Results
Found 6468 publication records. Showing 6468 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
31 | Nour Zawawi, Mohamed Hamdy El-Eliemy, Rania El-Gohary, Mohamed F. Tolba 0001 |
Security Issues on Cloud Data Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Bio-inspiring Cyber Security and Cloud Services ![In: Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations, pp. 497-517, 2014, Springer, 978-3-662-43615-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
31 | Reham Amin, Tarek Gaber, Ghada ElTaweel, Aboul Ella Hassanien |
Biometric and Traditional Mobile Authentication Techniques: Overviews and Open Issues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Bio-inspiring Cyber Security and Cloud Services ![In: Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations, pp. 423-446, 2014, Springer, 978-3-662-43615-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
31 | Mohamed Mostafa M. Fouad, Aboul Ella Hassanien |
Key Pre-distribution Techniques for WSN Security Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Bio-inspiring Cyber Security and Cloud Services ![In: Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations, pp. 265-283, 2014, Springer, 978-3-662-43615-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
31 | Ahmed Hammam, Samah Senbel |
A Reputation Trust Management System for Ad-Hoc Mobile Clouds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Bio-inspiring Cyber Security and Cloud Services ![In: Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations, pp. 519-539, 2014, Springer, 978-3-662-43615-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
31 | Yasmine M. Afify, Ibrahim F. Moawad, Nagwa L. Badr, Mohamed Fahmy Tolba |
Cloud Services Discovery and Selection: Survey and New Semantic-Based System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Bio-inspiring Cyber Security and Cloud Services ![In: Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations, pp. 449-477, 2014, Springer, 978-3-662-43615-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
31 | Manal M. Tantawi, Kenneth Revett, Abdel-Badeeh M. Salem, Mohamed Fahmy Tolba |
Electrocardiogram (ECG): A New Burgeoning Utility for Biometric Recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Bio-inspiring Cyber Security and Cloud Services ![In: Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations, pp. 349-382, 2014, Springer, 978-3-662-43615-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
31 | Ayman M. Bahaa Eldin |
TARA: Trusted Ant Colony Multi Agent Based Routing Algorithm for Mobile Ad-Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Bio-inspiring Cyber Security and Cloud Services ![In: Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations, pp. 151-184, 2014, Springer, 978-3-662-43615-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
31 | Konstantin Papatheodorou, Konstantinos Evangelidis |
Protecting and Preserving Ground Water with Monitoring Systems and Vulnerability Maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security and Resiliency Policy Framework ![In: Cyber Security and Resiliency Policy Framework, pp. 135-145, 2014, IOS Press, 978-1-61499-445-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
31 | Milan Maric |
E-Government 3 Web Security Issues: Who, What, When? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security and Resiliency Policy Framework ![In: Cyber Security and Resiliency Policy Framework, pp. 11-17, 2014, IOS Press, 978-1-61499-445-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
31 | Cvetko Andreeski |
Security Issues for Mobile Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security and Resiliency Policy Framework ![In: Cyber Security and Resiliency Policy Framework, pp. 36-48, 2014, IOS Press, 978-1-61499-445-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
31 | Galit M. Ben-Israel |
Development of Defense-Oriented Application Software under Fire: The Case of Israel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security and Resiliency Policy Framework ![In: Cyber Security and Resiliency Policy Framework, pp. 115-126, 2014, IOS Press, 978-1-61499-445-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
31 | George Magklaras, Steven Furnell |
Insider Threat Specification as a Threat Mitigation Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Insider Threats in Cyber Security ![In: Insider Threats in Cyber Security, pp. 219-244, 2010, Springer, 978-1-4419-7132-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
31 | Christian W. Probst, Jeffrey Hunker, Dieter Gollmann, Matt Bishop |
Aspects of Insider Threats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Insider Threats in Cyber Security ![In: Insider Threats in Cyber Security, pp. 1-15, 2010, Springer, 978-1-4419-7132-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
31 | Lizzie Coles-Kemp, Marianthi Theoharidou |
Insider Threat and Information Security Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Insider Threats in Cyber Security ![In: Insider Threats in Cyber Security, pp. 45-71, 2010, Springer, 978-1-4419-7132-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
31 | Ulrich Flegel, Florian Kerschbaum, Philip Miseldine, Ganna Monakova, Richard Wacker, Frank Leymann |
Legally Sustainable Solutions for Privacy Issues in Collaborative Fraud Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Insider Threats in Cyber Security ![In: Insider Threats in Cyber Security, pp. 139-171, 2010, Springer, 978-1-4419-7132-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
31 | Matt Bishop, Sophie Engle, Deborah A. Frincke, Carrie Gates, Frank L. Greitzer, Sean Peisert, Sean Whalen |
A Risk Management Approach to the "Insider Threat". ![Search on Bibsonomy](Pics/bibsonomy.png) |
Insider Threats in Cyber Security ![In: Insider Threats in Cyber Security, pp. 115-137, 2010, Springer, 978-1-4419-7132-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
31 | Peter G. Neumann |
Combatting Insider Threats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Insider Threats in Cyber Security ![In: Insider Threats in Cyber Security, pp. 17-44, 2010, Springer, 978-1-4419-7132-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
31 | Ulrich Flegel, Julien Vayssière, Gunter Bitz |
A State of the Art Survey of Fraud Detection Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Insider Threats in Cyber Security ![In: Insider Threats in Cyber Security, pp. 73-84, 2010, Springer, 978-1-4419-7132-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
31 | Brian M. Bowen, Malek Ben Salem 0001, Angelos D. Keromytis, Salvatore J. Stolfo |
Monitoring Technologies for Mitigating Insider Threats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Insider Threats in Cyber Security ![In: Insider Threats in Cyber Security, pp. 197-217, 2010, Springer, 978-1-4419-7132-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
31 | Jason Crampton, Michael Huth 0001 |
Towards an Access-Control Framework for Countering Insider Threats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Insider Threats in Cyber Security ![In: Insider Threats in Cyber Security, pp. 173-195, 2010, Springer, 978-1-4419-7132-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
31 | Ravi Sahita, Uday R. Savagaonkar |
Towards a Virtualization-enabled Framework for Information Traceability (VFIT). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Insider Attack and Cyber Security ![In: Insider Attack and Cyber Security - Beyond the Hacker, pp. 113-132, 2008, Springer, 978-0-387-77321-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Sara Sinclair, Sean W. Smith |
Preventative Directions For Insider Threat Mitigation Via Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Insider Attack and Cyber Security ![In: Insider Attack and Cyber Security - Beyond the Hacker, pp. 165-194, 2008, Springer, 978-0-387-77321-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Virgil D. Gligor, C. Sekar Chandersekaran |
Surviving Insider Attacks: A Call for System Experiments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Insider Attack and Cyber Security ![In: Insider Attack and Cyber Security - Beyond the Hacker, pp. 153-164, 2008, Springer, 978-0-387-77321-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Charles P. Pfleeger |
Reflections on the Insider Threat. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Insider Attack and Cyber Security ![In: Insider Attack and Cyber Security - Beyond the Hacker, pp. 5-16, 2008, Springer, 978-0-387-77321-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Jeffrey Hunker |
Taking Stock and Looking Forward - An Outsider's Perspective on the Insider Threat. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Insider Attack and Cyber Security ![In: Insider Attack and Cyber Security - Beyond the Hacker, pp. 195-214, 2008, Springer, 978-0-387-77321-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Steven M. Bellovin |
The Insider Attack Problem Nature and Scope. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Insider Attack and Cyber Security ![In: Insider Attack and Cyber Security - Beyond the Hacker, pp. 1-4, 2008, Springer, 978-0-387-77321-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Malek Ben Salem 0001, Shlomo Hershkop, Salvatore J. Stolfo |
A Survey of Insider Attack Detection Research. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Insider Attack and Cyber Security ![In: Insider Attack and Cyber Security - Beyond the Hacker, pp. 69-90, 2008, Springer, 978-0-387-77321-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Michael McCormick |
Data Theft: A Prototypical Insider Threat. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Insider Attack and Cyber Security ![In: Insider Attack and Cyber Security - Beyond the Hacker, pp. 53-68, 2008, Springer, 978-0-387-77321-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Angelos D. Keromytis |
Hard Problems and Research Challenges Concluding Remarks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Insider Attack and Cyber Security ![In: Insider Attack and Cyber Security - Beyond the Hacker, pp. 219-222, 2008, Springer, 978-0-387-77321-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Ravishankar K. Iyer, Paul Dabrowski, Nithin Nakka, Zbigniew Kalbarczyk |
Reconfigurable Tamper-resistant Hardware Support Against Insider Threats: The Trusted ILLIAC Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Insider Attack and Cyber Security ![In: Insider Attack and Cyber Security - Beyond the Hacker, pp. 133-152, 2008, Springer, 978-0-387-77321-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Angelos D. Keromytis |
Hard Problems and Research Challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Insider Attack and Cyber Security ![In: Insider Attack and Cyber Security - Beyond the Hacker, pp. 215-218, 2008, Springer, 978-0-387-77321-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Kevin S. Killourhy, Roy A. Maxion |
Naive Bayes as a Masquerade Detector: Addressing a Chronic Failure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Insider Attack and Cyber Security ![In: Insider Attack and Cyber Security - Beyond the Hacker, pp. 91-112, 2008, Springer, 978-0-387-77321-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Andrew P. Moore, Dawn M. Cappelli, Randall F. Trzeciak |
The "Big Picture" of Insider IT Sabotage Across U.S. Critical Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Insider Attack and Cyber Security ![In: Insider Attack and Cyber Security - Beyond the Hacker, pp. 17-52, 2008, Springer, 978-0-387-77321-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Robert D. Campbell, Elizabeth K. Hawthorne, Karl J. Klee |
The role of two-year colleges in educating the cyber-security workforce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITiCSE ![In: Proceedings of the 8th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, ITiCSE 2003, Thessaloniki, Greece, June 30 - July 2, 2003, pp. 235, 2003, ACM, 1-58113-672-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
cyber-security |
30 | William Bradley Glisson, Kim-Kwang Raymond Choo |
Introduction to the Minitrack on Cyber-of-Things: Cyber Crimes, Cyber Security and Cyber Forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 51st Hawaii International Conference on System Sciences, HICSS 2018, Hilton Waikoloa Village, Hawaii, USA, January 3-6, 2018, pp. 1-2, 2018, ScholarSpace / AIS Electronic Library (AISeL). The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
29 | Benjamin D. Cone, Michael F. Thompson, Cynthia E. Irvine, Thuy D. Nguyen |
Cyber Security Training and Awareness Through Game Play. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy in Dynamic Environments, Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden, pp. 431-436, 2006, Springer, 0-387-33405-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Jose J. Gonzalez |
Towards a Cyber Security Reporting System - A Quality Improvement Process. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAFECOMP ![In: Computer Safety, Reliability, and Security, 24th International Conference, SAFECOMP 2005, Fredrikstad, Norway, September 28-30, 2005, Proceedings, pp. 368-380, 2005, Springer, 3-540-29200-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Jason Diakoumakos, Evangelos Chaskos, Nicholas Kolokotronis, George Lepouras |
Cyber-Range Federation and Cyber-Security Games: A Gamification Scoring Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSR ![In: IEEE International Conference on Cyber Security and Resilience, CSR 2021, Rhodes, Greece, July 26-28, 2021, pp. 186-191, 2021, IEEE, 978-1-6654-0285-9. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Hamidreza Tavafoghi, Yi Ouyang 0002, Demosthenis Teneketzis, Michael P. Wellman |
Game Theoretic Approaches to Cyber Security: Challenges, Results, and Open Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense ![In: Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security, pp. 29-53, 2019, Springer, 978-3-030-30718-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
27 | Rajesh Ganesan, Ankit Shah 0002, Sushil Jajodia, Hasan Cam |
Optimizing Alert Data Management Processes at a Cyber Security Operations Center. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense ![In: Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security, pp. 206-231, 2019, Springer, 978-3-030-30718-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
27 | Erik Miehling, Mohammad Rasouli 0001, Demosthenis Teneketzis |
Control-Theoretic Approaches to Cyber-Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense ![In: Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security, pp. 12-28, 2019, Springer, 978-3-030-30718-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
27 | P. D. Persadha, A. A. Waskita, S. Yazid |
Comparative Study of Cyber Security Policies among Malaysia, Australia, Indonesia: A Responsibility Perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015, pp. 146-150, 2015, IEEE Computer Society, 978-1-4673-8499-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Ryan Goodfellow, Robert Braden, Terry Benzel, David E. Bakken |
First steps toward scientific cyber-security experimentation in wide-area cyber-physical systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSIIRW ![In: Cyber Security and Information Intelligence, CSIIRW '13, Oak Ridge, TN, USA, January 8-10, 2013, pp. 39, 2013, ACM, 978-1-4503-1687-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
27 | Bilal Al Sabbagh, Stewart Kowalski |
ST(CS)2 - Featuring socio-technical cyber security warning systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 312-316, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
27 | Newton Howard, Sergey Kanareykin |
Intention awareness in cyber security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012, pp. 6-11, 2012, IEEE, 978-1-4673-1425-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Kutub Thakur, Meikang Qiu, Keke Gai, Md Liakat Ali |
An Investigation on Cyber Security Threats and Security Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCloud ![In: IEEE 2nd International Conference on Cyber Security and Cloud Computing, CSCloud 2015, New York, NY, USA, November 3-5, 2015, pp. 307-311, 2015, IEEE Computer Society, 978-1-4673-9300-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Denise Ferebee, Dipankar Dasgupta, Michael Schmidt, Qishi Wu |
Security visualization: Cyber security storm map and event correlation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011, pp. 171-178, 2011, IEEE, 978-1-4244-9904-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Huiming Yu, Xiaohong Yuan, Jinsheng Xu, Stephen Providence, Bill Chu, Dechang Gu |
Bridge Information Assurance Education Gap between the Majority and Minority Universities through Collaboration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIS-ICIS ![In: 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 11-13 July 2007, Melbourne, Australia, pp. 1030-1035, 2007, IEEE Computer Society, 0-7695-2841-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Dong-Joo Kang, Hak-Man Kim |
A Method for Determination of Key Distribution Period Using QoS Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FGCN (2) ![In: Future Generation Communication and Networking, FGCN 2007, Ramada Plaza Jeju, Jeju-Island, Korea, December 6-8, 2007, Proceedings, pp. 532-535, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Joe Devanny, Andrew C. Dwyer |
From Cyber Security to Cyber Power: Appraising the Emergence of 'Responsible, Democratic Cyber Power' in UK Strategy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyCon ![In: 15th International Conference on Cyber Conflict: Meeting Reality, CyCon 2023, Tallinn, Estonia, May 30 - June 2, 2023, pp. 381-397, 2023, IEEE, 978-9916-9789-3-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Harjinder Singh Lallie 0001, Lynsay A. Shepherd, Jason R. C. Nurse, Arnau Erola, Gregory Epiphaniou, Carsten Maple, Xavier J. A. Bellekens |
Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 105, pp. 102248, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Harjinder Singh Lallie 0001, Lynsay A. Shepherd, Jason R. C. Nurse, Arnau Erola, Gregory Epiphaniou, Carsten Maple, Xavier J. A. Bellekens |
Cyber Security in the Age of COVID-19: A Timeline and Analysis of Cyber-Crime and Cyber-Attacks during the Pandemic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2006.11929, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
24 | William Bradley Glisson, Kim-Kwang Raymond Choo |
Introduction to Cyber-of-Things: Cyber-crimes and Cyber-Security Minitrack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 50th Hawaii International Conference on System Sciences, HICSS 2017, Hilton Waikoloa Village, Hawaii, USA, January 4-7, 2017, pp. 1-3, 2017, ScholarSpace / AIS Electronic Library (AISeL). The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
24 | Sandeep K. Shukla |
Cyber Security of Cyber Physical Systems: Cyber Threats and Defense of Critical Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLSID ![In: 29th International Conference on VLSI Design and 15th International Conference on Embedded Systems, VLSID 2016, Kolkata, India, January 4-8, 2016, pp. 30-31, 2016, IEEE Computer Society, 978-1-4673-8700-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
24 | Sven Herpig |
Anti-War and the Cyber Triangle: Strategic Implications of Cyber Operations and Cyber Security for the State. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2016 |
RDF |
|
24 | Raghu Santanam 0001, M. Sethumadhavan 0001, Mohit Virendra (eds.) |
Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2011 |
DBLP DOI BibTeX RDF |
|
24 | Deborah J. Bodeau, Richard D. Graubart, Jennifer Fabius-Greene |
Improving Cyber Security and Mission Assurance Via Cyber Preparedness (Cyber Prep) Levels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SocialCom/PASSAT ![In: Proceedings of the 2010 IEEE Second International Conference on Social Computing, SocialCom / IEEE International Conference on Privacy, Security, Risk and Trust, PASSAT 2010, Minneapolis, Minnesota, USA, August 20-22, 2010, pp. 1147-1152, 2010, IEEE Computer Society, 978-0-7695-4211-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
23 | Yin Pan |
Security auditing course development. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGITE Conference ![In: Proceedings of the 8th Conference on Information Technology Education, SIGITE 2007, Destin, Florida, USA, October 18-20, 2007, pp. 259-266, 2007, ACM, 978-1-59593-920-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security, IT education, curriculum development, IT audit |
22 | Bhavani Thuraisingham, Latifur Khan, Mohammad M. Masud 0001, Kevin W. Hamlen |
Data Mining for Security Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC (2) ![In: 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), Shanghai, China, December 17-20, 2008, Volume II: Workshops, pp. 585-589, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Gregory S. Thomas, Bill Nickless, David R. Thiede, Ian Gorton, Bill J. Pitre, Jason E. Christy, Liz Faultersack, Jeffery A. Mauth |
T3: Secure, Scalable, Distributed Data Movement and Remote System Control for Enterprise Level Cyber Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (2) ![In: Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009, Seattle, Washington, USA, July 20-24, 2009. Volume 2, pp. 468-472, 2009, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Susan Landau 0001, Martin R. Stytz, Carl E. Landwehr, Fred B. Schneider |
Overview of Cyber Security: A Crisis of Prioritization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 3(3), pp. 9-11, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
President’s Information Technology Advisory Committee, PITAC, PITAC report, cybersecurity |
21 | Cagatay Catal, Alper Ozcan, Emrah Donmez, Ahmet Kasif |
Analysis of cyber security knowledge gaps based on cyber security body of knowledge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Educ. Inf. Technol. ![In: Educ. Inf. Technol. 28(2), pp. 1809-1831, February 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Cagatay Catal, Alper Ozcan, Emrah Donmez, Ahmet Kasif |
Correction to: Analysis of cyber security knowledge gaps based on cyber security body of knowledge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Educ. Inf. Technol. ![In: Educ. Inf. Technol. 28(2), pp. 2405, February 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Florian Schütz, Bastian Spierau, Florian Rampold, Robert C. Nickerson, Simon Trang 0001 |
Chasing Cyber Security Unicorns: A Taxonomy-based Analysis of Cyber Security Start-ups' Business Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECIS ![In: 31st European Conference on Information Systems - Co-creating Sustainable Digital Futures, ECIS 2023, Kristiansan, Norway, June 11-16, 2023, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
21 | Victor Le Pochat, Wouter Joosen |
Analyzing Cyber Security Research Practices through a Meta-Research Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSET @ USENIX Security Symposium ![In: 2023 Cyber Security Experimentation and Test Workshop, CSET 2023, Marina del Rey, CA, USA, August 7-8, 2023, pp. 64-74, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Andrew Plapp, Jianzhang Wu, Lei Pan, Chao Chen, Caslon Chua, Jun Zhang |
Strengthening Cyber Security Education: Designing Robust Assessments for ChatGPT-Generated Answers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ML4CS ![In: Machine Learning for Cyber Security - 5th International Conference, ML4CS 2023, Yanuca Island, Fiji, December 4-6, 2023, Proceedings, pp. 17-27, 2023, Springer, 978-981-97-2457-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Marek Pawlicki, Rafal Kozik, Michal Choras |
A survey on neural networks for (cyber-) security and (cyber-) security of neural networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Neurocomputing ![In: Neurocomputing 500, pp. 1075-1087, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Lata Nautiyal, Awais Rashid, Joseph Hallett, Ben Shreeve, Michael K, Chris Ensor, Catherine H, Jelena Mirkovic, Blair Taylor |
The United Kingdom's Cyber Security Degree Certification Program: A Cyber Security Body of Knowledge Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 20(1), pp. 87-95, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Awais Rashid |
Why Rigorous Underpinnings for Cyber Security Education and Training Matter? Experiences from CyBOK: The Cyber Security Body of Knowledge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISSP ![In: Proceedings of the 8th International Conference on Information Systems Security and Privacy, ICISSP 2022, Online Streaming, February 9-11, 2022., pp. 5, 2022, SCITEPRESS, 978-989-758-553-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
21 | Anna Georgiadou, Ariadni Michalitsi-Psarrou, Dimitris Askounis |
Evaluating The Cyber-Security Culture of the EPES Sector: Applying a Cyber-Security Culture Framework to assess the EPES Sector's resilience and readiness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23 - 26, 2022, pp. 77:1-77:10, 2022, ACM, 978-1-4503-9670-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Anna Georgiadou, Ariadni Michalitsi-Psarrou, Dimitris Askounis |
Cyber-Security Culture Assessment in Academia: A COVID-19 Study: Applying a Cyber-Security Culture Framework to assess the Academia's resilience and readiness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23 - 26, 2022, pp. 126:1-126:8, 2022, ACM, 978-1-4503-9670-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Durga Prasad Dube, R. P. Mohanty |
The application of cyber security capability maturity model to identify the impact of internal efficiency factors on the external effectiveness of cyber security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Bus. Inf. Syst. ![In: Int. J. Bus. Inf. Syst. 38(3), pp. 367-392, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Jeffrey Kurebwa |
Understanding Cyber Security: A Review of the Cyber Security and Data Protection Bill in Zimbabwe. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Syst. Serv. Oriented Eng. ![In: Int. J. Syst. Serv. Oriented Eng. 11(1), pp. 43-55, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Nicola Fairburn, Andrew Shelton, Frances Ackroyd, Rachel Selfe |
Beyond Murphy's Law: Applying Wider Human Factors Behavioural Science Approaches in Cyber-Security Resilience - An Applied Practice Case Study Discussing Approaches to Assessing Human Factors Vulnerabilities in Cyber-Security Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (27) ![In: HCI for Cybersecurity, Privacy and Trust - Third International Conference, HCI-CPT 2021, Held as Part of the 23rd HCI International Conference, HCII 2021, Virtual Event, July 24-29, 2021, Proceedings, pp. 123-138, 2021, Springer, 978-3-030-77391-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Victoria Knight, Moufida Sadok |
Is cyber-security the new lifeboat? An exploration of the employee's perspective of cyber-security within the cruise ship industry. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STPIS ![In: Proceedings of the 7th International Workshop on Socio-Technical Perspective in IS Development (STPIS 2021), Virtual conference in Trento, Italy, October 11-12, 2021., pp. 216-231, 2021, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
21 | Zheng Xu 0001, Reza M. Parizi, Octavio Loyola-González, Xiaolu Zhang (eds.) |
Cyber Security Intelligence and Analytics - 2021 International Conference on Cyber Security Intelligence and Analytics (CSIA 2021), Shenyang, China, 19-20 March, 2021, Volume 2 ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSIA (2) ![Springer, 978-3-030-69998-7 The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Zheng Xu 0001, Reza M. Parizi, Octavio Loyola-González, Xiaolu Zhang (eds.) |
Cyber Security Intelligence and Analytics - 2021 International Conference on Cyber Security Intelligence and Analytics (CSIA 2021), Shenyang, China, 19-20 March, 2021, Volume 1 ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSIA (1) ![Springer, 978-3-030-70041-6 The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Abhi Patel, Tim Schenk, Steffi Knorn, Heiko Patzlaff, Dragan Obradovic, Andrés Botero Halblaub |
Real-time, Simulation-based Identification of Cyber-Security Attacks of Industrial Plants. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSR ![In: IEEE International Conference on Cyber Security and Resilience, CSR 2021, Rhodes, Greece, July 26-28, 2021, pp. 267-272, 2021, IEEE, 978-1-6654-0285-9. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Matthew Swann, Joseph R. Rose, Gueltoum Bendiab, Stavros Shiaeles, Fudong Li 0001 |
Open Source and Commercial Capture The Flag Cyber Security Learning Platforms - A Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSR ![In: IEEE International Conference on Cyber Security and Resilience, CSR 2021, Rhodes, Greece, July 26-28, 2021, pp. 198-205, 2021, IEEE, 978-1-6654-0285-9. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Eleni-Constantina Davri, Eleni Darra, Isidoros Monogioudis, Athanasios Grigoriadis, Christos Iliou, Notis Mengidis, Theodora Tsikrika, Stefanos Vrochidis, Adamantini Peratikou, Helen Gibson, Damir Haskovic, Dimitrios Kavallieros, Evangelos Chaskos, Peng Zhao, Stavros Shiaeles, Nick Savage 0001, Babak Akhgar, Xavier J. A. Bellekens, Mohamed Amine Ben Farah |
Cyber Security Certification Programmes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSR ![In: IEEE International Conference on Cyber Security and Resilience, CSR 2021, Rhodes, Greece, July 26-28, 2021, pp. 428-435, 2021, IEEE, 978-1-6654-0285-9. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Panagiotis Panagiotidis, Christos Angelidis, Ioannis Karalis, George Spyropoulos, Angelos Liapis |
Act Proactively: An Intrusion Prediction Approach for Cyber Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSR ![In: IEEE International Conference on Cyber Security and Resilience, CSR 2021, Rhodes, Greece, July 26-28, 2021, pp. 8-13, 2021, IEEE, 978-1-6654-0285-9. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Nikolaos Koutsouris, Costas Vassilakis, Nicholas Kolokotronis |
Cyber-Security Training Evaluation Metrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSR ![In: IEEE International Conference on Cyber Security and Resilience, CSR 2021, Rhodes, Greece, July 26-28, 2021, pp. 192-197, 2021, IEEE, 978-1-6654-0285-9. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Maria Tsiodra, Michail Chronopoulos, Matthias Ghering, Eirini Karapistoli, Neofytos Gerosavva, Nicolas Kylilis |
The SPIDER Cyber Security Investment Component (CIC). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSR ![In: IEEE International Conference on Cyber Security and Resilience, CSR 2021, Rhodes, Greece, July 26-28, 2021, pp. 415-421, 2021, IEEE, 978-1-6654-0285-9. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Robert Gove |
Automatic Narrative Summarization for Visualizing Cyber Security Logs and Incident Reports. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSec ![In: IEEE Symposium on Visualization for Cyber Security, VizSec 2021, New Orleans, LA, USA, October 27, 2021, pp. 1-9, 2021, IEEE, 978-1-6654-2085-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Hongbo Sun |
Research on the Innovation and Reform of Art Education and Teaching in the Era of Big Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSIA (2) ![In: Cyber Security Intelligence and Analytics - 2021 International Conference on Cyber Security Intelligence and Analytics (CSIA 2021), Shenyang, China, 19-20 March, 2021, Volume 2, pp. 734-741, 2021, Springer, 978-3-030-69998-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Qing Liu |
Application of Improved Random Forest Algorithm in Physical Training. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSIA (2) ![In: Cyber Security Intelligence and Analytics - 2021 International Conference on Cyber Security Intelligence and Analytics (CSIA 2021), Shenyang, China, 19-20 March, 2021, Volume 2, pp. 768-772, 2021, Springer, 978-3-030-69998-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Chunyan Zhu, Zhen Zhang, Rong Li, Yang Liu, Lu Zheng |
Research on the Application of Internet + VR Technology in Garden Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSIA (2) ![In: Cyber Security Intelligence and Analytics - 2021 International Conference on Cyber Security Intelligence and Analytics (CSIA 2021), Shenyang, China, 19-20 March, 2021, Volume 2, pp. 18-24, 2021, Springer, 978-3-030-69998-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Haihong Liang |
Modern Apprenticeship Talent Training Mechanism System Based on Cloud and Network Integration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSIA (2) ![In: Cyber Security Intelligence and Analytics - 2021 International Conference on Cyber Security Intelligence and Analytics (CSIA 2021), Shenyang, China, 19-20 March, 2021, Volume 2, pp. 711-718, 2021, Springer, 978-3-030-69998-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Feng Yang, Lidan Fan |
Mode of Big Data Analysis Professional Training Based on Network Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSIA (2) ![In: Cyber Security Intelligence and Analytics - 2021 International Conference on Cyber Security Intelligence and Analytics (CSIA 2021), Shenyang, China, 19-20 March, 2021, Volume 2, pp. 861-865, 2021, Springer, 978-3-030-69998-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Huihui Bai 0002, Hao Jin, Yunfeng Yang, Caicai Li |
Ratio Test for Mean Change Based on Financial Time Series Under the Background of Big Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSIA (2) ![In: Cyber Security Intelligence and Analytics - 2021 International Conference on Cyber Security Intelligence and Analytics (CSIA 2021), Shenyang, China, 19-20 March, 2021, Volume 2, pp. 431-436, 2021, Springer, 978-3-030-69998-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Qian Zhang |
Development Trend of Blockchain Technology in Large-Scale Sports Events in the Information Age. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSIA (2) ![In: Cyber Security Intelligence and Analytics - 2021 International Conference on Cyber Security Intelligence and Analytics (CSIA 2021), Shenyang, China, 19-20 March, 2021, Volume 2, pp. 202-209, 2021, Springer, 978-3-030-69998-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Xia Huang, Xiangfa Cao |
Research on the Application of Data Mining Techniques in the Construction of Sports Training Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSIA (2) ![In: Cyber Security Intelligence and Analytics - 2021 International Conference on Cyber Security Intelligence and Analytics (CSIA 2021), Shenyang, China, 19-20 March, 2021, Volume 2, pp. 785-791, 2021, Springer, 978-3-030-69998-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Weixin Kang |
An Empirical Study of the Impact of Margin Financing on the Volatility of the Shanghai Stock Index. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSIA (2) ![In: Cyber Security Intelligence and Analytics - 2021 International Conference on Cyber Security Intelligence and Analytics (CSIA 2021), Shenyang, China, 19-20 March, 2021, Volume 2, pp. 358-364, 2021, Springer, 978-3-030-69998-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Chaofeng Ye, Yanxia Cheng |
Based on Data Analysis of the Influence of Sellers' Humorous Responses on Users' Purchase Intention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSIA (2) ![In: Cyber Security Intelligence and Analytics - 2021 International Conference on Cyber Security Intelligence and Analytics (CSIA 2021), Shenyang, China, 19-20 March, 2021, Volume 2, pp. 408-415, 2021, Springer, 978-3-030-69998-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Xianjun Wang |
Research on Civil Engineering Condition Monitoring Based on Wireless Sensor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSIA (2) ![In: Cyber Security Intelligence and Analytics - 2021 International Conference on Cyber Security Intelligence and Analytics (CSIA 2021), Shenyang, China, 19-20 March, 2021, Volume 2, pp. 816-821, 2021, Springer, 978-3-030-69998-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Xingjun Zhao |
Based on Financial Management Mode of Construction Enterprises Based on Computer Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSIA (2) ![In: Cyber Security Intelligence and Analytics - 2021 International Conference on Cyber Security Intelligence and Analytics (CSIA 2021), Shenyang, China, 19-20 March, 2021, Volume 2, pp. 386-393, 2021, Springer, 978-3-030-69998-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Yan Dong |
Research on Business Administration Information Under the Background of Big Data Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSIA (2) ![In: Cyber Security Intelligence and Analytics - 2021 International Conference on Cyber Security Intelligence and Analytics (CSIA 2021), Shenyang, China, 19-20 March, 2021, Volume 2, pp. 466-471, 2021, Springer, 978-3-030-69998-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Ye Yu |
English Teaching Ability Evaluation Algorithm Based on Big Data Fuzzy K-means Clustering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSIA (2) ![In: Cyber Security Intelligence and Analytics - 2021 International Conference on Cyber Security Intelligence and Analytics (CSIA 2021), Shenyang, China, 19-20 March, 2021, Volume 2, pp. 557-564, 2021, Springer, 978-3-030-69998-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Xiangkun Li, Zhiwei Tian |
A Study on the Strategies of College English Teachers' Job Burnout Under the Information Teaching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSIA (2) ![In: Cyber Security Intelligence and Analytics - 2021 International Conference on Cyber Security Intelligence and Analytics (CSIA 2021), Shenyang, China, 19-20 March, 2021, Volume 2, pp. 603-611, 2021, Springer, 978-3-030-69998-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Pengmei Zhou |
Artificial Intelligence Technology Based on Machine Learning Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSIA (2) ![In: Cyber Security Intelligence and Analytics - 2021 International Conference on Cyber Security Intelligence and Analytics (CSIA 2021), Shenyang, China, 19-20 March, 2021, Volume 2, pp. 930-934, 2021, Springer, 978-3-030-69998-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
Displaying result #301 - #400 of 6468 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ >>] |