The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Countermeasures with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1968-1996 (15) 1997-1998 (15) 1999-2000 (17) 2001 (26) 2002 (38) 2003 (53) 2004 (74) 2005 (110) 2006 (118) 2007 (123) 2008 (125) 2009 (119) 2010 (51) 2011 (64) 2012 (80) 2013 (74) 2014 (87) 2015 (85) 2016 (78) 2017 (100) 2018 (128) 2019 (136) 2020 (165) 2021 (195) 2022 (156) 2023 (178) 2024 (36)
Publication types (Num. hits)
article(917) book(3) incollection(31) inproceedings(1433) phdthesis(62)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1065 occurrences of 522 keywords

Results
Found 2446 publication records. Showing 2446 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
13Troya Çagil Köylü Countermeasures against Fault Injection Attacks in Neural Networks and Processors. Search on Bibsonomy 2023   RDF
13Changzhen Li, Xin Zhao Research on the Influence of Artificial Intelligence Technology with web 3.0 on Accounting Education and Its Countermeasures. Search on Bibsonomy ACM Trans. Asian Low Resour. Lang. Inf. Process. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Ali F. Al-Qahtani, Stefano Cresci The COVID-19 scamdemic: A survey of phishing attacks and their countermeasures during COVID-19. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13N. Suriya, S. Vijay Shankar A novel ensembling of deep learning based intrusion detection system and scroll chaotic countermeasures for electric vehicle charging system. Search on Bibsonomy J. Intell. Fuzzy Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Koshiro Suzuki A North-South Problem in Civic-Tech and Volunteered Geographic Information as Countermeasures of COVID-19: A Brief Overview. Search on Bibsonomy SN Comput. Sci. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13 Research on the Detection Countermeasures of Telecommunication Network Fraud Based on Big Data for Killing Pigs and Plates. Search on Bibsonomy J. Robotics The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Jeet Rabari, P. Arun Raj Kumar A survey on interest packet flooding attacks and its countermeasures in named data networking. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Aaron Spence, Shaun Bangay Security beyond cybersecurity: side-channel attacks against non-cyber systems and their countermeasures. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Jean-Paul A. Yaacoub, Hassan N. Noura, Ola Salman, Ali Chehab Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13G. Nagarajan, Serin V. Simpson, R. I. Minu Chapter Thirteen - Edge computing security: Layered classification of attacks and possible countermeasures. Search on Bibsonomy Adv. Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Masahiro Sasabe, Masanari Yamamoto, Yuanyu Zhang, Shoji Kasahara Block diffusion delay attack and its countermeasures in a Bitcoin network. Search on Bibsonomy Int. J. Netw. Manag. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Avtar Singh, Navjot Kaur, Harpreet Kaur An extensive vulnerability assessment and countermeasures in open network operating system software defined networking controller. Search on Bibsonomy Concurr. Comput. Pract. Exp. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Mohammad Erfan Mazaheri, Siavash Bayat Sarmadi, Farhad Taheri Ardakani A Study of Timing Side-Channel Attacks and Countermeasures on JavaScript and WebAssembly. Search on Bibsonomy ISC Int. J. Inf. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Haozhe Zhou, Amin Milani Fard, Adetokunbo Makanju The State of Ethereum Smart Contracts Security: Vulnerabilities, Countermeasures, and Tool Support. Search on Bibsonomy J. Cybersecur. Priv. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Rajat Kaushik, Sandip Banerjee Predator-prey system with multiple delays: prey's countermeasures against juvenile predators in the predator-prey conflict. Search on Bibsonomy J. Appl. Math. Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Syed Khandker, Hannu Turtiainen, Andrei Costin, Timo Hämäläinen 0002 Cybersecurity Attacks on Software Logic and Error Handling Within ADS-B Implementations: Systematic Testing of Resilience and Countermeasures. Search on Bibsonomy IEEE Trans. Aerosp. Electron. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Anurag Gupta, Vikram Krishnamurthy Principal-Agent Problem as a Principled Approach to Electronic Counter-Countermeasures in Radar. Search on Bibsonomy IEEE Trans. Aerosp. Electron. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Baydaa Hashim Mohammed, Hasimi Sallehudin, Shaymaa Abdelghany Mohamed, Nurhizam Safie Mohd Satar, Afifuddin Husairi Bin Hussain Internet of Things-Building Information Modeling Integration: Attacks, Challenges, and Countermeasures. Search on Bibsonomy IEEE Access The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Parya Haji Mirzaee, Mohammad Shojafar, Haitham S. Cruickshank, Rahim Tafazolli Smart Grid Security and Privacy: From Conventional to Machine Learning Issues (Threats and Countermeasures). Search on Bibsonomy IEEE Access The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Md. Mostafizur Rahman Komol, Jack Pinnow, Mohammed Elhenawy, Shamsunnahar Yasmin, Mahmoud Masoud, Sebastien Glaser, Andry Rakotonirainy A Review on Drivers' Red Light Running Behavior Predictions and Technology Based Countermeasures. Search on Bibsonomy IEEE Access The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Pablo Arteaga-Díaz, Daniel Cano, Veronica Fernandez Practical Side-Channel Attack on Free-Space QKD Systems With Misaligned Sources and Countermeasures. Search on Bibsonomy IEEE Access The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Francisco Eugenio Potestad-Ordóñez, Erica Tena-Sánchez, Antonio J. Acosta 0001, Carlos Jesús Jiménez-Fernández, Ricardo Chaves Design and Evaluation of Countermeasures Against Fault Injection Attacks and Power Side-Channel Leakage Exploration for AES Block Cipher. Search on Bibsonomy IEEE Access The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Wojciech Widel, Preetam Mukherjee 0001, Mathias Ekstedt Security Countermeasures Selection Using the Meta Attack Language and Probabilistic Attack Graphs. Search on Bibsonomy IEEE Access The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Shun Hinatsu, Nori Matsuda, Hiroki Ishizuka, Sei Ikeda, Osamu Oshiro Identification of PPG Measurement Sites Toward Countermeasures Against Biometric Presentation Attacks. Search on Bibsonomy IEEE Access The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Robert Flowers Performance Impact of Header-Based Network Steganographic Countermeasures. Search on Bibsonomy IEEE Access The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Huanping Guo Research on the Current Situation and Countermeasures of English Listening Teaching Based on Multimedia Intelligent-Embedded Processor. Search on Bibsonomy J. Sensors The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Jiadai Wang, Jiajia Liu 0001 Deep Learning for Securing Software-Defined Industrial Internet of Things: Attacks and Countermeasures. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Fadhila Tlili, Lamia Chaari Fourati, Samiha Ayed, Bassem Ouni Investigation on vulnerabilities, threats and attacks prohibiting UAVs charging and depleting UAVs batteries: Assessments & countermeasures. Search on Bibsonomy Ad Hoc Networks The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Muhammad Asif Zahoor Raja, Ammara Mehmood, Sadia Ashraf, Khalid Mahmood Awan, Peng Shi 0001 Design of evolutionary finite difference solver for numerical treatment of computer virus propagation with countermeasures model. Search on Bibsonomy Math. Comput. Simul. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Igor V. Kotenko, Igor Saenko 0001, Igor Parashchuk, Elena Doynikova An approach for selecting countermeasures against harmful information based on uncertainty management. Search on Bibsonomy Comput. Sci. Inf. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Zhenxiu Liu, Meng Wang, Lifeng Wu 0001 Countermeasures of Double Carbon Targets in Beijing-Tianjin-Hebei Region by Using Grey Model. Search on Bibsonomy Axioms The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Abdullah M. Algarni, Vijey Thayananthan Autonomous Vehicles: The Cybersecurity Vulnerabilities and Countermeasures for Big Data Communication. Search on Bibsonomy Symmetry The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Petter Solnør, Øystein Volden, Kristoffer Gryte, Slobodan Petrovic, Thor I. Fossen Hijacking of unmanned surface vehicles: A demonstration of attacks and countermeasures in the field. Search on Bibsonomy J. Field Robotics The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Renjie Xie, Jiahao Cao, Qi Li 0002, Kun Sun 0001, Guofei Gu, Mingwei Xu, Yuan Yang 0001 Disrupting the SDN Control Channel via Shared Links: Attacks and Countermeasures. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Hyo Jin Jo, Wonsuk Choi A Survey of Attacks on Controller Area Networks and Corresponding Countermeasures. Search on Bibsonomy IEEE Trans. Intell. Transp. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Rakan Alsowail, Taher Al-Shehari Techniques and countermeasures for preventing insider threats. Search on Bibsonomy PeerJ Comput. Sci. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Yaoteng Zhao, Li Xin Research on green innovation countermeasures of supporting the circular economy to green finance under big data. Search on Bibsonomy J. Enterp. Inf. Manag. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Chen Wang 0011, Jian Chen, Yang Yang 0060, Xiaoqiang Ma, Jiangchuan Liu Poisoning attacks and countermeasures in intelligent networks: Status quo and prospects. Search on Bibsonomy Digit. Commun. Networks The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Qi Chen, Dongyan Zhao 0005, Liang Liu, Xuesong Yan, Yidong Yuan, Xige Zhang, Hongmei Wu, Zhe Wang Side-channel information leakage analysis and countermeasures in an embedded CPU microarchitecture. Search on Bibsonomy Comput. Stand. Interfaces The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Wenjun Bi, Guo Chen 0002, Kaifeng Zhang Profit-Oriented False Data Injection Attack Against Wind Farms and Countermeasures. Search on Bibsonomy IEEE Syst. J. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Louay Karadsheh, Haroun Alryalat, Ja'far Alqatawna, Samer Fawaz Alhawari, Mufleh Amin Al-Jarrah The Impact of Social Engineer Attack Phases on Improved Security Countermeasures: Social Engineer Involvement as Mediating Variable. Search on Bibsonomy Int. J. Digit. Crime Forensics The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Pengfei Gao, Hongyi Xie, Pu Sun, Jun Zhang, Fu Song, Taolue Chen Formal Verification of Masking Countermeasures for Arithmetic Programs. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13T. Manoj Kumar, P. Karthigaikumar An Effective Software Based Method to Analyze SCA Countermeasures for Advanced Encryption Standard. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Dorsaf Swessi, Hanen Idoudi A Survey on Internet-of-Things Security: Threats and Emerging Countermeasures. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Rachid Zagrouba, Reem Alhajri Machine Learning based Attacks Detection and Countermeasures in IoT. Search on Bibsonomy Int. J. Commun. Networks Inf. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Maria Papaioannou, Marina Karageorgou, Georgios Mantas, Victor Sucasas, Ismael Essop, Jonathan Rodriguez 0001, Dimitrios K. Lymberopoulos A Survey on Security Threats and Countermeasures in Internet of Medical Things (IoMT). Search on Bibsonomy Trans. Emerg. Telecommun. Technol. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Sudeep Pasricha, John Jose, Sujay Deb Electronic, Wireless, and Photonic Network-on-Chip Security: Challenges and Countermeasures. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Vasiliki Demertzi, Stavros Demertzis, Konstantinos Demertzis An Overview of Cyber Threats, Attacks, and Countermeasures on the Primary Domains of Smart Cities. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Huming Qiu, Hua Ma, Zhi Zhang 0001, Alsharif Abuadbba, Wei Kang, Anmin Fu, Yansong Gao Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Peng Ye, Zhifeng Jiang, Wei Wang 0030, Bo Li 0001, Baochun Li Feature Reconstruction Attacks and Countermeasures of DNN training in Vertical Federated Learning. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Wentao Chen, Fuzhou Wang, Matthew Edwards 0001 Active Countermeasures for Email Fraud. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Sen Yang, Fan Zhang, Ken Huang, Xi Chen, Youwei Yang, Feng Zhu 0023 SoK: MEV Countermeasures: Theory and Practice. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Jiajing Wu, Kaixin Lin, Dan Lin 0007, Ziye Zheng, Huawei Huang, Zibin Zheng Financial Crimes in Web3-empowered Metaverse: Taxonomy, Countermeasures, and Opportunities. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Lin Zhang, Xin Wang 0037, Erica Cooper, Nicholas W. D. Evans, Junichi Yamagishi The PartialSpoof Database and Countermeasures for the Detection of Short Generated Audio Segments Embedded in a Speech Utterance. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Darren Cobian Comprehensive Efficiency Analysis of Machine Learning Algorithms for Developing Hardware-Based Cybersecurity Countermeasures. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  BibTeX  RDF
13Tim Franzmeyer, João F. Henriques, Jakob N. Foerster, Philip H. S. Torr, Adel Bibi, Christian Schröder de Witt Illusionary Attacks on Sequential Decision Makers and Countermeasures. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Awais Khan 0007, Khalid Mahmood Malik, James Ryan, Mikul Saravanan Voice Spoofing Countermeasures: Taxonomy, State-of-the-art, experimental analysis of generalizability, open challenges, and the way forward. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Yinhao Jiang, Ba Dung Le, Tanveer A. Zia, Praveen Gauravaram Privacy Concerns Raised by Pervasive User Data Collection From Cyberspace and Their Countermeasures. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  BibTeX  RDF
13Cato Pauling, Michael Gimson, Muhammed Qaid, Ahmad Kida, Basel Halak A Tutorial on Adversarial Learning Attacks and Countermeasures. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  BibTeX  RDF
13Pasika Ranaweera, Anca Jurcut, Madhusanka Liyanage MEC-enabled 5G Use Cases: A Survey on Security Vulnerabilities and Countermeasures. Search on Bibsonomy ACM Comput. Surv. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Emad Aliwa, Omer F. Rana, Charith Perera, Peter Burnap Cyberattacks and Countermeasures for In-Vehicle Networks. Search on Bibsonomy ACM Comput. Surv. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Shufan Fei, Zheng Yan 0002, Wenxiu Ding, Haomeng Xie Security Vulnerabilities of SGX and Countermeasures: A Survey. Search on Bibsonomy ACM Comput. Surv. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Eva Papadogiannaki, Sotiris Ioannidis A Survey on Encrypted Network Traffic Analysis Applications, Techniques, and Countermeasures. Search on Bibsonomy ACM Comput. Surv. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Subodha Charles, Prabhat Mishra 0001 A Survey of Network-on-Chip Security Attacks and Countermeasures. Search on Bibsonomy ACM Comput. Surv. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Simone Raponi, Savio Sciancalepore, Gabriele Oligeri, Roberto Di Pietro Road Traffic Poisoning of Navigation Apps: Threats and Countermeasures. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13 Developing Countermeasures of Integrating Entrepreneurship Education with Professional Education in Colleges and Universities Using Data Mining. Search on Bibsonomy J. Electr. Comput. Eng. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Renato Lo Cigno, Francesco Gringoli, Marco Cominelli, Lorenzo Ghiro Integrating CSI Sensing in Wireless Networks: Challenges to Privacy and Countermeasures. Search on Bibsonomy IEEE Netw. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Mostafa Shokry, Ali Ismail Awad, Mahmoud Khaled Abd-Ellah, Ashraf A. M. Khalaf Systematic survey of advanced metering infrastructure security: Vulnerabilities, attacks, countermeasures, and future vision. Search on Bibsonomy Future Gener. Comput. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Li Duan, Yangyang Sun, Kejia Zhang, Yong Ding 0005 Multiple-Layer Security Threats on the Ethereum Blockchain and Their Countermeasures. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Hongning Wang Big Data Security Management Countermeasures in the Prevention and Control of Computer Network Crime. Search on Bibsonomy J. Glob. Inf. Manag. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Xingyu Zhang, Xiongwei Zhang, Wei Liu, Xia Zou, Meng Sun 0001, Jian Zhao 0006 Waveform level adversarial example generation for joint attacks against both automatic speaker verification and spoofing countermeasures. Search on Bibsonomy Eng. Appl. Artif. Intell. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Khizar Hameed, Mutaz Barika, Saurabh Garg 0001, Muhammad Bilal Amin, Byeong Kang 0001 A taxonomy study on securing Blockchain-based Industrial applications: An overview, application perspectives, requirements, attacks, countermeasures, and open issues. Search on Bibsonomy J. Ind. Inf. Integr. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Timo Bartkewitz, Sven Bettendorf, Thorben Moos, Amir Moradi 0001, Falk Schellenberg Beware of Insufficient Redundancy An Experimental Evaluation of Code-based FI Countermeasures. Search on Bibsonomy IACR Trans. Cryptogr. Hardw. Embed. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Sven Bauer, Hermann Drexler, Max Gebhardt, Dominik Klein 0001, Friederike Laus, Johannes Mittmann Attacks Against White-Box ECDSA and Discussion of Countermeasures A Report on the WhibOx Contest 2021. Search on Bibsonomy IACR Trans. Cryptogr. Hardw. Embed. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Sven Bauer, Hermann Drexler, Maximilian Gebhardt, Dominik Klein 0001, Friederike Laus, Johannes Mittmann Attacks Against White-Box ECDSA and Discussion of Countermeasures - A Report on the WhibOx Contest 2021. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
13Martin Brisfors, Michail Moraitis, Elena Dubrova Side-Channel Attack Countermeasures Based On Clock Randomization Have a Fundamental Flaw. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
13Chengbin Jin, Yongbin Zhou, Xinkuan Qiu, Qi Feng, Qian Zhang 0042 Breaking real-world COTS USIM cards with unknown side-channel countermeasures. Search on Bibsonomy Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Boyu Kuang, Anmin Fu, Willy Susilo, Shui Yu 0001, Yansong Gao A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects. Search on Bibsonomy Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Badis Hammi, Sherali Zeadally, Rida Khatoun, Jamel Nebhen Survey on smart homes: Vulnerabilities, risks, and countermeasures. Search on Bibsonomy Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Sudeep Pasricha, John Jose, Sujay Deb Electronic, Wireless, and Photonic Network-on-Chip Security: Challenges and Countermeasures. Search on Bibsonomy IEEE Des. Test The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Sarah N. Alyami, Randah Alharbi, Farag Azzedin Fragmentation Attacks and Countermeasures on 6LoWPAN Internet of Things Networks: Survey and Simulation. Search on Bibsonomy Sensors The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Wahab Khawaja, Vasilii Semkin, Naeem Iqbal Ratyal, Qasim Yaqoob, Jibran Gul, Ismail Güvenç Threats from and Countermeasures for Unmanned Aerial and Underwater Vehicles. Search on Bibsonomy Sensors The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Henri Ruotsalainen, Guanxiong Shen, Junqing Zhang, Radek Fujdiak LoRaWAN Physical Layer-Based Attacks and Countermeasures, A Review. Search on Bibsonomy Sensors The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Xiao Lu 0001, Nguyen Cong Luong, Dinh Thai Hoang, Dusit Niyato, Yong Xiao, Ping Wang 0001 Secure Wirelessly Powered Networks at the Physical Layer: Challenges, Countermeasures, and Road Ahead. Search on Bibsonomy Proc. IEEE The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Inaam Ilahi, Muhammad Usama, Junaid Qadir 0001, Muhammad Umar Janjua, Ala I. Al-Fuqaha, Dinh Thai Hoang, Dusit Niyato Challenges and Countermeasures for Adversarial Attacks on Deep Reinforcement Learning. Search on Bibsonomy IEEE Trans. Artif. Intell. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Gang Sun, Xiaoping Li, Degang Chen 0002 Ranking defects and solving countermeasures for Pythagorean fuzzy sets with hesitant degree. Search on Bibsonomy Int. J. Mach. Learn. Cybern. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Lu Kong, Wen Zhao Analysis and Countermeasures of Engineers' Ethical Behaviors in China. Search on Bibsonomy IEEE Technol. Soc. Mag. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Anton O. Belousov, Yevgeniy S. Zhechev, Evgeniya B. Chernikova, Alexander V. Nosov, Talgat R. Gazizov UAVs Protection and Countermeasures in a Complex Electromagnetic Environment. Search on Bibsonomy Complex. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Youling Wan, Zhiming Guo Complex Management Countermeasures of Postgraduate Education Quality Based on Comparison of International Training Models. Search on Bibsonomy Complex. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Xichen Zhang, Mohammad Mehdi Yadollahi, Sajjad Dadkhah, Haruna Isah, Duc-Phong Le, Ali A. Ghorbani 0001 Data breach: analysis, countermeasures and challenges. Search on Bibsonomy Int. J. Inf. Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Dou An, Feiye Zhang, Qingyu Yang, Chengwei Zhang 0001 Data Integrity Attack in Dynamic State Estimation of Smart Grid: Attack Model and Countermeasures. Search on Bibsonomy IEEE Trans Autom. Sci. Eng. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Junichi Sakamoto, Shungo Hayashi, Daisuke Fujimoto, Tsutomu Matsumoto Constructing software countermeasures against instruction manipulation attacks: an approach based on vulnerability evaluation using fault simulator. Search on Bibsonomy Clust. Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Atif Saeed, Peter Garraghan, Syed Asad Hussain Cross-VM Network Channel Attacks and Countermeasures Within Cloud Computing Environments. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Chongyan Gu, Yuqin Dou, Weiqiang Liu 0001, Máire O'Neill Security Vulnerabilities and Countermeasures for Approximate Circuits. Search on Bibsonomy Approximate Computing The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Yuan Liu, Juan Ang Problems and Countermeasures in the construction of skilled high-level universities based on mid-term inspection: - - Take M school in A province as an example. Search on Bibsonomy ICBDE The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Yu Dai 0005, Hongyan Xiong, Chao Liu Research on the Current Situation and Countermeasures of Online Foreign Language Courses Based on Course Reviews. Search on Bibsonomy ICBDE The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Yousun Ko 0001, Alex Bradbury, Bernd Burgstaller, Robert D. Mullins Trace-and-brace (TAB): bespoke software countermeasures against soft errors. Search on Bibsonomy LCTES The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Minh A. Vu, William C. Headley, Kevin P. Heaslip A Comparative Overview of Automotive Radar Spoofing Countermeasures. Search on Bibsonomy CSR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Bastien Sultan, Ludovic Apvrille, Philippe Jaillon, Sophie Coudert W-Sec: A Model-Based Formal Method for Assessing the Impacts of Security Countermeasures. Search on Bibsonomy MODELSWARD (Revised Selected Papers) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Bastien Sultan, Ludovic Apvrille, Philippe Jaillon Safety, Security and Performance Assessment of Security Countermeasures with SysML-Sec. Search on Bibsonomy MODELSWARD The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
Displaying result #401 - #500 of 2446 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license