The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase cyber-security (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1999-2004 (18) 2005-2006 (20) 2007 (37) 2008 (86) 2009 (136) 2010 (145) 2011 (195) 2012 (162) 2013 (172) 2014 (204) 2015 (326) 2016 (268) 2017 (317) 2018 (423) 2019 (784) 2020 (925) 2021 (803) 2022 (846) 2023 (567) 2024 (34)
Publication types (Num. hits)
article(784) book(13) data(2) incollection(168) inproceedings(5313) phdthesis(54) proceedings(134)
Venues (Conferences, Journals, ...)
CSIIRW(348) CSCloud/EdgeCom(281) ICCSIE(256) CSIA (2)(255) CSR(253) CSIA (1)(247) CSIA(203) CSCML(202) CSCloud(201) VizSec(157) CoRR(154) FCS(146) SciSec(134) CSNet(131) Cyber Security(125) ACeS(111) More (+10 of total 904)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 98 occurrences of 74 keywords

Results
Found 6468 publication records. Showing 6468 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
31Joseph P. Trien, Robert K. Abercrombie, Frederick T. Sheldon 4th annual cyber security and information intelligence research workshop. Search on Bibsonomy CSIIRW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Jon B. Weissman, Vipin Kumar 0001, Varun Chandola, Eric Eilertson, Levent Ertöz, György J. Simon, Seonho Kim, Jinoh Kim DDDAS/ITR: A Data Mining and Exploration Middleware for Grid and Distributed Computing. Search on Bibsonomy International Conference on Computational Science (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Data mining, Grid Computing
31Dan Li 0002, Kefei Wang, Jitender S. Deogun A Fuzzy Anomaly Detection System. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
31Andrew H. Sung, Srinivas Mukkamala The Feature Selection and Intrusion Detection Problems. Search on Bibsonomy ASIAN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
31Srinivas Mukkamala, Andrew H. Sung A Comparative Study of Techniques for Intrusion Detection. Search on Bibsonomy ICTAI The full citation details ... 2003 DBLP  DOI  BibTeX  RDF intrusion detection, information security, AI techniques
31Frank L. Greitzer, Olga Anna Kuchar, Kristy Huston Cognitive science implications for enhancing training effectiveness in a serious gaming context. Search on Bibsonomy ACM J. Educ. Resour. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cognitive principles, cyber security education, training effectiveness, Serious gaming, computer-based training
31Hicham Amellal, Abdelmajid Meslouhi, Abderahim El Allati, Anass El Haddadi QKD Protocols Security Between Theory and Engineering Implementation. Search on Bibsonomy Handbook of Computer Networks and Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
31Anil Kumar, Ravinder Kumar Privacy Preservation of Electronic Health Record: Current Status and Future Direction. Search on Bibsonomy Handbook of Computer Networks and Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
31Sudesh Rani, Poonam Saini Fog Computing: Applications and Secure Data Aggregation. Search on Bibsonomy Handbook of Computer Networks and Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
31Chaitanya Vemulapalli, Sanjay Kumar Madria, Mark Linderman Security Frameworks in Mobile Cloud Computing. Search on Bibsonomy Handbook of Computer Networks and Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
31Usha Jain, Muzzammil Hussain Underwater Wireless Sensor Networks. Search on Bibsonomy Handbook of Computer Networks and Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
31Cyrus F. Nourani Trees, Cryptosignatures, and Cyberspace Mobile Agent Interfaces. Search on Bibsonomy Handbook of Computer Networks and Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
31Kale Rahul Vishwanath, Bharadwaj Veeravalli, Xiaoli Wang A Practicable Machine Learning Solution for Security-Cognizant Data Placement on Cloud Platforms. Search on Bibsonomy Handbook of Computer Networks and Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
31Mohammed Saeed Alkatheiri, Abdur Rashid Sangi, Satish Anamalamudi Physical Unclonable Function (PUF)-Based Security in Internet of Things (IoT): Key Challenges and Solutions. Search on Bibsonomy Handbook of Computer Networks and Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
31Ravinder Kumar, Hitesh Singh Recent Trends in Text Steganography with Experimental Study. Search on Bibsonomy Handbook of Computer Networks and Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
31Tushar Ubale, Ankit Kumar Jain Survey on DDoS Attack Techniques and Solutions in Software-Defined Network. Search on Bibsonomy Handbook of Computer Networks and Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
31Priyanka Dhaka, Bharti Nagpal ABFT: Analytics to Uplift Big Social Events Using Forensic Tools. Search on Bibsonomy Handbook of Computer Networks and Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
31Arpita Sarkar, Binod Kumar Singh A Novel Session Key Generation and Secure Communication Establishment Protocol Using Fingerprint Biometrics. Search on Bibsonomy Handbook of Computer Networks and Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
31Mohamed Alloghani, Thar Baker, Dhiya Al-Jumeily, Abir Hussain, Jamila Mustafina, Ahmed J. Aljaaf A Systematic Review on Security and Privacy Issues in Mobile Devices and Systems. Search on Bibsonomy Handbook of Computer Networks and Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
31Andrea Vázquez-Ingelmo, Á. M. Moreno-Montero, Francisco José García-Peñalvo Threats Behind Default Configurations of Network Devices: Wired Local Network Attacks and Their Countermeasures. Search on Bibsonomy Handbook of Computer Networks and Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
31Moumita Roy, Chandreyee Chowdhury, Nauman Aslam Security and Privacy Issues in Wireless Sensor and Body Area Networks. Search on Bibsonomy Handbook of Computer Networks and Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
31Mahendra Kumar Murmu, Awadhesh Kumar Singh Security Issues in Cognitive Radio Ad Hoc Networks. Search on Bibsonomy Handbook of Computer Networks and Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
31R. Vinayakumar, K. P. Soman, Prabaharan Poornachandran DeepDGA-MINet: Cost-Sensitive Deep Learning Based Framework for Handling Multiclass Imbalanced DGA Detection. Search on Bibsonomy Handbook of Computer Networks and Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
31Palvi Aggarwal, Cleotilde Gonzalez, Varun Dutt HackIt: A Real-Time Simulation Tool for Studying Real-World Cyberattacks in the Laboratory. Search on Bibsonomy Handbook of Computer Networks and Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
31Dharavath Ramesh, Syam Kumar Pasupuleti A Novel AckIBE-Based Secure Cloud Data Management Framework. Search on Bibsonomy Handbook of Computer Networks and Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
31Kishore Bhamidipati, Soorya Annadurai Permutation-Substitution Based Image Encryption Algorithms Using Pseudorandom Number Generators. Search on Bibsonomy Handbook of Computer Networks and Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
31Aakanksha Tewari, Brij B. Gupta An Analysis of Provable Security Frameworks for RFID Security. Search on Bibsonomy Handbook of Computer Networks and Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
31Prachi Gulihar, Brij B. Gupta Cooperative Mechanisms for Defending Distributed Denial of Service (DDoS) Attacks. Search on Bibsonomy Handbook of Computer Networks and Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
31Mouhammd Al-Kasassbeh 0001, Safaa Mohammed, Mohammad Alauthman, Ammar Almomani Feature Selection Using a Machine Learning to Classify a Malware. Search on Bibsonomy Handbook of Computer Networks and Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
31Manjunath Kotari, Niranjan N. Chiplunkar Investigation of Security Issues in Distributed System Monitoring. Search on Bibsonomy Handbook of Computer Networks and Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
31Rachna Jain, Nikita Jain, Anand Nayyar Security and Privacy in Social Networks: Data and Structural Anonymity. Search on Bibsonomy Handbook of Computer Networks and Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
31Richa, Teek Parval Sharma, Ajay Kumar Sharma Heterogeneous-Internet of Vehicles (Het-IoV) in Twenty-First Century: A Comprehensive Study. Search on Bibsonomy Handbook of Computer Networks and Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
31Priyanka Datta, Shanu Bhardwaj, Surya Narayan Panda, Sarvesh Tanwar, Sumit Badotra Survey of Security and Privacy Issues on Biometric System. Search on Bibsonomy Handbook of Computer Networks and Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
31Mouna Jouini, Latifa Ben Arfa Rabai Towards New Quantitative Cybersecurity Risk Analysis Models for Information Systems: A Cloud Computing Case Study. Search on Bibsonomy Handbook of Computer Networks and Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
31Avani Vyas, Sujata Pal Preventing Security and Privacy Attacks in WBANs. Search on Bibsonomy Handbook of Computer Networks and Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
31Arash Shaghaghi, Mohamed Ali Kâafar, Rajkumar Buyya, Sanjay Jha 0001 Software-Defined Network (SDN) Data Plane Security: Issues, Solutions, and Future Directions. Search on Bibsonomy Handbook of Computer Networks and Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
31Ahmed M. Manasrah, M. A. Shannaq, Mahmoud Abu Nasir An Investigation Study of Privacy Preserving in Cloud Computing Environment. Search on Bibsonomy Handbook of Computer Networks and Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
31Kishor Kumar Gulla, P. Viswanath, Suresh Babu Veluru, R. Raja Kumar Machine Learning Based Intrusion Detection Techniques. Search on Bibsonomy Handbook of Computer Networks and Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
31Christos Stergiou 0002, Andreas P. Plageras, Konstantinos E. Psannis, Brij B. Gupta Secure Machine Learning Scenario from Big Data in Cloud Computing via Internet of Things Network. Search on Bibsonomy Handbook of Computer Networks and Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
31Sangeeta Mittal, Shivani Tyagi Computational Techniques for Real-Time Credit Card Fraud Detection. Search on Bibsonomy Handbook of Computer Networks and Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
31Sumit Badotra, Surya Narayan Panda Software-Defined Networking: A Novel Approach to Networks. Search on Bibsonomy Handbook of Computer Networks and Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
31Bhumika Paharia, Kriti Bhushan A Comprehensive Review of Distributed Denial of Service (DDoS) Attacks in Fog Computing Environment. Search on Bibsonomy Handbook of Computer Networks and Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
31Bharat Bhushan, Gadadhar Sahoo Requirements, Protocols, and Security Challenges in Wireless Sensor Networks: An Industrial Perspective. Search on Bibsonomy Handbook of Computer Networks and Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
31Biswarup Samanta Epidemic Modelling for the Spread of Bots Through DDoS Attack in E-Commerce Network. Search on Bibsonomy Handbook of Computer Networks and Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
31Przemyslaw Blaskiewicz, Lucjan Hanzlik, Kamil Kluczniak, Lukasz Krzywiecki, Miroslaw Kutylowski, Marcin Slowik, Marta Wszola Pseudonymous Signature Schemes. Search on Bibsonomy Advances in Cyber Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
31Joonsang Baek, Willy Susilo, Khaled Salah 0001, Jun Su Ha, Ernesto Damiani, Ilsun You Stateful Public-Key Encryption: A Security Solution for Resource-Constrained Environment. Search on Bibsonomy Advances in Cyber Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
31Zijian Zhang 0001, Jialing He, Liehuang Zhu, Kui Ren 0001 Non-intrusive Load Monitoring Algorithms for Privacy Mining in Smart Grid. Search on Bibsonomy Advances in Cyber Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
31Yang-Wai Chow, Willy Susilo, Pairat Thorncharoensri CAPTCHA Design and Security Issues. Search on Bibsonomy Advances in Cyber Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
31Jianghua Liu, Yang Xiang 0001, Wanlei Zhou 0001, Xinyi Huang 0001, Jinhua Ma Data Authentication with Privacy Protection. Search on Bibsonomy Advances in Cyber Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
31Zuoxia Yu, Man Ho Au, Rupeng Yang Accountable Anonymous Credentials. Search on Bibsonomy Advances in Cyber Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
31Jesus Diaz, Seung Geol Choi, David Arroyo, Angelos D. Keromytis, Francisco B. Rodríguez, Moti Yung A Methodology for Retrofitting Privacy and Its Application to e-Shopping Transactions. Search on Bibsonomy Advances in Cyber Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
31Joseph K. Liu Ring Signature. Search on Bibsonomy Advances in Cyber Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
31Pierangela Samarati, Indrajit Ray, Indrakshi Ray (eds.) From Database to Cyber Security - Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday Search on Bibsonomy From Database to Cyber Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
31Sharad Mehrotra, Kerim Yasin Oktay, Shantanu Sharma 0001 Exploiting Data Sensitivity on Partitioned Data. Search on Bibsonomy From Database to Cyber Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
31Steven Noel A Review of Graph Approaches to Network Security Analytics. Search on Bibsonomy From Database to Cyber Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
31Shang Li 0001, Srijan Kumar, Tudor Dumitras, V. S. Subrahmanian Breaking Bad: Forecasting Adversarial Android Bad Behavior. Search on Bibsonomy From Database to Cyber Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
31Angelo Genovese, Enrique Muñoz Ballester, Vincenzo Piuri, Fabio Scotti Advanced Biometric Technologies: Emerging Scenarios and Research Trends. Search on Bibsonomy From Database to Cyber Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
31Sankardas Roy, Dewan Chaulagain, Shiva Bhusal Static Analysis for Security Vetting of Android Apps. Search on Bibsonomy From Database to Cyber Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
31Ramaswamy Chandramouli Comprehensive Security Assurance Measures for Virtualized Server Environments. Search on Bibsonomy From Database to Cyber Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
31Yvo Desmedt, Arash Shaghaghi Function-Based Access Control (FBAC): Towards Preventing Insider Threats in Organizations. Search on Bibsonomy From Database to Cyber Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
31Saptarshi Das, Barsha Mitra, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural Policy Engineering in RBAC and ABAC. Search on Bibsonomy From Database to Cyber Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
31Lingyu Wang 0001, Mengyuan Zhang 0001, Anoop Singhal Network Security Metrics: From Known Vulnerabilities to Zero Day Attacks. Search on Bibsonomy From Database to Cyber Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
31Tao Lin, Chen Zhong, John Yen, Peng Liu 0005 Retrieval of Relevant Historical Data Triage Operations in Security Operation Centers. Search on Bibsonomy From Database to Cyber Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
31Massimiliano Albanese From Cyber Situational Awareness to Adaptive Cyber Defense: Leveling the Cyber Playing Field. Search on Bibsonomy From Database to Cyber Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
31Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati Access Privacy in the Cloud. Search on Bibsonomy From Database to Cyber Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
31Stelvio Cimato, Ernesto Damiani Some Ideas on Privacy-Aware Data Analytics in the Internet-of-Everything. Search on Bibsonomy From Database to Cyber Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
31Mauro Conti, Edlira Dushku, Luigi V. Mancini Distributed Services Attestation in IoT. Search on Bibsonomy From Database to Cyber Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
31Sabrina De Capitani di Vimercati, Sara Foresti, Giovanni Livraga, Vincenzo Piuri, Pierangela Samarati Supporting Users in Cloud Plan Selection. Search on Bibsonomy From Database to Cyber Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
31Frédéric Cuppens, Nora Cuppens-Boulahia Stratification Based Model for Security Policy with Exceptions and Contraries to Duty. Search on Bibsonomy From Database to Cyber Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
31Roberto Di Pietro, Flavio Lombardi Virtualization Technologies and Cloud Security: Advantages, Issues, and Perspectives. Search on Bibsonomy From Database to Cyber Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
31Karim Eldefrawy, Rafail Ostrovsky, Moti Yung Theoretical Foundations for Mobile Target Defense: Proactive Secret Sharing and Secure Multiparty Computation. Search on Bibsonomy From Database to Cyber Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
31George Cybenko, Gabriel Fortunato Stocco Asymptotic Behavior of Attack Graph Games. Search on Bibsonomy From Database to Cyber Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
31Zi Chu, Steven Gianvecchio, Haining Wang Bot or Human? A Behavior-Based Online Bot Detection System. Search on Bibsonomy From Database to Cyber Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
31Enrico Bacis, Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Marco Rosa, Pierangela Samarati Protecting Resources and Regulating Access in Cloud-Based Object Storage. Search on Bibsonomy From Database to Cyber Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
31Bruhadeshwar Bezawada, Indrakshi Ray Attribute-Based Encryption: Applications and Future Directions. Search on Bibsonomy From Database to Cyber Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
31David R. Martinez, William W. Streilein, Kevin M. Carter 0001, Arunesh Sinha (eds.) Artificial Intelligence for Cyber Security, Papers from the 2016 AAAI Workshop, Phoenix, Arizona, USA, February 12, 2016. Search on Bibsonomy AAAI Workshop: Artificial Intelligence for Cyber Security The full citation details ... 2016 DBLP  BibTeX  RDF
31Marcus Paul Gutierrez, Christopher Kiekintveld Bandits for Cybersecurity: Adaptive Intrusion Detection Using Honeypots. Search on Bibsonomy AAAI Workshop: Artificial Intelligence for Cyber Security The full citation details ... 2016 DBLP  BibTeX  RDF
31Eric Nunes, Paulo Shakarian, Gerardo I. Simari Toward Argumentation-Based Cyber Attribution. Search on Bibsonomy AAAI Workshop: Artificial Intelligence for Cyber Security The full citation details ... 2016 DBLP  BibTeX  RDF
31Zareen Syed, Ankur Padia, Tim Finin, M. Lisa Mathews, Anupam Joshi UCO: A Unified Cybersecurity Ontology. Search on Bibsonomy AAAI Workshop: Artificial Intelligence for Cyber Security The full citation details ... 2016 DBLP  BibTeX  RDF
31J. Benton 0001, Robert P. Goldman, Mark H. Burstein, Joseph Mueller, Paul Robertson 0001, Dan Cerys, Andreas Hoffman, Rusty Bobrow Active Perception for Cyber Intrusion Detection and Defense. Search on Bibsonomy AAAI Workshop: Artificial Intelligence for Cyber Security The full citation details ... 2016 DBLP  BibTeX  RDF
31Diane Oyen, Blake Anderson, Christine M. Anderson-Cook Bayesian Networks with Prior Knowledge for Malware Phylogenetics. Search on Bibsonomy AAAI Workshop: Artificial Intelligence for Cyber Security The full citation details ... 2016 DBLP  BibTeX  RDF
31Blake Anderson, David A. McGrew, Subharthi Paul Discovering Human and Machine Readable Descriptions of Malware Families. Search on Bibsonomy AAAI Workshop: Artificial Intelligence for Cyber Security The full citation details ... 2016 DBLP  BibTeX  RDF
31Paulo Shakarian, Jana Shakarian Socio-Cultural Modeling for Cyber Threat Actors. Search on Bibsonomy AAAI Workshop: Artificial Intelligence for Cyber Security The full citation details ... 2016 DBLP  BibTeX  RDF
31Bruno Korbar, Jim Blythe, Ross Koppel, Vijay H. Kothari, Sean W. Smith Validating an Agent-Based Model of Human Password Behavior. Search on Bibsonomy AAAI Workshop: Artificial Intelligence for Cyber Security The full citation details ... 2016 DBLP  BibTeX  RDF
31Parinaz Naghizadeh, Mingyan Liu Inter-Temporal Incentives in Security Information Sharing Agreements. Search on Bibsonomy AAAI Workshop: Artificial Intelligence for Cyber Security The full citation details ... 2016 DBLP  BibTeX  RDF
31Sajjad Dadkhah, Azizah Abd Manaf, Somayeh Sadeghi Efficient Image Authentication and Tamper Localization Algorithm Using Active Watermarking. Search on Bibsonomy Bio-inspiring Cyber Security and Cloud Services The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
31Mona M. Soliman, Aboul Ella Hassanien, Hoda M. Onsi An Optimized Approach for Medical Image Watermarking. Search on Bibsonomy Bio-inspiring Cyber Security and Cloud Services The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
31Ayman M. Bahaa Eldin A Bio-inspired Comprehensive Distributed Correlation Approach for Intrusion Detection Alerts and Events. Search on Bibsonomy Bio-inspiring Cyber Security and Cloud Services The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
31Amira Sayed A. Aziz, Aboul Ella Hassanien Multilayer Machine Learning-Based Intrusion Detection System. Search on Bibsonomy Bio-inspiring Cyber Security and Cloud Services The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
31Mohamed Azab, Mohamed Eltoweissy Bio-inspired Evolutionary Sensory System for Cyber-Physical System Security. Search on Bibsonomy Bio-inspiring Cyber Security and Cloud Services The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
31Abdallah Meraoumia, Salim Chitroub, Ahmed Bouridane Biometric Recognition Systems Using Multispectral Imaging. Search on Bibsonomy Bio-inspiring Cyber Security and Cloud Services The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
31Mona M. Soliman, Aboul Ella Hassanien, Hoda M. Onsi Bio-inspiring Techniques in Watermarking Medical Images: A Review. Search on Bibsonomy Bio-inspiring Cyber Security and Cloud Services The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
31D. Satish Kumar, N. Nagarajan, Ahmad Taher Azar An Improved Key Management Scheme with High Security in Wireless Sensor Networks. Search on Bibsonomy Bio-inspiring Cyber Security and Cloud Services The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
31Sameh Hussein, Nashwa Abdelbaki Towards Cloud Customers Self-Monitoring and Availability-Monitoring. Search on Bibsonomy Bio-inspiring Cyber Security and Cloud Services The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
31N. L. Manasa, A. Govardhan 0001, Ch. Satyanarayana Fusion of Multiple Biometric Traits: Fingerprint, Palmprint and Iris. Search on Bibsonomy Bio-inspiring Cyber Security and Cloud Services The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
31Rajesh P. Barnwal, Nirnay Ghosh, Soumya K. Ghosh 0001 Data and Application Security in Cloud. Search on Bibsonomy Bio-inspiring Cyber Security and Cloud Services The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
31Qurban A. Memon Secured and Networked Emergency Notification Without GPS Enabled Devices. Search on Bibsonomy Bio-inspiring Cyber Security and Cloud Services The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
31Behzad Nazarbakhsh, Azizah Abd Manaf Image Pre-processing Techniques for Enhancing the Performance of Real-Time Face Recognition System Using PCA. Search on Bibsonomy Bio-inspiring Cyber Security and Cloud Services The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
31Tarek Gaber, Aboul Ella Hassanien An Overview of Self-Protection and Self-Healing in Wireless Sensor Networks. Search on Bibsonomy Bio-inspiring Cyber Security and Cloud Services The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
31Mohamed Sarrab, Nasser Alalwan, Ahmed Alzahrani 0001, Mahdi Kordestani Cybercrime Investigation Challenges: Middle East and North Africa. Search on Bibsonomy Bio-inspiring Cyber Security and Cloud Services The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 6468 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license