default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 397 matches
- 2024
- Sani M. Abdullahi, Sanja Lazarova-Molnar:
Toward a Unified Security Framework for Digital Twin Architectures. CSR 2024: 612-617 - Sezen Acur, Teun Hendriks:
The Need for Cyber-Resilience in Complex Systems. CSR 2024: 480-485 - Fahad Ahmad, Katerina Kanta, Stavros Shiaeles, Afia Naeem, Zarnab Khalid, Kainaat Mahboob:
Enhancing ATM Security Management in the Post-Quantum Era with Quantum Key Distribution. CSR 2024: 329-334 - Mohammed M. Alani, Ali Ismail Awad, Ezedin Barka:
A Hybrid Ensemble Learning-Based Intrusion Detection System for the Internet of Things. CSR 2024: 1-8 - Fatimah Aloraini, Amir Javed:
Adversarial Attacks in Intrusion Detection Systems: Triggering False Alarms in Connected and Autonomous Vehicles. CSR 2024: 714-719 - Yazeed Alrowaili, Neetesh Saxena, Pete Burnap:
Towards Developing an Asset-Criticality Identification Framework in Smart Grids. CSR 2024: 720-725 - Sri Haritha Ambati, Norah Ridley, Enrico Branca, Natalia Stakhanova:
Navigating (in)Security of AI-Generated Code. CSR 2024: 1-8 - Mohamed Amjath, Shagufta Henna:
Rényi Differential Privacy Analysis of Skellam Under Federated Learning in Internet of Health Things. CSR 2024: 427-431 - Georgios Andronikidis, Charis Eleftheriadis, Zisis Batzos, Konstantinos Kyranou, Nikolaos Maropoulos, Gohar Sargsyan, Panagiotis I. Radoglou-Grammatikis, Panagiotis G. Sarigiannidis:
AI-Driven Anomaly and Intrusion Detection in Energy Systems: Current Trends and Future Direction. CSR 2024: 777-782 - Alì Aghazadeh Ardebili, Antonella Longo, Antonio Ficarella:
Enhancing Cyber-Physical Security: Integrating Virtual Fences Within Digital Twins. CSR 2024: 630-637 - Jan von der Assen, Jasmin Hochuli, Thomas Grübl, Burkhard Stiller:
The Danger Within: Insider Threat Modeling Using Business Process Models. CSR 2024: 186-192 - Jan von der Assen, Jamo Sharif, Chao Feng, Christian Killer, Gérôme Bovet, Burkhard Stiller:
Asset-Centric Threat Modeling for AI-Based Systems. CSR 2024: 437-444 - Salvatore Barone, Valentina Casola, Salvatore Della Torca:
Ineffectiveness of Digital Transformations for Detecting Adversarial Attacks Against Quantized and Approximate CNNs. CSR 2024: 290-295 - Emanuele Bellini, Emiliano Degl'Innocenti:
Transitioning SSH European Research Infrastructures to Critical Infrastructure Through Resilience. CSR 2024: 801-806 - Stanislas G. Bianou, Rodrigue G. Batogna:
PENTEST-AI, an LLM-Powered Multi-Agents Framework for Penetration Testing Automation Leveraging Mitre Attack. CSR 2024: 763-770 - Silvia Bonomi, Marco Cuoci, Simone Lenti:
A Version-Based Algorithm for Quality Enhancement of Automatically Generated Vulnerability Inventories. CSR 2024: 76-81 - Margherita Bottoni, Emanuele Bellini, Emeri Farinetti:
Towards a Reputational-Based Trustworthy Archaeological Information System. CSR 2024: 795-800 - Myria Bouhaddi, Kamel Adi:
When Rewards Deceive: Counteracting Reward Poisoning on Online Deep Reinforcement Learning. CSR 2024: 38-44 - Daniele Bringhenti, Francesco Pizzato, Riccardo Sisto, Fulvio Valenza:
A Looping Process for Cyberattack Mitigation. CSR 2024: 276-281 - Daniel Brown, Natalija Vlajic:
Novel Approach to Tor User De-Anonymization: Client-Side Generated Watermark. CSR 2024: 90-95 - Utku Budak, Fabrizio De Santis, Georg Sigl:
A Lightweight Firmware Resilience Engine for IoT Devices Leveraging Minimal Processor Features. CSR 2024: 486-491 - Cesare Caratozzolo, Valeria Rossi, Kamil Witek, Alberto Trombetta, Massimo Caccia:
On-line Anomaly Detection and Qualification of Random Bit Streams. CSR 2024: 897-904 - Paolo Ceravolo, Fatemeh Mohammadi, Marta Annamaria Tamborini:
Active Learning Methodology in LLMs Fine-Tuning. CSR 2024: 743-749 - Cyprien de la Vergne de Cerval, Eric Perret, Jonathan Sarrazin, Olivier Fichot, Vincent E. Urias, William M. S. Stout, Shadya B. Maldonado Rosado:
DIONYSUS - Deception Networks for the Cybersecurity of Physical Protection Systems. CSR 2024: 1-6 - Robert Andrew Chetwyn, Martin Eian, Audun Jøsang:
Onto Hunt - A Semantic Reasoning Approach to Cyber Threat Hunting with Indicators of Behaviour. CSR 2024: 853-859 - Luca Chianese, Daniele Granata, Paolo Palmiero, Massimiliano Rak:
Leveraging Threat Modelling for Effective Penetration Testing in 5G Systems. CSR 2024: 180-185 - F. Z. Chriki, E. Simó, Francesc Aguiló, I. Garcia-Milà, X. Masip:
A Deep Learning Framework for Safety Monitoring of a Railway Section. CSR 2024: 1-6 - Alexis Coca, Fudong Li, Stavros Shiaeles, Deha Wu, Fan Liu:
The Effect of Privacy Concerns, Interaction, Trust, Age, and Gender on Self-Disclosure Behaviours on Social Networking Sites. CSR 2024: 551-556 - Jasmin Cosic, Admir Jukan, Miroslav Baca:
Strengthening Cybersecurity Certifications Through Robust Chain of Custody Practices. CSR 2024: 570-574 - Marius Cotiga, Jens Myrup Pedersen, Edlira Dushku:
Cyber Resilience in OT: Characteristics and Security Challenges. CSR 2024: 750-756
skipping 367 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-14 01:11 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint