evaluation. Search on Bibsonomy Cyber Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
41Omego Obinna, Eckhard Pfluegel, Martin J. Tunnicliffe, Charles A. Clarke Ensuring Message Freshness in A Multi-Channel SMS Steganographic Banking Protocol. Search on Bibsonomy Cyber Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
41Mahdi Madani, Camel Tanougast Combined and Robust SNOW-ZUC Algorithm Based on Chaotic System. Search on Bibsonomy Cyber Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
41Shuai Fu, Nizar Bouguila A Bayesian Intrusion Detection Framework. Search on Bibsonomy Cyber Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
41Yassine Lemmou, El Mamoun Souidi Infection, Self-reproduction and Overinfection in Ransomware: The Case of TeslaCrypt. Search on Bibsonomy Cyber Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
41 2017 International Conference on Cyber Security And Protection Of Digital Services, Cyber Security 2017, London, United Kingdom, June 19-20, 2017 Search on Bibsonomy Cyber Security The full citation details ... 2017 DBLP  BibTeX  RDF
41Feng Yao, Suleiman Y. Yerima, BooJoong Kang, Sakir Sezer Continuous implicit authentication for mobile devices based on adaptive neuro-fuzzy inference system. Search on Bibsonomy Cyber Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
41Amala V. Rajan, Rejitha Ravikumar, Mariam Al Shaer UAE cybercrime law and cybercrimes - An analysis. Search on Bibsonomy Cyber Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
41Clement Guitton Foiling cyber attacks. Search on Bibsonomy Cyber Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
41Mohammed K. Alzaylaee, Suleiman Y. Yerima, Sakir Sezer Improving dynamic analysis of android apps using hybrid test input generation. Search on Bibsonomy Cyber Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
41Cyril Onwubiko Security operations centre: Situation awareness, threat intelligence and cybercrime. Search on Bibsonomy Cyber Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
41Stephen Singam Securing an US$ 2.8B digital asset: The movie - Avatar. Search on Bibsonomy Cyber Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
41Yassine Lemmou, El Mamoun Souidi PrincessLocker analysis. Search on Bibsonomy Cyber Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
41Taniya Bhatia, Rishabh Kaushal Malware detection in android based on dynamic analysis. Search on Bibsonomy Cyber Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
41Vahid Moula, Salman Niksefat ROPK++: An enhanced ROP attack detection framework for Linux operating system. Search on Bibsonomy Cyber Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
41Tianhui Meng, Zhihao Shang, Katinka Wolter An empirical performance and security evaluation of android container solutions. Search on Bibsonomy Cyber Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
41Daniel Fraunholz, Daniel Krohmer, Simon Duque Antón, Hans Dieter Schotten Investigation of cyber crime conducted by abusing weak or default passwords with a medium interaction honeypot. Search on Bibsonomy Cyber Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
41Kamalakanta Sethi, Amartya Majumdar, Padmalochan Bera A novel implementation of parallel homomorphic encryption for secure data storage in cloud. Search on Bibsonomy Cyber Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
41Yuanyuan Grace Zeng Identifying email threats using predictive analysis. Search on Bibsonomy Cyber Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
41Louai Maghrabi, Eckhard Pfluegel, Luluwah Al-Fagih, Roman Graf, Giuseppe Settanni, Florian Skopik Improved software vulnerability patching techniques using CVSS and game theory. Search on Bibsonomy Cyber Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
41Michelle Omoogun, Preetila Seeam, Visham Ramsurrun, Xavier J. A. Bellekens, Amar Seeam When eHealth meets the internet of things: Pervasive security and privacy challenges. Search on Bibsonomy Cyber Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
41 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), London, United Kingdom, June 13-14, 2016 Search on Bibsonomy Cyber Security The full citation details ... 2016 DBLP  BibTeX  RDF
41Mary Geddes, Pooneh Bagheri Zadeh Forensic analysis of private browsing. Search on Bibsonomy Cyber Security And Protection Of Digital Services The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
41BooJoong Kang, Suleiman Y. Yerima, Kieran McLaughlin, Sakir Sezer N-opcode analysis for android malware classification and categorization. Search on Bibsonomy Cyber Security And Protection Of Digital Services The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
41Zbigniew Hulicki The IM system with a cryptographic feature. Search on Bibsonomy Cyber Security And Protection Of Digital Services The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
41Egon Kidmose, Matija Stevanovic, Jens Myrup Pedersen Correlating intrusion detection alerts on bot malware infections using neural network. Search on Bibsonomy Cyber Security And Protection Of Digital Services The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
41Aisha Abubakar, Pooneh Bagheri Zadeh, Helge Janicke, Richard Howley Root cause analysis (RCA) as a preliminary tool into the investigation of identity theft. Search on Bibsonomy Cyber Security And Protection Of Digital Services The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
41Dylan Smyth, Victor Cionca, Seán McSweeney, Donna O'Shea Exploiting pitfalls in software-defined networking implementation. Search on Bibsonomy Cyber Security And Protection Of Digital Services The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
41Muhammad Aminu Ahmad, Steve Woodhead, Diane Gan A countermeasure mechanism for fast scanning malware. Search on Bibsonomy Cyber Security And Protection Of Digital Services The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
41Kamile Nur Sevis, Ensar Seker Cyber warfare: terms, issues, laws and controversies. Search on Bibsonomy Cyber Security And Protection Of Digital Services The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
41Reza Montasari, Pekka Peltola, Victoria Carpenter Gauging the effectiveness of computer misuse act in dealing with cybercrimes. Search on Bibsonomy Cyber Security And Protection Of Digital Services The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
41Taolue Chen, Tingting Han 0001, Florian Kammueller, Ibrahim Nemli, Christian W. Probst Model based analysis of insider threats. Search on Bibsonomy Cyber Security And Protection Of Digital Services The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
41Tomas Sochor, Matej Zuzcak, Petr Bujok Statistical analysis of attacking autonomous systems. Search on Bibsonomy Cyber Security And Protection Of Digital Services The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
41Abdulrahman Alruban, Nathan L. Clarke, Fudong Li 0001, Steven Furnell Proactive biometric-enabled forensic imprinting. Search on Bibsonomy Cyber Security And Protection Of Digital Services The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
41Thomas Mundt, Peter Wickboldt Security in building automation systems - a first analysis. Search on Bibsonomy Cyber Security And Protection Of Digital Services The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
41Cyril Onwubiko Exploring web analytics to enhance cyber situational awareness for the protection of online web services. Search on Bibsonomy Cyber Security And Protection Of Digital Services The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
41Louai Maghrabi, Eckhard Pfluegel, Senna Fathima Noorji Designing utility functions for game-theoretic cloud security assessment: a case for using the common vulnerability scoring system. Search on Bibsonomy Cyber Security And Protection Of Digital Services The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
41Catrin Burrows, Pooneh Bagheri Zadeh A mobile forensic investigation into steganography. Search on Bibsonomy Cyber Security And Protection Of Digital Services The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
41Gaofeng Zhang, Paolo Falcarin, Elena Gómez-Martínez, Shareeful Islam, Christophe Tartary, Bjorn De Sutter, Jérôme d'Annoville Attack simulation based software protection assessment method. Search on Bibsonomy Cyber Security And Protection Of Digital Services The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
41Fara Yahya, Robert John Walters, Gary B. Wills Goal-based security components for cloud storage security framework: a preliminary study. Search on Bibsonomy Cyber Security And Protection Of Digital Services The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
41Andrea J. Cullen, Lorna Armitage The social engineering attack spiral (SEAS). Search on Bibsonomy Cyber Security And Protection Of Digital Services The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
41Luben Boyanov, Zlatogor Minchev Cyber Security Challenges in Smart Homes. Search on Bibsonomy Cyber Security and Resiliency Policy Framework The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
41Metodi Hadji-Janev Toward Effective National Cyber Security Strategy: The Path Forward For Macedonia. Search on Bibsonomy Cyber Security and Resiliency Policy Framework The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
41Nazife Baykal Turkey's Approaches on Cyber Security Policy Framework. Search on Bibsonomy Cyber Security and Resiliency Policy Framework The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
41Predrag Pale Education as a Long-Term Strategy for Cyber Security. Search on Bibsonomy Cyber Security and Resiliency Policy Framework The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
41Gevorg Margarov Strengthening Cyber Security Policy by Means of End-Users Dedicated Training. Search on Bibsonomy Cyber Security and Resiliency Policy Framework The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
41Aleksandar Risteski, Mitko Bogdanoski, Marjan Stoilkovski, Miroslav Jovanovic Cyber Security Issues of Telecommunication Infrastructure. Search on Bibsonomy Cyber Security and Resiliency Policy Framework The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
41Frank L. Greitzer, Deborah A. Frincke Combining Traditional Cyber Security Audit Data with Psychosocial Data: Towards Predictive Modeling for Insider Threat Mitigation. Search on Bibsonomy Insider Threats in Cyber Security The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
40Carl Hauser Minitrack: Cyber Security. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
39Shince Thomas, Devesh Misra, P. R. Lakshmi Eswari, N. Sarat Chandra Babu A Transparent End-to-End Security Solution. Search on Bibsonomy ICISS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
38Bob G. Schlicher Emergence of cyber anti-forensics impacting cyber security. Search on Bibsonomy CSIIRW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
36Art Conklin, Gregory B. White e-Government and Cyber Security: The Role of Cyber Security Exercises. Search on Bibsonomy HICSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
35Dan Assaf Government Intervention in Information Infrastructure Protection. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Critical information infrastructure protection, market failures, cyber security, government regulation
34Paul Mullins 0001, Jim Wolfe, Michael Fry 0003, Erik L. Wynters, William C. Calhoun, Robert Montante, William Oblitey Panel on integrating security concepts into existing computer courses. Search on Bibsonomy SIGCSE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
33Ruby B. Lee Challenges in the Design of Security-Aware Processors. Search on Bibsonomy ASAP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
33Dennis K. Holstein, Jose Diaz Cyber Security Management for Utility Operations. Search on Bibsonomy HICSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
31Galen Rasche, Erin Allwein, Michael S. Moore, Ben Abbott Model-Based Cyber Security. Search on Bibsonomy ECBS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
31Thierry Mbah Mbelli, Barry Dwolatzky Cyber Security, a Threat to Cyber Banking in South Africa: An Approach to Network and Application Security. Search on Bibsonomy CSCloud The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
31Zeta Dooly, Kenny Doyle, Jamie Power Uncovering Innovation Practices and Requirements in Privacy and Cyber Security Organisations: Insights from IPACSO. Search on Bibsonomy CSP Forum The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
31Kenny Doyle, Zeta Dooly, Paul J. Kearney What's so Unique about Cyber Security? Search on Bibsonomy CSP Forum The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
31Dharm Kapletia, Massimo Felici, Nick Wainwright An Integrated Framework for Innovation Management in Cyber Security and Privacy. Search on Bibsonomy CSP Forum The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
31Ryan S. Bennink Quantum information: opportunities and challenges or "What's this quantum stuff and what does it have to do with cyber security?". Search on Bibsonomy CSIIRW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Mohammad M. Masud 0001, Jing Gao 0004, Latifur Khan, Jiawei Han 0001, Bhavani Thuraisingham Peer to peer botnet detection for cyber-security: a data mining approach. Search on Bibsonomy CSIIRW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 6468 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license