The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase cyber-security (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1999-2004 (18) 2005-2006 (20) 2007 (37) 2008 (86) 2009 (136) 2010 (145) 2011 (195) 2012 (162) 2013 (172) 2014 (204) 2015 (326) 2016 (268) 2017 (317) 2018 (423) 2019 (784) 2020 (925) 2021 (803) 2022 (846) 2023 (567) 2024 (34)
Publication types (Num. hits)
article(784) book(13) data(2) incollection(168) inproceedings(5313) phdthesis(54) proceedings(134)
Venues (Conferences, Journals, ...)
CSIIRW(348) CSCloud/EdgeCom(281) ICCSIE(256) CSIA (2)(255) CSR(253) CSIA (1)(247) CSIA(203) CSCML(202) CSCloud(201) VizSEC(157) CoRR(154) FCS(146) SciSec(134) CSNet(131) Cyber Security(125) ACeS(111) More (+10 of total 904)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 98 occurrences of 74 keywords

Results
Found 6468 publication records. Showing 6468 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
21Raffaele Bolla, Paolo Maria Comi, Matteo Repetto A Distributed Cyber-security Framework for Heterogeneous Environments. Search on Bibsonomy ITASEC The full citation details ... 2018 DBLP  BibTeX  RDF
21Abhik Roychoudhury, Yang Liu 0003 (eds.) A Systems Approach to Cyber Security - Proceedings of the 2nd Singapore Cyber-Security R&D Conference (SG-CRC 2017), Singapore, February 21-22, 2017 Search on Bibsonomy SG-CRC The full citation details ... 2017 DBLP  BibTeX  RDF
21Jin-Ning Tioh, Mani Mina, Douglas W. Jacobson Cyber security training a survey of serious games in cyber security. Search on Bibsonomy FIE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Kanthithasan Kauthamy, Noushin Ashrafi, Jean-Pierre Kuilboer Mobile Devices and Cyber Security - An Exploratory Study on User's Response to Cyber Security Challenges. Search on Bibsonomy WEBIST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Maximilian Frank, Maria Leitner, Timea Pahi Design Considerations for Cyber Security Testbeds: A Case Study on a Cyber Security Testbed for Education. Search on Bibsonomy DASC/PiCom/DataCom/CyberSciTech The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Aneesha Sethi, Gary B. Wills Expert-interviews led analysis of EEVi - A model for effective visualization in cyber-security. Search on Bibsonomy VizSEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Marco Angelini, Simone Lenti, Giuseppe Santucci CRUMBS: A cyber security framework browser. Search on Bibsonomy VizSEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Margarita Osadchy, Yan Wang, Orr Dunkelman, Stuart J. Gibson, Julio C. Hernandez-Castro, Christopher J. Solomon GenFace: Improving Cyber Security Using Realistic Synthetic Face Generation. Search on Bibsonomy CSCML The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Chien Eao Lee, Lilei Zheng, Ying Zhang 0047, Vrizlynn L. L. Thing Low-Dimensional Bigram Analysis for Mobile Data Fragment Classification. Search on Bibsonomy SG-CRC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Matthew David Smith 0001, Marie-Elisabeth Paté-Cornell Cyber Risk Analysis for a Smart Grid: How Smart is Smart Enough? A Multi-Armed Bandit Approach. Search on Bibsonomy SG-CRC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Wilayat Khan, Alwen Tiu, David Sanán VeriFormal: An Executable Formal Model of a Hardware Description Language. Search on Bibsonomy SG-CRC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Victor Pomponiu, Vrizlynn L. L. Thing A Deep Convolutional Neural Network for Anomalous Online Forum Incident Classification. Search on Bibsonomy SG-CRC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Hwajung Seo Faster ECC over (feat. PMULL). Search on Bibsonomy SG-CRC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Nir Nissim, Aviad Cohen 0002, Jian Wu 0006, Andrea Lanzi, Lior Rokach, Yuval Elovici, C. Lee Giles Scholarly Digital Libraries as a Platform for Malware Distribution. Search on Bibsonomy SG-CRC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21G. Sumathi, L. Srivani, D. Thirugnana Murthy, Anish Kumar, K. Madhusoodanan Hardware Obfuscation Using Different Obfuscation Cell Structures for PLDs. Search on Bibsonomy SG-CRC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Zhongmin Dai, Tong-Wei Chua, Dinesh Kumar Balakrishnan, Vrizlynn L. L. Thing Chat-App Decryption Key Extraction Through Information Flow Analysis. Search on Bibsonomy SG-CRC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Zhi Yuan Poh, Hui Cui 0001, Robert H. Deng, Yingjiu Li Attribute-Based Secure Messaging in the Public Cloud. Search on Bibsonomy SG-CRC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Luying Zhou, Huaqun Guo, Dong Li, Jun Wen Wong, Jianying Zhou 0001 Mind the Gap: Security Analysis of Metro Platform Screen Door System. Search on Bibsonomy SG-CRC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Maurice Hendrix, Ali Al-Sherbaz, Victoria Bloom Game Based Cyber Security Training: are Serious Games suitable for cyber security training? Search on Bibsonomy Int. J. Serious Games The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Riza Azmi, William Tibben, Khin Than Win Motives behind Cyber Security Strategy Development: A Literature Review of National Cyber Security Strategy. Search on Bibsonomy ACIS The full citation details ... 2016 DBLP  BibTeX  RDF
21Aditya Mathur, Abhik Roychoudhury (eds.) Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016 - Cyber-Security by Design, Singapore, January 14-15, 2016. Search on Bibsonomy SG-CRC The full citation details ... 2016 DBLP  BibTeX  RDF
21Abdullahi Arabo Mobile App Collusions and Its Cyber Security Implications. Search on Bibsonomy CSCloud The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Claude Asamoah, Lixin Tao, Keke Gai, Ning Jiang Powering Filtration Process of Cyber Security Ecosystem Using Knowledge Graph. Search on Bibsonomy CSCloud The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Edward Jero Sam Jeeva Raj, Palaniappan Ramu ECG Steganography Using Contourlet Transform For Transmission of Secured Patient Identity. Search on Bibsonomy SG-CRC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Weizhi Meng 0001, Lee Wang Hao, S. P. T. Krishnan A Framework for Large-Scale Collection of Information from Smartphone Users based on Juice Filming Attacks. Search on Bibsonomy SG-CRC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Ying Zhang 0047, Jonathan Goh, Lei Lei Win, Vrizlynn L. L. Thing Image Region Forgery Detection: A Deep Learning Approach. Search on Bibsonomy SG-CRC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Riccardo Taormina, Stefano Galelli, Nils Ole Tippenhauer, Elad Salomons, Avi Ostfeld Simulation of Cyber-Physical Attacks on Water Distribution Systems with EPANET. Search on Bibsonomy SG-CRC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Khurum Nazir Junejo, David K. Y. Yau Data Driven Physical Modelling For Intrusion Detection In Cyber Physical Systems. Search on Bibsonomy SG-CRC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Dinil Mon Divakaran, Yung Siang Liau, Vrizlynn L. L. Thing Accurate in-network file-type classification. Search on Bibsonomy SG-CRC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Jia Xu 0006, Ee-Chien Chang, Jianying Zhou 0001 Directed Transitive Signature on Directed Tree. Search on Bibsonomy SG-CRC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21David I. Urbina, Jairo Alonso Giraldo, Nils Ole Tippenhauer, Alvaro A. Cárdenas Attacking Fieldbus Communications in ICS: Applications to the SWaT Testbed. Search on Bibsonomy SG-CRC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Jia Xu 0006, Jianying Zhou 0001, Liming Lu Cyber and Physical Access Control in Legacy System Using Passwords. Search on Bibsonomy SG-CRC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21John Henry Castellanos, Tobias Wüchner, Martín Ochoa, Sandra Julieta Rueda Q-Floid: Android Malware detection with Quantitative Data Flow Graphs. Search on Bibsonomy SG-CRC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Jan-Willem Bullee, Lorena Montoya, Marianne Junger, Pieter H. Hartel Telephone-based social engineering attacks: An experiment testing the success and time decay of an intervention. Search on Bibsonomy SG-CRC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Ngoc Hieu Tran, Robert H. Deng, HweeHwa Pang Privacy-Preserving and Verifiable Data Aggregation. Search on Bibsonomy SG-CRC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Sridhar Adepu, Aditya P. Mathur Detecting Multi-Point Attacks in a Water Treatment System Using Intermittent Control Actions. Search on Bibsonomy SG-CRC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Cyril Onwubiko Cyber security operations centre: Security monitoring for protecting business and supporting cyber defense strategy. Search on Bibsonomy CyberSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Malek Ben Salem, Chris Wacek Enabling New Technologies for Cyber Security Defense with the ICAS Cyber Security Ontology. Search on Bibsonomy STIDS The full citation details ... 2015 DBLP  BibTeX  RDF
21Frances Cleary, Massimo Felici (eds.) Cyber Security and Privacy - 4th Cyber Security and Privacy Innovation Forum, CSP Innovation Forum 2015, Brussels, Belgium, April 28-29, 2015, Revised Selected Papers Search on Bibsonomy CSP Forum The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Sean McKenna, Diane Staheli, Miriah D. Meyer Unlocking user-centered design methods for building cyber security visualizations. Search on Bibsonomy VizSEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Prateek Singh, Saurabh Garg, Vinod Kumar, Zia Saquib A testbed for SCADA cyber security and intrusion detection. Search on Bibsonomy SSIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Xiaohe Fan, Kefeng Fan, Yong Wang, Ruikang Zhou Overview of cyber-security of industrial control system. Search on Bibsonomy SSIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Zakarya Drias, Ahmed Serhrouchni, Olivier Vogel Analysis of cyber security for industrial control systems. Search on Bibsonomy SSIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Emma Osborn, Andrew Simpson Small-Scale Cyber Security. Search on Bibsonomy CSCloud The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Johannes Schneider 0002, Sebastian Obermeier 0001, Roman Schlegel Cyber Security Maintenance for SCADA Systems. Search on Bibsonomy ICS-CSR The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Dónal McCarthy, Paul Malone, Johannes Hange, Kenny Doyle, Eric Robson, Dylan Conway, Stepan Ivanov, Lukasz Radziwonowicz, Robert Kleinfeld, Theodoros Michalareas, Timotheos Kastrinogiannis, Nikos Stasinos, Fenareti Lampathaki Privacy Aware Access Control for Cloud-Based Data Platforms. Search on Bibsonomy CSP Forum The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Denis Butin, Stefan-Lukas Gazdag, Johannes Buchmann 0001 Real-World Post-Quantum Digital Signatures. Search on Bibsonomy CSP Forum The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Roland Rieke, Maria Zhdanova, Jürgen Repp Security and Business Situational Awareness. Search on Bibsonomy CSP Forum The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Ludovic Jacquin, Antonio Lioy, Diego R. López, Adrian L. Shaw, Tao Su The Trust Problem in Modern Network Infrastructures. Search on Bibsonomy CSP Forum The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Juan Manuel Marín Pérez, Antonio Moragón Juan, Jaime Arrazola Pérez, Javier Monge Rabadán, Antonio F. Skarmeta-Gómez Security and Privacy in Vehicular Communications with INTER-TRUST. Search on Bibsonomy CSP Forum The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Claudio Caimi, Michela D'Errico, Carmela Gambardella, Mirko Manea, Nick Wainwright Implementing Privacy Policies in the Cloud. Search on Bibsonomy CSP Forum The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Thomas Lorünser, Charles Bastos Rodriguez, Denise Demirel, Simone Fischer-Hübner, Thomas Groß 0001, Thomas Länger, Mathieu Des Noes, Henrich C. Pöhls, Boris Rozenberg, Daniel Slamanig Towards a New Paradigm for Privacy and Security in Cloud Services. Search on Bibsonomy CSP Forum The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Cataldo Basile, Christian Pitscheider, Fulvio Risso, Fulvio Valenza, Marco Vallini Towards the Dynamic Provision of Virtualized Security Services. Search on Bibsonomy CSP Forum The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Nineta Polemi, Panayiotis Kotzanikolaou Medusa: A Supply Chain Risk Assessment Methodology. Search on Bibsonomy CSP Forum The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Francesco Di Cerbo, Nazila Gol Mohammadi, Sachar Paulus Evidence-Based Trustworthiness of Internet-Based Services Through Controlled Software Development. Search on Bibsonomy CSP Forum The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Beatriz Gallego-Nicasio Crespo, Alan Garwood Fighting Botnets with Cyber-Security Analytics: Dealing with Heterogeneous Cyber-Security Information in New Generation SIEMs. Search on Bibsonomy ARES The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21William Casey, Jose Andre Morales, Thomson Nguyen, Jonathan M. Spring, Rhiannon Weaver, Evan Wright, Leigh Metcalf, Bud Mishra Cyber Security via Signaling Games: Toward a Science of Cyber Security. Search on Bibsonomy ICDCIT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Frances Cleary, Massimo Felici (eds.) Cyber Security and Privacy - Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papers Search on Bibsonomy CSP Forum The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Hajar Iguer, Hicham Medromi, Adil Sayouti, Soukaina Elhasnaoui, Sophia Faris The Impact of Cyber Security Issues on Businesses and Governments: A Framework for Implementing a Cyber Security Plan. Search on Bibsonomy FiCloud The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Diane Staheli, Tamara Yu, R. Jordan Crouser, Suresh Damodaran, Kevin Nam, B. David O'Gwynn, Sean McKenna, Lane Harrison Visualization evaluation for cyber security: trends and future directions. Search on Bibsonomy VizSEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Melissa Danforth, Charles Lam Four-Week Summer Program in Cyber Security for High School Students: Practice and Experience Report. Search on Bibsonomy CSET The full citation details ... 2014 DBLP  BibTeX  RDF
21Chris Dalton, Antonio Lioy, Diego R. López, Fulvio Risso, Roberto Sassu Exploiting the Network for Securing Personal Devices. Search on Bibsonomy CSP Forum The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Vasilios Tountopoulos, Massimo Felici, Alain Pannetrat, Daniele Catteddu, Siani Pearson Interoperability Analysis of Accountable Data Governance in the Cloud. Search on Bibsonomy CSP Forum The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Martina de Gramatica, Fabio Massacci, Olga Gadyatskaya An Empirical Study of the Technology Transfer Potential of EU Security and Trust R&D Projects. Search on Bibsonomy CSP Forum The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Susan Perry, Claudia Roda Teaching Privacy by Design to Non-technical Audiences. Search on Bibsonomy CSP Forum The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Michele Paolino, Mian Muhammad Hamayun, Daniel Raho A Performance Analysis of ARM Virtual Machines Secured Using SELinux. Search on Bibsonomy CSP Forum The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Nicolás Notario, Alberto Crespo, Antonio Kung, Inga Kroener, Daniel Le Métayer, Carmela Troncoso, José M. del Álamo, Yod Samuel Martín PRIPARE: A New Vision on Engineering Privacy and Security by Design. Search on Bibsonomy CSP Forum The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Zeta Dooly, Seamus Galvin, Jamie Power, Bart Renard, Ulrich Seldeslachts IPACSO: Towards Developing an Innovation Framework for ICT Innovators in the Privacy and CyberSecurity Markets. Search on Bibsonomy CSP Forum The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Vasilios Tountopoulos, Ira Giannakoudaki, Konstantinos Giannakakis, Lefteris Korres, Leonidas Kallipolitis Ensuring Trustworthiness and Security in Service Compositions. Search on Bibsonomy CSP Forum The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Ahmad Sabouri, Souheil Bcheri, Kai Rannenberg Privacy-Respecting School Community Interaction Platform. Search on Bibsonomy CSP Forum The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Shahidul Hoque, Aneel Rahim, Francesco Di Cerbo Smart Grid Data Anonymization for Smart Grid Privacy. Search on Bibsonomy CSP Forum The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Alessandro Pollini, Alessandra Tedeschi, Lorenzo Falciani Airports as Critical Transportation Infrastructures Increasingly Impacted by Cyberattacks: A Case Study. Search on Bibsonomy CSP Forum The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Bernhard Katzmarski, Gunnar Schomaker, Wolfgang Nebel Mobile Agents Based on Virtual Machines to Protect Sensitive Information. Search on Bibsonomy CSP Forum The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Mattia Salnitri, Elda Paja, Paolo Giorgini Preserving Compliance with Security Requirements in Socio-Technical Systems. Search on Bibsonomy CSP Forum The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Martti Lehto The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies. Search on Bibsonomy Int. J. Cyber Warf. Terror. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Simon Miller, Jonathan M. Garibaldi, Susan Appleby Evolving OWA operators for cyber security decision making problems. Search on Bibsonomy CICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21William J. Matuszak, Lisa Cingiser DiPippo, Yan Lindsay Sun CyberSAVe: situational awareness visualization for cyber security of smart grid systems. Search on Bibsonomy VizSEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Ike Patterson, James J. Nutaro, Glenn Allgood, Phani Teja Kuruganti, David Fugate Optimizing investments in cyber-security for critical infrastructure. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Annarita Giani, Russell Bent Addressing smart grid cyber security. Search on Bibsonomy CSIIRW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Teodor Sommestad, Jonas Hallberg Cyber Security Exercises and Competitions as a Platform for Cyber Security Experiments. Search on Bibsonomy NordSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Chung-Wei Lin, Alberto L. Sangiovanni-Vincentelli Cyber-Security for the Controller Area Network (CAN) Communication Protocol. Search on Bibsonomy CyberSecurity The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Denise Ferebee, Dipankar Dasgupta, Qishi Wu A Cyber-Security Storm MAP. Search on Bibsonomy CyberSecurity The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Basie von Solms, Elmarie Kritzinger Critical Information Infrastructure Protection (CIIP) and Cyber Security in Africa - Has the CIIP and Cyber Security Rubicon Been Crossed? Search on Bibsonomy AFRICOMM The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Joseph Werther, Michael Zhivich, Tim Leek, Nickolai Zeldovich Experiences in Cyber Security Education: The MIT Lincoln Laboratory Capture-the-Flag Exercise. Search on Bibsonomy CSET The full citation details ... 2011 DBLP  BibTeX  RDF
21Tudor Dumitras, Iulian Neamtiu Experimental Challenges in Cyber Security: A Story of Provenance and Lineage for Malware. Search on Bibsonomy CSET The full citation details ... 2011 DBLP  BibTeX  RDF
21Malek Ben Salem 0001, Salvatore J. Stolfo On the Design and Execution of Cyber-Security User Studies: Methodology, Challenges, and Lessons Learned. Search on Bibsonomy CSET The full citation details ... 2011 DBLP  BibTeX  RDF
21Summer-Mistine Olmstead, Joseph Stites, Ferrol Aderholdt A layer cyber security defense strategy for smart grid programmable logic controllers. Search on Bibsonomy CSIIRW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
21Sajjan G. Shiva, Sankardas Roy, Dipankar Dasgupta Game theory for cyber security. Search on Bibsonomy CSIIRW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
21Michael Losavio, J. Eagle Shutt, Deborah W. Keeling Positing social and justice models for cyber security. Search on Bibsonomy CSIIRW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
21Arpan Roy, Dong Seong Kim 0001, Kishor S. Trivedi Cyber security analysis using attack countermeasure trees. Search on Bibsonomy CSIIRW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
21Haricharan Rengamani, Shambhu J. Upadhyaya, H. Raghav Rao, Ponnurangam Kumaraguru Protecting senior citizens from cyber security attacks in the e-health scenario: an international perspective. Search on Bibsonomy CSIIRW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
21Dipankar Dasgupta Tutorial: computational intelligence in cyber security. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Glenn A. Fink, Christopher L. North, Alex Endert, Stuart Rose Visualizing cyber security: Usable workspaces. Search on Bibsonomy VizSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Jose Romero-Mariona, Hadar Ziv, Debra J. Richardson, Dennis Bystritsky Towards usable cyber security requirements. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Doug Maughan National cyber security research assessment and roadmap. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Frederick T. Sheldon, Axel W. Krings, Robert K. Abercrombie, Ali Mili 0001 (eds.) Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, CSIIRW '08, Oak Ridge, Tennessee, USA, May 12-14, 2008 Search on Bibsonomy CSIIRW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Steve Lines Best practices on information sharing of threats and warnings between the USG and industry. Search on Bibsonomy CSIIRW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Matt Bishop, Carrie Gates Defining the insider threat. Search on Bibsonomy CSIIRW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Wenbing Zhao 0001 Towards practical intrusion tolerant systems: a blueprint. Search on Bibsonomy CSIIRW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Geoffrey Mazeroff Markov models for application behavior analysis. Search on Bibsonomy CSIIRW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
Displaying result #901 - #1000 of 6468 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license