The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for threats with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1954-1987 (15) 1988-1993 (16) 1994-1996 (33) 1997 (17) 1998 (16) 1999 (21) 2000 (25) 2001 (30) 2002 (50) 2003 (83) 2004 (118) 2005 (218) 2006 (250) 2007 (330) 2008 (332) 2009 (227) 2010 (121) 2011 (93) 2012 (111) 2013 (105) 2014 (124) 2015 (162) 2016 (189) 2017 (188) 2018 (231) 2019 (223) 2020 (287) 2021 (264) 2022 (259) 2023 (329) 2024 (95)
Publication types (Num. hits)
article(1596) book(11) data(5) incollection(78) inproceedings(2795) phdthesis(63) proceedings(14)
Venues (Conferences, Journals, ...)
CoRR(283) LEET(69) HICSS(59) IEEE Access(56) ARES(49) IEEE Secur. Priv.(49) MIST@CCS(43) ISI(38) Sensors(32) ACSAC(29) Netw. Secur.(29) Comput. Secur.(27) CCS(26) Commun. ACM(18) Computer(18) AsiaCCS(17) More (+10 of total 1688)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 2004 occurrences of 1111 keywords

Results
Found 4563 publication records. Showing 4562 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
11Ryan Mills, Angelos K. Marnerides, Matthew Broadbent, Nicholas J. P. Race Practical Intrusion Detection of Emerging Threats. Search on Bibsonomy IEEE Trans. Netw. Serv. Manag. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Andrew Stern, Huanyu Wang, Fahim Rahman, Farimah Farahmandi, Mark M. Tehranipoor ACED-IT: Assuring Confidential Electronic Design Against Insider Threats in a Zero-Trust Environment. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Sangjun Kim, Kyung-Joon Park, Chenyang Lu 0001 A Survey on Network Security for Cyber-Physical Systems: From Threats to Resilient Design. Search on Bibsonomy IEEE Commun. Surv. Tutorials The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Cristina Alcaraz, Javier López 0001 Digital Twin: A Comprehensive Survey of Security Threats. Search on Bibsonomy IEEE Commun. Surv. Tutorials The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Sungchae Park, Heung-Youl Youm Security and Privacy Threats and Requirements for the Centralized Contact Tracing System in Korea. Search on Bibsonomy Big Data Cogn. Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Divya Jatain, Vikram Singh 0001, Naveen Dahiya A contemplative perspective on federated machine learning: Taxonomy, threats & vulnerability assessment and challenges. Search on Bibsonomy J. King Saud Univ. Comput. Inf. Sci. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Dragan Korac, Boris Damjanovic, Dejan Simic, Kim-Kwang Raymond Choo A hybrid XSS attack (HYXSSA) based on fusion approach: Challenges, threats and implications in cybersecurity. Search on Bibsonomy J. King Saud Univ. Comput. Inf. Sci. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11E. Yu. Pavlenko Systematization of Cyber Threats to Large-Scale Systems with Adaptive Network Topology. Search on Bibsonomy Autom. Control. Comput. Sci. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11E. V. Zavadskii, D. V. Ivanov Counteracting Information Threats Using Honeypot Systems Based on a Graph of Potential Attacks. Search on Bibsonomy Autom. Control. Comput. Sci. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Yingzhe He, Guozhu Meng, Kai Chen 0012, Xingbo Hu, Jinwen He Towards Security Threats of Deep Learning Systems: A Survey. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Amir Masoud Rahmani, Suleyman Bayramov, Behnam Kiani Kalejahi Internet of Things Applications: Opportunities and Threats. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Dorsaf Swessi, Hanen Idoudi A Survey on Internet-of-Things Security: Threats and Emerging Countermeasures. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Olarotimi Kabir Amuda, Akinyemi Bodunde Odunola, Mistura Laide Sanni, Ganiyu Adesola Aderounmu A predictive User behaviour analytic Model for Insider Threats in Cyberspace. Search on Bibsonomy Int. J. Commun. Networks Inf. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Manaar Alam, Sayandeep Saha, Debdeep Mukhopadhyay, Sandip Kundu NN-Lock: A Lightweight Authorization to Prevent IP Threats of Deep Learning Models. Search on Bibsonomy ACM J. Emerg. Technol. Comput. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Maria Papaioannou, Marina Karageorgou, Georgios Mantas, Victor Sucasas, Ismael Essop, Jonathan Rodriguez 0001, Dimitrios K. Lymberopoulos A Survey on Security Threats and Countermeasures in Internet of Medical Things (IoMT). Search on Bibsonomy Trans. Emerg. Telecommun. Technol. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Williams Haruna, Toyin Ajiboro Aremu, Yetunde Ajao Modupe Defending against cybersecurity threats to the payments and banking system. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Vasiliki Demertzi, Stavros Demertzis, Konstantinos Demertzis An Overview of Cyber Threats, Attacks, and Countermeasures on the Primary Domains of Smart Cities. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Yu Shen 0001, Murat Simsek, Burak Kantarci, Hussein T. Mouftah, Mehran Bagheri, Petar Djukic Prior Knowledge based Advanced Persistent Threats Detection for IoT in a Realistic Benchmark. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Ahmed Omara, Burak Kantarci Adversarial Machine Learning-Based Anticipation of Threats Against Vehicle-to-Microgrid Services. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Stefan Rass, Sandra König, Stefan Schauer Defending Against Advanced Persistent Threats using Game-Theory. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Motahareh Dehghan, Babak Sadeghiyan, Erfan Khosravian, Alireza Sedighi Moghaddam, Farshid Nooshi ProAPT: Projection of APT Threats with Deep Reinforcement Learning. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Aiman Al-Sabaawi, Thamer A. Alrowidhan Detecting Network Security Vulnerabilities and Proactive Strategies to Mitigate Potential Threats. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Yee Ching Tok, Sudipta Chattopadhyay 0001 Identifying Threats, Cybercrime and Digital Forensic Opportunities in Smart City Infrastructure via Threat Modeling. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Bibhas Sharma, Ishan Karunanayake, Rahat Masood, Muhammad Ikram 0001 Analysing Security and Privacy Threats in the Lockdown Periods of COVID-19 Pandemic: Twitter Dataset Case Study. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  BibTeX  RDF
11Md. Jobair Hossain Faruk, Sharaban Tahora, Masrura Tasnim, Hossain Shahriar, Nazmus Sakib A Review of Quantum Cybersecurity: Threats, Risks and Opportunities. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Zizhuang Deng, Kai Chen 0012, Guozhu Meng, Xiaodong Zhang, Ke Xu, Yao Cheng Understanding Real-world Threats to Deep Learning Models in Android Apps. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Giorgio Di Tizio, Michele Armellini, Fabio Massacci Software Updates Strategies: a Quantitative Evaluation against Advanced Persistent Threats. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Shangwei Guo, Chunlong Xie, Jiwei Li 0001, Lingjuan Lyu, Tianwei Zhang 0004 Threats to Pre-trained Language Models: Survey and Taxonomy. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  BibTeX  RDF
11Yuhan Zhao, Quanyan Zhu Autonomous and Resilient Control for Optimal LEO Satellite Constellation Coverage Against Space Threats. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Satwik Kundu, Swaroop Ghosh Security Aspects of Quantum Machine Learning: Opportunities, Threats and Defenses. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Zhiyan Chen, Jinxin Liu 0001, Yu Shen 0001, Murat Simsek, Burak Kantarci, Hussein T. Mouftah, Petar Djukic Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Gurpreet Kaur, Rekha Agarwal, Vinod Patidar Image Encryption using Fractional Integral transforms: Vulnerabilities, Threats and Future scope. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Angad Pal Singh, Ankit Sharma A systematic literature review on insider threats. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Nyteisha Bookert, Mohd Anwar Privacy Threats on the Internet of Medical Things. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Wesley dos Reis Bezerra, Cristiano Antonio de Souza, Carla Merkle Westphall, Carlos Becker Westphall Characteristics and Main Threats about Multi-Factor Authentication: A Survey. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Abhilash Chakraborty, Anupam Biswas, Ajoy Kumar Khan Artificial Intelligence for Cybersecurity: Threats, Attacks and Mitigation. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Huaming Chen, Muhammad Ali Babar 0001 Security for Machine Learning-based Software Systems: a survey of threats, practices and challenges. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  BibTeX  RDF
11Nuria Rodríguez Barroso, Daniel Jiménez-López, María Victoria Luzón, Francisco Herrera, Eugenio Martínez-Cámara Survey on Federated Learning Threats: concepts, taxonomy on attacks and defences, experimental study and challenges. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  BibTeX  RDF
11Jenny Tang, Hannah Shoemaker, Leah Teffera, Eleanor Birrell, Ada Lerner Buying Privacy: User Perceptions of Privacy Threats from Mobile Apps. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Gino A. Chacon, Charles Williams, Johann Knechtel, Ozgur Sinanoglu, Paul V. Gratz Hardware Trojan Threats to Cache Coherence in Modern 2.5D Chiplet Systems. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Kratika Bhagtani, Amit Kumar Singh Yadav, Emily R. Bartusiak, Ziyue Xiang, Ruiting Shao, Sriram Baireddy, Edward J. Delp An Overview of Recent Work in Media Forensics: Methods and Threats. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Sébastien Gillard, Dimitri Percia David, Alain Mermoud, Thomas Maillart Efficient Collective Action for Tackling Time-Critical Cybersecurity Threats. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Hui Cao, Wenlong Zou, Yinkun Wang, Ting Song, Mengjun Liu Emerging Threats in Deep Learning-Based Autonomous Driving: A Comprehensive Survey. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Mohammad Kamrul Hasan, Taher M. Ghazal, Rashid A. Saeed, Bishwajeet Pandey, Hardik A. Gohel, Ala' A. Eshmawi, Sayed Abdel-Khalek, Hula Mahmoud Alkhassawneh A review on security threats, vulnerabilities, and counter measures of 5G enabled Internet-of-Medical-Things. Search on Bibsonomy IET Commun. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Francesca Cerruto, Stefano Cirillo, Domenico Desiato, Michele Simone Gambardella, Giuseppe Polese Social network data analysis to highlight privacy threats in sharing data. Search on Bibsonomy J. Big Data The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Bilal Rauf, Haider Abbas, Muhammad Usman 0001, Tanveer A. Zia, Waseem Iqbal 0001, Yawar Abbas Bangash, Hammad Afzal Application Threats to Exploit Northbound Interface Vulnerabilities in Software Defined Networks. Search on Bibsonomy ACM Comput. Surv. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Valarie A. Yerdon, Jinchao Lin, Ryan W. Wohleber, Gerald Matthews, Lauren Reinerman-Jones, Peter A. Hancock Eye-Tracking Active Indicators of Insider Threats: Detecting Illicit Activity During Normal Workflow. Search on Bibsonomy IEEE Trans. Engineering Management The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Haifa Nasser Alshabib, Jorge Tiago Martins Cybersecurity: Perceived Threats and Policy Responses in the Gulf Cooperation Council. Search on Bibsonomy IEEE Trans. Engineering Management The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Mwaffaq Abu-Alhaija, Nidal M. Turab, Abdelrahman Hamza Extensive Study of Cloud Computing Technologies, Threats and Solutions Prospective. Search on Bibsonomy Comput. Syst. Sci. Eng. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Abdulwahed Awad Almutairi, Shailendra Mishra, Mohammed Alshehri Web Security: Emerging Threats and Defense. Search on Bibsonomy Comput. Syst. Sci. Eng. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Mohammad H. Alshayeji, Sa'ed Abed Enhanced video-on-demand security in cloud computing against insider and outsider threats. Search on Bibsonomy Int. J. Secur. Networks The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Qi Wu, Qiang Li 0008, Dong Guo 0002, Xiangyu Meng 0002 Exploring the vulnerability in the inference phase of advanced persistent threats. Search on Bibsonomy Int. J. Distributed Sens. Networks The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Simone Raponi, Savio Sciancalepore, Gabriele Oligeri, Roberto Di Pietro Road Traffic Poisoning of Navigation Apps: Threats and Countermeasures. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Arslan Munir, Erik Blasch, Alexander J. Aved, E. Paul Ratazzi, Joonho Kong Security Issues in Situational Awareness: Adversarial Threats and Mitigation Techniques. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Jinxin Liu 0001, Yu Shen 0001, Murat Simsek, Burak Kantarci, Hussein T. Mouftah, Mehran Bagheri, Petar Djukic A New Realistic Benchmark for Advanced Persistent Threats in Network Traffic. Search on Bibsonomy IEEE Netw. Lett. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Sabreen Ahmadjee, Carlos Joseph Mera-Gómez, Rami Bahsoon, Rick Kazman A Study on Blockchain Architecture Design Decisions and Their Security Attacks and Threats. Search on Bibsonomy ACM Trans. Softw. Eng. Methodol. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Li Duan, Yangyang Sun, Kejia Zhang, Yong Ding 0005 Multiple-Layer Security Threats on the Ethereum Blockchain and Their Countermeasures. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Gamal Elkoumy, Stephan A. Fahrenkrog-Petersen, Mohammadreza Fani Sani, Agnes Koschmider, Felix Mannhardt, Saskia Nuñez von Voigt, Majid Rafiei, Leopold von Waldthausen Privacy and Confidentiality in Process Mining: Threats and Research Challenges. Search on Bibsonomy ACM Trans. Manag. Inf. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Su Wang, Zhiliang Wang, Tao Zhou, Hongbin Sun, Xia Yin, Dongqi Han, Han Zhang 0009, Xingang Shi, Jiahai Yang 0001 THREATRACE: Detecting and Tracing Host-Based Threats in Node Level Through Provenance Graph Learning. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11S. Manimaran, V. N. Sastry, N. P. Gopalan SBTDDL: A novel framework for sensor-based threats detection on Android smartphones using deep learning. Search on Bibsonomy Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Filipe Chichorro, Luís Correia 0001, Pedro Cardoso Biological traits interact with human threats to drive extinctions: A modelling study. Search on Bibsonomy Ecol. Informatics The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Othmane Friha, Mohamed Amine Ferrag, Leandros A. Maglaras, Lei Shu 0001 Digital Agriculture Security: Aspects, Threats, Mitigation Strategies, and Future Trends. Search on Bibsonomy IEEE Internet Things Mag. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Liton Kumar Biswas, Leonidas Lavdas, M. Tanjidur Rahman, Mark M. Tehranipoor, Navid Asadizanjani On Backside Probing Techniques and Their Emerging Security Threats. Search on Bibsonomy IEEE Des. Test The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Lara Mauri, Ernesto Damiani Modeling Threats to AI-ML Systems Using STRIDE. Search on Bibsonomy Sensors The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Wahab Khawaja, Vasilii Semkin, Naeem Iqbal Ratyal, Qasim Yaqoob, Jibran Gul, Ismail Güvenç Threats from and Countermeasures for Unmanned Aerial and Underwater Vehicles. Search on Bibsonomy Sensors The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Alexey M. Kashevnik, Andrew Ponomarev, Nikolay Shilov 0001, Andrey Chechulin Threats Detection during Human-Computer Interaction in Driver Monitoring Systems. Search on Bibsonomy Sensors The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Thulfiqar Jabar, Manmeet Mahinderjit Singh 0001 Exploration of Mobile Device Behavior for Mitigating Advanced Persistent Threats (APT): A Systematic Literature Review and Conceptual Framework. Search on Bibsonomy Sensors The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Adel Alahmadi, Saeed Ur Rehman, Husain S. Alhazmi, David G. Glynn, Hatoon Shoaib, Patrick Solé Cyber-Security Threats and Side-Channel Attacks for Digital Agriculture. Search on Bibsonomy Sensors The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Danish Javeed, Tianhan Gao, Muhammad Taimoor Khan, Duaa Shoukat A Hybrid Intelligent Framework to Combat Sophisticated Threats in Secure Industries. Search on Bibsonomy Sensors The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Giampaolo Bella, Rosario Giustolisi, Carsten Schürmann 0001 Modelling human threats in security ceremonies. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Pengrui Liu, Xiangrui Xu 0001, Wei Wang 0012 Threats, attacks and defenses to federated learning: issues, taxonomy and perspectives. Search on Bibsonomy Cybersecur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Mazin Mohammed Mogadem, Yan Li 0004, Daniel Limenew Meheretie A survey on internet of energy security: related fields, challenges, threats and emerging technologies. Search on Bibsonomy Clust. Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Françoise Forges, József Sákovics Tenable threats when Nash equilibrium is the norm. Search on Bibsonomy Int. J. Game Theory The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Huiling Li, Jun Wu 0001, Hansong Xu, Gaolei Li, Mohsen Guizani Explainable Intelligence-Driven Defense Mechanism Against Advanced Persistent Threats: A Joint Edge Game and AI Approach. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Alaa Nehme, Joey F. George Approaching IT Security & Avoiding Threats in the Smart Home Context. Search on Bibsonomy J. Manag. Inf. Syst. The full citation details ... 2022 DBLP  BibTeX  RDF
11Kim-Kwang Raymond Choo, Deepak Puthal, Charles Zhechao Liu, Chonggang Wang Introducing the Special Topic on "Mitigating Cyber Threats and Defense in Data Intensive Smart Cities". Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Qiaoyan Yu, Pruthvy Yellu, Landon Buell Towards Securing Approximate Computing Systems: Security Threats and Attack Mitigation. Search on Bibsonomy Approximate Computing The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Yi Zhou 0015, Nathalie Baracaldo, Ali Anwar 0001, Kamala Varma Dealing with Byzantine Threats to Neural Networks. Search on Bibsonomy Federated Learning The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Carol S. Smidts, Indrajit Ray, Quanyan Zhu, Pavan Kumar Vaddi, Yunfei Zhao, Linan Huang, Xiaoxu Diao, Rakibul Talukdar, Michael C. Pietrykowski Cyber-Security Threats and Response Models in Nuclear Power Plants Search on Bibsonomy 2022   DOI  RDF
11Kristan Stoddart Cyberwarfare - Threats to Critical Infrastructure, 5 Search on Bibsonomy 2022   DOI  RDF
11Adam Malatinský, Martin Hromada Evaluation of the most important fire threats of the building. Search on Bibsonomy ICCST The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Lucie Flynnova, Frantisek Paulus, Jarmil Valasek Threats and Resilience: Methodology in the Area of Railway Infrastructure. Search on Bibsonomy ICCST The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Jaya Preethi Mohan, Niroop Sugunaraj, Prakash Ranganathan Cyber Security Threats for 5G Networks. Search on Bibsonomy EIT The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Mikhail Gromov, David Arnold 0006, Jafar Saniie Tackling Multiple Security Threats in an IoT Environment. Search on Bibsonomy EIT The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Nurbaini Zainuddin, Rasimah Che Mohd Yusuff, Ganthan Narayana Samy Assessing Cloud Computing Security Threats in Malaysian Organization Using Fuzzy Delphi Method. Search on Bibsonomy SCDM The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Sahiti Bommareddy, Benjamin Gilby, Maher Khan, Imes Chiu, Mathaios Panteli, John W. van de Lindt, Linton Wells, Yair Amir, Amy Babay Data-Centric Analysis of Compound Threats to Critical Infrastructure Control Systems. Search on Bibsonomy DSN Workshops The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Zizhuang Deng, Kai Chen 0012, Guozhu Meng, Xiaodong Zhang, Ke Xu, Yao Cheng Understanding Real-world Threats to Deep Learning Models in Android Apps. Search on Bibsonomy CCS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Sana Habib, Tiffany Bao, Yan Shoshitaishvili, Adam Doupé Mitigating Threats Emerging from the Interaction between SDN Apps and SDN (Configuration) Datastore. Search on Bibsonomy CCSW The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Argha Chandra Dhar, Arna Roy, Subrata Biswas, Bashima Islam Studying the Security Threats of Partially Processed Deep Neural Inference Data in an IoT Device. Search on Bibsonomy SenSys The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Zlatogor Minchev Proactive Identification of Future Cyber Threats. Search on Bibsonomy BISEC The full citation details ... 2022 DBLP  BibTeX  RDF
11Nemanja Veselinovic, Milos Milasinovic, Milos Jovanovic 0005, Aca Alekisic, Nenad Biga Countering Cybersecurity Threats with AI. Search on Bibsonomy BISEC The full citation details ... 2022 DBLP  BibTeX  RDF
11Ning Liu, Jing Xia, Zhiping Cai, Tao Yang, Bingnan Hou, Zhilin Wang A Survey on IPv6 Security Threats and Defense Mechanisms. Search on Bibsonomy ICAIS (1) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Fulvio Valenza Next Generation of Hybrid Threats. Search on Bibsonomy EICC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Mahmoud Abbasi, Marta Plaza-Hernández, Yeray Mezquita Security of IoT Application Layer: Requirements, Threats, and Solutions. Search on Bibsonomy ISAmI The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Maxli Campos, Elson Gomes, Raphael Machado Sensors for detection of cyber threats on industrial environment using a high interaction ICS/SCADA Honeynet1. Search on Bibsonomy MetroInd4.0& IoT The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Cinara Rocha, João Carvalho Artificial Intelligence in the Judiciary: Uses and Threats (short paper). Search on Bibsonomy EGOV-CeDEM-ePart-* The full citation details ... 2022 DBLP  BibTeX  RDF
11Ailyn Estevez, Noemí Perez, Juan Casanova-Cháfer, Eduard Llobet, Andoni Beriain RFID Gas Sensor for In-field Detection of Chemical Threats: Evaluation of batteryless discontinuous operation. Search on Bibsonomy IEEE SENSORS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Ayodeji Olalekan Salau, Wubetu Barud Demilie, Adedeji Tomide Akindadelo, Joy Nnenna Eneh Artificial Intelligence Technologies: Applications, Threats, and Future Opportunities. Search on Bibsonomy ACI@ISIC The full citation details ... 2022 DBLP  BibTeX  RDF
11Roa'a Aljuraid, Taghreed Justinia Classification of Challenges and Threats in Healthcare Cybersecurity: A Systematic Review. Search on Bibsonomy ICIMTH The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Dimitrios Lappas, George Fessakis, Panagiotis Karampelas Recognizing the Threats of Drone Surveillance. A Case Study. Search on Bibsonomy IVMSP The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
Displaying result #901 - #1000 of 4562 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license