The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for cybersecurity with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2002-2004 (18) 2005-2006 (18) 2007-2008 (19) 2009 (23) 2010 (31) 2011 (20) 2012 (52) 2013 (38) 2014 (107) 2015 (96) 2016 (220) 2017 (288) 2018 (389) 2019 (553) 2020 (684) 2021 (904) 2022 (919) 2023 (1019) 2024 (269)
Publication types (Num. hits)
article(1908) book(32) data(3) incollection(134) inproceedings(3474) phdthesis(51) proceedings(65)
Venues (Conferences, Journals, ...)
CoRR(376) CCCI(132) CPITS(120) SecDev(112) IEEE Secur. Priv.(103) EICC(97) IEEE Access(97) ITASEC(92) HICSS(81) ICAIC(76) SIGCSE(75) Comput. Secur.(71) CECC(62) CCC(53) SVCC(53) Sensors(51) More (+10 of total 1258)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 131 occurrences of 84 keywords

Results
Found 5667 publication records. Showing 5667 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
10Muriel Figueredo Franco, Christian W. Omlin, Oliver Kamer, Eder John Scheid, Burkhard Stiller SECAdvisor: a Tool for Cybersecurity Planning using Economic Models. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Peter Sharfman, Samuel Sanders Visner Space Cybersecurity Norms. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Mst. Shapna Akter, Hossain Shahriar, Sheikh Iqbal Ahamed, Kishor Datta Gupta, Muhammad Asadur Rahman, Atef Mohamed, Mohammad Rahman, Akond Rahman, Fan Wu 0013 Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Danial Javaheri, Mahdi Fahmideh, Hassan Chizari, Pooia Lalbakhsh, Junbeom Hur Cybersecurity threats in FinTech: A systematic review. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Farzana Quayyum, Giske Naper Freberg Designing Cybersecurity Awareness Solutions for the Young People in Rural Developing Countries: The Need for Diversity and Inclusion. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Wojciech Mazurczyk, Dongwon Lee, Andreas Vlachos 0001 Disinformation 2.0 in the Age of AI: A Cybersecurity Perspective. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Gianpietro Castiglione, Giampaolo Bella, Daniele Francesco Santamaria Towards Grammatical Tagging for the Legal Language of Cybersecurity. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Forrest McKee, David Noever Acoustic Cybersecurity: Exploiting Voice-Activated Systems. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Tyler Malloy, Cleotilde Gonzalez Learning to Defend by Attacking (and Vice-Versa): Transfer of Learning in Cybersecurity Games. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Jasmin Wachter Graph models for Cybersecurity - A Survey. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Kuntal Kumar Pal, Kazuaki Kashihara, Ujjwala Anantheswaran, Kirby C. Kuznia, Siddhesh Jagtap, Chitta Baral Exploring the Limits of Transfer Learning with Unified Model in the Cybersecurity Domain. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Sofiya Makar, Ali Dehghantanha, Fattane Zarrinkalam, Gautam Srivastava 0001, Abbas Yazdinejad Systemization of Knowledge (SoK)- Cross Impact of Transfer Learning in Cybersecurity: Offensive, Defensive and Threat Intelligence Perspectives. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Haoyu He, Yuede Ji, H. Howie Huang Illuminati: Towards Explaining Graph Neural Networks for Cybersecurity Analysis. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Ioannis Mavromatis, Theodoros Spyridopoulos, Pietro Edoardo Carnelli, Woon Hau Chin, Ahmed Khalil, Jennifer Chakravarty, Lucia Cipolina Kun, Robert J. Piechocki, Colin Robbins, Daniel Cunnington, Leigh Chase, Lamogha Chiazor, Chris Preston, Rahul, Aftab Khan 0001 Cybersecurity in Motion: A Survey of Challenges and Requirements for Future Test Facilities of CAVs. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Kazuaki Kashihara, Kuntal Kumar Pal, Chitta Baral, Robert P. Trevino Prompt-Based Learning for Thread Structure Prediction in Cybersecurity Forums. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Sorin Adam Matei, Elisa Bertino Educating for AI Cybersecurity Work and Research: Ethics, Systems Thinking, and Communication Requirements. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Ivan Flechais, George Chalhoub Practical Cybersecurity Ethics: Mapping CyBOK to Ethical Concerns. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Bill Kay, Sinan G. Aksoy, Molly Baird, Daniel M. Best, Helen Jenne, Cliff A. Joslyn, Christopher Potvin, Gregory Henselman-Petrusek, Garret Seppala, Stephen J. Young, Emilie Purvine Hypergraph Topological Features for Autoencoder-Based Intrusion Detection for Cybersecurity Data. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Rawlings Fiberesima Assessment of POS Owners Awareness of Cybersecurity and Insider Threats in POS Kiosks Related Financial Crimes. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Jiazuo Hou, Fei Teng, Wenqian Yin, Yue Song, Yunhe Hou A Cost-Effective Cyber-Defense Strategy: Attack-Induced Region Minimization and Cybersecurity Margin Maximization. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Sarah Sharifi A Novel Approach to the Behavioral Aspects of Cybersecurity. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Peter Jamieson, Suman Bhunia, Dhananjai M. Rao With ChatGPT, do we have to rewrite our learning objectives - CASE study in Cybersecurity. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Sudip Mittal, Jingdao Chen AI Security Threats against Pervasive Robotic Systems: A Course for Next Generation Cybersecurity Workforce. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Valdemar Svábenský, Jan Vykopal, Pavel Celeda, Kristián Tkácik, Daniel Popovic Student Assessment in Cybersecurity Training Automated by Pattern Mining and Clustering. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Mansi Girdhar, Junho Hong, Wencong Su, Akila Herath, Chen-Ching Liu SDN-Based Dynamic Cybersecurity Framework of IEC-61850 Communications in Smart Grid. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Suman Rath, Tapadhir Das, Shamik Sengupta Improvise, Adapt, Overcome: Dynamic Resiliency Against Unknown Attack Vectors in Microgrid Cybersecurity Games. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Hossein Rahimpour, Joe Tusek, Alsharif Abuadbba, Aruna Seneviratne, Toan Phung, Ahmed Musleh, Boyu Liu Cybersecurity Challenges of Power Transformers. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Philipp Kuehn 0001, Mike Schmidt, Markus Bayer, Christian Reuter 0001 ThreatCrawl: A BERT-based Focused Crawler for the Cybersecurity Domain. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Victor Jüttner, Martin Grimmer 0002, Erik Buchmann ChatIDS: Explainable Cybersecurity Using Generative AI. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Xingchen Wu, Qin Qiu, Jiaqi Li, Yang Zhao Intell-dragonfly: A Cybersecurity Attack Surface Generation Engine Based On Artificial Intelligence-generated Content Technology. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Mike Wa Nkongolo, Nita Mennega, Izaan van Zyl Cybersecurity Career Requirements: A Literature Review. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Khatoon Mohammed Harnessing the Speed and Accuracy of Machine Learning to Advance Cybersecurity. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Md Habibor Rahman, Thorsten Wuest, Mohammed Shafae Review, Meta-Taxonomy, and Use Cases of Cyberattack Taxonomies of Manufacturing Cybersecurity Threat Attributes and Countermeasures. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Roberto Dillon The Future of Cybersecurity in Southeast Asia along the Maritime Silk Road. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Gokul Chettoor Jayakrishnan, Vijayanand Banahatti, Sachin Lodha Design and Execution Challenges for Cybersecurity Serious Games: An Overview. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Andreas Tsamados, Luciano Floridi, Mariarosaria Taddeo The Cybersecurity Crisis of Artificial Intelligence: Unrestrained Adoption and Natural Language-Based Attacks. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Petar Radanliev The Rise and Fall of Cryptocurrencies: Defining the Economic and Social Values of Blockchain Technologies, assessing the Opportunities, and defining the Financial and Cybersecurity Risks of the Metaverse. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Aydin Zaboli, Seong Lok Choi, Tai-Jin Song, Junho Hong ChatGPT and other Large Language Models for Cybersecurity of Smart Grid Applications. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Rahul Kale, Vrizlynn L. L. Thing Few-shot Weakly-supervised Cybersecurity Anomaly Detection. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10MohammadHossein Homaei, Oscar Mogollon-Gutierrez, José Carlos Sancho Núñez, Mar Avila Vegas, Andrés Caro Lindo A Review of Digital Twins and their Application in Cybersecurity based on Artificial Intelligence. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Francesco Schiliro Towards a Contemporary Definition of Cybersecurity. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Diane Jackson, Sorin Adam Matei, Elisa Bertino Artificial Intelligence Ethics Education in Cybersecurity: Challenges and Opportunities: a focus group report. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Rounak Meyur, Sumit Purohit, Braden K. Webb Fortify Your Defenses: Strategic Budget Allocation to Enhance Power Grid Cybersecurity. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Ahmad Mohsin, Helge Janicke, Surya Nepal, David Holmes Digital Twins and the Future of their Use Enabling Shift Left and Shift Right Cybersecurity Operations. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Carlos Rombaldo Junior, Ingolf Becker, Shane Johnson Unaware, Unfunded and Uneducated: A Systematic Review of SME Cybersecurity. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Christopher Scherb, Luc Bryan Heitz, Frank Grimberg, Hermann Grieder, Marcel Maurer A Serious Game for Simulating Cyberattacks to Teach Cybersecurity. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Konstantinos Lampropoulos 0001, Apostolis Zarras, Eftychia Lakka, Polyanthi Barmpaki, Kostas Drakonakis, Manos Athanatos, Hervé Debar, Andreas Alexopoulos, Aristeidis Sotiropoulos, George Tsakirakis, Nikos Dimakopoulos, Dimitris Tsolovos, Matthias Pocs, Michalis Smyrlis, Ioannis Basdekis, Georgios Spanoudakis, Ovidiu Mihaila, Bogdan Prelipcean, Eliot Salant, Sotiris Athanassopoulos, Petros Papachristou, Ioannis Ladakis, John Chang, Evangelos Floros, Konstantinos Smyrlis, Rouven Besters, Pietro Randine, Karianna Fjeld Lovaas, John Cooper, Iulia Ilie, Gabriel Danciu, Marwan Darwish Khabbaz White paper on cybersecurity in the healthcare sector. The HEIR solution. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Liang Niu, Nian Xue, Christina Pöpper Unveiling the Sentinels: Assessing AI Performance in Cybersecurity Peer Review. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Sanyam Jain, Raju gautam, Shivani Sharma, Ravi Tomar Four Factor Authentication with emerging cybersecurity for Mobile Transactions. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Gaith Rjoub, Jamal Bentahar, Omar Abdel Wahab 0001, Rabeb Mizouni, Alyssa Song, Robin Cohen, Hadi Otrok, Azzam Mourad A Survey on Explainable Artificial Intelligence for Network Cybersecurity. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Andrei Costin, Hannu Turtiainen, Syed Khandker, Timo Hämäläinen 0002 Towards a Unified Cybersecurity Testing Lab for Satellite, Aerospace, Avionics, Maritime, Drone (SAAMD) technologies and communications. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Mu-Huan Chung, Lu Wang 0004, Sharon Li, Yuhong Yang 0007, Calvin Giang, Khilan Jerath, Abhay Raman, David Lie, Mark H. Chignell Implementing Active Learning in Cybersecurity: Detecting Anomalies in Redacted Emails. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Kuchan Park, Junho Hong, Wencong Su, Hyojong Lee Machine Learning based Post Event Analysis for Cybersecurity of Cyber-Physical System. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Padmaksha Roy Deep Correlation-Aware Kernelized Autoencoders for Anomaly Detection in Cybersecurity. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Saptarshi Ghosh, Murali Sankar Venkatraman, Shehab Ahmed, Charalambos Konstantinou A Bi-Level Stochastic Game Model for PMU Placement in Power Grid with Cybersecurity Risks. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Aritran Piplai, Anantaa Kotal, Seyedreza Mohseni, Manas Gaur, Sudip Mittal, Anupam Joshi Knowledge-enhanced Neuro-Symbolic AI for Cybersecurity and Privacy. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Colman McGuan, Chansu Yu, Qin Lin Towards Low-Barrier Cybersecurity Research and Education for Industrial Control Systems. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Padmaksha Roy, Jaganmohan Chandrasekaran, Erin Lanus, Laura J. Freeman, Jeremy Werner A Survey of Data Security: Practices from Cybersecurity and Challenges of Machine Learning. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Tobias Braun, Irdin Pekaric, Giovanni Apruzzese Understanding the Process of Data Labeling in Cybersecurity. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Mike Wa Nkongolo Navigating the complex nexus: cybersecurity in political landscapes. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Veerle van Harten, Carlos Hernandez Gañán, Michel van Eeten, Simon Parkin Easier Said Than Done: The Failure of Top-Level Cybersecurity Advice for Consumer IoT Devices. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Terence Eden Exploring the visualisation of hierarchical cybersecurity data within the Metaverse. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Iqbal H. Sarker, Helge Janicke, Nazeeruddin Mohammad, Paul A. Watters, Surya Nepal AI Potentiality and Awareness: A Position Paper from the Perspective of Human-AI Teaming in Cybersecurity. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Bo Yan 0005, Cheng Yang 0002, Chuan Shi, Yong Fang 0002, Qi Li, Yanfang Ye 0001, Junping Du Graph Mining for Cybersecurity: A Survey. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Rasha Kashef 0001, Monika Freunek, Jeff Schwartzentruber, Reza Samavi, Burcu Bulgurcu, A. J. Khan, Marcus Santos Bridging the Bubbles: Connecting Academia and Industry in Cybersecurity Research. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Marcelo Ponce, Ramses van Zon Cybersecurity Training for Users of Remote Computing. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Maria Patrizia Carello, Alberto Marchetti-Spaccamela, Leonardo Querzoni, Marco Angelini A Systematization of Cybersecurity Regulations, Standards and Guidelines for the Healthcare Sector. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Jan Vykopal, Pavel Seda, Valdemar Svábenský, Pavel Celeda Smart Environment for Adaptive Learning of Cybersecurity Skills. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Andrei Costin, Syed Khandker, Hannu Turtiainen, Timo Hämäläinen 0002 Cybersecurity of COSPAS-SARSAT and EPIRB: threat and attacker models, exploits, future research. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Iqbal H. Sarker, Helge Janicke, Leandros A. Maglaras, Seyit Camtepe Data-Driven Intelligence can Revolutionize Today's Cybersecurity World: A Position Paper. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Christopher Scherb, Adrian Hadayah, Luc Bryan Heitz CyMed: A Framework for Testing Cybersecurity of Connected Medical Devices. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Azqa Nadeem Cybersecurity as a Crosscutting Concept Across an Undergrad Computer Science Curriculum: An Experience Report. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Anita Modi, Ievgeniia Kuzminykh, Bogdan Ghita 0003 Data Driven Approaches to Cybersecurity Governance for Board Decision-Making - A Systematic Review. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Lydia Kraus, Valdemar Svábenský, Martin Horák, Vashek Matyás, Jan Vykopal, Pavel Celeda Want to Raise Cybersecurity Awareness? Start with Future IT Professionals. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Tin Lai, Farnaz Farid, Abubakar Bello, Fariza Sabrina Ensemble Learning based Anomaly Detection for IoT Cybersecurity via Bayesian Hyperparameters Sensitivity Analysis. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Deepika Saxena, Ishu Gupta, Rishabh Gupta, Ashutosh Kumar Singh 0001, Xiaoqing Wen An AI-Driven VM Threat Prediction Model for Multi-Risks Analysis-Based Cloud Cybersecurity. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Wesley Joon-Wie Tann, Yuancheng Liu, Jun Heng Sim, Choon Meng Seah, Ee-Chien Chang Using Large Language Models for Cybersecurity Capture-The-Flag Challenges and Certification Questions. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Attia Qammar, Hongmei Wang, Jianguo Ding, Abdenacer Naouri, Mahmoud Daneshmand, Huansheng Ning Chatbots to ChatGPT in a Cybersecurity Space: Evolution, Vulnerabilities, Attacks, Challenges, and Future Recommendations. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Jack Hance, Jeremy Straub Development of a Multi-purpose Fuzzer to Perform Assessment as Input to a Cybersecurity Risk Assessment and Analysis System. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Daksh Dave, Gauransh Sawhney, Pushkar Aggarwal, Nitish Silswal, Dhruv Khut The New Frontier of Cybersecurity: Emerging Threats and Innovations. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Elisabetta Biasin, Erik Kamenjasevic, Kaspar Rosager Ludvigsen Cybersecurity of AI medical devices: risks, legislation, and challenges. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Md Habibor Rahman, Young-Jun Son, Mohammed Shafae Graph-Theoretic Approach for Manufacturing Cybersecurity Risk Modeling and Assessment. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Valdemar Svábenský, Jan Vykopal, Pavel Celeda, Lydia Kraus Applications of Educational Data Mining and Learning Analytics on Data From Cybersecurity Training. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Ryan Shah, Manuel Maarek, Shenando Stals, Lynne Baillie, Sheung Chi Chan, Robert J. Stewart 0001, Hans-Wolfgang Loidl, Olga Chatzifoti Introducing and Interfacing with Cybersecurity - A Cards Approach. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Maanak Gupta, Charankumar Akiri, Kshitiz Aryal, Eli Parker, Lopamudra Praharaj From ChatGPT to ThreatGPT: Impact of Generative AI in Cybersecurity and Privacy. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Micah Musser, Andrew Lohn, James X. Dempsey, Jonathan M. Spring, Ram Shankar Siva Kumar, Brenda Leong, Christina Liaghati, Cindy Martinez, Crystal D. Grant, Daniel Rohrer, Heather Frase, Jonathan Elliott, John Bansemer, Mikel Rodriguez, Mitt Regan, Rumman Chowdhury, Stefan Hermanek Adversarial Machine Learning and Cybersecurity: Risks, Challenges, and Legal Implications. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Giorgia Maria Cappello, Gabriella Colajanni, Patrizia Daniele, Daniele Sciacca A constrained optimization model for the provision of services in a 5G network with multi-level cybersecurity investments. Search on Bibsonomy Soft Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10E. Jayanthi, T. Ramesh, Reena Kharat, M. R. M. VeeraManickam, N. Bharathiraja, R. Venkatesan, Raja Marappan Cybersecurity enhancement to detect credit card frauds in health care using new machine learning strategies. Search on Bibsonomy Soft Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Shuai Zhou, Chi Liu, Dayong Ye, Tianqing Zhu, Wanlei Zhou 0001, Philip S. Yu Adversarial Attacks and Defenses in Deep Learning: From a Perspective of Cybersecurity. Search on Bibsonomy ACM Comput. Surv. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Ron Bitton, Nadav Maman, Inderjeet Singh, Satoru Momiyama, Yuval Elovici, Asaf Shabtai Evaluating the Cybersecurity Risk of Real-world, Machine Learning Production Systems. Search on Bibsonomy ACM Comput. Surv. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Danilo Bruschi, Nicla Diomede A framework for assessing AI ethics with applications to cybersecurity. Search on Bibsonomy AI Ethics The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Adam James Fenton, Ioannis Chapsos Ships without crews: IMO and UK responses to cybersecurity, technology, law and regulation of maritime autonomous surface ships (MASS). Search on Bibsonomy Frontiers Comput. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Lakshmi Goel 0001, Zuopeng Justin Zhang, Steven Williamson Work-to-Home Cybersecurity Spillover: Construct Development and Validation. Search on Bibsonomy Inf. Syst. Manag. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Angelo Corallo, Mariangela Lazoi, Marianna Lezzi, Pierpaolo Pontrandolfo Cybersecurity Challenges for Manufacturing Systems 4.0: Assessment of the Business Impact Level. Search on Bibsonomy IEEE Trans. Engineering Management The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Eatedal Alabdulkreem, Saud S. Alotaibi, Mohammad Alamgeer, Radwa Marzouk, Anwer Mustafa Hilal, Abdelwahed Motwakel, Abu Sarwar Zamani, Mohammed Rizwanullah Intelligent Cybersecurity Classification Using Chaos Game Optimization with Deep Learning Model. Search on Bibsonomy Comput. Syst. Sci. Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Fadwa M. Alrowais, Sami Althahabi, Saud S. Alotaibi, Abdullah Mohamed, Manar Ahmed Hamza, Radwa Marzouk Automated Machine Learning Enabled Cybersecurity Threat Detection in Internet of Things Environment. Search on Bibsonomy Comput. Syst. Sci. Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Hanan Abdullah Mengash, Jaber S. Alzahrani, Majdy M. Eltahir, Fahd N. Al-Wesabi, Abdullah Mohamed, Manar Ahmed Hamza, Radwa Marzouk Search and Rescue Optimization with Machine Learning Enabled Cybersecurity Model. Search on Bibsonomy Comput. Syst. Sci. Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Z. Faizal Khan, Saeed M. Alshahrani, Abdulrahman Abdullah Alghamdi, Someah Alangari, Nouf Ibrahim Altamami, Khalid A. Alissa, Sana Alazwari, Mesfer Al Duhayyim, Fahd N. Al-Wesabi Machine Learning Based Cybersecurity Threat Detection for Secure IoT Assisted Cloud Environment. Search on Bibsonomy Comput. Syst. Sci. Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Fatma S. Alrayes, Najm Alotaibi, Jaber S. Alzahrani, Sana Alazwari, Areej Alhogail, Ali M. Al-Sharafi, Mahmoud Othman, Manar Ahmed Hamza Enhanced Gorilla Troops Optimizer with Deep Learning Enabled Cybersecurity Threat Detection. Search on Bibsonomy Comput. Syst. Sci. Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Anwer Mustafa Hilal, Aisha Hassan Abdalla Hashim, Heba G. Mohamed, Lubna Alharbi, Mohamed K. Nour, Abdullah Mohamed, Ahmed S. Almasoud, Abdelwahed Motwakel Spotted Hyena Optimizer with Deep Learning Driven Cybersecurity for Social Networks. Search on Bibsonomy Comput. Syst. Sci. Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #901 - #1000 of 5667 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license