The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for DSC with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1988-2000 (15) 2001-2004 (18) 2005-2006 (22) 2007-2008 (33) 2009-2010 (20) 2011-2013 (20) 2014-2016 (133) 2017 (193) 2018 (213) 2019 (146) 2020 (75) 2021 (161) 2022 (145) 2023 (130) 2024 (5)
Publication types (Num. hits)
article(92) inproceedings(1223) proceedings(14)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 70 occurrences of 62 keywords

Results
Found 1330 publication records. Showing 1329 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
36Yichuan Wu, Meng Guo, Lei Yang, Wei Yu VCFN-Video Computing Force Network. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Kun Guo, Yibo Gao, Dongbin Wang, Hui Zhi, Tao Zhang, Yueming Lu A Hybrid Routing Mutation Mechanism based on Mutation Cost and Resource Trustworthiness in Network Moving Target Defense. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Jiashun Zhou, Na Wang, Aodi Liu, Xuehui Du FAVT: A Feature-Anchored Video Data Trading Mechanism. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Shangbin Han, Qianhong Wu, Han Zhang 0009, Bo Qin Light-weight Unsupervised Anomaly Detection for Encrypted Malware Traffic. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Bing Chen, Yaping Liu, Shuo Zhang 0011, Jie Chen, Zhiyu Han FLYFDetect: A Smart Home Privacy Protection Framework via Federated Learning. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Quan Hong, Yang Zhao, Jian Chang, Yuxin Du, Jun Li, Lidong Zhai Shock Trap: An active defense architecture based on trap vulnerabilities. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Jun Li, Xueying Qiu, Lingchen Li, Chenghui Zhu, Xiaonian Wu New Integral distinguishers for I - Presentâ„¢, TANGRAM and CHAM. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Haitao Zhang, Lei Luo 0004, Ruikun Li, Jiajia Yi, Yun Li, Lirong Chen Research and Application of Intelligent Vehicle Cybersecurity Threat Model. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Feng Ye Image Art Innovation based on Extended Reality Technology. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Yang Lv, Shaona Qin, Zifeng Zhu, Zhuocheng Yu, Shudong Li, Weihong Han A Review of Provenance Graph based APT Attack Detection: Applications and Developments. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Chen Guo, Tianxiu Wang, Yang Lin, Hao Chen, Haiyang Yu, Chengwei Zhu, Jing Qiu 0002 Modeling Unseen Entities from a Semantic Evidence View in Temporal Knowledge Graphs. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Hanwen Sun, Yuanping Nie, Xiang Li 0078, Minhuan Huang, Jianwen Tian, Wei Kong An Automatic Code Generation Method Based on Sequence Generative Adversarial Network. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Jiajia Yi, Meng Li, Kun Xiao, Lirong Chen, Lei Luo 0004, Rui Xu Capability-based Component Security Mechanism for Microkernel OS. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Jun-Zheng Yang, Feng Liu 0039, Yuan-Jie Zhao, Lu-Lu Liang, Jia-Yin Qi NiNSRAPM: An Ensemble Learning Based Non-intrusive Network Security Risk Assessment Prediction Model. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Jun Sun, Yang Li, Ge Zhang, Liangyu Dong, Zitao Yang, Mufeng Wang, Jiahe Cai Data traceability scheme of industrial control system based on digital watermark. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Qian Yan, Minhuan Huang, Huayang Cao A Survey of Human-machine Collaboration in Fuzzing. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Fashan Dong, Binyue Deng, Haiyang Yu, Wenrong Xie, Huawei Xu, Zhaoquan Gu An Asterisk-shaped Patch Attack for Object Detection. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Jie Chen, Yaping Liu, Shuo Zhang 0011, Zebin Guo, Bing Chen, Zhiyu Han DESEND: A Fast Device Event Signature Extraction And Detection Method for Smart Home. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Jincai Zou, Zhihan Tan, Yaya Huang, Yixing Chen 0005, Yuqiang Zhang, Ning Hu SMRT: An Effective Malicious Node Resistance Design for Mixnets. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Jiahao Qi, Ziyu Guo, Yueming Lu, Jiaqi Gao, Yihong Guo, Fanyao Meng Security Evaluation Model of Blockchain System Based on Combination Weighting and Grey Clustering. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Liang Li, Liqun Gao, Feng Xie, Bin Zhou 0004 Prediction of Real Popularity based on Sample Debias. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Jie Lu, Yong Ding 0005, Zhenyu Li, Chunhui Wang A timestamp-based covert data transmission method in Industrial Control System. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Lei Chen, Rong Jiang 0001, Changjian Lin, Aiping Li A Survey on Threat Hunting: Approaches and Applications. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Runsheng Guo 0001, Qichao Liu, Man Zhang 0004, Ning Hu, Hui Lu 0005 A Survey of Obfuscation and Deobfuscation Techniques in Android Code Protection. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Jiaxin Fan, Qi Yan, Mohan Li, Guanqun Qu, Yang Xiao A Survey on Data Poisoning Attacks and Defenses. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Dongye He, Lijuan Sun, Jingchen Wu, Yutong Gao, Xu Wu, Lirong Qiu TAFM: Topic-Attention FM-encoder for Text Generation. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Jinlei Liu, Wenchao Dan, Nuo Cheng, Wenjing Lian, Peirong Qu, Hui Zhang, Yueling Zhang, Jie Wang Knowledge Graph of Artificial Intelligence in Medicine: A Scientometric Analysis. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Yu Hu, Ran Li, Simin Wang, Fuqiang Tao, Zhe Sun SpeechHide: A Hybrid Privacy-preserving Mechanism for Speech Content and Voiceprint in Speech Data Sharing. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Lingzi Kong, Daoqi Han, Junmei Ding, Mingrui Fan, Yueming Lu A Hierarchical Terminal Recognition Approach based on Network Traffic Analysis. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Yuqiang Zhang, Zhiqiang Hao, Ning Hu, Jiawei Luo, Chonghua Wang A virtualization-based security architecture for industrial control systems. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Yunjie Tang, Kai Sun, Danhuai Zhao, Yan Lu, Jiaju Jiang, Hong Chen Industrial Defect Detection Through Computer Vision: A Survey. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Tuwen Guo, Xi Zhang, Lirong Qiu Leveraging Multi-aspect Semantics for Conversation Structure Modeling. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Ge Zhang, Zheyu Zhang, Jun Sun, Zun Wang, Rui Wang, Shirui Wang, Chengyun Xie 10 Gigabit industrial thermal data acquisition and storage solution based on software-defined network. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Qian Zhou, Hua Dai 0003, Liang Liu 0006, Kai Shi, Jie Chen, Hong Jiang The final security problem in IOT: Don't count on the canary! Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Ju Yang, Liang Zhou, Le Wang 0008, Shudong Li, Ziqing Lin, Zhaoquan Gu A Multi-step Attack Detection Framework for the Power System Network. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Riming Wu, Yiliang Han, Kaiyang Guo, Kai Liu Information dissemination model of recommendation platform based on network community. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Quanzhong Mao, Lijuan Sun, Jingchen Wu, Yutong Gao, Xu Wu, Lirong Qiu SATMask: Spatial Attention Transform Mask for Dense Instance Segmentation. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Zhang Ying Classification of Diabetic Retinopathy Based on B-ResNet. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Ruiling Gan, Jiawen Diao, Xiang Cui, Shouyou Song A DNS-based Data Exfiltration Traffic Detection Method for Unknown Samples. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Huanyu Chi, Zekun Fei, Peinuo Li, Boyu Yang, Zhi Wang 0014, Li Gu LISP-TBCNN: An AutoCAD Malware Detection Approach. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Haoran Ma, Zhaoyun Ding Research on Multi-Model Fusion for Named Entity Recognition Based on Loop Parameter Sharing Transfer Learning. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Junjian Zhang, Hao Tan, Binyue Deng, Jiacen Hu, Dong Zhu, Linyi Huang, Zhaoquan Gu NMI-FGSM-Tri: An Efficient and Targeted Method for Generating Adversarial Examples for Speaker Recognition. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Yufeng Xie, Mingchu Li, Kun Lu 0003, Syed Bilal Hussain Shah, Xiao Zheng Multi-task Learning Model based on Multiple Characteristics and Multiple Interests for CTR prediction. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Mingchu Li, Linlin Yang, Kun Lu 0003, Syed Bilal Hussain Shah, Xiao Zheng Device-to-Device Task Offloading in a Stochastic Invalid-Device Scenario with Social Awareness. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Jawhara Aljabri, Anna Lito Michala, Jeremy Singer ELSA: Edge Lightweight Searchable Attribute-based encryption Multi-keyword Scalability. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Wei-Loon Mow, Shih-Kun Huang, Hsu-Chun Hsiao LAEG: Leak-based AEG using Dynamic Binary Analysis to Defeat ASLR. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Shao-Fu Chen, Yu-Sung Wu Linux Kernel Module Development with Rust. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Joshua Streiff, Naheem Noah, Sanchari Das A Call for a New Privacy & Security Regime for IoT Smart Toys. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Heba Takruri Tamemi, Manar Rabayah, Kareem Abu Raad, Mai Kanaan, Ahmed Awad 0002 A Low Cost Blockchain-Based Framework for Preserving Critical Data in Health-Care IoT Systems Using Classification. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Chun-I Fan, Yen-Lin Lai, Cheng-Han Shie Clustering-Based Network Intrusion Detection System. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Jason Dejesus, John A. Chandy Cache Locking and Encryption to Prevent Memory Snooping in Embedded Systems. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Abdullah Alsalemi, Abbes Amira, Hossein Malekmohamadi, Kegong Diao Facilitating Deep Learning for Edge Computing: A Case Study on Data Classification. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Lu Zhang 0046, Reginald Cushing, Paola Grosso Defending OC-SVM based IDS from poisoning attacks. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Haiyue Yuan, Shujun Li Cyber Security Risks of Net Zero Technologies. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Daniel Fraunholz, Richard Schörghofer-Vrinssen, Hartmut König, Richard M. Zahoransky Show Me Your Attach Request and I'll Tell You Who You Are: Practical Fingerprinting Attacks in 4G and 5G Mobile Networks. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Fangwei Wang, Yuanyuan Lu, Qingru Li, Changguang Wang, Yonglei Bai A Co-evolutionary Algorithm-Based Malware Adversarial Sample Generation Method. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Peter T. Breuer High Speed Encrypted Computing: Stochastic Confusion and Lies in a Secret Computer. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Jiang-Yi Zeng, Li-En Chang, Hsin-Hung Cho, Chi-Yuan Chen, Han-Chieh Chao, Kuo-Hui Yeh Using Poisson Distribution to Enhance CNN-based NB-IoT LDoS Attack Detection. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Alexander Köberl, Holger Bock, Christian Steger A Novel Approach for Providing Client-Verifiable and Efficient Access to Private Smart Contracts. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Chun-I Fan, Cheng-Han Shie, Che-Ming Hsu, Tao Ban, Tomohiro Morikawa, Takeshi Takahashi 0001 IoT Botnet Detection Based on the Behaviors of DNS Queries. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Emma Scott, Sakshyam Panda, George Loukas, Emmanouil Panaousis Optimising user security recommendations for AI-powered smart-homes. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Yash Khare, Kumud Lakara, Maruthi Seshidhar Inukonda, Sparsh Mittal, Mahesh Chandra, Arvind Kaushik Design and Analysis of Novel Bit-flip Attacks and Defense Strategies for DNNs. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Awais Aziz Shah, Ahsan Adeel, Jawad Ahmad 0001, Ahmed Yassin Al-Dubai, Mandar Gogate, Abhijeet Bishnu, Muhammad Diyan 0002, Tassadaq Hussain, Kia Dashtipour, Tharm Ratnarajah, Amir Hussain 0001 A Novel Chaos-based Light-weight Image Encryption Scheme for Multi-modal Hearing Aids. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Bowen Zhao, Yingjiu Li, Ximeng Liu, HweeHwa Pang, Robert H. Deng FREED: An Efficient Privacy-Preserving Solution for Person Re-IDentification. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Upendra Bartwal, Subhasis Mukhopadhyay, Rohit Negi, Sandeep K. Shukla Security Orchestration, Automation, and Response Engine for Deployment of Behavioural Honeypots. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Leigh Turnbull, Zhiyuan Tan 0001, Kehinde O. Babaagba A Generative Neural Network for Enhancing Android Metamorphic Malware Detection based on Behaviour Profiling. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Changgang Zheng, Chen Zhen, Haiyong Xie 0001, Shufan Yang Towards Secure Multi-Agent Deep Reinforcement Learning: Adversarial Attacks and Countermeasures. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Robert L. Freas, Heather F. Adair, Eman M. Hammad An Engineering Process Framework for Cybersecurity Incident Response Assessment. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Sharifah Roziah Binti Mohd Kassim, Solahuddin Bin Shamsuddin, Shujun Li, Budi Arief How National CSIRTs Operate: Personal Observations and Opinions from MyCERT. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Rishi Rabheru, Hazim Hanif, Sergio Maffeis A Hybrid Graph Neural Network Approach for Detecting PHP Vulnerabilities. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Muhammad Omer Shahid, Chuadhry Mujeeb Ahmed, Venkata Reddy Palleti, Jianying Zhou 0001 Curse of System Complexity and Virtue of Operational Invariants: Machine Learning based System Modeling and Attack Detection in CPS. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Teik Guan Tan, Pawel Szalachowski, Jianying Zhou 0001 Securing Password Authentication for Web-based Applications. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Eva Papadogiannaki, Giorgos Tsirantonakis, Sotiris Ioannidis Network Intrusion Detection in Encrypted Traffic. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Thalia Laing, Eduard Marin, Mark D. Ryan 0001, Joshua Schiffman, GaĂ«tan Wattiau Symbolon: Enabling Flexible Multi-device-based User Authentication. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Sudhir Kumar Rai, Ashish Mittal, Sparsh Mittal A Node-Embedding Features Based Machine Learning Technique for Dynamic Malware Detection. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Mariam Varkey, Jacob John, Umadevi K. S. Automated Anomaly Detection Tool for Industrial Control System. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Talal Halabi, Aawista Chaudhry, Sarra M. Alqahtani, Mohammad Zulkernine A Scary Peek into The Future: Advanced Persistent Threats in Emerging Computing Environments. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Spencer Vecile, Kyle Lacroix, Katarina Grolinger, Jagath Samarabandu Malicious and Benign URL Dataset Generation Using Character-Level LSTM Models. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Qiang Wen, Fumio Machida Reliability Models and Analysis for Triple-model with Triple-input Machine Learning Systems. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Andrew Scholey, Pooneh Bagheri Zadeh A Digital Forensics Live Suspicious Activity Toolkit To Assist Investigators With Sexual Harm Prevention Order Monitoring. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Tyler Cody, Abdul Rahman, Christopher Redino, Lanxiao Huang, Ryan Clark, Akshay Kakkar, Deepak Kushwaha, Paul Park, Peter A. Beling, Edward Bowen Discovering Exfiltration Paths Using Reinforcement Learning with Attack Graphs. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Ipshita Roy Chowdhury, Deepayan Bhowmik Capturing Malware Behaviour with Ontology-based Knowledge Graphs. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Abel O. Gomez Rivera, Evan M. White, Jaime C. Acosta, Deepak K. Tosh Enabling Device Trustworthiness for SDN-Enabled Internet -of- Battlefield Things. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Zijie Huang 0003, Yulei Wu A Survey on Explainable Anomaly Detection for Industrial Internet of Things. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Nanjiang Xie, Zheng Gong, Yufeng Tang, Lei Wang, Yamin Wen Protecting White-Box Block Ciphers with Galois/Counter Mode. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Wai Weng Lo, Siamak Layeghy, Mohanad Sarhan, Marcus Gallagher, Marius Portmann Graph Neural Network-based Android Malware Classification with Jumping Knowledge. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36Warren Z. Cabral, Leslie F. Sikos, Craig Valli Shodan Indicators Used to Detect Standard Conpot Implementations and Their Improvement Through Sophisticated Customization. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
36 Sixth IEEE International Conference on Data Science in Cyberspace, DSC 2021, Shenzhen, China, October 9-11, 2021 Search on Bibsonomy DSC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
36 IEEE Conference on Dependable and Secure Computing, DSC 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021 Search on Bibsonomy DSC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
36Wei Hu, Jianyi Liu, Han Guo, Jing Li, Xinjian Zhao, Mingyang Zhang Network Security Situation Prediction Model Based on Security Situation Factors. Search on Bibsonomy DSC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
36Yuan Fang, Lixiang Li 0001, Yixiao Li, Haipeng Peng High Efficient and Secure Chaos-Based Compressed Spectrum Sensing in Cognitive Radio IoT Network. Search on Bibsonomy DSC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
36Zhaoyun Ding, Deqi Cao, Lina Liu, Donghua Yu, Haoyang Ma, Fei Wang A Method for Discovering Hidden Patterns of Cybersecurity Knowledge Based on Hierarchical Clustering. Search on Bibsonomy DSC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
36Wenyin Liu, Yin Lin, Zongcheng Qi, Zekai Wu, Guipeng Zhang, Kai Wang, Shuai Fan 0008, Zhenguo Yang LoginSoEasy: a System Enabling both Authentication and Protection of Personal Information based on Trusted User Agent. Search on Bibsonomy DSC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
36Yinhu Xu, Qi Chu 0001, Nenghai Yu Improving the Transferability of Adversarial Examples with Advanced Diversity-Ensemble Method. Search on Bibsonomy DSC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
36Wenrong Xie, Fashan Dong, Haiyang Yu, Zhaoquan Gu, Le Wang 0008, Zhihong Tian Generate Adversarial Examples Combined with Image Entropy Distribution. Search on Bibsonomy DSC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
36Jinxin Zuo, Ziyu Guo, Jiefu Gan, Yueming Lu Enhancing Continuous Service of Information Systems Based on Cyber Resilience. Search on Bibsonomy DSC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
36Fanzhi Meng, Peng Lu, Junhao Li, Teng Hu, Mingyong Yin, Fang Lou GRU and Multi-autoencoder based Insider Threat Detection for Cyber Security. Search on Bibsonomy DSC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
36Jian Zhang 0022, Linghui Lv, Zhi Wang, Ying Zhang 0032, Yang Yang, Jinjiu Li, Yaohua Wang Universal Pre-Calculating Structure: Reducing Complexity of Ising Chips with Arbitrary Connectivity. Search on Bibsonomy DSC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
36Feng Ye, Yong Liang Art Experience Innovation Design in Digital Media Era. Search on Bibsonomy DSC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
36Na Xu, Shudong Li, Xiaobo Wu, Weihong Han, Xiaojing Luo An APT Malware Classification Method Based on Adaboost Feature Selection and LightGBM. Search on Bibsonomy DSC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 1329 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license