The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase cyber-security (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1999-2004 (18) 2005-2006 (20) 2007 (37) 2008 (86) 2009 (136) 2010 (145) 2011 (195) 2012 (162) 2013 (172) 2014 (204) 2015 (326) 2016 (268) 2017 (317) 2018 (423) 2019 (784) 2020 (925) 2021 (803) 2022 (846) 2023 (567) 2024 (34)
Publication types (Num. hits)
article(784) book(13) data(2) incollection(168) inproceedings(5313) phdthesis(54) proceedings(134)
Venues (Conferences, Journals, ...)
CSIIRW(348) CSCloud/EdgeCom(281) ICCSIE(256) CSIA (2)(255) CSR(253) CSIA (1)(247) CSIA(203) CSCML(202) CSCloud(201) VizSEC(157) CoRR(154) FCS(146) SciSec(134) CSNet(131) Cyber Security(125) ACeS(111) More (+10 of total 904)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 98 occurrences of 74 keywords

Results
Found 6468 publication records. Showing 6468 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
31Nour Zawawi, Mohamed Hamdy El-Eliemy, Rania El-Gohary, Mohamed F. Tolba 0001 Security Issues on Cloud Data Services. Search on Bibsonomy Bio-inspiring Cyber Security and Cloud Services The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
31Reham Amin, Tarek Gaber, Ghada ElTaweel, Aboul Ella Hassanien Biometric and Traditional Mobile Authentication Techniques: Overviews and Open Issues. Search on Bibsonomy Bio-inspiring Cyber Security and Cloud Services The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
31Mohamed Mostafa M. Fouad, Aboul Ella Hassanien Key Pre-distribution Techniques for WSN Security Services. Search on Bibsonomy Bio-inspiring Cyber Security and Cloud Services The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
31Ahmed Hammam, Samah Senbel A Reputation Trust Management System for Ad-Hoc Mobile Clouds. Search on Bibsonomy Bio-inspiring Cyber Security and Cloud Services The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
31Yasmine M. Afify, Ibrahim F. Moawad, Nagwa L. Badr, Mohamed Fahmy Tolba Cloud Services Discovery and Selection: Survey and New Semantic-Based System. Search on Bibsonomy Bio-inspiring Cyber Security and Cloud Services The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
31Manal M. Tantawi, Kenneth Revett, Abdel-Badeeh M. Salem, Mohamed Fahmy Tolba Electrocardiogram (ECG): A New Burgeoning Utility for Biometric Recognition. Search on Bibsonomy Bio-inspiring Cyber Security and Cloud Services The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
31Ayman M. Bahaa Eldin TARA: Trusted Ant Colony Multi Agent Based Routing Algorithm for Mobile Ad-Hoc Networks. Search on Bibsonomy Bio-inspiring Cyber Security and Cloud Services The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
31Konstantin Papatheodorou, Konstantinos Evangelidis Protecting and Preserving Ground Water with Monitoring Systems and Vulnerability Maps. Search on Bibsonomy Cyber Security and Resiliency Policy Framework The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
31Milan Maric E-Government 3 Web Security Issues: Who, What, When? Search on Bibsonomy Cyber Security and Resiliency Policy Framework The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
31Cvetko Andreeski Security Issues for Mobile Devices. Search on Bibsonomy Cyber Security and Resiliency Policy Framework The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
31Galit M. Ben-Israel Development of Defense-Oriented Application Software under Fire: The Case of Israel. Search on Bibsonomy Cyber Security and Resiliency Policy Framework The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
31George Magklaras, Steven Furnell Insider Threat Specification as a Threat Mitigation Technique. Search on Bibsonomy Insider Threats in Cyber Security The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
31Christian W. Probst, Jeffrey Hunker, Dieter Gollmann, Matt Bishop Aspects of Insider Threats. Search on Bibsonomy Insider Threats in Cyber Security The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
31Lizzie Coles-Kemp, Marianthi Theoharidou Insider Threat and Information Security Management. Search on Bibsonomy Insider Threats in Cyber Security The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
31Ulrich Flegel, Florian Kerschbaum, Philip Miseldine, Ganna Monakova, Richard Wacker, Frank Leymann Legally Sustainable Solutions for Privacy Issues in Collaborative Fraud Detection. Search on Bibsonomy Insider Threats in Cyber Security The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
31Matt Bishop, Sophie Engle, Deborah A. Frincke, Carrie Gates, Frank L. Greitzer, Sean Peisert, Sean Whalen A Risk Management Approach to the "Insider Threat". Search on Bibsonomy Insider Threats in Cyber Security The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
31Peter G. Neumann Combatting Insider Threats. Search on Bibsonomy Insider Threats in Cyber Security The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
31Ulrich Flegel, Julien Vayssière, Gunter Bitz A State of the Art Survey of Fraud Detection Technology. Search on Bibsonomy Insider Threats in Cyber Security The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
31Brian M. Bowen, Malek Ben Salem 0001, Angelos D. Keromytis, Salvatore J. Stolfo Monitoring Technologies for Mitigating Insider Threats. Search on Bibsonomy Insider Threats in Cyber Security The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
31Jason Crampton, Michael Huth 0001 Towards an Access-Control Framework for Countering Insider Threats. Search on Bibsonomy Insider Threats in Cyber Security The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
31Ravi Sahita, Uday R. Savagaonkar Towards a Virtualization-enabled Framework for Information Traceability (VFIT). Search on Bibsonomy Insider Attack and Cyber Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Sara Sinclair, Sean W. Smith Preventative Directions For Insider Threat Mitigation Via Access Control. Search on Bibsonomy Insider Attack and Cyber Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Virgil D. Gligor, C. Sekar Chandersekaran Surviving Insider Attacks: A Call for System Experiments. Search on Bibsonomy Insider Attack and Cyber Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Charles P. Pfleeger Reflections on the Insider Threat. Search on Bibsonomy Insider Attack and Cyber Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Jeffrey Hunker Taking Stock and Looking Forward - An Outsider's Perspective on the Insider Threat. Search on Bibsonomy Insider Attack and Cyber Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Steven M. Bellovin The Insider Attack Problem Nature and Scope. Search on Bibsonomy Insider Attack and Cyber Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Malek Ben Salem 0001, Shlomo Hershkop, Salvatore J. Stolfo A Survey of Insider Attack Detection Research. Search on Bibsonomy Insider Attack and Cyber Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Michael McCormick Data Theft: A Prototypical Insider Threat. Search on Bibsonomy Insider Attack and Cyber Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Angelos D. Keromytis Hard Problems and Research Challenges Concluding Remarks. Search on Bibsonomy Insider Attack and Cyber Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Ravishankar K. Iyer, Paul Dabrowski, Nithin Nakka, Zbigniew Kalbarczyk Reconfigurable Tamper-resistant Hardware Support Against Insider Threats: The Trusted ILLIAC Approach. Search on Bibsonomy Insider Attack and Cyber Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Angelos D. Keromytis Hard Problems and Research Challenges. Search on Bibsonomy Insider Attack and Cyber Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Kevin S. Killourhy, Roy A. Maxion Naive Bayes as a Masquerade Detector: Addressing a Chronic Failure. Search on Bibsonomy Insider Attack and Cyber Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Andrew P. Moore, Dawn M. Cappelli, Randall F. Trzeciak The "Big Picture" of Insider IT Sabotage Across U.S. Critical Infrastructures. Search on Bibsonomy Insider Attack and Cyber Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
30Robert D. Campbell, Elizabeth K. Hawthorne, Karl J. Klee The role of two-year colleges in educating the cyber-security workforce. Search on Bibsonomy ITiCSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF cyber-security
30William Bradley Glisson, Kim-Kwang Raymond Choo Introduction to the Minitrack on Cyber-of-Things: Cyber Crimes, Cyber Security and Cyber Forensics. Search on Bibsonomy HICSS The full citation details ... 2018 DBLP  BibTeX  RDF
29Benjamin D. Cone, Michael F. Thompson, Cynthia E. Irvine, Thuy D. Nguyen Cyber Security Training and Awareness Through Game Play. Search on Bibsonomy SEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Jose J. Gonzalez Towards a Cyber Security Reporting System - A Quality Improvement Process. Search on Bibsonomy SAFECOMP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Jason Diakoumakos, Evangelos Chaskos, Nicholas Kolokotronis, George Lepouras Cyber-Range Federation and Cyber-Security Games: A Gamification Scoring Model. Search on Bibsonomy CSR The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
27Hamidreza Tavafoghi, Yi Ouyang 0002, Demosthenis Teneketzis, Michael P. Wellman Game Theoretic Approaches to Cyber Security: Challenges, Results, and Open Problems. Search on Bibsonomy Adversarial and Uncertain Reasoning for Adaptive Cyber Defense The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
27Rajesh Ganesan, Ankit Shah 0002, Sushil Jajodia, Hasan Cam Optimizing Alert Data Management Processes at a Cyber Security Operations Center. Search on Bibsonomy Adversarial and Uncertain Reasoning for Adaptive Cyber Defense The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
27Erik Miehling, Mohammad Rasouli 0001, Demosthenis Teneketzis Control-Theoretic Approaches to Cyber-Security. Search on Bibsonomy Adversarial and Uncertain Reasoning for Adaptive Cyber Defense The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
27P. D. Persadha, A. A. Waskita, S. Yazid Comparative Study of Cyber Security Policies among Malaysia, Australia, Indonesia: A Responsibility Perspective. Search on Bibsonomy CyberSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
27Ryan Goodfellow, Robert Braden, Terry Benzel, David E. Bakken First steps toward scientific cyber-security experimentation in wide-area cyber-physical systems. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
27Bilal Al Sabbagh, Stewart Kowalski ST(CS)2 - Featuring socio-technical cyber security warning systems. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
27Newton Howard, Sergey Kanareykin Intention awareness in cyber security. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Kutub Thakur, Meikang Qiu, Keke Gai, Md Liakat Ali An Investigation on Cyber Security Threats and Security Models. Search on Bibsonomy CSCloud The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
25Denise Ferebee, Dipankar Dasgupta, Michael Schmidt, Qishi Wu Security visualization: Cyber security storm map and event correlation. Search on Bibsonomy CICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Huiming Yu, Xiaohong Yuan, Jinsheng Xu, Stephen Providence, Bill Chu, Dechang Gu Bridge Information Assurance Education Gap between the Majority and Minority Universities through Collaboration. Search on Bibsonomy ACIS-ICIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Dong-Joo Kang, Hak-Man Kim A Method for Determination of Key Distribution Period Using QoS Function. Search on Bibsonomy FGCN (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Joe Devanny, Andrew C. Dwyer From Cyber Security to Cyber Power: Appraising the Emergence of 'Responsible, Democratic Cyber Power' in UK Strategy. Search on Bibsonomy CyCon The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Harjinder Singh Lallie 0001, Lynsay A. Shepherd, Jason R. C. Nurse, Arnau Erola, Gregory Epiphaniou, Carsten Maple, Xavier J. A. Bellekens Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Search on Bibsonomy Comput. Secur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Harjinder Singh Lallie 0001, Lynsay A. Shepherd, Jason R. C. Nurse, Arnau Erola, Gregory Epiphaniou, Carsten Maple, Xavier J. A. Bellekens Cyber Security in the Age of COVID-19: A Timeline and Analysis of Cyber-Crime and Cyber-Attacks during the Pandemic. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
24William Bradley Glisson, Kim-Kwang Raymond Choo Introduction to Cyber-of-Things: Cyber-crimes and Cyber-Security Minitrack. Search on Bibsonomy HICSS The full citation details ... 2017 DBLP  BibTeX  RDF
24Sandeep K. Shukla Cyber Security of Cyber Physical Systems: Cyber Threats and Defense of Critical Infrastructures. Search on Bibsonomy VLSID The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Sven Herpig Anti-War and the Cyber Triangle: Strategic Implications of Cyber Operations and Cyber Security for the State. Search on Bibsonomy 2016   RDF
24Raghu Santanam 0001, M. Sethumadhavan 0001, Mohit Virendra (eds.) Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives. Search on Bibsonomy 2011 DBLP  DOI  BibTeX  RDF
24Deborah J. Bodeau, Richard D. Graubart, Jennifer Fabius-Greene Improving Cyber Security and Mission Assurance Via Cyber Preparedness (Cyber Prep) Levels. Search on Bibsonomy SocialCom/PASSAT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
23Yin Pan Security auditing course development. Search on Bibsonomy SIGITE Conference The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, IT education, curriculum development, IT audit
22Bhavani Thuraisingham, Latifur Khan, Mohammad M. Masud 0001, Kevin W. Hamlen Data Mining for Security Applications. Search on Bibsonomy EUC (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Gregory S. Thomas, Bill Nickless, David R. Thiede, Ian Gorton, Bill J. Pitre, Jason E. Christy, Liz Faultersack, Jeffery A. Mauth T3: Secure, Scalable, Distributed Data Movement and Remote System Control for Enterprise Level Cyber Security. Search on Bibsonomy COMPSAC (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Susan Landau 0001, Martin R. Stytz, Carl E. Landwehr, Fred B. Schneider Overview of Cyber Security: A Crisis of Prioritization. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF President’s Information Technology Advisory Committee, PITAC, PITAC report, cybersecurity
21Cagatay Catal, Alper Ozcan, Emrah Donmez, Ahmet Kasif Analysis of cyber security knowledge gaps based on cyber security body of knowledge. Search on Bibsonomy Educ. Inf. Technol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Cagatay Catal, Alper Ozcan, Emrah Donmez, Ahmet Kasif Correction to: Analysis of cyber security knowledge gaps based on cyber security body of knowledge. Search on Bibsonomy Educ. Inf. Technol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Florian Schütz, Bastian Spierau, Florian Rampold, Robert C. Nickerson, Simon Trang 0001 Chasing Cyber Security Unicorns: A Taxonomy-based Analysis of Cyber Security Start-ups' Business Models. Search on Bibsonomy ECIS The full citation details ... 2023 DBLP  BibTeX  RDF
21Victor Le Pochat, Wouter Joosen Analyzing Cyber Security Research Practices through a Meta-Research Framework. Search on Bibsonomy CSET @ USENIX Security Symposium The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Andrew Plapp, Jianzhang Wu, Lei Pan, Chao Chen, Caslon Chua, Jun Zhang Strengthening Cyber Security Education: Designing Robust Assessments for ChatGPT-Generated Answers. Search on Bibsonomy ML4CS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Marek Pawlicki, Rafal Kozik, Michal Choras A survey on neural networks for (cyber-) security and (cyber-) security of neural networks. Search on Bibsonomy Neurocomputing The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
21Lata Nautiyal, Awais Rashid, Joseph Hallett, Ben Shreeve, Michael K, Chris Ensor, Catherine H, Jelena Mirkovic, Blair Taylor The United Kingdom's Cyber Security Degree Certification Program: A Cyber Security Body of Knowledge Case Study. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
21Awais Rashid Why Rigorous Underpinnings for Cyber Security Education and Training Matter? Experiences from CyBOK: The Cyber Security Body of Knowledge. Search on Bibsonomy ICISSP The full citation details ... 2022 DBLP  BibTeX  RDF
21Anna Georgiadou, Ariadni Michalitsi-Psarrou, Dimitris Askounis Evaluating The Cyber-Security Culture of the EPES Sector: Applying a Cyber-Security Culture Framework to assess the EPES Sector's resilience and readiness. Search on Bibsonomy ARES The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
21Anna Georgiadou, Ariadni Michalitsi-Psarrou, Dimitris Askounis Cyber-Security Culture Assessment in Academia: A COVID-19 Study: Applying a Cyber-Security Culture Framework to assess the Academia's resilience and readiness. Search on Bibsonomy ARES The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
21Durga Prasad Dube, R. P. Mohanty The application of cyber security capability maturity model to identify the impact of internal efficiency factors on the external effectiveness of cyber security. Search on Bibsonomy Int. J. Bus. Inf. Syst. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Jeffrey Kurebwa Understanding Cyber Security: A Review of the Cyber Security and Data Protection Bill in Zimbabwe. Search on Bibsonomy Int. J. Syst. Serv. Oriented Eng. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Nicola Fairburn, Andrew Shelton, Frances Ackroyd, Rachel Selfe Beyond Murphy's Law: Applying Wider Human Factors Behavioural Science Approaches in Cyber-Security Resilience - An Applied Practice Case Study Discussing Approaches to Assessing Human Factors Vulnerabilities in Cyber-Security Systems. Search on Bibsonomy HCI (27) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Victoria Knight, Moufida Sadok Is cyber-security the new lifeboat? An exploration of the employee's perspective of cyber-security within the cruise ship industry. Search on Bibsonomy STPIS The full citation details ... 2021 DBLP  BibTeX  RDF
21Zheng Xu 0001, Reza M. Parizi, Octavio Loyola-González, Xiaolu Zhang (eds.) Cyber Security Intelligence and Analytics - 2021 International Conference on Cyber Security Intelligence and Analytics (CSIA 2021), Shenyang, China, 19-20 March, 2021, Volume 2 Search on Bibsonomy CSIA (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Zheng Xu 0001, Reza M. Parizi, Octavio Loyola-González, Xiaolu Zhang (eds.) Cyber Security Intelligence and Analytics - 2021 International Conference on Cyber Security Intelligence and Analytics (CSIA 2021), Shenyang, China, 19-20 March, 2021, Volume 1 Search on Bibsonomy CSIA (1) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Abhi Patel, Tim Schenk, Steffi Knorn, Heiko Patzlaff, Dragan Obradovic, Andrés Botero Halblaub Real-time, Simulation-based Identification of Cyber-Security Attacks of Industrial Plants. Search on Bibsonomy CSR The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Matthew Swann, Joseph R. Rose, Gueltoum Bendiab, Stavros Shiaeles, Fudong Li 0001 Open Source and Commercial Capture The Flag Cyber Security Learning Platforms - A Case Study. Search on Bibsonomy CSR The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Eleni-Constantina Davri, Eleni Darra, Isidoros Monogioudis, Athanasios Grigoriadis, Christos Iliou, Notis Mengidis, Theodora Tsikrika, Stefanos Vrochidis, Adamantini Peratikou, Helen Gibson, Damir Haskovic, Dimitrios Kavallieros, Evangelos Chaskos, Peng Zhao, Stavros Shiaeles, Nick Savage 0001, Babak Akhgar, Xavier J. A. Bellekens, Mohamed Amine Ben Farah Cyber Security Certification Programmes. Search on Bibsonomy CSR The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Panagiotis Panagiotidis, Christos Angelidis, Ioannis Karalis, George Spyropoulos, Angelos Liapis Act Proactively: An Intrusion Prediction Approach for Cyber Security. Search on Bibsonomy CSR The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Nikolaos Koutsouris, Costas Vassilakis, Nicholas Kolokotronis Cyber-Security Training Evaluation Metrics. Search on Bibsonomy CSR The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Maria Tsiodra, Michail Chronopoulos, Matthias Ghering, Eirini Karapistoli, Neofytos Gerosavva, Nicolas Kylilis The SPIDER Cyber Security Investment Component (CIC). Search on Bibsonomy CSR The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Robert Gove Automatic Narrative Summarization for Visualizing Cyber Security Logs and Incident Reports. Search on Bibsonomy VizSec The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Hongbo Sun Research on the Innovation and Reform of Art Education and Teaching in the Era of Big Data. Search on Bibsonomy CSIA (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Qing Liu Application of Improved Random Forest Algorithm in Physical Training. Search on Bibsonomy CSIA (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Chunyan Zhu, Zhen Zhang, Rong Li, Yang Liu, Lu Zheng Research on the Application of Internet + VR Technology in Garden Design. Search on Bibsonomy CSIA (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Haihong Liang Modern Apprenticeship Talent Training Mechanism System Based on Cloud and Network Integration. Search on Bibsonomy CSIA (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Feng Yang, Lidan Fan Mode of Big Data Analysis Professional Training Based on Network Security. Search on Bibsonomy CSIA (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Huihui Bai 0002, Hao Jin, Yunfeng Yang, Caicai Li Ratio Test for Mean Change Based on Financial Time Series Under the Background of Big Data. Search on Bibsonomy CSIA (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Qian Zhang Development Trend of Blockchain Technology in Large-Scale Sports Events in the Information Age. Search on Bibsonomy CSIA (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Xia Huang, Xiangfa Cao Research on the Application of Data Mining Techniques in the Construction of Sports Training Models. Search on Bibsonomy CSIA (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Weixin Kang An Empirical Study of the Impact of Margin Financing on the Volatility of the Shanghai Stock Index. Search on Bibsonomy CSIA (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Chaofeng Ye, Yanxia Cheng Based on Data Analysis of the Influence of Sellers' Humorous Responses on Users' Purchase Intention. Search on Bibsonomy CSIA (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Xianjun Wang Research on Civil Engineering Condition Monitoring Based on Wireless Sensor. Search on Bibsonomy CSIA (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Xingjun Zhao Based on Financial Management Mode of Construction Enterprises Based on Computer Technology. Search on Bibsonomy CSIA (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Yan Dong Research on Business Administration Information Under the Background of Big Data Technology. Search on Bibsonomy CSIA (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Ye Yu English Teaching Ability Evaluation Algorithm Based on Big Data Fuzzy K-means Clustering. Search on Bibsonomy CSIA (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Xiangkun Li, Zhiwei Tian A Study on the Strategies of College English Teachers' Job Burnout Under the Information Teaching. Search on Bibsonomy CSIA (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Pengmei Zhou Artificial Intelligence Technology Based on Machine Learning Algorithm. Search on Bibsonomy CSIA (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #400 of 6468 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license