The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for cybersecurity with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2002-2004 (18) 2005-2006 (18) 2007-2008 (19) 2009 (23) 2010 (31) 2011 (20) 2012 (52) 2013 (38) 2014 (107) 2015 (96) 2016 (220) 2017 (288) 2018 (389) 2019 (553) 2020 (684) 2021 (904) 2022 (919) 2023 (1019) 2024 (269)
Publication types (Num. hits)
article(1908) book(32) data(3) incollection(134) inproceedings(3474) phdthesis(51) proceedings(65)
Venues (Conferences, Journals, ...)
CoRR(376) CCCI(132) CPITS(120) SecDev(112) IEEE Secur. Priv.(103) EICC(97) IEEE Access(97) ITASEC(92) HICSS(81) ICAIC(76) SIGCSE(75) Comput. Secur.(71) CECC(62) CCC(53) SVCC(53) Sensors(51) More (+10 of total 1258)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 131 occurrences of 84 keywords

Results
Found 5667 publication records. Showing 5667 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
21Sharif Hassan, Ratan Guha Security and Integrity Analysis Using Indicators. Search on Bibsonomy CyberSecurity The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Olga Kulikova, Ronald Heil, Jan van den Berg, Wolter Pieters Cyber Crisis Management: A Decision-Support Framework for Disclosing Security Incident Information. Search on Bibsonomy CyberSecurity The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Shlomi Dolev, Niv Gilboa, Marina Kopeetsky Permanent Revocation in Attribute Based Broadcast Encryption. Search on Bibsonomy CyberSecurity The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Alex Doyal, Justin Zhan, Huiming Anna Yu Towards Defeating DDoS Attacks. Search on Bibsonomy CyberSecurity The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Kazuya Kishimoto, Kenji Ohira, Yukiko Yamaguchi, Hirofumi Yamaki, Hiroki Takakura An Adaptive Honeypot System to Capture IPv6 Address Scans. Search on Bibsonomy CyberSecurity The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Anass Bayaga, Stephen Flowerday Principal Causes of Information Communication Technology (ICT) Risk Failure in an SME. Search on Bibsonomy CyberSecurity The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Munene W. Kanampiu, Justin Zhan A Dynamic Covert Passive Actors Detection Scheme for a Healthy Networked Community. Search on Bibsonomy CyberSecurity The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21 2012 ASE International Conference on Cyber Security, Alexandria, VA, USA, December 14-16, 2012 Search on Bibsonomy CyberSecurity The full citation details ... 2012 DBLP  BibTeX  RDF
21Woohyun Shim, Luca Allodi, Fabio Massacci Crime Pays If You Are Just an Average Hacker. Search on Bibsonomy CyberSecurity The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Andre Abadie, Duminda Wijesekera Leveraging an Inventory of the Cognitive Radio Attack Surface. Search on Bibsonomy CyberSecurity The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Jun Dai, Xiaoyan Sun 0003, Peng Liu 0005, Nicklaus A. Giacobe Gaining Big Picture Awareness through an Interconnected Cross-Layer Situation Knowledge Reference Model. Search on Bibsonomy CyberSecurity The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Robert F. Erbacher, Steve E. Hutchinson Extending Case-Based Reasoning to Network Alert Reporting. Search on Bibsonomy CyberSecurity The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Shams Zawoad, Ragib Hasan I Have the Proof: Providing Proofs of Past Data Possession in Cloud Forensics. Search on Bibsonomy CyberSecurity The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
20Benjamin F. Madnick, Keman Huang, Stuart E. Madnick The evolution of global cybersecurity norms in the digital age: A longitudinal study of the cybersecurity norm development process. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
20He Li, Zhengjie Sun, Feiqi Huang The Impact of Audit Office Cybersecurity Experience on Nonbreach Client's Audit Fees and Cybersecurity Risks. Search on Bibsonomy J. Inf. Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
20Chelsea K. Johnson, Richard W. Van Tassel, Temmie Shade, Andrew Rogers, Kimberly Ferguson-Walter Adversarial Cognitive Engineering (ACE) and Defensive Cybersecurity: Leveraging Attacker Decision-Making Heuristics in a Cybersecurity Task. Search on Bibsonomy HICSS The full citation details ... 2024 DBLP  BibTeX  RDF
20Priyan Malarvizhi Kumar, Kavya Vedantham, Jeeva Selvaraj, Balasubramanian Prabhu Kavin Enhanced Network Intrusion Detection System Using PCGSO-Optimized BI-GRU Model in AI-Driven Cybersecurity. Search on Bibsonomy ICAIC The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
20Shadi Jawhar, Jeremy R. Miller, Zeina Bitar AI-Based Cybersecurity Policies and Procedures. Search on Bibsonomy ICAIC The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
20Vladimer Svanadze, Maksim Iavich, Sergiy Gnatyuk Challenges and Solutions for Cybersecurity and Information Security Management in Organizations (short paper). Search on Bibsonomy CPITS The full citation details ... 2024 DBLP  BibTeX  RDF
20Giorgia Tempestini, Ericka Rovira, Aryn Pyke, Francesco Di Nocera The Cybersecurity Awareness INventory (CAIN): Early Phases of Development of a Tool for Assessing Cybersecurity Knowledge Based on the ISO/IEC 27032. Search on Bibsonomy J. Cybersecur. Priv. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Aleksandra Pawlicka, Marek Pawlicki, Rafal Kozik, Michal Choras What Will the Future of Cybersecurity Bring Us, and Will It Be Ethical? The Hunt for the Black Swans of Cybersecurity Ethics. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Ruti Gafni, Yair Levy Experts' feedback on the cybersecurity footprint elements: in pursuit of a quantifiable measure of SMBs' cybersecurity posture. Search on Bibsonomy Inf. Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Ignacio Fernandez De Arroyabe, Carlos F. A. Arranz, Marta F. Arroyabe, Juan Carlos Fernandez de Arroyabe Cybersecurity capabilities and cyber-attacks as drivers of investment in cybersecurity systems: A UK survey for 2018 and 2019. Search on Bibsonomy Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Faheem Ahmed Shaikh, Mikko T. Siponen Information security risk assessments following cybersecurity breaches: The mediating role of top management attention to cybersecurity. Search on Bibsonomy Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Changchang Ma, Denghui Zhang, Junjian Zhang, Le Wang, Hao Li, Zhaoquan Gu Cybersecurity Knowledge Graph Enables Targeted Data Collection for Cybersecurity Analysis. Search on Bibsonomy DSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Victoria Granova, Atefeh Mashatan, Ozgur Turetken Changing Hearts and Minds: The Role of Cybersecurity Champion Programs in Cybersecurity Culture. Search on Bibsonomy HCI (9) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Anne-Maarit Majanoja, Antti Hakkala Enhancing a cybersecurity curriculum development tool with a competence framework to meet industry needs for cybersecurity. Search on Bibsonomy CompSysTech The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Shuchi Grover, Brian Broll, Derek Babb Cybersecurity Education in the Age of AI: Integrating AI Learning into Cybersecurity High School Curricula. Search on Bibsonomy SIGCSE (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Georgios Gerontakis, Panayiotis Yannakopoulos, Ioannis Voyiatzis Evaluating Cybersecurity Certifications: A Framework for Extracting Educational Scenarios in Cybersecurity Training. Search on Bibsonomy PCI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Regner Sabillon, Juan Ramón Bermejo Higuera New Validation of a Cybersecurity Model to Audit the Cybersecurity Program in a Canadian Higher Education Institution. Search on Bibsonomy ICTAS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Chola Chhetri "Pedagogical Experiences from a Hands-on Cybersecurity Defense Course] "It was a one of a kind experience: " Student experiences and pedagogical design of a project-based hands-on cybersecurity pentesting course". Search on Bibsonomy SIGITE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Rohani Rohan, Borworn Papasratorn, Wichian Chutimaskul, Jari Hautamäki, Suree Funilkul, Debajyoti Pal Enhancing Cybersecurity Resilience: A Comprehensive Analysis of Human Factors and Security Practices Aligned with the NIST Cybersecurity Framework. Search on Bibsonomy IAIT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Farzana Quayyum Collaboration between parents and children to raise cybersecurity awareness. Search on Bibsonomy EICC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Umit Cali, Murat Kuzlu, Onur Elma, Osman Gazi Gucluturk, Ahmet Kilic, Ferhat Özgür Çatak Cybersecurity and Digital Privacy Aspects of V2X in the EV Charging Structure. Search on Bibsonomy EICC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Alvhild Skjelvik, Arnstein Vestad Digital safety alarms - Exploring the understandings of the cybersecurity practice in Norwegian municipalities. Search on Bibsonomy EICC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Gordon J. Bruce Cybersecurity Compliance Requirements for USA Department of Defense Contractors - Dragons at the Gate. Search on Bibsonomy HCI (35) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Ulku Clark, Jeff Greer, Rahmira Rufus, Geoff Stoker A Descriptive Enterprise System Model (DESM) Optimized for Cybersecurity Student and Practitioner Use. Search on Bibsonomy HCI (35) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Joel Wilf Cybersecurity as Part of Mission Assurance. Search on Bibsonomy HCI (35) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20John Brian Pickering, Stephen C. Phillips, Gencer Erdogan I Just Want to Help: SMEs Engaging with Cybersecurity Technology. Search on Bibsonomy HCI (35) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Johannes de Haan Functional Cyber-Resilience - Extending the Cybersecurity Paradigm in Critical Infrastructures. Search on Bibsonomy EnCyCriS@ICSE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Tadeusz Sawik, Bartosz Sawik A rough cut cybersecurity investment using portfolio of security controls with maximum cybersecurity value. Search on Bibsonomy Int. J. Prod. Res. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Bimal Ghimire, Danda B. Rawat Recent Advances on Federated Learning for Cybersecurity and Cybersecurity for Federated Learning for Internet of Things. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Borka Jerman Blazic Changing the landscape of cybersecurity education in the EU: Will the new approach produce the required cybersecurity skills? Search on Bibsonomy Educ. Inf. Technol. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Mohammad Azzeh, Ahmad Mousa Altamimi, Mahmood AlBashayreh, Mohammad Al-Oudat Adopting the Cybersecurity Concepts into Curriculum The Potential Effects on Students Cybersecurity Knowledge. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Kaspar Rosager Ludvigsen, Shishir Nagaraja The Opportunity to Regulate Cybersecurity in the EU (and the World): Recommendations for the Cybersecurity Resilience Act. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Amila S. Withanaarachchi, Nisansala Vithana Female underrepresentation in the cybersecurity workforce - a study on cybersecurity professionals in Sri Lanka. Search on Bibsonomy Inf. Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Vagelis Papakonstantinou Cybersecurity as praxis and as a state: The EU law path towards acknowledgement of a new right to cybersecurity? Search on Bibsonomy Comput. Law Secur. Rev. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Saleh H. Aldaajeh, Heba Saleous, Saed Alrabaee, Ezedin Barka, Frank Breitinger, Kim-Kwang Raymond Choo The role of national cybersecurity strategies on the improvement of cybersecurity education. Search on Bibsonomy Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Mason Torres, Antony Mullins, Nik Thompson Education Cybersecurity Assessment Tool: A cybersecurity self-assessment tool for the Australian K-12 sector. Search on Bibsonomy ACIS The full citation details ... 2022 DBLP  BibTeX  RDF
20Alexandra K. Michota, Nineta Polemi A Supply Chain Service Cybersecurity Certification Scheme based on the Cybersecurity Act. Search on Bibsonomy CSR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Richard Messnarz, Damjan Ekert, Georg Macher, Svatopluk Stolfa, Jakub Stolfa, Alexander Much Automotive SPICE for Cybersecurity - MAN.7 Cybersecurity Risk Management and TARA. Search on Bibsonomy EuroSPI The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Sessika Siregar, Kuochung Chang External Social Capital, Cybersecurity Incident Flexibility, and Cybersecurity Incident Management Effectiveness. Search on Bibsonomy PACIS The full citation details ... 2022 DBLP  BibTeX  RDF
20Dimitrios Skias, Sofia Tsekeridou, Theodore B. Zahariadis, Artemis C. Voulkidis, Terpsichori Helen Velivassaki Demonstration of alignment of the Pan-European Cybersecurity Incidents Information Sharing Platform to Cybersecurity policy, regulatory and legislative advancements. Search on Bibsonomy ARES The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Luca Viganò 0001 Don't Tell Me The Cybersecurity Moon Is Shining... (Cybersecurity Show and Tell). Search on Bibsonomy SECRYPT The full citation details ... 2022 DBLP  BibTeX  RDF
20Sybren de Kinderen, Monika Kaczmarek-Heß, Simon Hacks Towards Cybersecurity by Design: A multi-level reference model for requirements-driven smart grid cybersecurity. Search on Bibsonomy ECIS The full citation details ... 2022 DBLP  BibTeX  RDF
20Zhengyu Liu, Haochen Su, Nannan Wang, Cheng Huang 0003 Coreference Resolution for Cybersecurity Entity: Towards Explicit, Comprehensive Cybersecurity Knowledge Graph with Low Redundancy. Search on Bibsonomy SecureComm The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Preston Moore, Justin Cappos Cybersecurity Shuffle: Using Card Magic to Introduce Cybersecurity Concepts. Search on Bibsonomy SIGCSE (2) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Norshima Humaidi, Saif Hussein Abdallah Alghazo Procedural Information Security Countermeasure Awareness and Cybersecurity Protection Motivation in Enhancing Employee's Cybersecurity Protective Behaviour. Search on Bibsonomy ISDFS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20André da Silva Oliveira, Henrique Santos 0001 Continuous Industrial Sector Cybersecurity Assessment Paradigm* : Proposed Model of Cybersecurity Certification. Search on Bibsonomy DRCN The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Cara Tang, Seth T. Hamman, Sidd Kaza, Blair Taylor National Cybersecurity Curriculum Task Force: How you can contribute to and benefit from high-quality, high-impact cybersecurity curriculum. Search on Bibsonomy SIGITE The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Shreya Gupta, Steven Furnell From Cybersecurity Hygiene to Cyber Well-Being. Search on Bibsonomy HCI (32) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Md. Jobair Hossain Faruk, Sharaban Tahora, Masrura Tasnim, Hossain Shahriar, Nazmus Sakib A Review of Quantum Cybersecurity: Threats, Risks and Opportunities. Search on Bibsonomy ICAIC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Robert Murimi, Sandra Blanke, Renita Murimi A Decade of Development of Mental Models in Cybersecurity and Lessons for the Future. Search on Bibsonomy Cyber Science The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Arnstein Vestad, Bian Yang Municipal Cybersecurity - A Neglected Research Area? A Survey of Current Research. Search on Bibsonomy Cyber Science The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Georgios Potamos, Savvas Theodoulou, Eliana Stavrou, Stavros Stavrou Building Maritime Cybersecurity Capacity Against Ransomware Attacks. Search on Bibsonomy Cyber Science The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Joseph Kaberuka, Christopher W. Johnson 0001 Case Studies in the Socio-technical Analysis of Cybersecurity Incidents: Comparing Attacks on the UK NHS and Irish Healthcare Systems. Search on Bibsonomy Cyber Science The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Sandra Schmitz-Berndt Refining the Mandatory Cybersecurity Incident Reporting Under the NIS Directive 2.0: Event Types and Reporting Processes. Search on Bibsonomy Cyber Science The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Paula Contreras The Transnational Dimension of Cybersecurity: The NIS Directive and Its Jurisdictional Challenges. Search on Bibsonomy Cyber Science The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Joel Pinney, Fiona Carroll Uncertainty and Risk: Investigating Line Graph Aesthetic for Enhanced Cybersecurity Awareness. Search on Bibsonomy Cyber Science The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Clet Boudehenn, Jean-Christophe Cexus, Ramla Abdelkader, Maxence Lannuzel, Olivier Jacq, David Brosset, Abdel Boudraa Holistic Approach of Integrated Navigation Equipment for Cybersecurity at Sea. Search on Bibsonomy Cyber Science The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Fabio De Rosa, Nicolò Maunero, Luca Nicoletti, Paolo Prinetto, Martina Trussoni Ontology for Cybersecurity Governance of ICT Systems. Search on Bibsonomy ITASEC The full citation details ... 2022 DBLP  BibTeX  RDF
20Valeriy Lakhno, Lazat Kydyralina, Berik Akhmetov, Bagdat Yagaliyeva, Kayirbek Makulov Analysis of Information Flows of Distance Education Systems, Taking into Account the Need to Ensure Their Cybersecurity (short paper). Search on Bibsonomy CPITS The full citation details ... 2022 DBLP  BibTeX  RDF
20Ahmed Abdelwahab Elmarady, Kamel Rahouma Studying Cybersecurity in Civil Aviation, Including Developing and Applying Aviation Cybersecurity Risk Assessment. Search on Bibsonomy IEEE Access The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
20Luca Viganò 0001 Don't Tell Me The Cybersecurity Moon Is Shining... (Cybersecurity Show And Tell). Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
20Dave Chatterjee Bringing the Best Actionable Insights on Cybersecurity: A Call for Papers: An Ongoing Cybersecurity Research Series for the Journal of Organizational Computing and Electronic Commerce. Search on Bibsonomy J. Organ. Comput. Electron. Commer. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
20Eduard Fosch-Villaronga, Tobias Mahler Cybersecurity, safety and robots: Strengthening the link between cybersecurity and safety in the context of care robots. Search on Bibsonomy Comput. Law Secur. Rev. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
20Brian K. Payne, Wu He, Cong Wang 0006, D. E. Wittkower, Hongyi Wu Cybersecurity, Technology, and Society: Developing an Interdisciplinary, Open, General Education Cybersecurity Course. Search on Bibsonomy J. Inf. Syst. Educ. The full citation details ... 2021 DBLP  BibTeX  RDF
20M. Mahdi Roghanizad, Ellen Choi, Atefeh Atty Mashatan, Ozgur Turetken Mindfulness and Cybersecurity Behavior: A comparative analysis of rational and intuitive cybersecurity decisions. Search on Bibsonomy AMCIS The full citation details ... 2021 DBLP  BibTeX  RDF
20Yasin Kose, Murat Ozer, Mehmet F. Bastug, Said Varlioglu, Oguzhan Basibuyuk, Hari Priya Ponnakanti Developing Cybersecurity Workforce: Introducing CyberSec Labs for Industry Standard Cybersecurity Training. Search on Bibsonomy CSCI The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
20Costas Boletsis, Ragnhild Halvorsrud, John Brian Pickering, Stephen C. Phillips, Mike Surridge Cybersecurity for SMEs: Introducing the Human Element into Socio-technical Cybersecurity Risk Assessment. Search on Bibsonomy VISIGRAPP (3: IVAPP) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
20Matteo Zallio, Carlos Raymundo Ibañez, Jesús Rafael Hechavarría Hernández (eds.) Advances in Human Factors in Robots, Unmanned Systems and Cybersecurity - Proceedings of the AHFE 2021 Virtual Conferences on Human Factors in Robots, Drones and Unmanned Systems, and Human Factors in Cybersecurity, July 25-29, 2021, USA Search on Bibsonomy AHFE (10) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
20Anne Wagner, Anna Bakas, Shelia Kennison, Eric Chan-Tin A Comparison of SONA and MTurk for Cybersecurity Surveys. Search on Bibsonomy EICC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
20Summer Rebensky, Meredith B. Carroll, Andrew Nakushian, Maria Chaparro, Tricia Prior Understanding the Last Line of Defense: Human Response to Cybersecurity Events. Search on Bibsonomy HCI (27) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
20Satoshi Ozaki, Hiroshi Furukawa Study on the Impact of Learning About Information Security Measures on Mental Models: Applying Cybersecurity Frameworks to Self-learning Materials. Search on Bibsonomy HCI (27) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
20John Brian Pickering, Costas Boletsis, Ragnhild Halvorsrud, Stephen C. Phillips, Mike Surridge It's Not My Problem: How Healthcare Models Relate to SME Cybersecurity Awareness. Search on Bibsonomy HCI (27) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
20Trevor Martin On the Need for Collaborative Intelligence in Cybersecurity. Search on Bibsonomy AI-Cybersec@SGAI The full citation details ... 2021 DBLP  BibTeX  RDF
20Marco Bozzetti, Luca Olivieri, Fausto Spoto Cybersecurity Impacts of the Covid-19 Pandemic in Italy. Search on Bibsonomy ITASEC The full citation details ... 2021 DBLP  BibTeX  RDF
20Anna Pagnacco Critical Information Infrastructure Protection: Between Cybersecurity and Policymaking. Search on Bibsonomy ITASEC The full citation details ... 2021 DBLP  BibTeX  RDF
20Didier Danet Punish and Perish: The Human Factor in Cybersecurity. Search on Bibsonomy ITASEC The full citation details ... 2021 DBLP  BibTeX  RDF
20Mariia Astafieva, Dmytro Bodnenko, Oksana Lytvyn, Volodymyr Proshkin, Oleksii B. Zhyltsov Mathematical Modeling as a Tool for Interdisciplinary Training of Computer Sciences and Cybersecurity Students. Search on Bibsonomy CPITS II (1) The full citation details ... 2021 DBLP  BibTeX  RDF
20Oleksandr Lemeshko, Oleksandra Yeremenko, Maryna Yevdokymenko, Ievgeniia Kuzminykh, Amal Mersni Development of Virtual Laboratories and Innovative Cybersecurity Courses for Distance Learning. Search on Bibsonomy CPITS II (2) The full citation details ... 2021 DBLP  BibTeX  RDF
20Mykola Khudyntsev, Andrii Davydiuk, Oleksiy Lebid, Oleksandr Trofymchuk, Artem Zhylin Cybersecurity Indices: Review and Classification. Search on Bibsonomy CPITS II (1) The full citation details ... 2021 DBLP  BibTeX  RDF
20Roman Bybyk, Ivan Opirskyy, Mike McIntosh SDR Receivers as a New Challenge to Cybersecurity Wireless Technology. Search on Bibsonomy CPITS II (2) The full citation details ... 2021 DBLP  BibTeX  RDF
20Roman Boyarchuk, Mykola Khudyntsev, Oleksiy Lebid, Oleksandr Trofymchuk Organizational and Technical Model of National Cybersecurity and Cyber Protection. Search on Bibsonomy CPITS I The full citation details ... 2021 DBLP  BibTeX  RDF
20Tetiana Moiseienko, Anastasiia Kiva Cybersecurity Startup Investments (short paper). Search on Bibsonomy CPITS II (2) The full citation details ... 2021 DBLP  BibTeX  RDF
20Ihor Subach, Dmytro Mogylevych, Artem Mykytiuk, Volodymyr Kubrak, Stanislav Korotayev Design Methodology of Cybersecurity Situational Center. Search on Bibsonomy CPITS II (1) The full citation details ... 2021 DBLP  BibTeX  RDF
20Igor Skiter, Hennadii Hulak, Viktor Grechaninov, Vitalii Klymenko, Nikolay Ievlev System Approach to the Creation of Cybersecurity Centers of Critical Infrastructure (short paper). Search on Bibsonomy CPITS II (1) The full citation details ... 2021 DBLP  BibTeX  RDF
20Vasyl Buhas, Ihor Ponomarenko, Vlriy Bugas, Andrii Ramskyi, Volodymyr Sokolov Using Machine Learning Techniques to Increase the Effectiveness of Cybersecurity (short paper). Search on Bibsonomy CPITS II (2) The full citation details ... 2021 DBLP  BibTeX  RDF
20Julia Rosén, Jessica Lindblom, Erik Billing Reporting of Ethical Conduct in Human-Robot Interaction Research. Search on Bibsonomy AHFE (10) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
20Eleanor K. Foster, Keith S. Jones, Miriam E. Armstrong, Akbar Siami Namin User Perceptions of Phishing Consequence Severity and Likelihood, and Implications for Warning Message Design. Search on Bibsonomy AHFE (10) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 5667 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license