The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for threats with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1954-1987 (15) 1988-1993 (16) 1994-1996 (33) 1997 (17) 1998 (16) 1999 (21) 2000 (25) 2001 (30) 2002 (50) 2003 (83) 2004 (118) 2005 (218) 2006 (250) 2007 (330) 2008 (332) 2009 (227) 2010 (121) 2011 (93) 2012 (111) 2013 (105) 2014 (124) 2015 (162) 2016 (189) 2017 (188) 2018 (231) 2019 (223) 2020 (287) 2021 (264) 2022 (259) 2023 (329) 2024 (95)
Publication types (Num. hits)
article(1596) book(11) data(5) incollection(78) inproceedings(2795) phdthesis(63) proceedings(14)
Venues (Conferences, Journals, ...)
CoRR(283) LEET(69) HICSS(59) IEEE Access(56) ARES(49) IEEE Secur. Priv.(49) MIST@CCS(43) ISI(38) Sensors(32) ACSAC(29) Netw. Secur.(29) Comput. Secur.(27) CCS(26) Commun. ACM(18) Computer(18) AsiaCCS(17) More (+10 of total 1688)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 2004 occurrences of 1111 keywords

Results
Found 4563 publication records. Showing 4562 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
11Volodymyr Sabat, Bohdan Durniak, Myroslava Kulynych, Olena Havrylyshyn, Pavlo Hibey Using semantic analysis of document text in building risk models in the threats system. Search on Bibsonomy IntelITSIS The full citation details ... 2024 DBLP  BibTeX  RDF
11Ulrike Gretzel, Tanja Schöllhammer Under Pressure: A Netnographic Study of Threats to Influencer and Creator Mental Health. Search on Bibsonomy HICSS The full citation details ... 2024 DBLP  BibTeX  RDF
11Jason Landsborough, Thuy Nguyen, Neil C. Rowe Retrospectively Using Multilayer Deception in Depth Against Advanced Persistent Threats. Search on Bibsonomy HICSS The full citation details ... 2024 DBLP  BibTeX  RDF
11Hemant K. Bhargava, Junghee Lee, Xinxue Qu, Daewon Sun How Should We Deal with Malicious Customers' Threats in Online Review? Perspectives of Retailers, Customers, and Platforms. Search on Bibsonomy HICSS The full citation details ... 2024 DBLP  BibTeX  RDF
11Yang Pan, Weiling Song Tech Giants and New Entry Threats. Search on Bibsonomy HICSS The full citation details ... 2024 DBLP  BibTeX  RDF
11Oliver Rath, Frederic Haase, Johannes Werner Melsbach, Jiarun Liu, Julia Lauten, Detlef Schoder Analyzing Threats to Financial Market Integrity - A Taxonomy of Financial Fake News Schemes. Search on Bibsonomy HICSS The full citation details ... 2024 DBLP  BibTeX  RDF
11Bingjie Deng, Yunlu Yin Exploring the Influence of Contagious Threats on Consumer Perceptions of Social Media Influencers. Search on Bibsonomy HICSS The full citation details ... 2024 DBLP  BibTeX  RDF
11Mingyuan Huang, Jiachi Chen, Zigui Jiang, Zibin Zheng Revealing Hidden Threats: An Empirical Study of Library Misuse in Smart Contracts. Search on Bibsonomy ICSE The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Debashis Gupta, Aditi Golder, Kishor Datta Gupta, Dipankar Dasgupta, Roy George, Khalil Shujaee Security threats on Data-Driven Approaches for Luggage Screening. Search on Bibsonomy CCWC The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Katherine Davis, Shining Sun Needle-in-the-Haystack: On Automatic Risk-based Searching to Stop Cyber-Physical Threats in Large-Scale Power Systems. Search on Bibsonomy CISS The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Matthew P. Hare, Doug Salt, Ric Colasanti, Richard Milton, Mike Batty, Alison J. Heppenstall, Gary Polhill Taking Agent-Based Social Simulation to the Next Level Using Exascale Computing: Potential Use-Cases, Capacity Requirements and Threats. Search on Bibsonomy AAMAS The full citation details ... 2024 DBLP  BibTeX  RDF
11Adéle da Veiga, Steven Furnell, Yuxiang Hong, Merrill Warkentin Introduction to the special issue on insider threats in cybersecurity. Search on Bibsonomy J. Inf. Secur. Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Xueyuan Wen, Kaiyan Dai, Qi Xiong, Lili Chen, Jian Zhang, Zhen Wang 0013 An approach to internal threats detection based on sentiment analysis and network analysis. Search on Bibsonomy J. Inf. Secur. Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Ilker Kara Fileless malware threats: Recent advances, analysis approach through memory forensics and research challenges. Search on Bibsonomy Expert Syst. Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Yee Ching Tok, Sudipta Chattopadhyay 0001 Identifying threats, cybercrime and digital forensic opportunities in Smart City Infrastructure via threat modeling. Search on Bibsonomy Forensic Sci. Int. Digit. Investig. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Harish Garg, Cengiz Kahraman, Zeeshan Ali, Tahir Mahmood 0002 Interaction hamy mean operators for complex pythagorean fuzzy information and their applications to security threats in computers. Search on Bibsonomy J. Intell. Fuzzy Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11S. Suganya, S. Selvamuthukumaran Auditing of hadoop log file for dynamic detection of threats using H-ISSM-MIM and convolutional neural network. Search on Bibsonomy J. Intell. Fuzzy Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Suzan Almutairi, Ahmed Barnawi Federated learning vulnerabilities, threats and defenses: A systematic review and future directions. Search on Bibsonomy Internet Things The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Ramin Barati Security Threats and Dealing with Social Networks. Search on Bibsonomy SN Comput. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Cristina Alcaraz, Jesus Cumplido, Alicia Triviño OCPP in the spotlight: threats and countermeasures for electric vehicle charging infrastructures 4.0. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Gennaro Avitabile, Vincenzo Botta, Vincenzo Iovino, Ivan Visconti Privacy and Integrity Threats in Contact Tracing Systems and Their Mitigations. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Brian K. Masinde, Caroline M. Gevaert, Michael H. Nagenborg, Jaap Zevenbergen Group-Privacy Threats for Geodata in the Humanitarian Context. Search on Bibsonomy ISPRS Int. J. Geo Inf. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Xifeng Wang, Limin Sun, Chao Wang, Hongsong Zhu, Lian Zhao, Shujie Yang, Changqiao Xu Intelligent Connected Vehicle Security: Threats, Attacks and Defenses. Search on Bibsonomy J. Inf. Sci. Eng. The full citation details ... 2023 DBLP  BibTeX  RDF
11Abdul Majeed 0004, Abdullah M. Alnajim, Athar Waseem, Aleem Khaliq, Aqdas Naveed, Shabana Habib, Muhammad Islam, Sheroz Khan Deep Learning-Based Symptomizing Cyber Threats Using Adaptive 5G Shared Slice Security Approaches. Search on Bibsonomy Future Internet The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Weiting Yue, Chao Ren 0005, Yueji Liang, Jieyu Liang, Xiaoqi Lin, Anchao Yin, Zhenkui Wei Assessment of Wildfire Susceptibility and Wildfire Threats to Ecological Environment and Urban Development Based on GIS and Multi-Source Data: A Case Study of Guilin, China. Search on Bibsonomy Remote. Sens. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Jiantao Li, Tianxian Zhang, Kai Liu Memory-Enhanced Twin Delayed Deep Deterministic Policy Gradient (ME-TD3)-Based Unmanned Combat Aerial Vehicle Trajectory Planning for Avoiding Radar Detection Threats in Dynamic and Unknown Environments. Search on Bibsonomy Remote. Sens. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Anil V. Turukmane Forecasting the IoT-based cyber threats using the hybrid forage dependent ensemble classifier. Search on Bibsonomy Concurr. Comput. Pract. Exp. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Kamal Kumar Gola, Shikha Arya Underwater acoustic sensor networks: Taxonomy on applications, architectures, localization methods, deployment techniques, routing techniques, and threats: A systematic review. Search on Bibsonomy Concurr. Comput. Pract. Exp. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Tingwei Liu, Hong Xie 0004, John C. S. Lui Online Zero-Cost Learning: Optimizing Large Scale Network Rare Threats Simulation. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Suryateja S. Pericherla Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art. Search on Bibsonomy ISC Int. J. Inf. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Naveed Ul Mustafa, Yan Solihin Persistent Memory Security Threats to Interprocess Isolation. Search on Bibsonomy IEEE Micro The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Lizy Kurian John Hardware Security and Privacy: Threats and Opportunities. Search on Bibsonomy IEEE Micro The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Petro Shepita, Lyubov Tupychak, Julia Shepita Analysis of Cyber Security Threats of the Printing Enterprise. Search on Bibsonomy J. Cyber Secur. Mobil. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Usman Rauf, Fadi Mohsen, Zhiyuan Wei A Taxonomic Classification of Insider Threats: Existing Techniques, Future Directions & Recommendations. Search on Bibsonomy J. Cyber Secur. Mobil. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Montida Pattaranantakul, Chalee Vorakulpipat, Takeshi Takahashi 0001 Service Function Chaining security survey: Addressing security challenges and threats. Search on Bibsonomy Comput. Networks The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Sowmya Myneni, Kritshekhar Jha, Abdulhakim Sabur, Garima Agrawal, Yuli Deng, Ankur Chowdhary, Dijiang Huang Unraveled - A semi-synthetic dataset for Advanced Persistent Threats. Search on Bibsonomy Comput. Networks The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Mikolaj Kowalski, Wojciech Mazurczyk Toward the mutual routing security in wide area networks: A scoping review of current threats and countermeasures. Search on Bibsonomy Comput. Networks The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Muhammad Waqas 0001, Shanshan Tu, Jialin Wan, Talha Mir, Hisham Alasmary, Ghulam Abbas 0002 Defense scheme against advanced persistent threats in mobile fog computing security. Search on Bibsonomy Comput. Networks The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Chengbo Zhang, Zhenghan Lian, Bo Xu, Qingzhong Shen, Mingwei Bao, Zunxi Huang, Hongchen Jiang, Wenjun Li Gut Microbiome Variation Along A Lifestyle Gradient Reveals Threats Faced by Asian Elephants. Search on Bibsonomy Genom. Proteom. Bioinform. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Vasileios Vlachos, Yannis C. Stamatiou, Sotiris E. Nikoletseas The Privacy Flag Observatory: A Crowdsourcing Tool for Real Time Privacy Threats Evaluation. Search on Bibsonomy J. Cybersecur. Priv. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Anastasios Papathanasiou, George Liontos, Vasiliki Liagkou, Euripidis Glavas Business Email Compromise (BEC) Attacks: Threats, Vulnerabilities and Countermeasures - A Perspective on the Greek Landscape. Search on Bibsonomy J. Cybersecur. Priv. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Milad Mehri A circuit level analysis of power distribution network on a PCB layout exposed to intentional/unintentional electromagnetic threats. Search on Bibsonomy Integr. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Hakan Alakoca, Mustafa Namdar, Sultan Aldirmaz Çolak, Mehmet Basaran, Arif Basgumus, Lutfiye Durak-Ata, Halim Yanikomeroglu Metasurface Manipulation Attacks: Potential Security Threats of RIS-Aided 6G Communications. Search on Bibsonomy IEEE Commun. Mag. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Amit Sharma, Brij B. Gupta, Awadhesh Kumar Singh, V. K. Saraswat Advanced Persistent Threats (APT): evolution, anatomy, attribution and countermeasures. Search on Bibsonomy J. Ambient Intell. Humaniz. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Abdulbasit A. Darem, Asma Alhashmi, Tareq M. Alkhaldi, Abdullah Mujawib Alashjaee, Sultan M. Alanazi, Shouki A. Ebad Cyber Threats Classifications and Countermeasures in Banking and Financial Sector. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Sinchana Kumbale, Smriti Singh, G. Poornalatha, Sanjay Singh 0002 BREE-HD: A Transformer-Based Model to Identify Threats on Twitter. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Samson O. Oruma, Slobodan Petrovic Security Threats to 5G Networks for Social Robots in Public Spaces: A Survey. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Bibhas Sharma, Ishan Karunanayake, Rahat Masood, Muhammad Ikram 0001 Don't Be a Victim During a Pandemic! Analysing Security and Privacy Threats in Twitter During COVID-19. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Arsalan Javeed, Cemal Yilmaz 0001, Erkay Savas Microarchitectural Side-Channel Threats, Weaknesses and Mitigations: A Systematic Mapping Study. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Sheikh Imroza Manzoor, Sanjeev Jain, Yashwant Singh, Harvinder Singh Federated Learning Based Privacy Ensured Sensor Communication in IoT Networks: A Taxonomy, Threats and Attacks. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Yongle Xu, Ming Zhang, Boyin Jin Pursuing Benefits or Avoiding Threats: Realizing Regional Multi-Target Electronic Reconnaissance With Deep Reinforcement Learning. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Nir Kshetri Cybercrime and Privacy Threats of Large Language Models. Search on Bibsonomy IT Prof. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Luis Puche Rondon, Leonardo Babun, Ahmet Aris, Kemal Akkaya, A. Selcuk Uluagac Ivycide: Smart Intrusion Detection System Against E-IoT Driver Threats. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Hamidreza Jahangir, Subhash Lakshminarayana, Carsten Maple, Gregory Epiphaniou A Deep-Learning-Based Solution for Securing the Power Grid Against Load Altering Threats by IoT-Enabled Devices. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Sergio Ruiz-Villafranca, Javier Carrillo Mondéjar, Juan Manuel Castelo Gómez, José Roldán Gómez MECInOT: a multi-access edge computing and industrial internet of things emulator for the modelling and study of cybersecurity threats. Search on Bibsonomy J. Supercomput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11K. Janani, S. Ramamoorthy Countermeasure SDN-based IoT threats using blockchain multicontroller. Search on Bibsonomy Int. J. High Perform. Syst. Archit. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Sven Dietrich, Frank Kargl, Hartmut König, Pavel Laskov, Artur Hermann Network Attack Detection and Defense - AI-Powered Threats and Responses (Dagstuhl Seminar 23431). Search on Bibsonomy Dagstuhl Reports The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Yue Wang, Md. Abul Bashar, Mahinthan Chandramohan, Richi Nayak Exploring topic models to discern cyber threats on Twitter: A case study on Log4Shell. Search on Bibsonomy Intell. Syst. Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Alessandro Brighente, Mauro Conti, Radha Poovendran, Jianying Zhou 0001 Guest Editorial: Cyber-Physical Threats and Solutions for Autonomous Transportation Systems. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Yao Shan, Yu Yao, Tong Zhao, Wei Yang NeuPot: A Neural Network-Based Honeypot for Detecting Cyber Threats in Industrial Control Systems. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Chun Liu 0006, Jing Zhao, Ron J. Patton Distributed Antittack Fault-Tolerant Tracking Control for Vehicle Platoon Systems Under Cyber-Physical Threats. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Sri Harsha Mekala, Zubair A. Baig, Adnan Anwar, Sherali Zeadally Cybersecurity for Industrial IoT (IIoT): Threats, countermeasures, challenges and future directions. Search on Bibsonomy Comput. Commun. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Ashok Kumar Yadav, Karan Singh, Ali H. Amin, Laila M. Almutairi, Theyab R. Alsenani, Ali Ahmadian A comparative study on consensus mechanism with security threats and future scopes: Blockchain. Search on Bibsonomy Comput. Commun. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Mayank Kumar Rusia, Dushyant Kumar Singh A comprehensive survey on techniques to handle face identity threats: challenges and opportunities. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Tiantian Zhu, Stein Haugen, Yiliu Liu, Xue Yang A value of prediction model to estimate optimal response time to threats for accident prevention. Search on Bibsonomy Reliab. Eng. Syst. Saf. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Roberto Setola New threats and research problems for critical infrastructure. Search on Bibsonomy Int. J. Crit. Infrastructure Prot. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Yassine Maleh, Youssef Qasmaoui, Khalid El Gholami, Yassine Sadqi, Soufyane Mounir A comprehensive survey on SDN security: threats, mitigations, and future directions. Search on Bibsonomy J. Reliab. Intell. Environ. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Maria Garcia-Fernandez, Guillermo Álvarez Narciandi, Yuri Álvarez López, Fernando Las-Heras Array-Based Ground Penetrating Synthetic Aperture Radar on Board an Unmanned Aerial Vehicle for Enhanced Buried Threats Detection. Search on Bibsonomy IEEE Trans. Geosci. Remote. Sens. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Syed Hussain Ali Kazmi, Rosilah Hassan, Faizan Qamar, Kashif Nisar, Ag Asri Ag Ibrahim Security Concepts in Emerging 6G Communication: Threats, Countermeasures, Authentication Techniques and Research Directions. Search on Bibsonomy Symmetry The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Nikolay Sergeevich Egoshin, Anton Konev, Aleksandr Aleksandrovich Shelupanov Model of Threats to the Integrity and Availability of Information Processed in Cyberspace. Search on Bibsonomy Symmetry The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Anh Ta, Hakan Tarakci, Shailesh Kulkarni, Victor R. Prybutok, Robert Pavur The effects of cyber threats on maintenance outsourcing and age replacement policy. Search on Bibsonomy Comput. Ind. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Vojtech Havlena, Petr Matousek, Ondrej Rysavý, Lukás Holík Accurate Automata-Based Detection of Cyber Threats in Smart Grid Communication. Search on Bibsonomy IEEE Trans. Smart Grid The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Jessica C. Acharya, Catherine J. Staes, Katie S. Allen, Joel Hartsell, Theresa A. Cullen, Leslie Lenert, Donald W. Rucker, Harold P. Lehmann, Brian E. Dixon Strengths, weaknesses, opportunities, and threats for the nation's public health information systems infrastructure: synthesis of discussions from the 2022 ACMI Symposium. Search on Bibsonomy J. Am. Medical Informatics Assoc. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Muhammad Adil 0002, Mian Ahmad Jan, Yongxin Liu, Hussein Abulkasim, Ahmed Farouk, Houbing Song A Systematic Survey: Security Threats to UAV-Aided IoT Applications, Taxonomy, Current Challenges and Requirements With Future Research Directions. Search on Bibsonomy IEEE Trans. Intell. Transp. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Imran Ashraf, Yongwan Park, Soojung Hur, Sung Won Kim, Roobaea Alroobaea, Yousaf Bin Zikria, Summera Nosheen A Survey on Cyber Security Threats in IoT-Enabled Maritime Industry. Search on Bibsonomy IEEE Trans. Intell. Transp. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Baraka Jacob Maiseli, Abdi T. Abdalla, Libe V. Massawe, Mercy Mbise, Khadija Mkocha, Nassor Ally Nassor, Moses Ismail, James Michael, Samwel Kimambo Brain-computer interface: trend, challenges, and threats. Search on Bibsonomy Brain Informatics The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Fabio Urbina, Filippa Lentzos, Cédric Invernizzi, Sean Ekins Preventing AI From Creating Biochemical Threats. Search on Bibsonomy J. Chem. Inf. Model. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Angélica Pigola, Priscila Rezende Da Costa Dynamic Capabilities in Cybersecurity Intelligence: A Meta-Synthesis to Enhance Protection Against Cyber Threats. Search on Bibsonomy Commun. Assoc. Inf. Syst. The full citation details ... 2023 DBLP  BibTeX  RDF
11Ferhat Arat, Sedat Akleylek Modified graph-based algorithm to analyze security threats in IoT. Search on Bibsonomy PeerJ Comput. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Naeem A. Nawaz, Kashif Ishaq, Uzma Farooq, Amna Khalil, Saim Rasheed, Adnan Abid, Fadhilah Rosdi A comprehensive review of security threats and solutions for the online social networks industry. Search on Bibsonomy PeerJ Comput. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Christopher Ifeanyi Eke, Azah Anir Norman, Mwenge Mulenga Machine learning approach for detecting and combating bring your own device (BYOD) security threats and attacks: a systematic mapping review. Search on Bibsonomy Artif. Intell. Rev. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Wenqi Wei, Ling Liu 0001, Jingya Zhou, Ka Ho Chow, Yanzhao Wu 0001 Securing Distributed SGD Against Gradient Leakage Threats. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Mohammad Hammoudeh, Gregory Epiphaniou, Pedro Pinto 0001 Cyber-Physical Systems: Security Threats and Countermeasures. Search on Bibsonomy J. Sens. Actuator Networks The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Munmun Bhattacharya, Sandip Roy 0001, Samiran Chattopadhyay, Ashok Kumar Das, Sachin Shetty A comprehensive survey on online social networks security and privacy issues: Threats, machine learning-based solutions, and open challenges. Search on Bibsonomy Secur. Priv. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Limin Song, Seungmin Rho Hidden target recognition method for high-speed network security threats based on attack graph theory. Search on Bibsonomy J. High Speed Networks The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Pragati Rana, B. P. Patil Cyber security threats in IoT: A review. Search on Bibsonomy J. High Speed Networks The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Megha V. Kadam, Hemant B. Mahajan, Nilesh J. Uke, Pravin R. Futane Cybersecurity threats mitigation in Internet of Vehicles communication system using reliable clustering and routing. Search on Bibsonomy Microprocess. Microsystems The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Zelin Wan, Jin-Hee Cho, Mu Zhu, Ahmed H. Anwar, Charles A. Kamhoua, Munindar P. Singh Resisting Multiple Advanced Persistent Threats via Hypergame-Theoretic Defensive Deception. Search on Bibsonomy IEEE Trans. Netw. Serv. Manag. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Tianqing Zhu, Dayong Ye, Zishuo Cheng, Wanlei Zhou 0001, Philip S. Yu Learning Games for Defending Advanced Persistent Threats in Cyber Systems. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Sunil Gautam, Ketaki Pattani, Mohd. Zuhair, Mamoon Rashid, Nazir Ahmad Covertvasion: Depicting threats through covert channels based novel evasive attacks in android. Search on Bibsonomy Int. J. Intell. Networks The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Mohammad J. K. Abood, Ghassan Abdul-Majeed Classification of network slicing threats based on slicing enablers: A survey. Search on Bibsonomy Int. J. Intell. Networks The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Shameek Bhattacharjee, Sajal K. Das 0001 Unifying Threats Against Information Integrity in Participatory Crowd Sensing. Search on Bibsonomy IEEE Pervasive Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Lina Ge, Haiao Li, Xiao Wang, Zhe Wang A review of secure federated learning: Privacy leakage threats, protection technologies, challenges and future directions. Search on Bibsonomy Neurocomputing The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Eryn Juan He, Sergei Savin, Joel Goh, Chung-Piaw Teo Off-Platform Threats in On-Demand Services. Search on Bibsonomy Manuf. Serv. Oper. Manag. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Peter R. J. Trim, Yang-Im Lee Managing Cybersecurity Threats and Increasing Organizational Resilience. Search on Bibsonomy Big Data Cogn. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Marius Letourneau, Guillaume Doyen, Rémi Cogranne, Bertrand Mathieu A Comprehensive Characterization of Threats Targeting Low-Latency Services: The Case of L4S. Search on Bibsonomy J. Netw. Syst. Manag. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Mohannad Alhanahnah, Clay Stevens, Bocheng Chen, Qiben Yan, Hamid Bagheri IoTCom: Dissecting Interaction Threats in IoT Systems. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Giorgio Di Tizio, Michele Armellini, Fabio Massacci Software Updates Strategies: A Quantitative Evaluation Against Advanced Persistent Threats. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Umer Ahmed Butt, Rashid Amin, Muhammad Mehmood, Hamza Aldabbas, Mafawez T. Alharbi, Nasser Albaqami Cloud Security Threats and Solutions: A Survey. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Kavita Kumavat, Joanne Gomes EIDDM: Edge and Internet Layer Distributed DoS Threats Detection and Mitigation for Internet of Things Wireless Communications. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #600 of 4562 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license