The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for threats with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1954-1987 (15) 1988-1993 (16) 1994-1996 (33) 1997 (17) 1998 (16) 1999 (21) 2000 (25) 2001 (30) 2002 (50) 2003 (83) 2004 (118) 2005 (218) 2006 (250) 2007 (330) 2008 (332) 2009 (227) 2010 (121) 2011 (93) 2012 (111) 2013 (105) 2014 (124) 2015 (162) 2016 (189) 2017 (188) 2018 (231) 2019 (223) 2020 (287) 2021 (264) 2022 (259) 2023 (329) 2024 (95)
Publication types (Num. hits)
article(1596) book(11) data(5) incollection(78) inproceedings(2795) phdthesis(63) proceedings(14)
Venues (Conferences, Journals, ...)
CoRR(283) LEET(69) HICSS(59) IEEE Access(56) ARES(49) IEEE Secur. Priv.(49) MIST@CCS(43) ISI(38) Sensors(32) ACSAC(29) Netw. Secur.(29) Comput. Secur.(27) CCS(26) Commun. ACM(18) Computer(18) AsiaCCS(17) More (+10 of total 1688)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 2004 occurrences of 1111 keywords

Results
Found 4563 publication records. Showing 4562 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
11Rohit Sharma, Rajeev Arya 0001 Security threats and measures in the Internet of Things for smart city infrastructure: A state of art. Search on Bibsonomy Trans. Emerg. Telecommun. Technol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Jinyin Chen, Jie Ge, Shilian Zheng, Linhui Ye, Haibin Zheng, Weiguo Shen, Keqiang Yue, Xiaoniu Yang AIR: Threats of Adversarial Attacks on Deep Learning-Based Information Recovery. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Qun Li 0005, Chandra Thapa, Lawrence Ong, Yifeng Zheng, Hua Ma, Seyit Ahmet Çamtepe, Anmin Fu, Yansong Gao Vertical Federated Learning: Taxonomies, Threats, and Prospects. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Danial Javaheri, Mahdi Fahmideh, Hassan Chizari, Pooia Lalbakhsh, Junbeom Hur Cybersecurity threats in FinTech: A systematic review. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Jiaqi Ruan, Gaoqi Liang, Huan Zhao, Guolong Liu, Jing Qiu 0001, Junhua Zhao 0001, Zhao Xu 0002, Fushuan Wen, Zhao Yang Dong Applying Large Language Models to Power Systems: Potential Security Threats. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Maximilian Mozes, Xuanli He, Bennett Kleinberg, Lewis D. Griffin Use of LLMs for Illicit Purposes: Threats, Prevention Measures, and Vulnerabilities. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Fabio Massacci, Giorgio Di Tizio Are Software Updates Useless Against Advanced Persistent Threats? Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Mike Wa Nkongolo, Mahmut Tokmak Zero-Day Threats Detection for Critical Infrastructures. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Preston K. Robinette, Daniel Moyer, Taylor T. Johnson Monsters in the Dark: Sanitizing Hidden Threats with Diffusion Models. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11D. S. Belyakov, E. O. Kalinin, A. A. Konev, Alexander A. Shelupanov, A. K. Novokhrestov Life cycle models and security threats to a microcircuit during its development and operation. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Rawlings Fiberesima Assessment of POS Owners Awareness of Cybersecurity and Insider Threats in POS Kiosks Related Financial Crimes. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Dominik Bär, Nicolas Pröllochs, Stefan Feuerriegel New threats to society from free-speech social media platforms. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Daniel Timko, Muhammad Lutfor Rahman Commercial Anti-Smishing Tools and Their Comparative Effectiveness Against Modern Threats. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Sudip Mittal, Jingdao Chen AI Security Threats against Pervasive Robotic Systems: A Course for Next Generation Cybersecurity Workforce. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Xi Li, Songhe Wang, Chen Wu, Hao Zhou, Jiaqi Wang 0002 Backdoor Threats from Compromised Foundation Models to Federated Learning. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Hongyang Du, Dusit Niyato, Jiawen Kang, Zehui Xiong, Kwok-Yan Lam, Yuguang Fang, Yonghui Li 0001 Spear or Shield: Leveraging Generative AI to Tackle Security Threats of Intelligent Network Services. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Aram Bahrini, Mohammadsadra Khamoshifar, Hossein Abbasimehr, Robert J. Riggs, Maryam Esmaeili, Rastin Mastali Majdabadkohne, Morteza Pasehvar ChatGPT: Applications, Opportunities, and Threats. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Naresh Kshetri, Mir Mehedi Rahman, Sayed Abu Sayeed, Irin Sultana cryptoRAN: A review on cryptojacking and ransomware attacks w.r.t. banking industry - threats, challenges, & problems. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Marvin Muñoz Barón, Marvin Wyrich, Daniel Graziotin, Stefan Wagner 0001 Evidence Profiles for Validity Threats in Program Comprehension Experiments. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Antigoni Kruti Identity Prove Limited Information Governance Policy against cyber security persistent threats. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Thomas Cilloni, Charles Fleming, Charles Walter Privacy Threats in Stable Diffusion Models. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11June Sallou, Thomas Durieux, Annibale Panichella Breaking the Silence: the Threats of Using LLMs in Software Engineering. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Rahat Masum Cyber Security in Smart Manufacturing (Threats, Landscapes Challenges). Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Zian Jia, Yun Xiong, Yuhong Nan, Yao Zhang, Jinjing Zhao, Mi Wen MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Suranjeet Chowdhury Avik, Sujit Biswas, Md Atiqur Rahaman Ahad, Zohaib Latif, Abdullah Alghamdi, Hamad Ali Abosaq, Anupam Kumar Bairagi Challenges in Blockchain as a Solution for IoT Ecosystem Threats and Access Control: A Survey. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Yuke Hu, Wei Liang, Ruofan Wu, Kai Xiao, Weiqiang Wang, Xiaochen Li, Jinfei Liu, Zhan Qin Quantifying and Defending against Privacy Threats on Federated Knowledge Graph Embedding. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Yuqing Yang 0003, Chao Wang, Yue Zhang, Zhiqiang Lin SoK: Decoding the Super App Enigma: The Security Mechanisms, Threats, and Trade-offs in OS-alike Apps. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Nan Wang, Xuezhi Wen, Dalin Zhang 0003, Xibin Zhao, Jiahui Ma, Mengxia Luo, Sen Nie, Shi Wu, Jiqiang Liu TBDetector: Transformer-Based Detector for Advanced Persistent Threats with Provenance Graph. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Xuandong Zhao, Kexun Zhang, Yu-Xiang Wang 0003, Lei Li 0005 Generative Autoencoders as Watermark Attackers: Analyses of Vulnerabilities and Threats. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Wenqi Wei, Ling Liu 0001, Jingya Zhou, Ka Ho Chow, Yanzhao Wu 0001 Securing Distributed SGD against Gradient Leakage Threats. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Ozlem Ceviz, Pinar Sadioglu, Sevil Sen A Survey of Security in UAVs and FANETs: Issues, Threats, Analysis of Attacks, and Solutions. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Enrique Tomás Martínez Beltrán, Pedro Miguel Sánchez Sánchez, Sergio López Bernal, Gérôme Bovet, Manuel Gil Pérez, Gregorio Martínez Pérez, Alberto Huertas Celdrán Mitigating Communications Threats in Decentralized Federated Learning through Moving Target Defense. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Yusuke Kawamoto 0001, Kazumasa Miyake, Koichi Konishi, Yutaka Oiwa Threats, Vulnerabilities, and Controls of Machine Learning Based Systems: A Survey and Taxonomy. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Yuanda Wang, Qiben Yan, Nikolay Ivanov, Xun Chen A Practical Survey on Emerging Threats from AI-driven Voice Attacks: How Vulnerable are Commercial Voice Control Systems? Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Josh A. Goldstein, Girish Sastry, Micah Musser, Renee DiResta, Matthew Gentzel, Katerina Sedova Generative Language Models and Automated Influence Operations: Emerging Threats and Potential Mitigations. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Akaki Tsunoda Investigating Threats Posed by SMS Origin Spoofing to IoT Devices. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Zixuan Wang, Jiliang Li, Yuntao Wang 0004, Zhou Su, Shui Yu 0001, Weizhi Meng 0001 Optimal Repair Strategy Against Advanced Persistent Threats Under Time-Varying Networks. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Gaolei Li, Yuanyuan Zhao, Wenqi Wei, Yuchen Liu Few-shot Multi-domain Knowledge Rearming for Context-aware Defence against Advanced Persistent Threats. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Baihe Ma, Xu Wang 0004, Xiaojie Lin, Yanna Jiang, Caijun Sun, Zhe Wang, Guangsheng Yu, Ying He 0001, Wei Ni 0001, Ren Ping Liu Location Privacy Threats and Protections in Future Vehicular Networks: A Comprehensive Review. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Gennady Medvinsky, Ben Livshits From Social Engineering to Quantum Threats: Safeguarding User Wallets with FailSafe. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Tushar Nagrare, Parul Sindhewad, Faruk Kazi 0001 BLE Protocol in IoT Devices and Smart Wearable Devices: Security and Privacy Threats. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Leo Schwinn, David Dobre, Stephan Günnemann, Gauthier Gidel Adversarial Attacks and Defenses in Large Language Models: Old and New Threats. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Dennis Agnew, Sharon Boamah, Janise McNair A Survey of Software-Defined Smart Grid Networks: Security Threats and Defense Techniques. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Wei Chen 0043, Yihui Ren 0001, Ai Kagawa, Matthew R. Carbone, Samuel Yen-Chi Chen, Xiaohui Qu, Shinjae Yoo, Austin Clyde, Arvind Ramanathan, Rick L. Stevens, Hubertus Johannes Jacobus Van Dam, Deyu Lu Transferable Graph Neural Fingerprint Models for Quick Response to Future Bio-Threats. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Subhash Lakshminarayana, Carsten Maple, Andrew Larkins, Daryl Flack, Christopher Few, Anurag K. Srivastava 0001 Demand-Side Threats to Power Grid Operations from IoT-Enabled Edge. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11David Sánchez 0001, Najeeb Jebreel, Josep Domingo-Ferrer, Krishnamurty Muralidhar, Alberto Blanco-Justicia An Examination of the Alleged Privacy Threats of Confidence-Ranked Reconstruction of Census Microdata. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Qian Li, Yuxiao Hu, Yinpeng Dong, Dongxiao Zhang, Yuntian Chen Focus on Hiders: Exploring Hidden Threats for Enhancing Adversarial Training. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Kai Greshake, Sahar Abdelnabi, Shailesh Mishra, Christoph Endres, Thorsten Holz, Mario Fritz More than you've asked for: A Comprehensive Analysis of Novel Prompt Injection Threats to Application-Integrated Large Language Models. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Dag I. K. Sjøberg, Gunnar R. Bergersen Improving the Reporting of Threats to Construct Validity. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Philipp Pütz, Richard Mitev, Markus Miettinen, Ahmad-Reza Sadeghi Unleashing IoT Security: Assessing the Effectiveness of Best Practices in Protecting Against Threats. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Harjinder Singh Lallie 0001, Andrew Thompson 0013, Elzbieta Titis, Paul Stephens Understanding Cyber Threats Against the Universities, Colleges, and Schools. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Yuntao Wang 0004, Han Liu, Zhou Su Combating Advanced Persistent Threats: Challenges and Solutions. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Daksh Dave, Gauransh Sawhney, Pushkar Aggarwal, Nitish Silswal, Dhruv Khut The New Frontier of Cybersecurity: Emerging Threats and Innovations. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Mahmut Tokmak, Mike Wa Nkongolo Stacking an autoencoder for feature selection of zero-day threats. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Mauro Conti, Nicola Farronato, Stefanos Koffas, Luca Pajola, Stjepan Picek Invisible Threats: Backdoor Attack in OCR Systems. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Mario Raciti, Giampaolo Bella How to Model Privacy Threats in the Automotive Domain. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Shufan Jiang, Rafael Angarita, Stéphane Cormier, Francis Rousseaux Named Entity Recognition for Monitoring Plant Health Threats in Tweets: a ChouBERT Approach. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Zhiyan Chen, Jinxin Liu 0001, Yu Shen 0001, Murat Simsek, Burak Kantarci, Hussein T. Mouftah, Petar Djukic Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats. Search on Bibsonomy ACM Comput. Surv. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Alessio Rugo, Claudio A. Ardagna, Nabil El Ioini A Security Review in the UAVNet Era: Threats, Countermeasures, and Gap Analysis. Search on Bibsonomy ACM Comput. Surv. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Shalini Saini, Nitesh Saxena A Survey of Threats to Research Literature-dependent Medical AI Solutions. Search on Bibsonomy ACM Comput. Surv. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Yupeng Hu, Wenxin Kuang, Zheng Qin 0001, Kenli Li 0001, Jiliang Zhang 0002, Yansong Gao, Wenjia Li, Keqin Li 0001 Artificial Intelligence Security: Threats and Countermeasures. Search on Bibsonomy ACM Comput. Surv. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Zhibo Wang 0001, Jingjing Ma, Xue Wang, Jiahui Hu, Zhan Qin, Kui Ren 0001 Threats to Training: A Survey of Poisoning Attacks and Defenses on Machine Learning Systems. Search on Bibsonomy ACM Comput. Surv. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Badis Hammi, Sherali Zeadally, Jamel Nebhen Security Threats, Countermeasures, and Challenges of Digital Supply Chains. Search on Bibsonomy ACM Comput. Surv. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Guilherme Giantini The sophistry of the neutral tool. Weaponizing artificial intelligence and big data into threats toward social exclusion. Search on Bibsonomy AI Ethics The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Saeed Matar Al Jaberi, Asma Patel, Ahmed N. Al-Masri Object tracking and detection techniques under GANN threats: A systemic review. Search on Bibsonomy Appl. Soft Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Marc Lacoste, Vincent Lefebvre Trusted Execution Environments for Telecoms: Strengths, Weaknesses, Opportunities, and Threats. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Fuchen Ma, Meng Ren, Lerong Ouyang, Yuanliang Chen, Juan Zhu, Ting Chen 0002, Yingli Zheng, Xiao Dai, Yu Jiang 0001, Jiaguang Sun 0001 Pied-Piper: Revealing the Backdoor Threats in Ethereum ERC Token Contracts. Search on Bibsonomy ACM Trans. Softw. Eng. Methodol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Dominik Bär, Nicolas Pröllochs, Stefan Feuerriegel New Threats to Society from Free-Speech Social Media Platforms. Search on Bibsonomy Commun. ACM The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Fabio Massacci, Giorgio Di Tizio Are Software Updates Useless against Advanced Persistent Threats? Search on Bibsonomy Commun. ACM The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Steve Lipner, John Pescatore Updates, Threats, and Risk Management. Search on Bibsonomy Commun. ACM The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Evgeniy Y. Pavlenko, K. V. Vasil'eva, Daria S. Lavrova, Dmitry P. Zegzhda Counteraction the cybersecurity threats of the in-vehicle local network. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Nina D. Ivanova, Vitaliy G. Ivanenko Modeling advanced persistent threats using risk matrix methods. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Muhammad Akbar Husnoo, Adnan Anwar, Nasser Hosseinzadeh, Shama Naz Islam, Abdun Naser Mahmood, Robin Doss False data injection threats in active distribution systems: A comprehensive survey. Search on Bibsonomy Future Gener. Comput. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Nguyen Thi Thanh Tan, Huynh Van Huy, Do Hyeun Kim, Anh-Ngoc Le An intelligent threats solution for object detection and resource perspective rectification of distorted anomaly identification card images in cloud environments. Search on Bibsonomy Appl. Intell. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Zixuan Wang, Jiliang Li, Yuntao Wang 0004, Zhou Su, Shui Yu 0001, Weizhi Meng 0001 Optimal Repair Strategy Against Advanced Persistent Threats Under Time-Varying Networks. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Lefeng Zhang, Tianqing Zhu, Farookh Khadeer Hussain, Dayong Ye, Wanlei Zhou 0001 A Game-Theoretic Method for Defending Against Advanced Persistent Threats in Cyber Systems. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Leonie Reichert An Analysis of Requirements and Privacy Threats in Mobile Data Donations. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
11Simin Ghesmati, Walid Fdhila, Edgar R. Weippl Analyzing UTXO-Based Blockchain Privacy Threats. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
11Usharani Hareesh Govindarajan, Dhiraj Kumar Singh, Hardik A. Gohel Forecasting cyber security threats landscape and associated technical trends in telehealth using Bidirectional Encoder Representations from Transformers (BERT). Search on Bibsonomy Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Muhammad Ali Imran 0001, Hafeez Ur Rehman Siddiqui, Ali Raza, Muhammad Amjad Raza, Furqan Rustam, Imran Ashraf A performance overview of machine learning-based defense strategies for advanced persistent threats in industrial control systems. Search on Bibsonomy Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Nicola d'Ambrosio, Gaetano Perrone, Simon Pietro Romano Including insider threats into risk management through Bayesian threat graph networks. Search on Bibsonomy Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Stefano Silvestri, Shareeful Islam, Spyridon Papastergiou, Christos Tzagkarakis, Mario Ciampi A Machine Learning Approach for the NLP-Based Analysis of Cyber Threats and Vulnerabilities of the Healthcare Ecosystem. Search on Bibsonomy Sensors The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Bakkiam David Deebak, Fadi Al-Turjman 0001 EEI-IoT: Edge-Enabled Intelligent IoT Framework for Early Detection of COVID-19 Threats. Search on Bibsonomy Sensors The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Nicola Liberatore, Roberto Viola, Sandro Mengali, Luca Masini, Federico Zardi, Ivan Elmi, Stefano Zampolli Compact GC-QEPAS for On-Site Analysis of Chemical Threats. Search on Bibsonomy Sensors The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Adel Alqudhaibi, Majed Albarrak, Abdulmohsan Aloseel, Sandeep Jagtap, Konstantinos Salonitis Predicting Cybersecurity Threats in Critical Infrastructure for Industry 4.0: A Proactive Approach Based on Attacker Motivations. Search on Bibsonomy Sensors The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Pedro Blanco-Carmona, Lucía Baeza-Moreno, Eduardo Hidalgo Fort, Rubén Martín-Clemente, Ramón González Carvajal, Fernando Muñoz Chavero AIoT in Agriculture: Safeguarding Crops from Pest and Disease Threats. Search on Bibsonomy Sensors The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Sean Joe Taylor, Farhan Ahmad, Hoang Nga Nguyen, Siraj Ahmed Shaikh Vehicular Platoon Communication: Architecture, Security Threats and Open Challenges. Search on Bibsonomy Sensors The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Mary Nankya, Robin Chataut, Robert Akl Securing Industrial Control Systems: Components, Cyber Threats, and Machine Learning-Driven Defense Strategies. Search on Bibsonomy Sensors The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Jaidip Kotak, Edan Habler, Oleg Brodt, Asaf Shabtai, Yuval Elovici Information Security Threats and Working from Home Culture: Taxonomy, Risk Assessment and Solutions. Search on Bibsonomy Sensors The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Daisuke Mashima, Yao Chen 0008, Muhammad M. Roomi, Subhash Lakshminarayana, Deming Chen Cybersecurity for Modern Smart Grid Against Emerging Threats. Search on Bibsonomy Found. Trends Priv. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Roberto Verdecchia, Emelie Engström, Patricia Lago, Per Runeson, Qunying Song Threats to validity in software engineering research: A critical reflection. Search on Bibsonomy Inf. Softw. Technol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Homayoun Nikookar A Risk Analysis of Communication, Navigation and Sensing Satellite Systems Threats. Search on Bibsonomy J. Mobile Multimedia The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Basim AlGhanboosi, Saqib Ali, Ali Tarhini Examining the effect of regulatory factors on avoiding online blackmail threats on social media: A structural equation modeling approach. Search on Bibsonomy Comput. Hum. Behav. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Sébastien Gillard, Dimitri Percia David, Alain Mermoud, Thomas Maillart Efficient collective action for tackling time-critical cybersecurity threats. Search on Bibsonomy J. Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Olha Kovalchuk, Mikolaj P. Karpinski, Ludmila Babala, Mykhailo Kasianchuk, Ruslan Shevchuk The Canonical Discriminant Model of the Environmental Security Threats. Search on Bibsonomy Complex. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Nuria Rodríguez Barroso, Daniel Jiménez-López, María Victoria Luzón, Francisco Herrera, Eugenio Martínez-Cámara Survey on federated learning threats: Concepts, taxonomy on attacks and defences, experimental study and challenges. Search on Bibsonomy Inf. Fusion The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Amit Kumar Mishra, Shweta Paliwal Mitigating cyber threats through integration of feature selection and stacking ensemble learning: the LGBM and random forest intrusion detection perspective. Search on Bibsonomy Clust. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Falah Amro, Hemant Purohit Integrated content-network analysis to discover influential collectives for studying social cyber-threats from online social movements. Search on Bibsonomy Soc. Netw. Anal. Min. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Miguel Villarreal-Vasquez, Gaspar Modelo-Howard, Simant Dube, Bharat K. Bhargava Hunting for Insider Threats Using LSTM-Based Anomaly Detection. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Teng Li 0003, Ya Jiang, Chi Lin 0001, Mohammad S. Obaidat, Yulong Shen, Jianfeng Ma 0001 DeepAG: Attack Graph Construction and Threats Prediction With Bi-Directional Deep Learning. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #601 - #700 of 4562 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license