The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for threats with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1954-1987 (15) 1988-1993 (16) 1994-1996 (33) 1997 (17) 1998 (16) 1999 (21) 2000 (25) 2001 (30) 2002 (50) 2003 (83) 2004 (118) 2005 (218) 2006 (250) 2007 (330) 2008 (332) 2009 (227) 2010 (121) 2011 (93) 2012 (111) 2013 (105) 2014 (124) 2015 (162) 2016 (189) 2017 (188) 2018 (231) 2019 (223) 2020 (287) 2021 (264) 2022 (259) 2023 (329) 2024 (95)
Publication types (Num. hits)
article(1596) book(11) data(5) incollection(78) inproceedings(2795) phdthesis(63) proceedings(14)
Venues (Conferences, Journals, ...)
CoRR(283) LEET(69) HICSS(59) IEEE Access(56) ARES(49) IEEE Secur. Priv.(49) MIST@CCS(43) ISI(38) Sensors(32) ACSAC(29) Netw. Secur.(29) Comput. Secur.(27) CCS(26) Commun. ACM(18) Computer(18) AsiaCCS(17) More (+10 of total 1688)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 2004 occurrences of 1111 keywords

Results
Found 4563 publication records. Showing 4562 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
13Todd S. Bertulis, John O. Miller Logistics 2: using simulation to understand Interim Brigade Combat Team (IBCT) munitions logistics. Search on Bibsonomy WSC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
13Jari Arkko, Tuomas Aura, James Kempf, Vesa-Matti Mäntylä, Pekka Nikander, Michael Roe Securing IPv6 neighbor and router discovery. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2002 DBLP  DOI  BibTeX  RDF duplicate address, router discovery, detection, neighbor discovery, identity-based cryptosystems, autoconfiguration
13Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine, Clay Shields, Elizabeth M. Belding-Royer A Secure Routing Protocol for Ad Hoc Networks. Search on Bibsonomy ICNP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
13Tuomas Aura, Michael Roe, Jari Arkko Security of Internet Location Management. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
13Peter Bergstrom, Kevin Driscoll 0001, John Kimball Making Home Automation Communications Secure. Search on Bibsonomy Computer The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
13James H. Kaufman, Joann Ruvolo, Daniel Alexander Ford Tempus fight and the need for an e-social contract. Search on Bibsonomy Agents The full citation details ... 2001 DBLP  DOI  BibTeX  RDF active calendar, personal information management system, social contract, agent, calendar
13G. John van der Pijl, Pieter M. A. Ribbers, Martin Smits Technology Management for Doing Business in the Knowledge based Economy - Minitrack Introduction. Search on Bibsonomy HICSS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
13Stefan Klein 0002, Rolf Alexander Teubner Web-based Procurement New Roles for Intermediaries. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2000 DBLP  DOI  BibTeX  RDF cybermediary, re-, cybermediation, public procurement, electronic procurement, network, hierarchy, market, intermediary, dis-
13Bradley J. Clement, Edmund H. Durfee Performance of Coordinating Concurrent Hierarchical Planning Agents Using Summary Information. Search on Bibsonomy ICMAS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
13Bradley J. Clement, Edmund H. Durfee Performance of Coordinating Concurrent Hierarchical Planning Agents Using Summary Information. Search on Bibsonomy ATAL The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
13Eija Kaasinen Usability Challenges in Agent Based Services. Search on Bibsonomy IS&N The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
13Jan Verschuren Security of Computer Networks. Search on Bibsonomy State of the Art in Applied Cryptography The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
13Brian Vetter, Feiyi Wang, Shyhtsun Felix Wu An experimental study of insider attacks for OSPF routing protocol. Search on Bibsonomy ICNP The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
13Hung-Yu Lin, Lein Harn Authentication Protocols for Personal Communication Systems. Search on Bibsonomy SIGCOMM The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
13David Alan Hanson Data security. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 1979 DBLP  DOI  BibTeX  RDF
13Rudolf Bayer, J. K. Metzger On the Encipherment of Search Trees and Random Access Files. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 1976 DBLP  DOI  BibTeX  RDF encipherment, indexed sequential files, privacy transformation, random access files, security, privacy, cryptography, indexes, paging, protection, B-trees, search trees
11Chenquan Gan, Jiabin Lin, Da-Wen Huang, Qingyi Zhu, Liang Tian, Deepak Kumar Jain Equipment classification based differential game method for advanced persistent threats in Industrial Internet of Things. Search on Bibsonomy Expert Syst. Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Hadeel Alrubayyi, Moudy Sharaf Alshareef, Zunaira Nadeem, Ahmed M. Abdelmoniem, Mona Jaber Security Threats and Promising Solutions Arising from the Intersection of AI and IoT: A Study of IoMT and IoET Applications. Search on Bibsonomy Future Internet The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Ziqin Chen, Guanpu Chen, Yiguang Hong Defense for Advanced Persistent Threat with Inadvertent and Malicious Insider Threats. Search on Bibsonomy Unmanned Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Kyriaki Tsantikidou, Nicolas Sklavos 0001 Threats, Attacks, and Cryptography Frameworks of Cybersecurity in Critical Infrastructures. Search on Bibsonomy Cryptogr. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Cheng-Feng Hung, You-Run Chen, Chi-heng Tseng, Shin-Ming Cheng Security Threats to xApps Access Control and E2 Interface in O-RAN. Search on Bibsonomy IEEE Open J. Commun. Soc. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Rachel McAmis, Mattea Sim, Mia M. Bennett, Tadayoshi Kohno Over Fences and Into Yards: Privacy Threats and Concerns of Commercial Satellites. Search on Bibsonomy Proc. Priv. Enhancing Technol. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Bader Al-Sada, Alireza Sadighian, Gabriele Oligeri Analysis and Characterization of Cyber Threats Leveraging the MITRE ATT&CK Database. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Muhammad Sulaiman 0001, Muhammad Waseem, Addisu Negash Ali, Ghaylen Laouini, Fahad Sameer Alshammari Defense Strategies for Epidemic Cyber Security Threats: Modeling and Analysis by Using a Machine Learning Approach. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Olufunsho I. Falowo, Jacques Bou Abdo 2019-2023 in Review: Projecting DDoS Threats With ARIMA and ETS Forecasting Techniques. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Dheyaaldin Alsalman A Comparative Study of Anomaly Detection Techniques for IoT Security Using Adaptive Machine Learning for IoT Threats. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Daojing He, Ke Ding, Sammy Chan, Mohsen Guizani Unknown Threats Detection Methods of Smart Contracts. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Ali M. Al Shahrani, Ali Rizwan, Manuel Sánchez-Chero, Lilia Lucy Campos Cornejo, Mohammad Shabaz Blockchain-enabled federated learning for prevention of power terminals threats in IoT environment using edge zero-trust model. Search on Bibsonomy J. Supercomput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Tao He, Hao Li 0067, Shixiong Zhang, Zhichao Zeng, Zhijun Yan, Qizhen Sun, Deming Liu A Surveillance System for Urban Utility Tunnel Subject to Third-Party Threats Based on Fiber-Optic DAS and FPN-BiLSTM Network. Search on Bibsonomy IEEE Trans. Instrum. Meas. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Ryhan Uddin, Sathish A. P. Kumar, Vinay Chamola Denial of service attacks in edge computing layers: Taxonomy, vulnerabilities, threats and solutions. Search on Bibsonomy Ad Hoc Networks The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Pietro Tedeschi, Fatima Ali Al Nuaimi, Ali Ismail Awad, Enrico Natalizio Privacy-Aware Remote Identification for Unmanned Aerial Vehicles: Current Solutions, Potential Threats, and Future Directions. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Divya Velayudhan, Abdelfatah Hassan Ahmed, Taimur Hassan, Neha Gour, Muhammad Owais, Mohammed Bennamoun, Ernesto Damiani, Naoufel Werghi Autonomous Localization of X-Ray Baggage Threats via Weakly Supervised Learning. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Pooja Ahuja, Preeti Sethi, Naresh Chauhan A comprehensive survey of security threats, detection, countermeasures, and future directions for physical and network layers in cognitive radio networks. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Yilun Hu, Jun Wu 0001, Gaolei Li, Jianhua Li 0001, Jinke Cheng Privacy-Preserving Few-Shot Traffic Detection Against Advanced Persistent Threats via Federated Meta Learning. Search on Bibsonomy IEEE Trans. Netw. Sci. Eng. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Jiaqi Ruan, Gaoqi Liang, Huan Zhao, Guolong Liu, Xianzhuo Sun, Jing Qiu 0001, Zhao Xu 0002, Fushuan Wen, Zhao Yang Dong Applying Large Language Models to Power Systems: Potential Security Threats. Search on Bibsonomy IEEE Trans. Smart Grid The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Ying Gao 0004, Hongyue Miao, Jixiang Chen, Binjie Song, Xiping Hu 0001, Wei Wang 0077 Explosive Cyber Security Threats During COVID-19 Pandemic and a Novel Tree-Based Broad Learning System to Overcome. Search on Bibsonomy IEEE Trans. Intell. Transp. Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Shana Moothedath, Dinuka Sahabandu, Joey Allen, Linda Bushnell, Wenke Lee, Radha Poovendran Stochastic Dynamic Information Flow Tracking game using supervised learning for detecting advanced persistent threats. Search on Bibsonomy Autom. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Ren-Yi Huang, G. Dumindu Samaraweera, J. Morris Chang Exploring Threats, Defenses, and Privacy-Preserving Techniques in Federated Learning: A Survey. Search on Bibsonomy Computer The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Kuan-Chu Lu, I-Hsien Liu, Keng-Hao Chang, Jung-Shian Li VoWi-Fi security threats: Address resolution protocol attack and countermeasures. Search on Bibsonomy IET Networks The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Al Tariq Sheik, Carsten Maple, Gregory Epiphaniou, Mehrdad Dianati A Comprehensive Survey of Threats in Platooning - A Cloud-Assisted Connected and Autonomous Vehicle Application. Search on Bibsonomy Inf. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Robin Cyriac, Sundaravadivazhagan Balasubaramanian, Venkatachalam Balamurugan, Ramamoorthy Karthikeyan DCCGAN based intrusion detection for detecting security threats in IoT. Search on Bibsonomy Int. J. Bio Inspired Comput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Felix Klement, Wuhao Liu, Stefan Katzenbeisser 0001 Toward Securing the 6G Transition: A Comprehensive Empirical Method to Analyze Threats in O-RAN Environments. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Andrzej Ozadowicz Generic IoT for Smart Buildings and Field-Level Automation - Challenges, Threats, Approaches, and Solutions. Search on Bibsonomy Comput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Adeeb Mansoor Ansari, Mohammed Nazir, Khurram Mustafa Smart Homes App Vulnerabilities, Threats, and Solutions: A Systematic Literature Review. Search on Bibsonomy J. Netw. Syst. Manag. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Anum Paracha, Junaid Arshad, Mohamed Ben Farah, Khalid Ismail Machine learning security and privacy: a review of threats and countermeasures. Search on Bibsonomy EURASIP J. Inf. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Lizzy Oluwatoyin Ofusori, Prabhakar Rontala Subramaniam Securing BYOD environment from social and mobility related threats: the case of Nigerian banking sector. Search on Bibsonomy Int. J. Inf. Commun. Technol. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Anindya Nag, Md. Mehedi Hassan, Ayontika Das, Anurag Sinha, Nisarga Chand, Anwesha Kar, Vandana Sharma, Ahmed Alkhayyat Exploring the applications and security threats of Internet of Thing in the cloud computing paradigm: A comprehensive study on the cloud of things. Search on Bibsonomy Trans. Emerg. Telecommun. Technol. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Qiannan Wang, Changchun Yin, Liming Fang 0001, Lu Zhou 0002, Zhe Liu 0001, Run Wang, Chenhao Lin SSL-OTA: Unveiling Backdoor Threats in Self-Supervised Learning for Object Detection. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Ziyao Liu, Huanyi Ye, Chen Chen 0037, Kwok-Yan Lam Threats, Attacks, and Defenses in Machine Unlearning: A Survey. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Yige Li, Xingjun Ma, Jiabo He, Hanxun Huang, Yu-Gang Jiang Multi-Trigger Backdoor Attacks: More Triggers, More Threats. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Dorjan Hitaj, Giulio Pagnotta, Fabio De Gaspari, Sediola Ruko, Briland Hitaj, Luigi V. Mancini, Fernando Pérez-Cruz Do You Trust Your Model? Emerging Malware Threats in the Deep Learning Ecosystem. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Chen Wu, Xi Li, Jiaqi Wang Vulnerabilities of Foundation Model Integrated Federated Learning Under Adversarial Threats. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Ashutosh Kumar, Sagarika Singh, Shiv Vignesh Murty, Swathy Ragupathy The Ethics of Interaction: Mitigating Security Threats in LLMs. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Hong-Fu Chou, Sourabh Solanki, Vu Nguyen Ha, Lin Chen, Sean Longyu Ma, Hayder Al-Hraishawi, Geoffrey Eappen, Symeon Chatzinotas Edge AI Empowered Physical Layer Security for 6G NTN: Potential Threats and Future Opportunities. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Fatama Tuz Johora, Md Shahedul Islam Khan, Esrath Kanon, Mohammad Abu Tareq Rony, Md. Zubair, Iqbal H. Sarker A Data-Driven Predictive Analysis on Cyber Security Threats with Key Risk Factors. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Thanh Nguyen Canh, Xiem HoangVan Machine Learning-Based Malicious Vehicle Detection for Security Threats and Attacks in Vehicle Ad-hoc Network (VANET) Communications. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Ziyue Pan, Wenbo Shen, Xingkai Wang, Yutian Yang, Rui Chang, Yao Liu, Chengwei Liu, Yang Liu, Kui Ren 0001 Ambush from All Sides: Understanding Security Threats in Open-Source Software CI/CD Pipelines. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Lei Yu, Meng Han, Yiming Li, Changting Lin, Yao Zhang, Mingyang Zhang, Yan Liu, Haiqin Weng, Yuseok Jeon, Ka-Ho Chow, Stacy Patterson A Survey of Privacy Threats and Defense in Vertical Federated Learning: From Model Life Cycle Perspective. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Andrea Miotti, Akash Wasil Combatting deepfakes: Policies to address national security threats and rights violations. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Wenkai Yang, Xiaohan Bi, Yankai Lin, Sishuo Chen, Jie Zhou, Xu Sun Watch Out for Your Agents! Investigating Backdoor Threats to LLM-Based Agents. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Shenghai Yuan, Yizhuo Yang, Thien Hoang Nguyen, Thien-Minh Nguyen, Jianfei Yang, Fen Liu, Jianping Li, Han Wang, Lihua Xie MMAUD: A Comprehensive Multi-Modal Anti-UAV Dataset for Modern Miniature Drone Threats. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Zhibo Zhang, Pengfei Li, Ahmed Y. Al Hammadi, Fusen Guo, Ernesto Damiani, Chan Yeob Yeun Reputation-Based Federated Learning Defense to Mitigate Threats in EEG Signal Classification. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Veikko Halttunen How do digital threats change requirements for the software industry? Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Harikrishnan K., J. Harshan, Anwitaman Datta Optimized Denial-of-Service Threats on the Scalability of LT Coded Blockchains. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Masahiro Hayashitani, Junki Mori, Isamu Teranishi Survey of Privacy Threats and Countermeasures in Federated Learning. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Shu Yang, Jiayuan Su, Han Jiang, Mengdi Li, Keyuan Cheng, Muhammad Asif Ali, Lijie Hu, Di Wang Dialectical Alignment: Resolving the Tension of 3H and Security Threats of LLMs. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Marvin Wyrich, Sven Apel Evidence Tetris in the Pixelated World of Validity Threats. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Siyuan Liang, Kuanrong Liu, Jiajun Gong, Jiawei Liang, Yuan Xun, Ee-Chien Chang, Xiaochun Cao Unlearning Backdoor Threats: Enhancing Backdoor Defense in Multimodal Contrastive Learning via Local Token Unlearning. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Leo Schwinn, David Dobre, Sophie Xhonneux, Gauthier Gidel, Stephan Günnemann Soft Prompt Threats: Attacking Safety Alignment and Unlearning in Open-Source LLMs through the Embedding Space. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Benjamin Michéle, Iván Peña, Pablo Angueira Threats and Limitations of Terrestrial Broadcast Attacks. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Sara Abdali, Richard Anarfi, C. J. Barberan, Jia He Securing Large Language Models: Threats, Vulnerabilities and Responsible Practices. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Kanghua Mo, Peigen Ye, Xiaojun Ren, Shaowei Wang 0003, Wenjun Li, Jin Li 0002 Security and Privacy Issues in Deep Reinforcement Learning: Threats and Countermeasures. Search on Bibsonomy ACM Comput. Surv. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Andrey Antonio Rodrigues, Maria Lúcia Bento Villela, Eduardo Feitosa A Systematic Mapping Study on Social Network Privacy: Threats and Solutions. Search on Bibsonomy ACM Comput. Surv. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Huaming Chen, Muhammad Ali Babar 0001 Security for Machine Learning-based Software Systems: A Survey of Threats, Practices, and Challenges. Search on Bibsonomy ACM Comput. Surv. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Nadir Omer, Ahmed H. Samak, Ahmed I. Taloba, Rasha M. Abd El-Aziz Cybersecurity Threats Detection Using Optimized Machine Learning Frameworks. Search on Bibsonomy Comput. Syst. Sci. Eng. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Eldar Boltachev Correction to: Potential cyber threats of adversarial attacks on autonomous driving models. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Qian Zhu 0010, Linping Yuan, Zian Xu, Leni Yang, Meng Xia, Zhuo Wang, Hai-Ning Liang, Xiaojuan Ma From reader to experiencer: Design and evaluation of a VR data story for promoting the situation awareness of public health threats. Search on Bibsonomy Int. J. Hum. Comput. Stud. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11E. E. Lawrence Of acquisitions and interference: accounting for systemic threats to the freedom to read. Search on Bibsonomy J. Documentation The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Suman, Raees Ahmad Khan An optimized neural network for prediction of security threats on software testing. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Hao Tian, Ruiheng Li, Yi Di, Qiankun Zuo, Jinpeng Wang Employing RNN and Petri Nets to Secure Edge Computing Threats in Smart Cities. Search on Bibsonomy J. Grid Comput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Nuri Alperen Kose, Razaq Jinad, Amar Rasheed, Narasimha Shashidhar, Mohamed Baza, Hani Alshahrani Detection of Malicious Threats Exploiting Clock-Gating Hardware Using Machine Learning. Search on Bibsonomy Sensors The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Shafiullah Khan, Muhammad Altaf Khan, Noha Alnazzawi Artificial Neural Network-Based Mechanism to Detect Security Threats in Wireless Sensor Networks. Search on Bibsonomy Sensors The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Giovanni Pettorru, Virginia Pilloni, Marco Martalò Trustworthy Localization in IoT Networks: A Survey of Localization Techniques, Threats, and Mitigation. Search on Bibsonomy Sensors The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Abhishek Behl, Brinda Sampat, Justin Zhang 0001, Vijay Pereira Editorial: the dark side of blockchains: threats, risks, ethics and biases in blockchain adoption. Search on Bibsonomy J. Inf. Commun. Ethics Soc. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Selena I. Quiroz, Thao Ha, Samantha F. Anderson "You liked that Instagram post?!" Adolescents' jealousy and digital dating abuse behaviors in reaction to digital romantic relationship threats. Search on Bibsonomy Comput. Hum. Behav. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Daniel Pimentel, Sriram Kalyanaraman How Cognitive Absorption Influences Responses to Immersive Narratives of Environmental Threats. Search on Bibsonomy Cyberpsychology Behav. Soc. Netw. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Wenbo Jiang, Tianwei Zhang 0004, Han Qiu 0001, Hongwei Li 0001, Guowen Xu Incremental Learning, Incremental Backdoor Threats. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Ziyue Pan, Wenbo Shen, Xingkai Wang, Yutian Yang, Rui Chang, Yao Liu 0007, Chengwei Liu, Yang Liu 0003, Kui Ren 0001 Ambush From All Sides: Understanding Security Threats in Open-Source Software CI/CD Pipelines. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Carles Farré, Xavier Franch Replication Package: Threats to Validity in Green AI Research. Search on Bibsonomy 2024   DOI  RDF
11Carles Farré, Xavier Franch Replication Package: Threats to Validity in Green AI Research. Search on Bibsonomy 2024   DOI  RDF
11Carles Farré, Xavier Franch Replication Package: Threats to Validity in Green AI Research. Search on Bibsonomy 2024   DOI  RDF
11Carles Farré, Xavier Franch Replication Package: Threats to Validity in Green AI Research. Search on Bibsonomy 2024   DOI  RDF
11Carles Farré, Xavier Franch Replication Package: Threats to Validity in Green AI Research. Search on Bibsonomy 2024   DOI  RDF
11Bahareh Pahlevanzadeh, Sima Ahmadpour Cybersecurity Threats and Attacks in IoE Networks. Search on Bibsonomy Cybersecurity Vigilance and Security Engineering of Internet of Everything The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Reza Montasari Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution - Threats, Assessment and Responses Search on Bibsonomy 2024   DOI  RDF
11Xiaofei Wang, Rashik Shadman, Daqing Hou, Faraz Hussain 0001, Stephanie Schuckers A Novel Keystroke Dataset for Preventing Advanced Persistent Threats. Search on Bibsonomy ICPRAM The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Mauro Conti Covert & Side Stories: Threats Evolution in Traditional and Modern Technologies. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  BibTeX  RDF
11Bogdan-Costel Mocanu, Razvan Stoleriu, Alexandra-Elena Mocanu (Mihaita), Catalin Negru, Elena-Gabriela Dragotoiu, Mihnea Alexandru Moisescu, Florin Pop NextEDR - Next Generation Agent-Based EDR Systems for Cybersecurity Threats. Search on Bibsonomy PDP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Darshan Kumar, Nidhi Sinha, Alekha Kumar Mishra, Asis Kumar Tripathy An Experimental Comparison and Impact Analysis of Various RPL-Based IoT Security Threats Using Contiki Simulator. Search on Bibsonomy COMSNETS The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Tao Liu, Yuhang Zhang, Zhu Feng, Zhiqin Yang, Chen Xu 0008, Dapeng Man, Wu Yang 0001 Beyond Traditional Threats: A Persistent Backdoor Attack on Federated Learning. Search on Bibsonomy AAAI The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
Displaying result #401 - #500 of 4562 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license