The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Threat with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1964-1982 (15) 1983-1989 (16) 1990-1993 (20) 1994-1996 (20) 1997 (15) 1998-1999 (32) 2000 (19) 2001 (38) 2002 (54) 2003 (80) 2004 (129) 2005 (216) 2006 (242) 2007 (314) 2008 (320) 2009 (244) 2010 (113) 2011 (114) 2012 (117) 2013 (132) 2014 (148) 2015 (162) 2016 (200) 2017 (250) 2018 (326) 2019 (348) 2020 (348) 2021 (449) 2022 (499) 2023 (506) 2024 (120)
Publication types (Num. hits)
article(2051) book(11) data(2) incollection(83) inproceedings(3406) phdthesis(53)
Venues (Conferences, Journals, ...)
CoRR(376) Comput. Secur.(83) IEEE Access(83) HICSS(74) ARES(60) ISI(60) NeuroImage(50) IEEE Secur. Priv.(46) Sensors(40) FUSION(38) Netw. Secur.(31) ACSAC(30) CCS(28) RFC(26) SAC(26) IEEE BigData(25) More (+10 of total 1868)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1717 occurrences of 1015 keywords

Results
Found 5607 publication records. Showing 5606 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
10Luca Caviglione, Carmela Comito, Massimo Guarascio 0001, Giuseppe Manco 0001, Francesco Sergio Pisani, Marco Zuppelli ORISHA: Improving Threat Detection through Orchestrated Information Sharing (Discussion Paper). Search on Bibsonomy SEBD The full citation details ... 2023 DBLP  BibTeX  RDF
10Lin Zhou 0006, Meng Zhang, Weiwei Shuai, Zhentao Hu, Congcong Cheng, Jiawei Wu Air Target Threat Assessment and Prediction Based on Improved GM(1,1) Model. Search on Bibsonomy ICSPCC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Lin Zhou 0006, Junfang Leng, Meng Zhang, Zheng Zhao, Yongjing Huo, Jiawei Wu Air Target Threat Assessment Method Based on Variable Weight Cloud Bayesian Network. Search on Bibsonomy ICSPCC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Gerrit Holtrup, William Blonay, Martin Strohmeier, Alain Mermoud, Jean-Pascal Chavanne, Vincent Lenders Modeling 5G Threat Scenarios for Critical Infrastructure Protection. Search on Bibsonomy CyCon The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Omid Mirzamohammadi, Kristof Jannes, Laurens Sion, Dimitri Van Landuyt, Aysajan Abidin, Dave Singelée Security and Privacy Threat Analysis for Solid. Search on Bibsonomy SecDev The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Asim Mian, Asif Qumer Gill, Nabin Sharma Towards the Development of a Security Threat Identification Framework for UAV Information Infrastructure. Search on Bibsonomy SmartIoT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Md Sakib Anwar, Chaoshun Zuo, Carter Yagemann, Zhiqiang Lin Extracting Threat Intelligence From Cheat Binaries For Anti-Cheating. Search on Bibsonomy RAID The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Benjamin Cyr, Yan Long, Takeshi Sugawara 0001, Kevin Fu Position Paper: Space System Threat Models Must Account for Satellite Sensor Spoofing. Search on Bibsonomy SpaceSec The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Andrei Costin, Hannu Turtiainen, Syed Khandkher, Timo Hämäläinen 0002 Cybersecurity of COSPAS-SARSAT and EPIRB: threat and attacker models, exploits, future research. Search on Bibsonomy SpaceSec The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Muhammad Fahad Zia, Sri Harish Kalidass, Jonathan Francis Roscoe SANTA: Semi-supervised Adversarial Network Threat and Anomaly Detection System. Search on Bibsonomy SGAI Conf. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Fotis Lampropoulos, Ioannis Daramouskas, Isidoros Perikos, Michael Paraskevas Analysis of data from UAVs for surveillance and threat identification in maritime areas. Search on Bibsonomy BCD The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Amir Al Sadi, Davide Berardi, Franco Callegati, Andrea Melis 0001, Marco Prandini, Luca Tolomei A Structured Approach to Insider Threat Monitoring for Offensive Security Teams. Search on Bibsonomy CCNC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Wen Liu, Degang Sun, Yan Wang 0081, Zhongyuan Chen, Xinbo Han, Haitian Yang ABTD-Net: Autonomous Baggage Threat Detection Networks for X-ray Images. Search on Bibsonomy ICME The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Nanda Rani, Bikash Saha, Vikas Maurya, Sandeep Kumar Shukla TTPHunter: Automated Extraction of Actionable Intelligence as TTPs from Narrative Threat Reports. Search on Bibsonomy ACSW The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Syed Hussain Ali Kazmi, Faizan Qamar, Rosilah Hassan, Kashif Nisar, Dahlila Putri Binti Dahnil, Mohammed Azmi Al-Betar Threat Intelligence with Non-IID Data in Federated Learning enabled Intrusion Detection for SDN: An Experimental Study. Search on Bibsonomy ACIT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Leon Kersten, Tom Mulders, Emmanuele Zambon, Chris Snijders, Luca Allodi 'Give Me Structure': Synthesis and Evaluation of a (Network) Threat Analysis Process Supporting Tier 1 Investigations in a Security Operation Center. Search on Bibsonomy SOUPS The full citation details ... 2023 DBLP  BibTeX  RDF
10Mohamed Amine Ferrag, Mérouane Debbah, Muna Al-Hawawreh Generative AI for Cyber Threat-Hunting in 6G-enabled IoT Networks. Search on Bibsonomy CCGridW The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Abdullahi Chowdhury, Ranesh Naha, Shahriar Kaisar, Mohammad Ali Khoshkholghi, Kamran Ali, Antonino Galletta Information Fusion-based Cybersecurity Threat Detection for Intelligent Transportation System. Search on Bibsonomy CCGridW The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Filippo Perrina, Francesco Marchiori, Mauro Conti, Nino Vincenzo Verde AGIR: Automating Cyber Threat Intelligence Reporting with Natural Language Generation. Search on Bibsonomy IEEE Big Data The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Luis Soeiro, Thomas Robert 0001, Stefano Zacchiroli Assessing the Threat Level of Software Supply Chains with the Log Model. Search on Bibsonomy IEEE Big Data The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Jia Mei Grace Lim, Olakunle Olayinka Threat Hunting in Internet of Things Networks with Bio-Inspired Models. Search on Bibsonomy IEEE Big Data The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Jihane Najar, Marinos Tsantekidis, Aris Sotiropoulos, Vassilis Prevelakis Enhancing Cyber Threat Hunting: A Visual Approach with the Forensic Visualization Toolkit. Search on Bibsonomy IEEE Big Data The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Koen T. W. Teuwen A Modular Approach to Automatic Cyber Threat Attribution using Opinion Pools. Search on Bibsonomy IEEE Big Data The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Angel Kodituwakku, Clark Xu, Daniel Rogers, David K. Ahn, Errin W. Fulp Temporal Aspects of Cyber Threat Intelligence. Search on Bibsonomy IEEE Big Data The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Cristoffer Leite, Jerry den Hartog, Daniel Ricardo dos Santos, Elisa Costante Automated Cyber Threat Intelligence Generation on Multi-Host Network Incidents. Search on Bibsonomy IEEE Big Data The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Ryan Simons Investigating Initial Access Strategies and Malware Deployment Tactics Used by Iranian Advanced Persistent Threat Groups. Search on Bibsonomy IEEE Big Data The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Jiehui Liu, Jieyu Zhan Constructing Knowledge Graph from Cyber Threat Intelligence Using Large Language Model. Search on Bibsonomy IEEE Big Data The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Ismael Villanueva-Miranda, Monika Akbar Analyzing Threat Vectors in ICS Cyberattacks. Search on Bibsonomy IEEE Big Data The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Oleg Schell, Marcel Kneib SPARTA: Signal Propagation-based Attack Recognition and Threat Avoidance for Automotive Networks. Search on Bibsonomy AsiaCCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Guy Frankovits, Yisroel Mirsky Discussion Paper: The Threat of Real Time Deepfakes. Search on Bibsonomy WDC@AsiaCCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Mohammad Beyrouti, Ahmed Lounis, Benjamin Lussier, Abdelmadjid Bouabdallah, Abed Ellatif Samhat Vulnerability and Threat Assessment Framework for Internet of Things Systems. Search on Bibsonomy CIoT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Mahdieh Safarzadehvahed, Farzaneh Abazari, Fateme Shabani QR-SACP: Quantitative Risk-Based Situational Awareness Calculation and Projection Through Threat Information Sharing. Search on Bibsonomy ISPEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Ngo Duc Hoang Son, Huynh Thai Thi, Phan The Duy, Van-Hau Pham XFedGraph-Hunter: An Interpretable Federated Learning Framework for Hunting Advanced Persistent Threat in Provenance Graph. Search on Bibsonomy ISPEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Ammara Nasim, Divya Velayudhan, Abdelfatah Hassan Ahmed, Taimur Hassan, Samet Akcay, Muhammad Usman Akram, Naoufel Werghi Incremental Instance Segmentation for Cluttered Baggage Threat Detection. Search on Bibsonomy CIVEMSA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Ashraf Abzakh, Ahmad Alkhatib, Omar Rabayah, Shorouq Elmanaseer, Rand Albustanji, Nagham Almadi A Survey: Threat Hunting for the OT Systems. Search on Bibsonomy ICIT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Mahathir Almashor, M. Ejaz Ahmed, Benjamin Pick, Jason Xue, Sharif Abuadbba, Raj Gaire 0001, Shuo Wang 0012, Seyit Camtepe, Surya Nepal Unraveling Threat Intelligence Through the Lens of Malicious URL Campaigns. Search on Bibsonomy AINTEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Apostolos Lagarias, Anastasia Stratigea, Yiota Theodora Overtourism as an Emerging Threat for Sustainable Island Communities - Exploring Indicative Examples from the South Aegean Region, Greece. Search on Bibsonomy ICCSA (Workshops 7) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Carmine Gianni, Rosario Giordano, Gregorio Pitolli, Graziano Lubello Lincenti GNSS Threat Identification and Mitigation, Cyber-Security aspects in Automotive Scenarios. Search on Bibsonomy MetroAutomotive The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Talaya Farasat, Muhammad Ahmad Rathore, JongWon Kim 0001 Integrating Machine Learning for Network Threat Detection with SmartX Multi-Sec Framework. Search on Bibsonomy ICOIN The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Youngja Park, Weiqiu You A Pretrained Language Model for Cyber Threat Intelligence. Search on Bibsonomy EMNLP (Industry Track) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Georgios Kaissis, Alexander Ziller, Stefan Kolek, Anneliese Riess, Daniel Rueckert Optimal privacy guarantees for a relaxed threat model: Addressing sub-optimal adversaries in differentially private machine learning. Search on Bibsonomy NeurIPS The full citation details ... 2023 DBLP  BibTeX  RDF
10Naman Deep Singh, Francesco Croce, Matthias Hein 0001 Revisiting Adversarial Training for ImageNet: Architectures, Training and Generalization across Threat Models. Search on Bibsonomy NeurIPS The full citation details ... 2023 DBLP  BibTeX  RDF
10Yasmeen Afzal, Kifayat-Ullah Khan, Muhammad Asim 0001 HDA-TIP: A Framework for Heterogeneous Data Aggregation for Threat Intelligence Platform. Search on Bibsonomy IMCOM The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Ravella Abhinav, Kunduru Nikunj Raghav, Singadi Shanthan Reddy, Penugonda Sai Naga Koushik, Senthil Kumar Thangavel, Karthik Srinivasan A Cloud-Based Intrusion Detection System for Advanced Threat Detection and Prevention using Machine Learning Techniques. Search on Bibsonomy ICCCNT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Manuj Aggarwal Ransomware Attack: An Evolving Targeted Threat. Search on Bibsonomy ICCCNT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Amartyanil Chattopadhyay, Divya Sripada Security Analysis and Threat Modelling of Mobile Banking Applications. Search on Bibsonomy ICCCNT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10V. S. Tharunika, Shridhar T, K. Veeresh, Senthil Kumar Thangavel, Karthik Srinivasan, Sulakshan Vajipayajula, Anjali Tibrewal Detection and Prevention of Advanced Persistent Threat (APT) Activities in Heterogeneous Networks using SIEM and Deep Learning. Search on Bibsonomy ICCCNT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10V. Amrith, Darshan S, Suriya K. S, Sulakshan Vajipayajula, Kartik Srinivasan, Senthil Kumar Thangavel, T. Gireesh Kumar An early malware threat detection model using Conditional Tabular Generative Adversarial Network. Search on Bibsonomy ICCCNT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Kazeem Saheed, Shagufta Henna Heterogeneous Graph Transformer for Advanced Persistent Threat Classification in Wireless Networks. Search on Bibsonomy NFV-SDN The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Sonu Preetam, Maxime Compastié, Vanesa Daza, Shuaib Siddiqui An Approach for Intelligent Behaviour-Based Threat Modelling with Explanations. Search on Bibsonomy NFV-SDN The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Karl Jonatan Due Vatn, Georgios Kavallieratos, Sokratis K. Katsikas Threat Analysis in Dairy Farming 4.0. Search on Bibsonomy ESORICS Workshops (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Teodor Sommestad, Henrik Karlzén, Hanna Kvist, Hanna Gustafsson Skade - A Challenge Management System for Cyber Threat Hunting. Search on Bibsonomy ESORICS Workshops (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Mario Raciti, Giampaolo Bella Up-to-Date Threat Modelling for Soft Privacy on Smart Cars. Search on Bibsonomy ESORICS Workshops (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Mohamed Abdelsalam, Simon Greiner, Oum-El-Kheir Aktouf, Annabelle Mercier C-TAR: A Compositional Threat Analysis and Risk Assessment Method for Infrastructure-Based Autonomous Driving. Search on Bibsonomy ESORICS Workshops (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Marcus Botacin GPThreats-3: Is Automatic Malware Generation a Threat? Search on Bibsonomy SP (Workshops) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Anna Maria Mandalari, Hamed Haddadi, Daniel J. Dubois, David R. Choffnes Protected or Porous: A Comparative Analysis of Threat Detection Capability of IoT Safeguards. Search on Bibsonomy SP The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Xiaojiao Chen, Sheng Li 0010, Jiyi Li, Yang Cao 0011, Hao Huang, Liang He 0003 GhostVec: A New Threat to Speaker Privacy of End-to-End Speech Recognition System. Search on Bibsonomy MMAsia The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Louis B. Rosenberg The Metaverse and Conversational AI as a Threat Vector for Targeted Influence. Search on Bibsonomy CCWC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Sandra Nguyen, Doina Bein Data Science Analysis of Malicious Advertisements and Threat Detection Automation for Cybersecurity Progress. Search on Bibsonomy CCWC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Cole Mckee, Kelsie Edie, Adam Duby Activity-Attack Graphs for Intelligence-Informed Threat COA Development. Search on Bibsonomy CCWC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Sara Abdellaoui, Emil Dumitrescu, Cédric Escudero, Eric Zamaï Cyber Threat Assessment in Monitoring Turnout Railway Systems. Search on Bibsonomy ETFA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Francisco R. P. da Ponte, Emanuel B. Rodrigues, César L. C. Mattos CVEjoin: An Information Security Vulnerability and Threat Intelligence Dataset. Search on Bibsonomy AINA (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Moumita Das Purba, Bill Chu Extracting Actionable Cyber Threat Intelligence from Twitter Stream. Search on Bibsonomy ISI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Avishek Bose, Huichen Yang, Marissa Shivers, Ahat Orazgeldiyev, William H. Hsu Context-Augmented Key Phrase Extraction from Short Texts for Cyber Threat Intelligence Tasks. Search on Bibsonomy ISI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Jihen Bennaceur, Wissem Zouaghi, Ali Mabrouk Enhancing Cyber Threat Intelligence Through Supervised Machine Learning: A Comprehensive Classification Approach. Search on Bibsonomy WETICE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Daniel Heitmeyer, Kelly Cohen Genetic Fuzzy Threat Assessment for Asteroids 2600 Derived Game. Search on Bibsonomy NAFIPS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Cui-Ping Li, Qiao Zhang, Xu Dong Bian, Sen Xue Zhang Status Quo and Prospects of Automotive Cyber Threat Intelligence. Search on Bibsonomy FAIML The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Navid Ayoobi, Sadat Shahriar, Arjun Mukherjee The Looming Threat of Fake and LLM-generated LinkedIn Profiles: Challenges and Opportunities for Detection and Prevention. Search on Bibsonomy HT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Talgan Kumar Rao, Narayana Darapaneni, Anwesh Reddy Paduri, Amarnath G. S, Arun Kumar, Guruprasad Ps Insider Threat Detection: Using Classification Models. Search on Bibsonomy IC3 The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Deven Westmoreland, Gahangir Hossain Enhancing Cloud Data Processing with Amortized Analysis and Splay Trees for Cyber Threat Intelligence. Search on Bibsonomy IC3 The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Simon Bertrand, Josée Desharnais, Nadia Tawbi Unsupervised User-Based Insider Threat Detection Using Bayesian Gaussian Mixture Models. Search on Bibsonomy PST The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Ayush Kumar 0001, Vrizlynn L. L. Thing RAPTOR: Advanced Persistent Threat Detection in Industrial IoT via Attack Stage Correlation. Search on Bibsonomy PST The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Anisha Mitra, Dipanwita Roy Chowdhury Unmasking the Dominant Threat of Data Manipulation Attack on Implantable Cardioverter Defibrillators. Search on Bibsonomy PST The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Mario Aragonés Lozano, Israel Pérez-Llopis, Alfonso Climente Alarcón, Manuel Esteve Domingo A Machine Learning-Driven Threat Hunting Architecture for Protecting Critical Infrastructures. Search on Bibsonomy DRCN The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Md. Muzakkir Quamar, Sami El-Ferik, Abdul-Wahid A. Saif A Bioinspired Adaptation-Based Algorithm for Swarm of UAVs in multiple threat prone Environments. Search on Bibsonomy SSD The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Alexander Velazquez, Roberto Rigolin Ferreira Lopes, Adrien Bécue, Johannes F. Loevenich, Paulo H. L. Rettore, Konrad S. Wrona Autonomous Cyber Defense Agents for NATO: Threat Analysis, Design, and Experimentation. Search on Bibsonomy MILCOM The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Salva Daneshgadeh Çakmakçi, Sercan Catalkaya, Kai-Oliver Detken, Evren Eren Central Security Incident Management Platform in Industry 4.0 with Threat Intelligence Interface. Search on Bibsonomy IDAACS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Mohit Singhal, Nihal Kumarswamy, Shreyasi Kinhekar, Shirin Nilizadeh Cybersecurity Misinformation Detection on Social Media: Case Studies on Phishing Reports and Zoom's Threat. Search on Bibsonomy ICWSM The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Muhammad A. Nainna, Julian M. Bass, Lee Speakman Factors Amplifying or Inhibiting Cyber Threat Intelligence Sharing. Search on Bibsonomy EMCIS (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Beáta Stingelová, Clemens Thaddäus Thrakl, Laura Wronska, Sandra Jedrej-Szymankiewicz, Sajjad Khan, Davor Svetinovic User-Centric Security and Privacy Threats in Connected Vehicles: A Threat Modeling Analysis Using STRIDE and LINDDUN. Search on Bibsonomy DASC/PiCom/CBDCom/CyberSciTech The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Marija Brkic, Horia-Stefan Dinu, Alida Mirkovic, Alma Sabirovic, Sajjad Khan, Davor Svetinovic Cyber Vulnerabilities in Blockchain Electronic Health Records: An In-Depth Threat Analysis. Search on Bibsonomy DASC/PiCom/CBDCom/CyberSciTech The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Hong Hanh Doan, Audri Adhyas Paul, Harald Zeindlinger, Yiheng Zhang, Sajjad Khan, Davor Svetinovic Threat Modeling for ML-based Topology Prediction in Vehicular Edge Computing Architecture. Search on Bibsonomy DASC/PiCom/CBDCom/CyberSciTech The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Aleksandra Ursula Charlotte Hamel, Bogdan-Cristian Zarcu, András-Gergely Csenteri, Tamara Pfliegler, Sajjad Khan, Davor Svetinovic Safeguarding Healthcare: A Comprehensive Threat Analysis of Clinical Decision Support Systems. Search on Bibsonomy DASC/PiCom/CBDCom/CyberSciTech The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Belsabel Teklemariam, Saron Bokretsion, Safa Otoum, Bassem Ouni On the Viability of Federated Deep Autoencoder for Botnet Threat Detection. Search on Bibsonomy DASC/PiCom/CBDCom/CyberSciTech The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Rahan Rasheed Khan, Athar Hanif, Qadeer Ahmed Threat Analysis of Position, Navigation, and Timing for Highly Automated Vehicles. Search on Bibsonomy PLANS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Maria Caamano, Daniel Gerbeth, Hiroatsu Sato, Mihaela-Simona Circiu, Michael Felux Performance Evaluation of the Ionospheric Threat Mitigation Strategies in Dual-Frequency Multi-Constellation GBAS. Search on Bibsonomy PLANS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Juan Blanch, Todd Walter An Evaluation of the Advanced RAIM Threat Model. Search on Bibsonomy PLANS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Ivan Koptev, Cameron G. Walker, Andreas W. Kempa-Liehr Image Recognition and Threat Detection in Bags Arriving at the Airport. Search on Bibsonomy PSIVT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Fan Xiao, Wei Hong, Jiao Yin 0003, Hua Wang 0002, Jinli Cao, Yanchun Zhang A Study on Historical Behaviour Enabled Insider Threat Prediction. Search on Bibsonomy APWeb/WAIM (3) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Alexander Plaza, Thaier Hayajneh Defining Metrics for Comparing Threat Intelligence Solutions Through the Lens of the Analyst. Search on Bibsonomy UEMCON The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Olga Ussatova, Vladislav Karyukin, Aidana Zhumabekova, Yenlik Begimbayeva, Nikita Ussatov Designing a vulnerability threat detection scanner with the use of machine learning models. Search on Bibsonomy IAIT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Hauton Tsang, Mohammad A. Salahuddin 0001, Noura Limam, Raouf Boutaba Meta-ATMoS+: A Meta-Reinforcement Learning Framework for Threat Mitigation in Software-Defined Networks. Search on Bibsonomy LCN The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Jeroen Pijpker, Stephen James McCombie A Ship Honeynet to Gather Cyber Threat Intelligence for the Maritime Sector. Search on Bibsonomy LCN The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Mai Ye, Shiming Men, Lei Xie, Bing Chen 0002 Detect Advanced Persistent Threat In Graph-Level Using Competitive AutoEncoder. Search on Bibsonomy CNCIT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Hamza Abdi, Steven R. Bagley, Steven Furnell, Jamie Twycross Automatically Labeling Cyber Threat Intelligence reports using Natural Language Processing. Search on Bibsonomy DocEng The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Wenming Liu, Rui Zhai, Fang Zuo A Vulnerability Threat Assessment Model Based on Bayesian Networks. Search on Bibsonomy CAIBDA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Rami Alboqmi, Sharmin Jahan, Rose F. Gamble Threat Intelligence Sharing Component in the Service Mesh Architecture. Search on Bibsonomy FiCloud The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Florian Klaus Kaiser Cyber Threat Intelligence based Holistic Risk Quantification and Management. Search on Bibsonomy 2023   RDF
10Ebu Yusuf Güven Siber tehdit istihbaratı için yeni tarama modeli geliştirilmesi (Development of a new scanning model in cyber threat intelligence) Search on Bibsonomy 2023   RDF
10Neeshe Khan A human centric approach to unintentional insider threat: development of a sociotechnical framework. Search on Bibsonomy 2023   RDF
Displaying result #901 - #1000 of 5606 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license