The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Threat with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1964-1982 (15) 1983-1989 (16) 1990-1993 (20) 1994-1996 (20) 1997 (15) 1998-1999 (32) 2000 (19) 2001 (38) 2002 (54) 2003 (80) 2004 (129) 2005 (216) 2006 (242) 2007 (314) 2008 (320) 2009 (244) 2010 (113) 2011 (114) 2012 (117) 2013 (132) 2014 (148) 2015 (162) 2016 (200) 2017 (250) 2018 (326) 2019 (348) 2020 (348) 2021 (449) 2022 (499) 2023 (506) 2024 (120)
Publication types (Num. hits)
article(2051) book(11) data(2) incollection(83) inproceedings(3406) phdthesis(53)
Venues (Conferences, Journals, ...)
CoRR(376) Comput. Secur.(83) IEEE Access(83) HICSS(74) ARES(60) ISI(60) NeuroImage(50) IEEE Secur. Priv.(46) Sensors(40) FUSION(38) Netw. Secur.(31) ACSAC(30) CCS(28) RFC(26) SAC(26) IEEE BigData(25) More (+10 of total 1868)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1717 occurrences of 1015 keywords

Results
Found 5607 publication records. Showing 5606 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
10Varol O. Kayhan, Manish Agrawal, Shivendu Shivendu Cyber threat detection: Unsupervised hunting of anomalous commands (UHAC). Search on Bibsonomy Decis. Support Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Taimur Hassan, Samet Akcay, Bilal Hassan, Mohammed Bennamoun, Salman H. Khan 0001, Jorge Dias 0001, Naoufel Werghi Cascaded structure tensor for robust baggage threat detection. Search on Bibsonomy Neural Comput. Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Shreyas Kolte, Neelanjan Bhowmik, Dhiraj Threat Object-based anomaly detection in X-ray images using GAN-based ensembles. Search on Bibsonomy Neural Comput. Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Sivaram Rajeyyagari Threat detection in Internet of Things using Cuckoo search Chicken Swarm optimisation algorithm. Search on Bibsonomy J. Exp. Theor. Artif. Intell. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Haotian Yin Security analysis of Bluetooth Secure Simple Pairing protocols with extended threat model. Search on Bibsonomy J. Inf. Secur. Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Krunal Randive, R. Mohan, Ambairam Muthu Sivakrishna An efficient pattern-based approach for insider threat classification using the image-based feature representation. Search on Bibsonomy J. Inf. Secur. Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Preetam Pal, Pratik Chattopadhyay, Mayank Swarnkar Temporal feature aggregation with attention for insider threat detection from activity logs. Search on Bibsonomy Expert Syst. Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Raphaela Mettig, Charles Glass, Andrew Case, Golden G. Richard III Assessing the threat of Rosetta 2 on Apple Silicon devices. Search on Bibsonomy Forensic Sci. Int. Digit. Investig. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Yee Ching Tok, Sudipta Chattopadhyay 0001 Identifying threats, cybercrime and digital forensic opportunities in Smart City Infrastructure via threat modeling. Search on Bibsonomy Forensic Sci. Int. Digit. Investig. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Dongsheng Xu, Yuhuan Sun, Xinyang He Threat assessment based on single-valued neutrosophic TOPSIS and three-way decision. Search on Bibsonomy J. Intell. Fuzzy Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10D. Santhadevi, B. Janet HSDL-based intelligent threat detection framework for IoT network. Search on Bibsonomy J. Intell. Fuzzy Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Zainab Noor, Sadaf Hina, Faisal Hayat, Ghalib A. Shah An intelligent context-aware threat detection and response model for smart cyber-physical systems. Search on Bibsonomy Internet Things The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Phan The Duy, Nguyen Huu Quyen, Nghi Hoang Khoa, Dung Tran Tuan, Van-Hau Pham FedChain-Hunter: A reliable and privacy-preserving aggregation for federated threat hunting framework in SDN-based IIoT. Search on Bibsonomy Internet Things The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Mohammad Amiri-Zarandi, Hadis Karimipour, Rozita A. Dara 0001 A federated and explainable approach for insider threat detection in IoT. Search on Bibsonomy Internet Things The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Shahzaib Zahid, Muhammad Shoaib Mazhar, Syed Ghazanfar Abbas, Zahid Hanif, Sadaf Hina, Ghalib A. Shah Threat modeling in smart firefighting systems: Aligning MITRE ATT&CK matrix and NIST security controls. Search on Bibsonomy Internet Things The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Sanjay Adiwal, Mohammad Misbahuddin Intrusion Detection and Prevention in OpenStack: A Case Study on Enhancing Security and Threat Detection. Search on Bibsonomy SN Comput. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Md. Mahadi Hasan, Muhammad Usama Islam, Md Jasim Uddin Advanced Persistent Threat Identification with Boosting and Explainable AI. Search on Bibsonomy SN Comput. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Mohammad Aijaz, Mohammed Nazir, Malik Nadeem Anwar Mohammad Threat Modeling and Assessment Methods in the Healthcare-IT System: A Critical Review and Systematic Evaluation. Search on Bibsonomy SN Comput. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Andreas Grüner, Alexander Mühle, Niko Lockenvitz, Christoph Meinel Analyzing and comparing the security of self-sovereign identity management systems through threat modeling. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Emre Süren, Fredrik Heiding, Johannes Olegård, Robert Lagerström PatrIoT: practical and agile threat research for IoT. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Ahmed Amro, Vasileios Gkioulos Cyber risk management for autonomous passenger ships using threat-informed defense-in-depth. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Alexandros Papanikolaou, Aggelos Alevizopoulos, Christos Ilioudis, Konstantinos Demertzis, Konstantinos Rantos An autoML network traffic analyzer for cyber threat detection. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Hamed Sepehrzadeh A method for insider threat assessment by modeling the internal employee interactions. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Taher Al-Shehari, Rakan Alsowail Random resampling algorithms for addressing the imbalanced dataset classes in insider threat detection. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Karthikeyan Saminathan, Sai Tharun Reddy Mulka, Sangeetha Damodharan, Maheswar Rajagopal, Josip Lorincz An Artificial Neural Network Autoencoder for Insider Cyber Security Threat Detection. Search on Bibsonomy Future Internet The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Xingyuan Yang, Jie Yuan, Hao Yang, Ya Kong, Hao Zhang, Jinyu Zhao A Highly Interactive Honeypot-Based Approach to Network Threat Management. Search on Bibsonomy Future Internet The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Ismail El Gaabouri, Mohamed Senhadji, Mostafa Belkasmi, Brahim El Bhiri A Systematic Literature Review on Authentication and Threat Challenges on RFID Based NFC Applications. Search on Bibsonomy Future Internet The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Zhen Wang 0020, Buhong Wang, Yaohui Liu 0001, Jianxin Guo Global Feature Attention Network: Addressing the Threat of Adversarial Attack for Aerial Image Semantic Segmentation. Search on Bibsonomy Remote. Sens. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Guilherme A. V. Mataveli, Michel E. D. Chaves, João Guerrero, Elton Vicente Escobar-Silva, Katyanne Conceição, Gabriel de Oliveira Correction: Mataveli et al. Mining Is a Growing Threat within Indigenous Lands of the Brazilian Amazon. Remote Sens. 2022, 14, 4092. Search on Bibsonomy Remote. Sens. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Lampis Alevizos, Eliana Stavrou Cyber threat modeling for protecting the crown jewels in the Financial Services Sector (FSS). Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Rami Mohammed Baazeem Cybersecurity: BotNet Threat Detection Across the Seven-Layer ISO-OSI Model Using Machine Learning Techniques. Search on Bibsonomy Comput. Informatics The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Oleksii Osliak, Andrea Saracino, Fabio Martinelli, Paolo Mori Cyber threat intelligence for critical infrastructure security. Search on Bibsonomy Concurr. Comput. Pract. Exp. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Fang Qi, Yingkai Zhao, Md. Zakirul Alam Bhuiyan, Tao Hai, Md. Monirul Islam, Shaobo Zhang 0001, Zhe Tang Unauthorized and privacy-intrusive human activity watching through Wi-Fi signals: An emerging cybersecurity threat. Search on Bibsonomy Concurr. Comput. Pract. Exp. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Chunyu Li, Peng Xing, Yanting Li Supply chain's green investment strategy to cope with an entrant threat considering differentiated competitiveness. Search on Bibsonomy RAIRO Oper. Res. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10George C. Alexandropoulos, Konstantinos D. Katsanos, Miaowen Wen, Daniel B. da Costa 0001 Counteracting Eavesdropper Attacks Through Reconfigurable Intelligent Surfaces: A New Threat Model and Secrecy Rate Optimization. Search on Bibsonomy IEEE Open J. Commun. Soc. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Abhay Deep Seth, Santosh Biswas, Amit Kumar Dhar DADCNF: Diagnoser design for Duplicate Address Detection threat using Conjunctive Normal Form. Search on Bibsonomy Comput. Networks The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Po-Ching Lin, Wen-Hao Hsu, Ying-Dar Lin, Ren-Hung Hwang, Hsiao-Kuang Wu, Yuan-Cheng Lai, Chung-Kuan Chen Correlation of cyber threat intelligence with sightings for intelligence assessment and augmentation. Search on Bibsonomy Comput. Networks The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Sergio Ruiz-Villafranca, José Roldán Gómez, Javier Carrillo Mondéjar, Juan Manuel Castelo Gómez, José Miguel Villalón Millán A MEC-IIoT intelligent threat detector based on machine learning boosted tree algorithms. Search on Bibsonomy Comput. Networks The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Ozgur Tuncer, Hakan Ali Çirpan Adaptive fuzzy based threat evaluation method for air and missile defense systems. Search on Bibsonomy Inf. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Immanuel Kunz, Konrad Weiss, Angelika Schneider, Christian Banse Privacy Property Graph: Towards Automated Privacy Threat Modeling via Static Graph-based Analysis. Search on Bibsonomy Proc. Priv. Enhancing Technol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Eugene Bang, Jiyun Lee Undersampled Ionospheric Irregularity Threat Parameterization Using a Three-Dimensional Model for Satellite-Based Augmentation Systems. Search on Bibsonomy IEEE Trans. Aerosp. Electron. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Muhittin Coskun, Sakir Tasdemir Fuzzy Logic-Based Threat Assessment Application In Air Defense Systems. Search on Bibsonomy IEEE Trans. Aerosp. Electron. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Zijiao Tian, Meir Danino, Yaakov Bar-Shalom, Benny Milgrom Missile Threat Detection and Evasion Maneuvers With Countermeasures for a Low-Altitude Aircraft. Search on Bibsonomy IEEE Trans. Aerosp. Electron. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Malvika Singh, Babu M. Mehtre, S. Sangeetha 0001, Venu Govindaraju User Behaviour based Insider Threat Detection using a Hybrid Learning Approach. Search on Bibsonomy J. Ambient Intell. Humaniz. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Taimur Hassan, Samet Akçay, Mohammed Bennamoun, Salman Khan 0001, Naoufel Werghi Unsupervised anomaly instance segmentation for baggage threat recognition. Search on Bibsonomy J. Ambient Intell. Humaniz. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Tahani Aljohani, Ning Zhang 0001 Secure, ID Privacy and Inference Threat Prevention Mechanisms for Distributed Systems. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Anna Lena Duque Antón, Johannes Müller, Mohammad Rahmani Fadiheh, Dominik Stoffel, Wolfgang Kunz Fault Attacks on Access Control in Processors: Threat, Formal Analysis and Microarchitectural Mitigation. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Emilio Paolini, Luca Valcarenghi, Luca Maggiani, Nicola Andriolli Real-Time Clustering Based on Deep Embeddings for Threat Detection in 6G Networks. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Subhadip Ghosh, Aydin Zaboli, Junho Hong, Jaerock Kwon An Integrated Approach of Threat Analysis for Autonomous Vehicles Perception System. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Michal Kida, Oluwafemi Olukoya Nation-State Threat Actor Attribution Using Fuzzy Hashing. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Renato Marinho, Raimir Holanda Automated Emerging Cyber Threat Identification and Profiling Based on Natural Language Processing. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Othmane Cherqi, Youness Moukafih, Mounir Ghogho, Houda Benbrahim Enhancing Cyber Threat Identification in Open-Source Intelligence Feeds Through an Improved Semi-Supervised Generative Adversarial Learning Approach With Contrastive Learning. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Mat Razali Noor Afiza, Nur Atiqah Malizan, Nor Asiakin Hasbullah, Muslihah Wook, Norulzahrah Mohd Zainuddin, Khairul Khalil Ishak, Suzaimah Ramli, Sazali Sukardi Political Security Threat Prediction Framework Using Hybrid Lexicon-Based Approach and Machine Learning Technique. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Rafael Bruno Peccatiello, João José Costa Gondim, Luís Paulo Faina Garcia Applying One-Class Algorithms for Data Stream-Based Insider Threat Detection. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Nguyen Tan Cam, Nguyen Gia Trung An Intelligent Approach to Improving the Performance of Threat Detection in IoT. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Zhi Qiang Wang, Abdulmotaleb El-Saddik DTITD: An Intelligent Insider Threat Detection Framework Based on Digital Twin and Self-Attention Based Deep Learning Models. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Evan Crothers, Nathalie Japkowicz, Herna L. Viktor Machine-Generated Text: A Comprehensive Survey of Threat Models and Detection Methods. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Masoud Alajmi, Hanan Abdullah Mengash, Hamed Alqahtani, Sumayh S. Aljameel, Manar Ahmed Hamza, Ahmed S. Salama Automated Threat Detection Using Flamingo Search Algorithm With Optimal Deep Learning on Cyber-Physical System Environment. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Abdul Basit Ajmal, Shawal Khan, Masoom Alam, Abolfazl Mehbodniya, Julian L. Webber, Abdul Waheed Toward Effective Evaluation of Cyber Defense: Threat Based Adversary Emulation Approach. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Andrey Antonio Rodrigues, Maria Lúcia Bento Villela, Eduardo Luzeiro Feitosa Privacy Threat MOdeling Language. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Jimin Lee, Bongsob Song Data-Driven Strategy Decision Integrating Convolution Neural Network With Threat Assessment and Motion Prediction for Automatic Evasive Steering. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Urs J. De Swardt, Herman Kamper Semi-Supervised Machine Learning for Livestock Threat Classification Using GPS Data. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Jorge A. Ricardo, Luiz Giacomossi, João Francisco Silva Trentin, José F. B. Brancalion, Marcos Ricardo Omena de Albuquerque Máximo, Davi A. Santos Cooperative Threat Engagement Using Drone Swarms. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Taher Al-Shehari, Muna S. Al-Razgan, Taha Alfakih, Rakan A. Alsowail, Saravanan Pandiaraj Insider Threat Detection Model Using Anomaly-Based Isolation Forest Algorithm. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Ibrahim Gulatas, H. Hakan Kilinc, Abdul Halim Zaim, M. Ali Aydin Malware Threat on Edge/Fog Computing Environments From Internet of Things Devices Perspective. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Daniele Granata, Massimiliano Rak, Wissam Mallouli Automated Generation of 5G Fine-Grained Threat Models: A Systematic Approach. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Ehtisham Ul Haque, Waseem Abbasi, Sathishkumar Murugesan, Muhammad Shahid Anwar, Faheem Khan, Youngmoon Lee Cyber Forensic Investigation Infrastructure of Pakistan: An Analysis of the Cyber Threat Landscape and Readiness. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Yasuyuki Kawanishi, Hideaki Nishihara, Hirotaka Yoshida, Hideki Yamamoto, Hiroyuki Inoue A Study on Threat Analysis and Risk Assessment Based on the "Asset Container" Method and CWSS. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Zubair A. Baig, Sri Harsha Mekala, Sherali Zeadally Ransomware Attacks of the COVID-19 Pandemic: Novel Strains, Victims, and Threat Actors. Search on Bibsonomy IT Prof. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Ziaur Rahman 0003, Xun Yi, Ibrahim Khalil Blockchain-Based AI-Enabled Industry 4.0 CPS Protection Against Advanced Persistent Threat. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Iram Bibi, Adnan Akhunzada, Neeraj Kumar 0001 Deep AI-Powered Cyber Threat Analysis in IIoT. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Tim Ackermann, Markus Karch, Jörg Kippe Integration of Cyber Threat Intelligence into Security Onion and Malcolm for the use case of industrial networks. Search on Bibsonomy Autom. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Ali Aghamohammadpour, Ebrahim Mahdipour, Iman Attarzadeh Architecting threat hunting system based on the DODAF framework. Search on Bibsonomy J. Supercomput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10D. Santhadevi, B. Janet Stacked Deep Learning Framework for Edge-Based Intelligent Threat Detection in IoT Network. Search on Bibsonomy J. Supercomput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Jichao Bi, Shibo He, Fengji Luo, Wenchao Meng, Luyue Ji, Da-Wen Huang Defense of Advanced Persistent Threat on Industrial Internet of Things With Lateral Movement Modeling. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Tarek Moulahi, Rateb Jabbar, Abdulatif Alabdulatif, Sidra Abbas, Salim El Khediri, Salah Zidi, Muhammad Rizwan 0005 Privacy-preserving federated learning cyber-threat detection for intelligent transport systems with blockchain-based security. Search on Bibsonomy Expert Syst. J. Knowl. Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Divya Ramachandran, Mubarak Albathan, Ayyaz Hussain, Qaisar Abbas Enhancing Cloud-Based Security: A Novel Approach for Efficient Cyber-Threat Detection Using GSCSO-IHNN Model. Search on Bibsonomy Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Amir Namavar Jahromi, Hadis Karimipour, Ali Dehghantanha An ensemble deep federated learning cyber-threat hunting model for Industrial Internet of Things. Search on Bibsonomy Comput. Commun. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Ahmet Cevahir Cinar, Turkan Beyza Kara The current state and future of mobile security in the light of the recent mobile security threat reports. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Gaurav Sharma, Stilianos Vidalis, Catherine Menon, Niharika Anand Analysis and implementation of semi-automatic model for vulnerability exploitations of threat agents in NIST databases. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Rundong Yan, Sarah Dunnett, John D. Andrews A Petri net model-based resilience analysis of nuclear power plants under the threat of natural hazards. Search on Bibsonomy Reliab. Eng. Syst. Saf. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Ali Ahmadian Ramaki, Abbas Ghaemi Bafghi, Abbas Rasoolzadegan CAPTAIN: Community-based Advanced Persistent Threat Analysis in IT Networks. Search on Bibsonomy Int. J. Crit. Infrastructure Prot. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Engla Rencelj Ling, Mathias Ekstedt A threat modeling language for generating attack graphs of substation automation systems. Search on Bibsonomy Int. J. Crit. Infrastructure Prot. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Xiaojia Xu, Yongcai Wang, Lanling Xu, Deying Li 0001 LSA: Understanding the Threat of Link-Based Scapegoating Attack in Network Tomography. Search on Bibsonomy IEEE Trans. Netw. Sci. Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Zong-Xun Li, Yu-Jun Li, Yi-Wei Liu, Cheng Liu, Nan-Xin Zhou K-CTIAA: Automatic Analysis of Cyber Threat Intelligence Based on a Knowledge Graph. Search on Bibsonomy Symmetry The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Xiu Kan, Yixuan Fan, Jinjie Zheng, Chi-Hung Chi, Wanqing Song 0001, Aleksey Kudreyko Data adjusting strategy and optimized XGBoost algorithm for novel insider threat detection model. Search on Bibsonomy J. Frankl. Inst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Ofek Gur, Tomer Gross, Davide Bellizia, François-Xavier Standaert, Itamar Levi An In-Depth Evaluation of Externally Amplified Coupling (EAC) Attacks - A Concrete Threat for Masked Cryptographic Implementations. Search on Bibsonomy IEEE Trans. Circuits Syst. I Regul. Pap. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Marta Frasquet, María José Miquel-Romero, Alejandro Mollá-Descals When showrooming is not a threat: Uncovering opportunities for showroomer retention. Search on Bibsonomy Electron. Commer. Res. Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Wei Gao, Qingqing Guo, Ning Jiang Information vulnerability in facial recognition payment: An explanation of technology threat avoidance and information boundary theory. Search on Bibsonomy Electron. Commer. Res. Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Abbas Yazdinejad, Ali Dehghantanha, Reza M. Parizi, Gautam Srivastava 0001, Hadis Karimipour Secure Intelligent Fuzzy Blockchain Framework: Effective Threat Detection in IoT Networks. Search on Bibsonomy Comput. Ind. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Nora McDonald, Nazanin Andalibi "I Did Watch 'The Handmaid's Tale'": Threat Modeling Privacy Post-roe in the United States. Search on Bibsonomy ACM Trans. Comput. Hum. Interact. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Célia Tavares, Luciana Oliveira 0001, Pedro Duarte, Manuel Moreira da Silva Artificial Intelligence: A Blessing or a Threat for Language Service Providers in Portugal. Search on Bibsonomy Informatics The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Antony Bryant AI Chatbots: Threat or Opportunity? Search on Bibsonomy Informatics The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Prabhat Kumar 0003, Govind P. Gupta, Rakesh Tripathi, Sahil Garg, Mohammad Mehedi Hassan DLTIF: Deep Learning-Driven Cyber Threat Intelligence Modeling and Identification Framework in IoT-Enabled Maritime Transportation Systems. Search on Bibsonomy IEEE Trans. Intell. Transp. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Xudong He, Jian Wang 0015, Jiqiang Liu, Weiping Ding 0001, Zhen Han, Bin Wang 0062, Jamel Nebhen, Wei Wang 0012 DNS Rebinding Threat Modeling and Security Analysis for Local Area Network of Maritime Transportation Systems. Search on Bibsonomy IEEE Trans. Intell. Transp. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Abbas Yazdinejad, Behrouz Zolfaghari, Ali Dehghantanha, Hadis Karimipour, Gautam Srivastava 0001, Reza M. Parizi Accurate threat hunting in industrial internet of things edge devices. Search on Bibsonomy Digit. Commun. Networks The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Abbas Yazdinejad, Mostafa Kazemi, Reza M. Parizi, Ali Dehghantanha, Hadis Karimipour An ensemble deep learning model for cyber threat hunting in industrial internet of things. Search on Bibsonomy Digit. Commun. Networks The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Mingfei Sun, Xiaoyue Ma Combating health misinformation on social media through fact-checking: The effect of threat appraisal, coping appraisal, and empathy. Search on Bibsonomy Telematics Informatics The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Shameek Bhattacharjee, Sajal K. Das 0001 Building a Unified Data Falsification Threat Landscape for Internet of Things/Cyberphysical Systems Applications. Search on Bibsonomy Computer The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Pete Ford The Quantum Cybersecurity Threat May Arrive Sooner Than You Think. Search on Bibsonomy Computer The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #600 of 5606 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license