The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for attackers with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1991-1999 (17) 2000-2001 (18) 2002 (24) 2003 (44) 2004 (80) 2005 (100) 2006 (134) 2007 (119) 2008 (162) 2009 (101) 2010 (28) 2011-2012 (22) 2013-2014 (29) 2015 (18) 2016 (27) 2017 (30) 2018 (33) 2019 (31) 2020 (34) 2021 (39) 2022 (36) 2023 (53) 2024 (10)
Publication types (Num. hits)
article(288) incollection(2) inproceedings(887) phdthesis(12)
Venues (Conferences, Journals, ...)
CoRR(57) CCS(22) IEEE Secur. Priv.(21) ACSAC(16) HICSS(13) ARES(12) RAID(12) SAC(12) S&P(11) DIMVA(10) AsiaCCS(9) INFOCOM(9) ESORICS(8) ICICS(8) IPDPS(8) CDC(7) More (+10 of total 544)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 962 occurrences of 560 keywords

Results
Found 1189 publication records. Showing 1189 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
66Tom Chothia, Dominic Duggan Type-Based Distributed Access Control vs. Untyped Attackers. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
50Jakob Eriksson, Michalis Faloutsos, Srikanth V. Krishnamurthy Routing amid Colluding Attackers. Search on Bibsonomy ICNP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
46Nicholas Weaver, Vern Paxson, Stuart Staniford, Robert K. Cunningham A taxonomy of computer worms. Search on Bibsonomy WORM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF mobile malicious code, taxonomy, motivation, attackers, computer worms
42Marios Mavronicolas, Vicky Papadopoulou, Anna Philippou, Paul G. Spirakis A Network Game with Attackers and a Defender. Search on Bibsonomy Algorithmica The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Attacks and defenses, Security, Game theory, Graph theory, Nash equilibria
42Sherif M. Khattab, Sameh Gobriel, Rami G. Melhem, Daniel Mossé Live Baiting for Service-Level DoS Attackers. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
42Ming-Hour Yang, Chien-Si Chiu, Shiuhpyng Shieh Tracing Mobile Attackers in Wireless Ad-Hoc Network. Search on Bibsonomy ICIW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
42Terence K. T. Law, John C. S. Lui, David K. Y. Yau You Can Run, But You Can't Hide: An Effective Statistical Methodology to Trace Back DDoS Attackers. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF attack traffic filtering, minimum stable time, DDoS attack, traceback
42Shravan K. Rayanchu, Gautam Barua Tracing Attackers with Deterministic Edge Router Marking (DERM). Search on Bibsonomy ICDCIT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
37Musard Balliu, Isabella Mastroeni A weakest precondition approach to active attacks analysis. Search on Bibsonomy PLAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF robustness, non-interference, declassification, program semantics, active attackers
35Yinuo Du, Baptiste Prébot, Xiaoli Xi, Cleotilde Gonzalez A Cyber-War Between Bots: Human-Like Attackers are More Challenging for Defenders than Deterministic Attackers. Search on Bibsonomy HICSS The full citation details ... 2023 DBLP  BibTeX  RDF
35Kelly Shortridge, Ryan Petrich Lamboozling Attackers: A New Generation of Deception: Software engineering teams can exploit attackers' human nature by building deception environments. Search on Bibsonomy ACM Queue The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
34Marios Mavronicolas, Burkhard Monien, Vicky G. Papadopoulou How Many Attackers Can Selfish Defenders Catch? Search on Bibsonomy HICSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
34K. T. Law, John C. S. Lui, David K. Y. Yau You Can Run, But You Can't Hide: An Effective Methodology to Traceback DDoS Attackers. Search on Bibsonomy MASCOTS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
33Jing Chen, Huanguo Zhang, Junhui Hu An Efficiency Security Model of Routing Protocol in Wireless Sensor Networks. Search on Bibsonomy Asia International Conference on Modelling and Simulation The full citation details ... 2008 DBLP  DOI  BibTeX  RDF sensor network, routing, security model
33M. N. Kishore Babu, A. Antony Franklin, C. Shiv Ram Murthy On the prevention of collusion attack in OLSR-based Mobile Ad hoc Networks. Search on Bibsonomy ICON The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Wei Yu 0003, Zhu Ji, K. J. Ray Liu Securing Cooperative Ad-Hoc Networks Under Noise and Imperfect Monitoring: Strategies and Game Theoretic Analysis. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
33Fumiaki Nagano, Kohei Tatara, Kouichi Sakurai, Toshihiro Tabata An Intrusion Detection System using Alteration of Data. Search on Bibsonomy AINA (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Marios Mavronicolas, Vicky G. Papadopoulou, Anna Philippou, Paul G. Spirakis Network Game with Attacker and Protector Entities. Search on Bibsonomy ISAAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
33Dan Dumitriu, Edward W. Knightly, Aleksandar Kuzmanovic, Ion Stoica, Willy Zwaenepoel Denial-of-service resilience in peer-to-peer file sharing systems. Search on Bibsonomy SIGMETRICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF file pollution, network-targeted attacks, peer-to-peer, denial of service
33Roberto Giacobazzi, Isabella Mastroeni Abstract non-interference: parameterizing non-interference by abstract interpretation. Search on Bibsonomy POPL The full citation details ... 2004 DBLP  DOI  BibTeX  RDF abstract interpretation, language-based security, non-interference, abstract domains
29Bruce Schneier Empathy and Security. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF security, attackers, Empathy, morality
29Mike Andrews, James A. Whittaker Computer Security. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF defense in depth, computer security, attackers, firewalls, vulnerability
26Matthew Carpenter, Tom Liston, Ed Skoudis Hiding Virtualization from Attackers and Malware. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Karin Sallhammar, Svein J. Knapskog, Bjarne E. Helvik Using Stochastic Game Theory to Compute the Expected Behavior of Attackers. Search on Bibsonomy SAINT Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Juan José Salazar González Extending Cell Suppression to Protect Tabular Data against Several Attackers. Search on Bibsonomy Inference Control in Statistical Databases The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
24Tyler Moore 0001, Richard Clayton 0001 Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing. Search on Bibsonomy Financial Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Gérard Wagener, Radu State, Alexandre Dulaunoy, Thomas Engel 0001 Self Adaptive High Interaction Honeypots Driven by Game Theory. Search on Bibsonomy SSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Virginia N. L. Franqueira, Raul H. C. Lopes, Pascal van Eck Multi-step attack modelling and simulation (MsAMS) framework based on mobile ambients. Search on Bibsonomy SAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF hypergraph, attack graph, vulnerability assessment, network attack
24Mao Lin Huang, Jie Liang 0004, Quang Vinh Nguyen A Visualization Approach for Frauds Detection in Financial Market. Search on Bibsonomy IV The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Ahren Studer, Adrian Perrig The Coremelt Attack. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Jie Yu 0008, Chengfang Fang, Liming Lu, Zhoujun Li 0001 A Lightweight Mechanism to Mitigate Application Layer DDoS Attacks. Search on Bibsonomy Infoscale The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Trust, DDoS Attacks, Lightweight, Application layer
24Hai Zhang, Xuyang Zhu, Wenming Guo TCP portscan detection based on single packet flows and entropy. Search on Bibsonomy ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF TCP portscan, single packet flows, entropy
24Jared Cordasco, Susanne Wetzel An attacker model for MANET routing security. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security, routing, ad-hoc, manet, attacker model
24Zhenhai Duan, Xin Yuan 0001, Jaideep Chandrashekar Controlling IP Spoofing through Interdomain Packet Filters. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Infrastructure Protection, Routing Protocols, BGP, DDoS, Network-level security and protection, IP Spoofing
24Nan Zhang 0004, Wei Yu 0002, Xinwen Fu, Sajal K. Das 0001 Towards Effective Defense Against Insider Attacks: The Establishment of Defender's Reputation. Search on Bibsonomy ICPADS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Shouhuai Xu Collaborative Attack vs. Collaborative Defense. Search on Bibsonomy CollaborateCom The full citation details ... 2008 DBLP  DOI  BibTeX  RDF collaborative attack, collaborative defense, cyber security, cyber attack
24Min Gyung Kang, Juan Caballero, Dawn Xiaodong Song Distributed Evasive Scan Techniques and Countermeasures. Search on Bibsonomy DIMVA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF scan detection, distributed scanning, information-hiding, evasion
24William Conner, Klara Nahrstedt Securing peer-to-peer media streaming systems from selfish and malicious behavior. Search on Bibsonomy Middleware (Doctoral Symposium) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, multimedia, peer-to-peer, accounting
24H. Vicky Zhao, K. J. Ray Liu Behavior forensics for scalable multiuser collusion: fairness versus effectiveness. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24H. Vicky Zhao, K. J. Ray Liu Traitor-Within-Traitor Behavior Forensics: Strategy and Risk Minimization. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Cliff Changchun Zou, Ryan Cunningham Honeypot-Aware Advanced Botnet Construction and Maintenance. Search on Bibsonomy DSN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Arjun Nambiar, Matthew K. Wright Salsa: a structured approach to large-scale anonymity. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF privacy, networks, peer-to-peer networks, anonymous communications
24Linfeng Zhang, Anthony G. Persaud, Alan Johnson, Yong Guan Detection of stepping stone attack under delay and chaff perturbations. Search on Bibsonomy IPCCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24William Zhu 0001, Clark D. Thomborson, Fei-Yue Wang 0001 Applications of Homomorphic Functions to Software Obfuscation. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Shirley Gaw, Edward W. Felten Password management strategies for online accounts. Search on Bibsonomy SOUPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF password reuse, security, survey, password, user behavior, password management
24Byung Ryong Kim, Ki-Chang Kim A Proposal of Extension of FMS-Based Mechanism to Find Attack Paths. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Marina Gelastou, Marios Mavronicolas, Vicky G. Papadopoulou, Anna Philippou, Paul G. Spirakis The Power of the Defender. Search on Bibsonomy ICDCS Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Xinwen Fu, Wei Yu 0002, Dan Cheng, Xuejun Tan, Kevin Streff, Steve Graham On Recognizing Virtual Honeypots and Countermeasures. Search on Bibsonomy DASC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Marios Mavronicolas, Vicky G. Papadopoulou, Anna Philippou, Paul G. Spirakis A Graph-Theoretic Network Security Game. Search on Bibsonomy WINE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Yuseung Sohn, Misung Cho, Giwon On, Kijoon Chae A Secure User Authentication Method in Networked Intelligent Manufacturing Systems. Search on Bibsonomy CW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Gregory J. Conti, Kulsoom Abdullah Passive visual fingerprinting of network attack tools. Search on Bibsonomy VizSEC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF application fingerprinting, network attack visualization, operating system fingerprinting, passive fingerprinting, visual fingerprinting, information visualization
24Dong Yu 0001, Deborah A. Frincke A Novel Framework for Alert Correlation and Understanding. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Tieyan Li, Wai-Meng Chew, Kwok-Yan Lam Defending against Distributed Denial of Service Attacks Using Resistant Mobile Agent Architecture. Search on Bibsonomy IPDPS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF attack resistant, mobile agents, intrusion detection systems, DoS attacks
18Ruiliang Deng, Zongying Shi, Yisheng Zhong Reach-Avoid Games With Two Cooperative Attackers: Value Function and Singular Surfaces. Search on Bibsonomy IEEE Trans. Aerosp. Electron. Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Hironori Uchibori, Katsunari Yoshioka, Kazumasa Omote Honeypot Method to Lure Attackers Without Holding Crypto-Assets. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Suman Sourav, Binbin Chen 0001 Exposing Hidden Attackers in Industrial Control Systems Using Micro-Distortions. Search on Bibsonomy IEEE Trans. Smart Grid The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Ruochen Tai, Liyong Lin, Rong Su 0001 On Decidability of Existence of Fortified Supervisors Against Covert Actuator Attackers. Search on Bibsonomy IEEE Trans. Autom. Control. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Kim Hammar, Rolf Stadler Learning Near-Optimal Intrusion Responses Against Dynamic Attackers. Search on Bibsonomy IEEE Trans. Netw. Serv. Manag. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Md Rayhanur Rahman, Setu Kumar Basak, Rezvan Mahdavi-Hezaveh, Laurie A. Williams Attackers reveal their arsenal: An investigation of adversarial techniques in CTI reports. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Hangsheng Zhang, Jiqiang Liu, Jinsong Dong CARE: Ensemble Adversarial Robustness Evaluation Against Adaptive Attackers for Security Applications. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Gideon Samid Finite Key OTP Functionality: Ciphers That Hold Off Attackers Smarter Than Their Designers. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
18Davinder Kaur, Suleyman Uslu, Mimoza Durresi, Arjan Durresi Artificial intelligence control for trust-based detection of attackers in 5G social networks. Search on Bibsonomy Comput. Intell. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Palvi Aggarwal, Saeefa Rubaiyet Nowmi, Yinuo Du, Cleotilde Gonzalez Evidence of Cognitive Biases in Cyber Attackers from An Empirical Study. Search on Bibsonomy HICSS The full citation details ... 2024 DBLP  BibTeX  RDF
18Haoxiang Ma, Shuo Han 0002, Charles A. Kamhoua, Jie Fu Optimizing Sensor Allocation Against Attackers With Uncertain Intentions: A Worst-Case Regret Minimization Approach. Search on Bibsonomy IEEE Control. Syst. Lett. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Amith Manoharan, P. B. Sujit NMPC-Based Cooperative Strategy to Lure Two Attackers Into Collision by Two Targets. Search on Bibsonomy IEEE Control. Syst. Lett. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Yuanhua Fu, Zhiming He Massive SSDF Attackers Identification in Cognitive Radio Networks by Using Consistent Property. Search on Bibsonomy IEEE Trans. Veh. Technol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Sandeep Patil, Lalita Admuthe, Meenakshi R. Patil SNTAM: secure neuro-fuzzy-based trusted neighbour selection and attackers detection in multipath ad-hoc network. Search on Bibsonomy Int. J. Internet Protoc. Technol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Li Liang, Jianan Wang, Fang Deng Targets-Attackers-Defenders Game via Pairwise Outcomes. Search on Bibsonomy Unmanned Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Xuewen Dong, Yuanyu Zhang, Yuanxiong Guo, Yanmin Gong 0001, Yulong Shen, Jianfeng Ma 0001 PRAM: A Practical Sybil-Proof Auction Mechanism for Dynamic Spectrum Access With Untruthful Attackers. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Yufeng Cai, Wenya Wang, Yicong Chen, Haijun Tan, Ning Xie 0007, Jiangzhou Wang Multiple Cooperative Attackers for Tag-Based Physical Layer Authentication. Search on Bibsonomy IEEE Commun. Mag. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18S. Lakshmi, E. A. Mary Anita, J. Jenefa A Hybrid Approach Against Black Hole Attackers Using Dynamic Threshold Value and Node Credibility. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Chaoqun Yang, Lei Mo, Xianghui Cao, Heng Zhang 0001, Zhiguo Shi 0001 A Labeled RFS-Based Framework for Multiple Integrity Attackers Detection and Identification in Cyber-Physical Systems. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18P. S. Nandhini, S. Kuppuswami, Subramaniam Malliga, R. Devi Priya Enhanced Rank Attack Detection Algorithm (E-RAD) for securing RPL-based IoT networks by early detection and isolation of rank attackers. Search on Bibsonomy J. Supercomput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Mana Azamat, Johann Schütz, Mathias Uslar Use cases also exist for attackers - how to foster the concept of misuse cases. Search on Bibsonomy Elektrotech. Informationstechnik The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Cong Zhang, Jie Wang 0047, Qingchen Liu, Weiming Fu, Wei Xing Zheng 0001 Optimal power control for sensors and DoS attackers over a fading channel network. Search on Bibsonomy J. Frankl. Inst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Ruochen Tai, Liyong Lin, Rong Su 0001 Synthesis of optimal covert sensor-actuator attackers for discrete-event systems. Search on Bibsonomy Autom. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Kim Hammar, Rolf Stadler Learning Near-Optimal Intrusion Responses Against Dynamic Attackers. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Lei Yuan, Ziqian Zhang, Ke Xue 0001, Hao Yin, Feng Chen 0042, Cong Guan, Lihe Li, Chao Qian 0001, Yang Yu 0001 Robust multi-agent coordination via evolutionary generation of auxiliary adversarial attackers. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Keane Lucas, Matthew Jagielski, Florian Tramèr, Lujo Bauer, Nicholas Carlini Randomness in ML Defenses Helps Persistent Attackers and Hinders Evaluators. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Cansu Dogan, Selim Yilmaz, Sevil Sen Assessing the Impact of Mobile Attackers on RPL-based Internet of Things. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Xuandong Zhao, Kexun Zhang, Yu-Xiang Wang 0003, Lei Li 0005 Generative Autoencoders as Watermark Attackers: Analyses of Vulnerabilities and Threats. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Hanyang Hu, Minh Bui, Mo Chen Multi-Agent Reach-Avoid Games: Two Attackers Versus One Defender and Mixed Integer Programming. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Suman Sourav, Binbin Chen 0001 Exposing Hidden Attackers in Industrial Control Systems using Micro-distortions. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Puning Zhao, Zhiguo Wan High Dimensional Distributed Gradient Descent with Arbitrary Number of Byzantine Attackers. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Rong Du, Qingqing Ye 0001, Yue Fu, Haibo Hu 0001, Jin Li 0002, Chengfang Fang, Jie Shi Differential Aggregation against General Colluding Attackers. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Haoxiang Ma, Shuo Han 0002, Charles A. Kamhoua, Jie Fu Optimizing Sensor Allocation against Attackers with Uncertain Intentions: A Worst-Case Regret Minimization Approach. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Ruochen Tai, Liyong Lin, Rong Su 0001 On Decidability of Existence of Fortified Supervisors Against Covert Actuator Attackers. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Md. Rayhanur Rahman, Rezvan Mahdavi-Hezaveh, Laurie A. Williams What Are the Attackers Doing Now? Automating Cyberthreat Intelligence Extraction from Text on Pace with the Changing Threat Landscape: A Survey. Search on Bibsonomy ACM Comput. Surv. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Fengxiang Yang, Juanjuan Weng, Zhun Zhong, Hong Liu 0009, Zheng Wang 0007, Zhiming Luo, Donglin Cao, Shaozi Li, Shin'ichi Satoh 0001, Nicu Sebe Towards Robust Person Re-Identification by Defending Against Universal Attackers. Search on Bibsonomy IEEE Trans. Pattern Anal. Mach. Intell. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Mary Ellen Zurko Unusable Security for Attackers [From the Editors]. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Chan Dai Truyen Thai, Thanh T. Tran, De-Thu Huynh Secure and opportunistic communication with interference cancellation against powerful and full-duplex attackers. Search on Bibsonomy Wirel. Networks The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Eric Dubois 0004, Ashley Peper, Laura A. Albert Interdicting Attack Plans with Boundedly Rational Players and Multiple Attackers: An Adversarial Risk Analysis Approach. Search on Bibsonomy Decis. Anal. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Gaoxin Qi, Jichao Li, Chi Xu, Gang Chen, Kewei Yang Attack-Defense Game Model with Multi-Type Attackers Considering Information Dilemma. Search on Bibsonomy Entropy The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Xu An Wang 0001, Lunhai Pan, Hao Liu, Xiaoyuan Yang 0002 Traitor Tracing Revisited: New Attackers, Stronger Security Model and New Construction. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
18Yaoqi Yang, Xianglin Wei, Renhui Xu, Weizheng Wang, Laixian Peng, Yangang Wang Jointly beam stealing attackers detection and localization without training: an image processing viewpoint. Search on Bibsonomy Frontiers Comput. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Cathryn Peoples, Adrian Moore 0001, Nektarios Georgalas The Design of Ethical Service-Level Agreements to Protect Cyber Attackers and Attackees. Search on Bibsonomy Emerging Trends in Cybersecurity Applications The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Torsten Krauß, Alexandra Dmitrienko MESAS: Poisoning Defense for Federated Learning Resilient against Adaptive Attackers. Search on Bibsonomy CCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Rong Du, Qingqing Ye 0001, Yue Fu, Haibo Hu 0001, Jin Li 0002, Chengfang Fang, Jie Shi Differential Aggregation against General Colluding Attackers. Search on Bibsonomy ICDE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Stanislava Ivanova, Naghmeh Moradpoor Fake PLC in the Cloud, We Thought the Attackers Believed that: How ICS Honeypot Deception Gets Impacted by Cloud Deployments? Search on Bibsonomy WFCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18He Zhu, Ce Li, Haitian Yang, Yan Wang 0081, Weiqing Huang Prompt Makes mask Language Models Better Adversarial Attackers. Search on Bibsonomy ICASSP The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 1189 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license