The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for cybersecurity with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2002-2004 (18) 2005-2006 (18) 2007-2008 (19) 2009 (23) 2010 (31) 2011 (20) 2012 (52) 2013 (38) 2014 (107) 2015 (96) 2016 (220) 2017 (288) 2018 (389) 2019 (553) 2020 (684) 2021 (904) 2022 (919) 2023 (1019) 2024 (269)
Publication types (Num. hits)
article(1908) book(32) data(3) incollection(134) inproceedings(3474) phdthesis(51) proceedings(65)
Venues (Conferences, Journals, ...)
CoRR(376) CCCI(132) CPITS(120) SecDev(112) IEEE Secur. Priv.(103) EICC(97) IEEE Access(97) ITASEC(92) HICSS(81) ICAIC(76) SIGCSE(75) Comput. Secur.(71) CECC(62) CCC(53) SVCC(53) Sensors(51) More (+10 of total 1258)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 131 occurrences of 84 keywords

Results
Found 5667 publication records. Showing 5667 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
20Anze Mihelic, Simon Vrhovec Explaining the Employment of Information Security Measures by Individuals in Organizations: The Self-protection Model. Search on Bibsonomy CECC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Samo Tomazic, Igor Bernik Preparation of Response Model to Cyber-attacks at Nuclear Facilities. Search on Bibsonomy CECC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Martin Böhm 0004, Ina Schiering, Diederich Wermser Security of IoT Cloud Services - A User-Oriented Test Approach. Search on Bibsonomy CECC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Ziya Alper Genç, Gabriele Lenzini, Peter Y. A. Ryan Cipher, the Random and the Ransom: A Survey on Current and Future Ransomware. Search on Bibsonomy CECC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Martin Mihajlov, Borka Jerman-Blazic Eye Tracking Graphical Passwords. Search on Bibsonomy AHFE (9) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Tihomir Orehovacki, Snjezana Babic, Darko Etinger Identifying Relevance of Security, Privacy, Trust, and Adoption Dimensions Concerning Cloud Computing Applications Employed in Educational Settings. Search on Bibsonomy AHFE (9) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Abbas Moallem Do You Really Trust "Privacy Policy" or "Terms of Use" Agreements Without Reading Them? Search on Bibsonomy AHFE (9) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Kenneth D. Nguyen, Heather Rosoff, Richard S. John Valuing Information Security from a Phishing Attack. Search on Bibsonomy AHFE (9) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Christian Zinke, Jürgen Anke, Kyrill Meyer, Johannes Schmidt 0003 Modeling, Analysis and Control of Personal Data to Ensure Data Privacy - A Use Case Driven Approach. Search on Bibsonomy AHFE (9) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Kirsten E. Richards, Anthony F. Norcio Exploring the Discoverability of Personal Data Used for Authentication. Search on Bibsonomy AHFE (9) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Dongwoo Kang, Jaewook Jung, Hyungkyu Yang, Younsung Choi, Dongho Won Cryptanalysis of Lightweight User Authentication Scheme Using Smartcard. Search on Bibsonomy AHFE (9) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Lauren Massey, Remzi Seker, Denise Nicholson Feasibility of Leveraging an Adaptive Presentation Layer for Cyber Security Visualizations. Search on Bibsonomy AHFE (9) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Aseel Addawood, Yixin Zou, Masooda N. Bashir Users' Attitudes Towards the "Going Dark" Debate. Search on Bibsonomy AHFE (9) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Scott D. Lathrop Interacting with Synthetic Teammates in Cyberspace. Search on Bibsonomy AHFE (9) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Heather Young, Tony van Vliet, Josine G. M. van de Ven, Steven Jol, Carlijn Broekman Understanding Human Factors in Cyber Security as a Dynamic System. Search on Bibsonomy AHFE (9) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Saurabh Dutta, Ger Joyce, Jay Brewer Utilizing Chatbots to Increase the Efficacy of Information Security Practitioners. Search on Bibsonomy AHFE (9) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Scott Cadzow Preserving Dignity, Maintaining Security and Acting Ethically. Search on Bibsonomy AHFE (9) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Balázs Péter Hámornik, Csaba Krasznay A Team-Level Perspective of Human Factors in Cyber Security: Security Operations Centers. Search on Bibsonomy AHFE (9) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Phillip H. Griffin Adaptive Weak Secrets for Authenticated Key Exchange. Search on Bibsonomy AHFE (9) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Char Sample, Jennifer Cowley, Steve E. Hutchinson, Jonathan Z. Bakdash Culture + Cyber: Exploring the Relationship. Search on Bibsonomy AHFE (9) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Florian Kammüller Human Centric Security and Privacy for the IoT Using Formal Techniques. Search on Bibsonomy AHFE (9) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Barry L. Drake, Tiffany Huang, Ashley Beavers, Rundong Du, Haesun Park Event Detection Based on Nonnegative Matrix Factorization: Ceasefire Violation, Environmental, and Malware Events. Search on Bibsonomy AHFE (9) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Mohammed AlSaudi Ali, Dyaa Motawa, Fahad M. Al-Harby Internet of Things and Distributed Denial of Service Mitigation. Search on Bibsonomy AHFE (9) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Chunyi Quan, Hakjun Lee, Dongwoo Kang, Jiye Kim, Seokhyang Cho, Dongho Won Cryptanalysis and Improvement of an Advanced Anonymous and Biometrics-Based Multi-server Authentication Scheme Using Smart Cards. Search on Bibsonomy AHFE (9) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Jongho Moon, Taeui Song, Donghoon Lee 0007, Youngsook Lee, Dongho Won Cryptanalysis of Chaos-Based 2-Party Key Agreement Protocol with Provable Security. Search on Bibsonomy AHFE (9) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Paul Biocco, Mohd Anwar Grid Framework to Address Password Memorability Issues and Offline Password Attacks. Search on Bibsonomy AHFE (9) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Henry W. Glaspie, Waldemar Karwowski Human Factors in Information Security Culture: A Literature Review. Search on Bibsonomy AHFE (9) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Wayne Patterson, Jacari Boboye, Sidney Hall, Maalik Hornbuckle The Gender Turing Test. Search on Bibsonomy AHFE (9) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Fernando Maymí, Angela Woods, Jeremiah T. Folsom-Kovarik Humans as the Strong Link in Securing the Total Learning Architecture. Search on Bibsonomy AHFE (9) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Johan de Heer, Paul Porskamp Human Behavior Analytics from Microworlds: The Cyber Security Game. Search on Bibsonomy AHFE (9) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Abdullaziz A. Sarhan, Shehab A. Farhan, Fahad M. Al-Harby Understanding and Discovering SQL Injection Vulnerabilities. Search on Bibsonomy AHFE (9) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Dinesh Reddy, V. Rao Cybersecurity Skills: The Moderating Role in the Relationship between Cybersecurity Awareness and Compliance. Search on Bibsonomy AMCIS The full citation details ... 2016 DBLP  BibTeX  RDF
20Jian Ming Colin Wee, Masooda N. Bashir, Nasir D. Memon Self-Efficacy in Cybersecurity Tasks and Its Relationship with Cybersecurity Competition and Work-Related Outcomes. Search on Bibsonomy ASE @ USENIX Security Symposium The full citation details ... 2016 DBLP  BibTeX  RDF
20Colin Wee, Masooda N. Bashir, Nasir D. Memon The Cybersecurity Competition Experience: Perceptions from Cybersecurity Workers. Search on Bibsonomy WSIW@SOUPS The full citation details ... 2016 DBLP  BibTeX  RDF
20Ross Koppel, Jim Blythe, Vijay H. Kothari, Sean W. Smith Beliefs about Cybersecurity Rules and Passwords: A Comparison of Two Survey Samples of Cybersecurity Professionals Versus Regular Users. Search on Bibsonomy WSF@SOUPS The full citation details ... 2016 DBLP  BibTeX  RDF
20Karen Renaud, George R. S. Weir Cybersecurity and the Unbearability of Uncertainty. Search on Bibsonomy CCC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
20Diana L. Burley, Jon Eisenberg, Seymour E. Goodman Would cybersecurity professionalization help address the cybersecurity crisis? Search on Bibsonomy Commun. ACM The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
20Takeshi Takahashi 0001, Youki Kadobayashi, Koji Nakao Toward global cybersecurity collaboration: Cybersecurity operation activity model. Search on Bibsonomy Kaleidoscope The full citation details ... 2011 DBLP  BibTeX  RDF
20 Pete Burke on Cybersecurity and the Law: Why the people need WWII-type cybersecurity drills. Search on Bibsonomy Ubiquity The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20David C. Bergman, Dong (Kevin) Jin, Joshua Juen, Naoki Tanaka, Carl A. Gunter, Andrew K. Wright Nonintrusive Load-Shed Verification. Search on Bibsonomy IEEE Pervasive Comput. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF nonintrusive load monitoring, demand response, demand side management, pervasive computing, cybersecurity, smart grid
20David P. Fidler Was Stuxnet an Act of War? Decoding a Cyberattack. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Aggression, armed attack, cyberweapons, international law, Stuxnet, use of force, war, cybersecurity, intervention
20Lee Garber News Briefs. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Adobe Flash Player, Linked-In, Google Maps with Street View, Pandora, cloud computing, security policy, compliance, Twitter, Facebook, cybersecurity, cyberattacks, BlackBerry
20Daniel E. Geer Jr. Eisenhower Revisited. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF cyber-industrial complex, Eisenhower, cybersecurity
20H. Gilbert Miller, James L. Fisher Requiring Strong Credentials: What's Taking So Long?. Search on Bibsonomy IT Prof. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Smart IT, authentication, authorization, cybersecurity, digital certificates, public-key infrastructure (PKI)
20Daniel E. Geer Jr., Daniel G. Conway Nothing Ventured, Nothing Gained. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF venture, indices, trends, cybersecurity, investment
20Carl E. Landwehr Drawing the Line. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF computer security, ethics, research, cybersecurity
20Cynthia E. Irvine, Charles C. Palmer Call in the Cyber National Guard! Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF preparedness, network security, computer security, cybersecurity, security & privacy, national security, cyberattack
20Mark Fabro, Tim Roxey, Michael J. Assante No Grid Left Behind. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF advanced meter infrastructure, cybersecurity, smart grid, infrastructure security
20Marc Donner International Blues. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF policy, culture, globalization, internationalization, cybersecurity
20Hiroshi Nagano Development of ICT Infrastructure for Local Socio-Economic System in Japan. Search on Bibsonomy ARES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Local Economy Cybersecurity, Local Culture, Broadband
20W. Douglas Maughan Crossing the "Valley of Death": Transitioning Research into Commercial Products - A Personal Perspective. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2010 DBLP  DOI  BibTeX  RDF open source, development, research, cybersecurity, small business, technology transition
20Stefano Foresti, James Agutter, Yarden Livnat, Shaun Moon, Robert F. Erbacher Visual Correlation of Network Alerts. Search on Bibsonomy IEEE Computer Graphics and Applications The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Visualization, User Centered Design, Situational Awareness, Network Monitoring, Cybersecurity, Data Correlation, Network Intrusion
20Mike O'Leary A laboratory based capstone course in computer security for undergraduates. Search on Bibsonomy SIGCSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, curriculum, laboratory, cybersecurity, exercise
20Laurianne McLaughlin Interview: Holistic Security. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Tom Leighton, PITAC report, government funding for security research, cybersecurity
20Cynthia E. Irvine, Michael F. Thompson, Ken Allen CyberCIEGE: Gaming for Information Assurance. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF CyberCIEGE, Naval Postgraduate School, Rivermind, security, simulation, risk management, entertainment, video games, information assurance, cybersecurity, IA
20Paul J. Wagner, Jason M. Wudi Designing and implementing a cyberwar laboratory exercise for a computer security course. Search on Bibsonomy SIGCSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF cyberwar, security, laboratory, cybersecurity, exercise
18Larry Howard, Julie Johnson, Carin Neitzel Reflecting on online learning designs using observed behavior. Search on Bibsonomy ITiCSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF design reflection, inquiry-based learning, instructional design patterns, learning environments, self-regulated learning
18Solange Ghernaouti-Helie An Inclusive Information Society Needs a Global Approach of Information Security. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Shari Lawrence Pfleeger, Thomas Ciszek Choosing a Security Option: The InfoSecure Methodology. Search on Bibsonomy IT Prof. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Linda Wilbanks When Black Hats Are Really White. Search on Bibsonomy IT Prof. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Frank L. Greitzer, Andrew P. Moore, Dawn M. Cappelli, Dee H. Andrews, Lynn A. Carroll, Thomas D. Hull Combating the Insider Cyber Threat. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Laree Kiely, Terry V. Benzel Systemic Security Management. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Rose K. Shumba Teaching hands-on Linux host computer security. Search on Bibsonomy ACM J. Educ. Resour. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF file integrity, file permissions, host security exercises, user accounts, cryptography, Computer security
18Murat Can Ganiz, Sudhan Kanitkar, Mooi Choo Chuah, William M. Pottenger Detection of Interdomain Routing Anomalies Based on Higher-Order Path Analysis. Search on Bibsonomy ICDM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Lap-Chung Lam, Tzi-cker Chiueh Automatic Extraction of Accurate Application-Specific Sandboxing Policy. Search on Bibsonomy RAID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF system call graph, non-deterministic finite state automaton, intrusion detection, sandboxing, mimicry attack
18Yang Yu, Tzi-cker Chiueh Display-only file server: a solution against information theft due to insider attack. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2004 DBLP  DOI  BibTeX  RDF information theft, access, digital rights management, insider attack
18Jim Hearn Moving Forward? Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
10Yash A. Kadakia, Atharva V. Suryavanshi, Aisha Alnajdi, Fahim Abdullah, Panagiotis D. Christofides Integrating machine learning detection and encrypted control for enhanced cybersecurity of nonlinear processes. Search on Bibsonomy Comput. Chem. Eng. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Ariel López González, Mailyn Moreno, Ariadna C. Moreno Román, Yahima Hadfeg Fernández, Nayma Cepero-Pérez Ethics in Artificial Intelligence: an Approach to Cybersecurity. Search on Bibsonomy Inteligencia Artif. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Mayra Alexandra Macas Carrasco, Chun-Ming Wu 0001, Walter Fuertes Adversarial examples: A survey of attacks and defenses in deep learning-enabled cybersecurity systems. Search on Bibsonomy Expert Syst. Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Iqbal H. Sarker, Helge Janicke, Mohamed Amine Ferrag, Alsharif Abuadbba Multi-aspect rule-based AI: Methods, taxonomy, challenges and directions towards automation, intelligence and transparent cybersecurity modeling for critical infrastructures. Search on Bibsonomy Internet Things The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Jameel Ahmad, Muhammad Umer Zia, Ijaz Haider Naqvi, Jawwad Nasar Chattha, Faran Awais Butt, Tao Huang 0008, Wei Xiang 0001 Machine learning and blockchain technologies for cybersecurity in connected vehicles. Search on Bibsonomy WIREs Data. Mining. Knowl. Discov. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Alexandre Rekeraho, Daniel Tudor Cotfas, Petru Adrian Cotfas, Titus Constantin Balan, Emmanuel Tuyishime, Rebecca Acheampong Cybersecurity challenges in IoT-based smart renewable energy. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Ferney Martínez, Luis Enrique Sánchez, Antonio Santos-Olmo, David Garcia Rosado, Eduardo Fernández-Medina Maritime cybersecurity: protecting digital seas. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Fulvio Frati, Georgiana Darau, Nikos Salamanos, Pantelitsa Leonidou, Costas Iordanou, Dimitris Plachouris, Efstratios Syrmas, Evangelos Floros, George Nikitakis, George Spanoudakis, Konstantinos Kalais, Stella Tsichlaki, Ernesto Damiani, George C. Kagadis, Jihane Najar, Michael Sirivianos Cybersecurity training and healthcare: the AERAS approach. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Kaitlyn Devalk, Niklas Elmqvist Riverside: A design study on visualization for situation awareness in cybersecurity. Search on Bibsonomy Inf. Vis. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Selma Gomez Orr, Cyrus J. Bonyadi, Enis Golaszewski, Alan T. Sherman, Peter A. H. Peterson, Richard Forno, Sydney Johns, Jimmy Rodriguez Shadow IT in higher education: survey and case study for cybersecurity. Search on Bibsonomy Cryptologia The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Lu Xu, Yanhui Li, Yanwei Lin, Chaofeng Tang, Qi Yao Supply chain cybersecurity investments with interdependent risks under different information exchange modes. Search on Bibsonomy Int. J. Prod. Res. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Kai Goebel, Shantanu Rane AI in Industrial IoT Cybersecurity [Industrial and Governmental Activities]. Search on Bibsonomy IEEE Comput. Intell. Mag. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Emanuele Santonicola, Ennio Andrea Adinolfi, Simone Coppola, Francesco Pascale Automotive Cybersecurity Application Based on CARDIAN. Search on Bibsonomy Future Internet The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Davy Preuveneers, Wouter Joosen An Ontology-Based Cybersecurity Framework for AI-Enabled Systems and Applications. Search on Bibsonomy Future Internet The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Joakim Kävrestad, Steven Furnell, Marcus Nohlberg User perception of Context-Based Micro-Training - a method for cybersecurity training. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Kyriaki Tsantikidou, Nicolas Sklavos 0001 Threats, Attacks, and Cryptography Frameworks of Cybersecurity in Critical Infrastructures. Search on Bibsonomy Cryptogr. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Abraham Yosipof, Netanel Drori, Or Elroy, Yannis Pierraki Textual sentiment analysis and description characteristics in crowdfunding success: The case of cybersecurity and IoT industries. Search on Bibsonomy Electron. Mark. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Bo Yan 0005, Cheng Yang 0002, Chuan Shi, Yong Fang 0002, Qi Li, Yanfang Ye 0001, Junping Du Graph Mining for Cybersecurity: A Survey. Search on Bibsonomy ACM Trans. Knowl. Discov. Data The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Shanhsin Lee, Mengru Tsai, Shiuhpyng Winston Shieh The Game of Spear and Shield in Next Era of Cybersecurity. Search on Bibsonomy IEEE Trans. Reliab. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Duha Alsmadi, Ali Maqousi, Tala Abuhussein Engaging in cybersecurity proactive behavior: awareness in COVID-19 age. Search on Bibsonomy Kybernetes The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Wenhao Yang, Xiwen Dengxiong, Xueting Wang, Yidan Hu, Yunbo Zhang "I Can See Your Password": A Case Study About Cybersecurity Risks in Mid-Air Interactions of Mixed Reality-Based Smart Manufacturing Applications. Search on Bibsonomy J. Comput. Inf. Sci. Eng. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Md Habibor Rahman, Erfan Yazdandoost Hamedani, Young-Jun Son, Mohammed Shafae Taxonomy-Driven Graph-Theoretic Framework for Manufacturing Cybersecurity Risk Modeling and Assessment. Search on Bibsonomy J. Comput. Inf. Sci. Eng. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Olha Kovalchuk, Ruslan Shevchuk, Serhiy Banakh Cryptocurrency Crime Risks Modeling: Environment, E-Commerce, and Cybersecurity Issue. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Christian Garzón, Santiago Ríos-Guiral, Erwin Alexander Leal, Sergio Armando Gutierrez, Juan Felipe Botero P4 Cybersecurity Solutions: Taxonomy and Open Challenges. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Won Sakong, Wooju Kim An Adaptive Policy-Based Anomaly Object Control System for Enhanced Cybersecurity. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Santiago Criollo-C, Andrea Guerrero-Arias, Diego Buenaño-Fernández, Sergio Luján-Mora Usability and Workload Evaluation of a Cybersecurity Educational Game Application: A Case Study. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Fatima Al-Quayed, Zulfiqar Ahmad, Mamoona Humayun A Situation Based Predictive Approach for Cybersecurity Intrusion Detection and Prevention Using Machine Learning and Deep Learning Algorithms in Wireless Sensor Networks of Industry 4.0. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Louai Maghrabi, Sahar Shabanah, Turki A. Althaqafi, Dheyaaldin Alsalman, Sultan Algarni, Abdullah Al-Malaise Al-Ghamdi, Mahmoud Ragab Enhancing Cybersecurity in the Internet of Things Environment Using Bald Eagle Search Optimization With Hybrid Deep Learning. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Kazumasa Omote, Yoko Inoue, Yoshihide Terada, Naohiro Shichijo, Toshiyuki Shirai A Scientometrics Analysis of Cybersecurity Using e-CSTI. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Ishita Agarwal, Aanchal Singh, Aran Agarwal, Shruti Mishra, Sandeep Kumar Satapathy, Sung-Bae Cho, Manas Ranjan Prusty, Sachi Nandan Mohanty Enhancing Road Safety and Cybersecurity in Traffic Management Systems: Leveraging the Potential of Reinforcement Learning. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Nimra Tabish, Chaur-Luh Tsai Maritime Autonomous Surface Ships: A Review of Cybersecurity Challenges, Countermeasures, and Future Perspectives. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Taher Al-Shehari, Domenico Rosaci, Muna S. Al-Razgan, Taha Alfakih, Mohammed Kadrie, Hammad Afzal, Raheel Nawaz Enhancing Insider Threat Detection in Imbalanced Cybersecurity Settings Using the Density-Based Local Outlier Factor Algorithm. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Abid Mehmood, Arslan Shafique, Moatsum Alawida, Abdul Nasir Khan Advances and Vulnerabilities in Modern Cryptographic Techniques: A Comprehensive Survey on Cybersecurity in the Domain of Machine/Deep Learning and Quantum Techniques. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
Displaying result #401 - #500 of 5667 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license