default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 26 matches
- 2023
- Cyril Onwubiko, Pierangelo Rosati, Aunshul Rege, Arnau Erola, Xavier J. A. Bellekens, Hanan Hindy, Martin Gilje Jaatun:
Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media, Cyber Science 2022, Wales, UK, June 20-21, 2022. Springer Proceedings in Complexity, Springer 2023, ISBN 978-981-19-6414-5 [contents] - 2022
- Aniket Agrawal, Kamalakanta Sethi, Padmalochan Bera:
Blockchain-Based Cardinal E-Voting System Using Biometrics, Watermarked QR Code and Partial Homomorphic Encryption. Cyber Science 2022: 411-436 - Rachel Bleiman, Jamie Williams, Aunshul Rege, Katorah Williams:
Exploring the MITRE ATT&CK® Matrix in SE Education. Cyber Science 2022: 133-149 - Clet Boudehenn, Jean-Christophe Cexus, Ramla Abdelkader, Maxence Lannuzel, Olivier Jacq, David Brosset, Abdel Boudraa:
Holistic Approach of Integrated Navigation Equipment for Cybersecurity at Sea. Cyber Science 2022: 75-86 - Paula Contreras:
The Transnational Dimension of Cybersecurity: The NIS Directive and Its Jurisdictional Challenges. Cyber Science 2022: 327-341 - Gonzalo Faura, Cezary Siewiersky, Irina Tal:
A User-Centric Evaluation of Smart Contract Analysis Tools in Decentralised Finance (DeFi). Cyber Science 2022: 453-476 - Joseph Kaberuka, Christopher W. Johnson:
Case Studies in the Socio-technical Analysis of Cybersecurity Incidents: Comparing Attacks on the UK NHS and Irish Healthcare Systems. Cyber Science 2022: 375-387 - Naghmeh Moradpoor, Masoud Barati, Andres Robles-Durazno, Ezra Abah, James McWhinnie:
Neutralizing Adversarial Machine Learning in Industrial Control Systems Using Blockchain. Cyber Science 2022: 437-451 - Robert Murimi, Sandra Blanke, Renita Murimi:
A Decade of Development of Mental Models in Cybersecurity and Lessons for the Future. Cyber Science 2022: 105-132 - Alan Paice, Sean McKeown:
Practical Cyber Threat Intelligence in the UK Energy Sector. Cyber Science 2022: 3-23 - Sachet Rajat Kumar Patil, Neil John, Poorvi Sameep Kunja, Anushka Dwivedi, S. Suganthi, Prasad B. Honnnavali:
Hardening Containers with Static and Dynamic Analysis. Cyber Science 2022: 207-227 - Joel Pinney, Fiona Carroll:
Uncertainty and Risk: Investigating Line Graph Aesthetic for Enhanced Cybersecurity Awareness. Cyber Science 2022: 245-253 - Georgios Potamos, Savvas Theodoulou, Eliana Stavrou, Stavros Stavrou:
Building Maritime Cybersecurity Capacity Against Ransomware Attacks. Cyber Science 2022: 87-101 - Aunshul Rege, Rachel Bleiman:
A Free and Community-Driven Critical Infrastructure Ransomware Dataset. Cyber Science 2022: 25-37 - Sandra Schmitz-Berndt:
Refining the Mandatory Cybersecurity Incident Reporting Under the NIS Directive 2.0: Event Types and Reporting Processes. Cyber Science 2022: 343-351 - Anjuli R. K. Shere, Jason R. C. Nurse, Andrew Martin:
Threats to Journalists from the Consumer Internet of Things. Cyber Science 2022: 303-326 - Robert Sherry, Ethan Bayne, David McLuskie:
Near-Ultrasonic Covert Channels Using Software-Defined Radio Techniques. Cyber Science 2022: 169-189 - Young Jin Shin:
A Study on the Development of Crisis Management Compliance by Personal Information Infringement Factors in Artificial Intelligence Service. Cyber Science 2022: 277-299 - Andrea Skytterholm, Guro Hotvedt:
Criteria for Realistic and Expedient Scenarios for Tabletop Exercises on Cyber Attacks Against Industrial Control Systems in the Petroleum Industry. Cyber Science 2022: 39-54 - Andrea Neverdal Skytterholm, Martin Gilje Jaatun:
Exploring the Need for a CERT for the Norwegian Construction Sector. Cyber Science 2022: 57-73 - Celestine Ugwu, Modesta Ezema, Uchenna Ome, Lizzy Ofusori, Comfort Olebera, Elochukwu Ukwandu:
A Study on the Impact of Gender, Employment Status, and Academic Discipline on Cyber-Hygiene: A Case Study of University of Nigeria, Nsukka. Cyber Science 2022: 389-407 - Elochukwu Ukwandu, Ephraim N. C. Okafor, Charles Ikerionwu, Comfort Olebara, Celestine Ugwu:
Assessing Cyber-Security Readiness of Nigeria to Industry 4.0. Cyber Science 2022: 355-374 - Arnstein Vestad, Bian Yang:
Municipal Cybersecurity - A Neglected Research Area? A Survey of Current Research. Cyber Science 2022: 151-165 - Richard Wheeler, Fiona Carroll:
An Explainable AI Solution: Exploring Extended Reality as a Way to Make Artificial Intelligence More Transparent and Trustworthy. Cyber Science 2022: 255-276 - Cimone Wright-Hamor, Steffanie Bisinger, Jeffrey Neel, Benjamin A. Blakely, Nathaniel Evans:
A Preventative Moving Target Defense Solution for Web Servers Using Iptables. Cyber Science 2022: 191-205 - Arman Zand, Eckhard Pfluegel:
Efficient Cyber-Evidence Sharing Using Zero-Knowledge Proofs. Cyber Science 2022: 229-242
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-23 04:10 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint