The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for threats with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1954-1987 (15) 1988-1993 (16) 1994-1996 (33) 1997 (17) 1998 (16) 1999 (21) 2000 (25) 2001 (30) 2002 (50) 2003 (83) 2004 (118) 2005 (218) 2006 (250) 2007 (330) 2008 (332) 2009 (227) 2010 (121) 2011 (93) 2012 (111) 2013 (105) 2014 (124) 2015 (162) 2016 (189) 2017 (188) 2018 (231) 2019 (223) 2020 (287) 2021 (264) 2022 (259) 2023 (329) 2024 (95)
Publication types (Num. hits)
article(1596) book(11) data(5) incollection(78) inproceedings(2795) phdthesis(63) proceedings(14)
Venues (Conferences, Journals, ...)
CoRR(283) LEET(69) HICSS(59) IEEE Access(56) ARES(49) IEEE Secur. Priv.(49) MIST@CCS(43) ISI(38) Sensors(32) ACSAC(29) Netw. Secur.(29) Comput. Secur.(27) CCS(26) Commun. ACM(18) Computer(18) AsiaCCS(17) More (+10 of total 1688)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 2004 occurrences of 1111 keywords

Results
Found 4563 publication records. Showing 4562 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
11Roozmehr Safi, Glenn J. Browne Detecting Cybersecurity Threats: The Role of the Recency and Risk Compensating Effects. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Tuomo Sipola, Tero Kokkonen, Mika Karjalainen Model Fooling Threats Against Medical Imaging. Search on Bibsonomy Artificial Intelligence and Cybersecurity The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Jessica Fernanda Silva Barbosa, Geiser Chalco Challco, Francys Rafael Do Nascimento Martins, Breno Felix de Sousa, Ig Ibert Bittencourt, Marcelo Reis, Jário José Santos, Seiji Isotani The Good and Bad of Stereotype Threats: Understanding Its Effects on Negative Thinking and Learning Performance in Gamified Tutoring. Search on Bibsonomy AIED (Posters/Late Breaking Results/...) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Pankaj Khatiwada, Muhammad Ali Fauzi, Bian Yang, Prosper Kandabongee Yeng, Jia-Chun Lin, Luyi Sun Threats and Risk on Using Digital Technologies for Remote Health Care Process. Search on Bibsonomy SIET The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Daniela Pöhn, Michael Grabatin, Wolfgang Hommel Modeling the Threats to Self-Sovereign Identities. Search on Bibsonomy Open Identity Summit The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Mohamed Faisal Elrawy, Lenos Hadjidemetriou, Christos Laoudias, Maria K. Michael Modelling and Analysing Security Threats Targeting Protective Relay Operations in Digital Substations. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Luís Oliveira, Andrzej Chmielewski, Paulina Rutecka, Karina Cicha, Mariia Rizun, Nuno Torres, Pedro Pinto 0001 Assessing Cybersecurity Hygiene and Cyber Threats Awareness in the Campus - A Case Study of Higher Education Institutions in Portugal and Poland. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Marcus L. Green, Priya Dozier Understanding Human Factors of Cybersecurity: Drivers of Insider Threats. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Giorgi Akhalaia, Maksim Iavich High-Band Related Threats in 5G Network. Search on Bibsonomy IVUS The full citation details ... 2023 DBLP  BibTeX  RDF
11Zhi Li 0048, Weijie Liu 0004, XiaoFeng Wang 0001, Bin Yuan, Hongliang Tian, Hai Jin 0001, Shoumeng Yan Lost along the Way: Understanding and Mitigating Path-Misresolution Threats to Container Isolation. Search on Bibsonomy CCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Jan-Philip van Acken, Joost F. Gadellaa, Slinger Jansen, Katsiaryna Labunets Poster: The Unknown Unknown: Cybersecurity Threats of Shadow IT in Higher Education. Search on Bibsonomy CCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Peter Padiet, Md. Rafiqul Islam, M. Arif Khan Analysis of Malicious Intruder Threats to Data Integrity. Search on Bibsonomy ACR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Paul Tavolato, Robert Luh, Sebastian Eresheim A Game Theoretic Analysis of Cyber Threats. Search on Bibsonomy ICISSP The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Valeria Bonagura, Chiara Foglietta, Stefano Panzieri, Massimiliano Rossi 0005, Riccardo Santini, Monica Scannapieco, Luisa Franchina Modeling and Assessing the Impacts of Cyber Threats on Interdependent Critical Infrastructures. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Hope Nkiruka Eke, Andrei Petrovski 0001 Advanced Persistent Threats Detection based on Deep Learning Approach. Search on Bibsonomy ICPS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Georgi Nikolov, Wim Mees Detection of Previously Unknown Advanced Persistent Threats Through Visual Analytics with the MASFAD Framework. Search on Bibsonomy ICMCIS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Mayank Kumar, Radha Agrawal, Priyanka Singh RAFT: Evaluating Federated Learning Resilience Against Threats. Search on Bibsonomy SIN The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Ritu Rai, Jyoti Grover, Soumya Pandey Unveiling Threats: A Comprehensive Taxonomy of Attacks in In-Vehicle Networks. Search on Bibsonomy SIN The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Antonio S. Da Silva, João Paulo J. Da Costa, Giovanni Almeida Santos, Zohair Miri, Muhammad I. B. M. Fauzi, Alexey V. Vinel, Edison P. de Freitas, Kira Kastell Radio Jamming in Vehicle-to-Everything Communication Systems: Threats and Countermeasures. Search on Bibsonomy ICTON The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Fai Ben Salamah, Marco A. Palomino, Maria Papadaki, Matthew J. Craven, Steven Furnell Evaluating the Risks of Human Factors Associated with Social Media Cybersecurity Threats. Search on Bibsonomy HAISA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Deepak Puthal, Saraju P. Mohanty, Amit Kumar Mishra, Chan Yeob Yeun, Ernesto Damiani Revolutionizing Cyber Security: Exploring the Synergy of Machine Learning and Logical Reasoning for Cyber Threats and Mitigation. Search on Bibsonomy ISVLSI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Wei Chen 0043, Yihui Ren 0001, Ai Kagawa, Matthew R. Carbone, Samuel Yen-Chi Chen, Xiaohui Qu, Shinjae Yoo, Austin Clyde, Arvind Ramanathan, Rick L. Stevens, Hubertus Van Dam, Deyu Lu Transferable Graph Neural Fingerprint Models for Quick Response to Future Bio-Threats. Search on Bibsonomy ICMLA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Kamalakkannan Ravi, Adan Ernesto Vela, Elizabeth Jenaway, Steven Windisch Exploring Multi-Level Threats in Telegram Data with AI-Human Annotation: A Preliminary Study. Search on Bibsonomy ICMLA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Manfred Hofmeier, Karl Seidenfad, Andreas Rieb, Ulrike Lechner Risk Factors for Malicious Insider Threats - An Analysis of Attack Scenarios. Search on Bibsonomy AMCIS The full citation details ... 2023 DBLP  BibTeX  RDF
11Raja Hasnain Anwar, Yi (Zoe) Zou, Muhammad Taqi Raza Detecting Privacy Threats with Machine Learning: A Design Framework for Identifying Side-Channel Risks of Illegitimate User Profiling. Search on Bibsonomy AMCIS The full citation details ... 2023 DBLP  BibTeX  RDF
11Moad Idrissi, Ahmad Najiy Wahab, Dalia El-Banna, Daphne Lai 0001, Ferry Slik, A. Taufiq Asyhari Digital Detection of Acacia Mangium Trees via Remote Sensing for Controlling the Invasive Population of Biodiversity Threats: Case Study in Brunei. Search on Bibsonomy IEEA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Akshat Gaurav, Brij B. Gupta, Varsha Arya, Kwok Tai Chui, Francisco José García-Peñalvo Adaptive Defense Mechanisms Against Phishing Threats in 6G Wireless Environments. Search on Bibsonomy VTC Fall The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Samiha Besnaci, Mohamed Hafidi, Mahnane Lamia Log Analysis for Feature Engineering and Application of a Boosting Algorithm to Detect Insider Threats. Search on Bibsonomy ISPR (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Thanh Nguyen Canh, Xiem HoangVan Machine Learning-Based Malicious Vehicle Detection for Security Threats and Attacks in Vehicle Ad-Hoc Network (VANET) Communications. Search on Bibsonomy RIVF The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Zahra Borhani, Francisco R. Ortega 0001 A Virtual Reality System for Gender Swapping to Increase Empathy Against Stereotype Threats in Computer Science Job Interviews. Search on Bibsonomy ISMAR-Adjunct The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Tej Akash, Alaka Jayan, Nimit Gaur, Saddikuti Vishnu Vardhan Reddy, Manjith B. C. Identifying Insider Cyber Threats Using Behaviour Modelling and Analysis. Search on Bibsonomy OCIT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Tuomo Lahtinen, Andrei Costin Linking Computers to the Brain: Overview of Cybersecurity Threats and Possible Solutions. Search on Bibsonomy BMSD The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Qiang Cao 0003, Xian Cheng, Stephen Shaoyi Liao The Impact of Competitive Threats from the Product Market on Data Breaches. Search on Bibsonomy PACIS The full citation details ... 2023 DBLP  BibTeX  RDF
11Ugur Kursuncu, Kai-Cheng Yang, Francesco Pierri 0002, Matthew R. DeVerna, Yelena Mejova, Jeremy Blackburn CySoc 2023: 4th International Workshop on Cyber Social Threats. Search on Bibsonomy WWW (Companion Volume) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Yuke Hu, Wei Liang, Ruofan Wu, Kai Xiao, Weiqiang Wang, Xiaochen Li, Jinfei Liu, Zhan Qin Quantifying and Defending against Privacy Threats on Federated Knowledge Graph Embedding. Search on Bibsonomy WWW The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Axel Boström, Franz Wotawa Wireless Threats Against V2X Communication. Search on Bibsonomy QRS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Sandra König, Abdelkader Magdy Shaaban, Tamara Hadjina, Klemen Gregorc, Albert Kutej Identification and Evaluation of Cyber-Physical Threats on Interdependent Critical Infrastructures. Search on Bibsonomy ARES The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Lazaros Papadopoulos, Antonios Karteris, Dimitrios Soudris, Eva María Muñoz Navarro, Juan Jose Hernandez-Montesinos, Stéphane Paul, Nicolas Museux, Sandra König, Manuel Egger, Stefan Schauer, Javier Hingant Gómez, Tamara Hadjina PRAETORIAN: A Framework for the Protection of Critical Infrastructures from advanced Combined Cyber and Physical Threats. Search on Bibsonomy ARES The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Pablo G. Madoery, Renato Cherini, Alessandro Cammarano, Juan J. Grosso, Jorge M. Finochietto Analysis of Bundle Protocol Security Policies for Safeguarding Space Missions against Threats. Search on Bibsonomy WiSEE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Tianmeng Jin, Xiaofan Wang, Jing Zhao, Chun Liu Co-design of fault detection filter and fault-tolerant controller for unmanned surface vehicle under cyber-physical threats. Search on Bibsonomy SAFEPROCESS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Subhadra Rajpoot, Puneet Singh, Pankaj Singh, Preeti Singh Bahadur, Aditi Dhama Fortifying IoT Against Quantum Threats: Strategies for Securing Connected Devices in the Quantum Era. Search on Bibsonomy IC3I The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Kate Sanders 0001, Jan Vahrenhold, Robert McCartney How Do Computing Education Researchers Talk About Threats and Limitations? Search on Bibsonomy ICER (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Yana Dimova, Mrunmayee Kode, Shirin Kalantari, Kim Wuyts, Wouter Joosen, Jan Tobias Mühlberg From Privacy Policies to Privacy Threats: A Case Study in Policy-Based Threat Modeling. Search on Bibsonomy WPES@CCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Hubert Djuitcheu, Sachinkumar Bavikatti Mallikarjun, Mohammad Asif Habibi, Nandish P. Kuruvatti, Hans D. Schotten Securing Private 5G Campus Networks: Abstract Survey on Current Status, Security Threats, and Research Landscape. Search on Bibsonomy 6GNet The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Zhen Yang, Cheng Huang, Jiayong Liu Unveiling Cybersecurity Threats from Online Chat Groups: A Triple Extraction Approach. Search on Bibsonomy KSEM (4) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Thoai van Do, Do van Thuan 0001, Niels Jacot, Bernardo Flores 0001, Boning Feng, Do Van Thanh 0001 MITRE ATT and CK Threat Modelling Extensions for Mobile Threats. Search on Bibsonomy MobiWIS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Matida Churu, Dewald Blaauw, Bruce W. Watson A Review and Analysis of Cybersecurity Threats and Vulnerabilities, by Development of a Fuzzy Rule-Based Expert System. Search on Bibsonomy PanAfriCon AI (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Renjie Ji, Wansen Wang, Yan Xiong, Wenchao Huang SolScope: Effectively Hunting Potential Permission Backdoor Threats in Smart Contracts. Search on Bibsonomy BIGCOM The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Haotian Chi, Qiang Zeng 0001, Xiaojiang Du Detecting and Handling IoT Interaction Threats in Multi-Platform Multi-Control-Channel Smart Homes. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2023 DBLP  BibTeX  RDF
11Surabhi Dwivedi, R. Balaji, Praveen Ampatt, Sithu D. Sudarsan A Survey on Security Threats and Mitigation Strategies for NoSQL Databases - MongoDB as a Use Case. Search on Bibsonomy ICISS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Mohamed Faisal Elrawy, Eleni Tekki, Lenos Hadjidemetriou, Christos Laoudias, Maria K. Michael Protection and Communication Model of Intelligent Electronic Devices to Investigate Security Threats. Search on Bibsonomy ISGT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Muhammad Shujaat Mirza, Labeeba Begum, Liang Niu, Sarah Pardo, Azza Abouzied, Paolo Papotti, Christina Pöpper Tactics, Threats & Targets: Modeling Disinformation and its Mitigation. Search on Bibsonomy NDSS The full citation details ... 2023 DBLP  BibTeX  RDF
11Chongzhou Fang, Najmeh Nazari, Behnam Omidi, Han Wang, Aditya Puri, Manish Arora, Setareh Rafatirad, Houman Homayoun, Khaled N. Khasawneh HeteroScore: Evaluating and Mitigating Cloud Security Threats Brought by Heterogeneity. Search on Bibsonomy NDSS The full citation details ... 2023 DBLP  BibTeX  RDF
11Rasheed Yousef, Mahmoud Jazzar, Amna Eleyan, Tarek Bejaoui A Machine Learning Framework & Development for Insider Cyber-crime Threats Detection. Search on Bibsonomy SmartNets The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Gaolei Li, Yuanyuan Zhao, Wenqi Wei, Yuchen Liu Few-shot Multi-domain Knowledge Rearming for Context-aware Defence against Advanced Persistent Threats. Search on Bibsonomy SmartNets The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Joseph K. Wrieden, Vassilios G. Vassilakis An Analysis of the Threats Posed by Botnet Malware Targeting Vulnerable Cryptocurrency Miners. Search on Bibsonomy ICUFN The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Hashem Mohamed, Alia El Bolock, Caroline Sabty IntrusionHunter: Detection of Cyber Threats in Big Data. Search on Bibsonomy DATA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Marius Iulian Mihailescu, Stefania Loredana Nita, Marius G. Rogobete, Valentina Marascu Unveiling Threats: Leveraging User Behavior Analysis for Enhanced Cybersecurity. Search on Bibsonomy ECAI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Christin J. Salley, Neda Mohammadi, John E. Taylor 0001 Safeguarding Infrastructure from Cyber Threats with NLP-Based Information Retrieval. Search on Bibsonomy WSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Sana Okumura, Tomoya Amagasa, Tsubasa Shibata, Takumi Yamamoto, Tadakazu Yamanaka, Tetsushi Ohki, Masakatsu Nishigaki Scheme for Selection of Deceptions as a Countermeasure for Insider Threats. Search on Bibsonomy BWCCA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Rahaf Alkhaldi, Sara Ehsan, Hafiz Farooq Detecting Insider Threats Using VADER and NAÏVE BAYS Algorithms. Search on Bibsonomy ISCSIC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Antonios Karteris, Georgios Tzanos, Lazaros Papadopoulos, Dimitrios Soudris Detection of Cyber Security Threats through Social Media Platforms. Search on Bibsonomy IPDPS Workshops The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Ting-Yi Chiang, I-Long Lin, Chi-Jan Huang Analysis of Smart Building System: Risks, Threats, and Standards. Search on Bibsonomy ICKII The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Wenjing Cai, Ziyuan Zhu, Yuxin Liu, Yusha Zhang, Xu Cheng 0001 Detecting and Mitigating Cache Side Channel Threats on Intel SGX. Search on Bibsonomy CSCWD The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Dezhi Li, Hojin Park, Xingbo Dong, Yen-Lung Lai, Hui Zhang, Andrew Beng Jin Teoh, Zhe Jin Minimum Assumption Reconstruction Attacks: Rise of Security and Privacy Threats Against Face Recognition. Search on Bibsonomy PRCV (5) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Jaqueline Hans, Sajjad Khan, Davor Svetinovic Blockchain CBDC Security Threats Using STRIDE. Search on Bibsonomy BCCA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Long Chen, Yanqing Song, Jianguo Chen 0004 A Framework for Few-Shot Network Threats Based on Generative Adversarial Networks. Search on Bibsonomy ISCC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Serhii Toliupa, Serhii Shtanenko, Oleksiy Silko, Pavlo Khusainov, Andrii Kulko An Approach to Restore the Proper Functioning of Embedded Systems Due to Cyber Threats. Search on Bibsonomy IT&I The full citation details ... 2023 DBLP  BibTeX  RDF
11James Burroughs, Michal Tereszkowski-Kaminski, Guillermo Suarez-Tangil Visualizing Cyber-Threats in Underground Forums. Search on Bibsonomy EuroS&P Workshops The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Yunhe Yang, Mu Zhang 0001 From Tactics to Techniques: A Systematic Attack Modeling for Advanced Persistent Threats in Industrial Control Systems. Search on Bibsonomy EuroS&P Workshops The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Leonie Reichert, Björn Scheuermann 0001 An Analysis of Requirements and Privacy Threats in Mobile Data Donations. Search on Bibsonomy EuroS&P Workshops The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Colin M. Gray, Cristiana Teixeira Santos, Nicole Tong, Thomas Mildner, Arianna Rossi, Johanna T. Gunawan, Caroline Sinders Dark Patterns and the Emerging Threats of Deceptive Design Practices. Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Gunther Meinlschmidt, Stefanie Herta, Stefan Germann, Cliona Chee Pui Khei, Sebastian Klöss, Moritz Borrmann Mental Health and the Metaverse: Ample Opportunities or Alarming Threats for Mental Health in Immersive Worlds? Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Omego Nnamonu, Mohammad Hammoudeh, Tooska Dargahi Metaverse Cybersecurity Threats and Risks Analysis: The case of Virtual Reality Towards Security Testing and Guidance Framework. Search on Bibsonomy MetaCom The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Martina Nobili, Camilla Fioravanti, Simone Guarino, Silvia Maria Ansaldi, Maria Francesca Milazzo, Paolo A. Bragatto, Roberto Setola DRIVERS: A platform for dynamic risk assessment of emergent cyber threats for industrial control systems. Search on Bibsonomy MED The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Andrii Davydiuk, Vitalii Zubok Analytical Review of the Resilience of Ukraine's Critical Energy Infrastructure to Cyber Threats in Times of War. Search on Bibsonomy CyCon The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Bohdan Durnyak, Petro Shepita, Lyubov Tupychak Protection of the Information System of the Printing Enterprise from Cyber Threats. Search on Bibsonomy IntelITSIS The full citation details ... 2023 DBLP  BibTeX  RDF
11Lyubomyr Sikora, Nataliia Lysa, Rostyslav Tkachuk, Olga Fedevych Informational and procedural description of an energy-active control object behavior under active threats conditions. Search on Bibsonomy IntelITSIS The full citation details ... 2023 DBLP  BibTeX  RDF
11Marko Slunjski, Damir Sumina Utilising the capabilities of next-generation PLC controllers for ICSs protection from cyber threats. Search on Bibsonomy ICIT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Jiapin Xie, Qiyong Fu, Riheng Jia, Minglu Li 0001 Multi-UAV Path Planning Under Radar Threats. Search on Bibsonomy SmartIoT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Morgana Macedo Azevedo da Rosa, Eduardo A. C. da Costa, Rafael Iankowski Soares, Sergio Bampi Exploring Security Threats by Hardware-Faults in Approximate Arithmetic Computing. Search on Bibsonomy NEWCAS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Qi Ji, Xiaoshuang Xu, Chao Shen, Hongkai Xue, Yuhang Ma, Xiang Qiu Insider Threats Risk Warning and Traceability Based on User Behavior Entity Analysis and Knowledge Graph. Search on Bibsonomy RICAI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Soo Yin Yi, Manmeet Mahinderjit Singh 0001, Gian Chand Sodhy, Thulfiqar Jabar Fingerprinting generation for Advanced Persistent Threats (APT) detection using Machine Learning techniques. Search on Bibsonomy CITA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Xiao Yang, Mianxiong Dong, Kaoru Ota, Gaolei Li, Chaofeng Zhang Entity Interactivity-Aware Graph Encoder-Decoder Networks for Explainable Relation Prediction against Advanced Persistent Threats. Search on Bibsonomy ICCC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Agnieszka Ubowska, Tomasz Królikowski ChatGPT - opportunities or threats in the educational process. Search on Bibsonomy KES The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Gengaku Mashiro, Kenichi Ichimura, Setsuya Kurahashi How to Prepare for Food and Life Supplies of Employees that Ensure the Business Continuity Plan under Disaster Threats and Risks. Search on Bibsonomy KES The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11José Borges, David Pascoal Rosado Cybersecurity Threats in Military Robotic and Autonomous Systems. Search on Bibsonomy ROBOT (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Eric Blancaflor, Mariah Anne Romero, Irish Nacu, Denver Ryan Golosinda A Case Study on Smishing: An Assessment of Threats against Mobile Devices. Search on Bibsonomy ICCTA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Bashayer Alshehhi, Halim Khelalfa, Shafiz A Mohd Yusof Scenario Intelligence: Modeling Insider Threats for Effective Anomaly Detection Using Real Life Scenarios. Search on Bibsonomy ACIT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Afaq Ashraf, Afaq Taha, Nida ul Habib Bajwa, Cornelius J. König, Mobin Javed, Maryam Mustafa "Stalking is immoral but not illegal": Understanding Security, Cyber Crimes and Threats in Pakistan. Search on Bibsonomy SOUPS The full citation details ... 2023 DBLP  BibTeX  RDF
11Mario Raciti, Giampaolo Bella How to Model Privacy Threats in the Automotive Domain. Search on Bibsonomy VEHITS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Eunyoung Kim, Kiwook Sohn Research on Security Threats Using VPN in Zero Trust Environments. Search on Bibsonomy WISA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Arthur Urbano, Douglas Silva, Maria C. Mesquita, Yago Melo Costa, Mariana Cirino, Rafael Lopes Gomes MonTh: A Tool for Automated Monitoring of Threats. Search on Bibsonomy LADC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Daksh Dave, Gauransh Sawhney, Pushkar Aggarwal, Nitish Silswal, Dhruv Khut The New Frontier of Cybersecurity: Emerging Threats and Innovations. Search on Bibsonomy ICT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Tong Bu, Jianhao Ding, Zecheng Hao, Zhaofei Yu Rate Gradient Approximation Attack Threats Deep Spiking Neural Networks. Search on Bibsonomy CVPR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Francesco Cerasuolo, Giampaolo Bovenzi, Christian Marescalco, Francesco Cirillo, Domenico Ciuonzo, Antonio Pescapè Adaptive Intrusion Detection Systems: Class Incremental Learning for IoT Emerging Threats. Search on Bibsonomy IEEE Big Data The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Robinson Umeike Comparative Crime Analysis and Prediction Using Machine Learning Algorithms: Assessing the Tools and Addressing the Threats. Search on Bibsonomy ICTAI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Lie Yang, Chien-Erh Weng, Hsing-Chung Chen, Yang-Cheng-Kuang Chen, Yung-Cheng Yao Attacks and Threats Verification Based on 4G/5G Security Architecture. Search on Bibsonomy IMIS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Nataliia Bahniuk, Linchuk Oleksandr, Bortnyk Kateryna, Inna Kondius, Kateryna Melnyk, Kostiantyn Kondius Threats Detection and Analysis Based on SYSMON Tool. Search on Bibsonomy DESSERT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Sergii Saukh A Structurally Variable Electric Power System Resistant to Terrorist and Military Threats. Search on Bibsonomy DESSERT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #701 - #800 of 4562 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license