|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 147 occurrences of 110 keywords
|
|
|
Results
Found 1184 publication records. Showing 1184 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
89 | Nong Ye, Toni Farley, Deepak Lakshminarasimhan |
An attack-norm separation approach for detecting cyber attacks. |
Inf. Syst. Frontiers |
2006 |
DBLP DOI BibTeX RDF |
Computer and network security, Intrusion detection, Signal processing, Signal detection, Cyber attacks |
83 | Peeter Lorents, Rain Ottis, Raul Rikk |
Cyber Society and Cooperative Cyber Defence. |
HCI (14) |
2009 |
DBLP DOI BibTeX RDF |
cyber society, cooperative cyber defence, CCD COE, Knowledge, information, cyber attacks |
70 | Flora S. Tsai, Kap Luk Chan |
Detecting Cyber Security Threats in Weblogs Using Probabilistic Models. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
cyber terrorism, data mining, blog, weblog, probabilistic latent semantic analysis, cyber security, cyber crime |
67 | Leonard Kwan, Pradeep Ray, Greg Stephens |
Towards a Methodology for Profiling Cyber Criminals. |
HICSS |
2008 |
DBLP DOI BibTeX RDF |
|
58 | Srinivas Mukkamala, Andrew H. Sung |
Computational Intelligent Techniques for Detecting Denial of Service Attacks. |
IEA/AIE |
2004 |
DBLP DOI BibTeX RDF |
|
53 | Ahmed Zeeshan, Anwar M. Masood, Zafar M. Faisal, Azam Kalim, Naheed Farzana |
PrISM: Automatic Detection and Prevention from Cyber Attacks. |
IMTIC |
2008 |
DBLP DOI BibTeX RDF |
Information Security Management System, Intrusion Detection, Network security, Computer Security, Intrusion Prevention |
52 | Nong Ye, Yebin Zhang, Connie M. Borror |
Robustness of the Markov-chain model for cyber-attack detection. |
IEEE Trans. Reliab. |
2004 |
DBLP DOI BibTeX RDF |
|
50 | Sai Ho Kwok, Anthony C. T. Lai, Jason C. K. Yeung |
A study of online service and information exposure of public companies. |
KDD Workshop on CyberSecurity and Intelligence Informatics |
2009 |
DBLP DOI BibTeX RDF |
malicious hackers, public company, public server, web server, ports, cyber security |
48 | Shouhuai Xu |
Collaborative Attack vs. Collaborative Defense. |
CollaborateCom |
2008 |
DBLP DOI BibTeX RDF |
collaborative attack, collaborative defense, cyber security, cyber attack |
46 | Gregory B. White |
The Community Cyber Security Maturity Model. |
HICSS |
2007 |
DBLP DOI BibTeX RDF |
|
43 | Natalie Granado, Gregory White 0001 |
Cyber Security and Government Fusion Centers. |
HICSS |
2008 |
DBLP DOI BibTeX RDF |
|
43 | Carl Livadas, Robert Walsh, David E. Lapsley, W. Timothy Strayer |
Using Machine Learning Techniques to Identify Botnet Traffic. |
LCN |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Shangping Ren, Kevin A. Kwiat |
A Non-Intrusive Approach to Enhance Legacy Embedded Control Systems with Cyber Protection Features. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
legacy control systems, behavior observation, feedback loop |
40 | Kun Xiao, Shangping Ren, Kevin A. Kwiat |
Retrofitting Cyber Physical Systems for Survivability through External Coordination. |
HICSS |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Jang-Se Lee, Jung-Rae Jung, Jong Sou Park, Sung-Do Chi |
Linux-Based System Modelling for Cyber-attack Simulation. |
AIS |
2004 |
DBLP DOI BibTeX RDF |
|
35 | Byoung-Joon Min, Seung Hwan Yoo, Jongho Ryu, Dong Il Seo |
Return on Security Investment Against Cyber Attacks on Availability. |
ICCSA (2) |
2006 |
DBLP DOI BibTeX RDF |
|
34 | John Hale, Paul Brusil |
Secur(e/ity) Management: A Continuing Uphill Climb. |
J. Netw. Syst. Manag. |
2007 |
DBLP DOI BibTeX RDF |
Security industry, Information assurance, Security management, Secure management, Security metrics, Enterprise networks |
34 | Gregory B. White, David J. DiCenso |
Information Sharing Needs for National Security. |
HICSS |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Andrew H. Sung, Srinivas Mukkamala |
The Feature Selection and Intrusion Detection Problems. |
ASIAN |
2004 |
DBLP DOI BibTeX RDF |
|
31 | James Bret Michael, Thomas C. Wingfield, Duminda Wijesekera |
Measured Responses to Cyber Attacks Using Schmitt Analysis: A Case Study of Attack Scenarios for a Software-Intensive System. |
COMPSAC |
2003 |
DBLP DOI BibTeX RDF |
|
31 | Jon B. Weissman, Vipin Kumar 0001, Varun Chandola, Eric Eilertson, Levent Ertöz, György J. Simon, Seonho Kim, Jinoh Kim |
DDDAS/ITR: A Data Mining and Exploration Middleware for Grid and Distributed Computing. |
International Conference on Computational Science (1) |
2007 |
DBLP DOI BibTeX RDF |
Data mining, Grid Computing |
31 | Dan Li 0002, Kefei Wang, Jitender S. Deogun |
A Fuzzy Anomaly Detection System. |
WISI |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Abhrajit Ghosh, Larry Wong, Giovanni Di Crescenzo, Rajesh Talpade |
InFilter: Predictive Ingress Filtering to Detect Spoofed IP Traffic. |
ICDCS Workshops |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Srinivas Mukkamala, Andrew H. Sung |
A Comparative Study of Techniques for Intrusion Detection. |
ICTAI |
2003 |
DBLP DOI BibTeX RDF |
intrusion detection, information security, AI techniques |
29 | Meng Yu 0001, Peng Liu 0005, Wanyu Zang, Sushil Jajodia |
Trusted Recovery. |
Secure Data Management in Decentralized Systems |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Harjinder Singh Lallie 0001, Lynsay A. Shepherd, Jason R. C. Nurse, Arnau Erola, Gregory Epiphaniou, Carsten Maple, Xavier J. A. Bellekens |
Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. |
Comput. Secur. |
2021 |
DBLP DOI BibTeX RDF |
|
25 | Harjinder Singh Lallie 0001, Lynsay A. Shepherd, Jason R. C. Nurse, Arnau Erola, Gregory Epiphaniou, Carsten Maple, Xavier J. A. Bellekens |
Cyber Security in the Age of COVID-19: A Timeline and Analysis of Cyber-Crime and Cyber-Attacks during the Pandemic. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
25 | Barbara Endicott-Popovsky, Julia Narvaez, Christian Seifert, Deborah A. Frincke, Lori Ross O'Neil, Chiraag Uday Aval |
Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks. |
HCI (16) |
2009 |
DBLP DOI BibTeX RDF |
counter-deception, honeypots, deception, drive-by-downloads, cyber-attacks |
25 | Natalia Stakhanova, Oleg Stakhanov, Ali A. Ghorbani 0001 |
A Behavioral Model of Ideologically-motivated "Snowball" Attacks. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
ideological attacks, conceptual model, cyber attacks |
25 | Nong Ye |
QoS-Centric Stateful Resource Management in Information Systems. |
Inf. Syst. Frontiers |
2002 |
DBLP DOI BibTeX RDF |
quality of service, internet, information systems, resource management, cyber attacks |
25 | Daniel Barbará, Julia Couto 0001, Sushil Jajodia, Ningning Wu |
ADAM: A Testbed for Exploring the Use of Data Mining in Intrusion Detection. |
SIGMOD Rec. |
2001 |
DBLP DOI BibTeX RDF |
intrusion detection software, data mining, pattern analysis, cyber attacks |
25 | Yang Li 0002, Li Guo 0001 |
TCM-KNN scheme for network anomaly detection using feature-based optimizations. |
SAC |
2008 |
DBLP DOI BibTeX RDF |
TCM-KNN algorithm, feature selection, network security, anomaly detection, feature weight |
25 | Rami Puzis, Marius David Klippel, Yuval Elovici, Shlomi Dolev |
Optimization of NIDS Placement for Protection of Intercommunicating Critical Infrastructures. |
EuroISI |
2008 |
DBLP DOI BibTeX RDF |
communication infrastructure protection, NIDS placement, epidemic models |
25 | Barry E. Mullins, Timothy H. Lacey, Robert F. Mills, Joseph M. Trechter, Samuel D. Bass |
The Impact of the NSA Cyber Defense Exercise on the Curriculum at the Air Force Institute of Technology. |
HICSS |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Moses Garuba, Anteneh Girma |
Impact Of External Security Measures On Data Access Implementation With Online Database Management System. |
ITCC (1) |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Ariel Futoransky, Fernando Miranda, José Ignacio Orlicki, Carlos Sarraute |
Simulating cyber-attacks for fun and profit. |
SimuTools |
2009 |
DBLP DOI BibTeX RDF |
0-day, network security, training, network simulation, vulnerability, exploit, penetration test, cyber-attack |
25 | Young-Gab Kim, Taek Lee, Hoh Peter In, Yoon Jung Chung, In-Jung Kim, Doo-Kwon Baik |
A Probabilistic Approach to Estimate the Damage Propagation of Cyber Attacks. |
ICISC |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Mahdi Taheri, Khashayar Khorasani, Nader Meskin |
The Security Requirement to Prevent Zero Dynamics Attacks and Perfectly Undetectable Cyber-Attacks in Cyber-Physical Systems. |
CDC |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Qingyu Su, Handong Wang, Chaowei Sun, Bo Li, Jian Li 0026 |
Cyber-attacks against cyber-physical power systems security: State estimation, attacks reconstruction and defense strategy. |
Appl. Math. Comput. |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Dan Peng, Zhicai Shi, Longming Tao, Wu Ma |
Enhanced and Authenticated Deterministic Packet Marking for IP Traceback. |
APPT |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Keisuke Takemori, Yutaka Miyake, Chie Ishida, Iwao Sasase |
A SOC Framework for ISP Federation and Attack Forecast by Learning Propagation Patterns. |
ISI |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Kymie M. C. Tan, Kevin S. Killourhy, Roy A. Maxion |
Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits. |
RAID |
2002 |
DBLP DOI BibTeX RDF |
|
22 | Kristopher Daley, Ryan Larson, Jerald Dawkins |
A Structural Framework for Modeling Multi-Stage Network Attacks. |
ICPP Workshops |
2002 |
DBLP DOI BibTeX RDF |
|
22 | Greg Aaron, Katharine A. Bostik, Rod Rasmussen, Edmon Chung |
Protecting the web: phishing, malware, and other security threats. |
WWW |
2008 |
DBLP DOI BibTeX RDF |
security, dns |
22 | Dong-Joo Kang, Hak-Man Kim |
A Method for Determination of Key Distribution Period Using QoS Function. |
FGCN (2) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Robert G. Cole, Nam Phamdo, Moheeb Abu Rajab, Andreas Terzis |
Requirements on Worm Mitigation Technologies in MANETS. |
PADS |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Claudio Mazzariello, Carlo Sansone |
Anomaly-Based Detection of IRC Botnets by Means of One-Class Support Vector Classifiers. |
ICIAP |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Syed Obaid Amin, Muhammad Shoaib Siddiqui, Choong Seon Hong |
A novel IPv6 traceback architecture using COPS protocol. |
Ann. des Télécommunications |
2008 |
DBLP DOI BibTeX RDF |
Network security, Network management, IPv6, DDoS, Traceback |
19 | Zonghua Zhang, Ruo Ando, Youki Kadobayashi |
Hardening Botnet by a Rational Botmaster. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
intrusion detection, Network security, malware, botnet |
19 | Qijun Gu, Rizwan Noorani |
Towards self-propagate mal-packets in sensor networks. |
WISEC |
2008 |
DBLP DOI BibTeX RDF |
mal-packet, sensor worm, buffer overflow, control flow |
19 | Habib Ullah Baig, Farrukh Kamran |
Detection of Port and Network Scan Using Time Independent Feature Set. |
ISI |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Ji Wu 0006, Chaoqun Ye, Shiyao Jin |
Adversarial Organization Modeling for Network Attack/Defense. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Dong-Soo Kim, Y. J. Jung, Tai-Myung Chung |
PRISM: A Preventive and Risk-Reducing Integrated Security Management Model Using Security Label. |
J. Supercomput. |
2005 |
DBLP DOI BibTeX RDF |
security management, security label, ESM, ISM |
19 | Michael Atighetchi, Partha P. Pal, Franklin Webber, Christopher C. Jones |
Adaptive Use of Network-Centric Mechanisms in Cyber-Defense. |
NCA |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Michael Atighetchi, Partha P. Pal, Franklin Webber, Christopher C. Jones |
Adaptive Use of Network-Centric Mechanisms in Cyber-Defense. |
ISORC |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Xiangxing Kong, Zhigang Lu 0003, Xiaoqiang Guo, Jiangfeng Zhang, Huifeng Li |
Resilience Evaluation of Cyber-Physical Power System Considering Cyber Attacks. |
IEEE Trans. Reliab. |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Yajing Ma, Yuan Wang, Zhanjie Li, Xiangpeng Xie |
Event-triggered finite-time command-filtered tracking control for nonlinear time-delay cyber physical systems against cyber attacks. |
Frontiers Inf. Technol. Electron. Eng. |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Naveen Tatipatri, S. L. Arun |
A Comprehensive Review on Cyber-Attacks in Power Systems: Impact Analysis, Detection, and Cyber Security. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Lanxin Wang, Yue Long, Tieshan Li, Hanqing Yang 0001, C. L. Philip Chen |
Asynchronous attack tolerant control for Markov jump cyber-physical systems under hybrid cyber-attacks. |
Appl. Math. Comput. |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Zhi Feng, Guoqiang Hu 0001 |
Attack-Resilient Distributed Convex Optimization of Cyber-Physical Systems Against Malicious Cyber-Attacks Over Random Digraphs. |
IEEE Internet Things J. |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Jinghua Guo, Lubin Li, Jingyao Wang, Keqiang Li |
Cyber-Physical System-Based Path Tracking Control of Autonomous Vehicles Under Cyber-Attacks. |
IEEE Trans. Ind. Informatics |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Valentyn Sobchuk, Oleg Barabash, Andrii Musienko, Iryna Tsyganivska, Oleksandr Kurylko |
Mathematical Model of Cyber Risks Management Based on the Expansion of Piecewise Continuous Analytical Approximation Functions of Cyber Attacks in the Fourier Series. |
Axioms |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Zhaoxia Peng, Yingwen Zhang, Guoguang Wen, Jinhuan Wang, Tingwen Huang |
Resilient Output Consensus to Cyber-Attacks in Continuous-Time Cyber-Physical Systems. |
IEEE Trans. Netw. Sci. Eng. |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Wende Luo, Linlin Hou, Kaibo Shi |
Event-triggered dynamic output feedback control of switched cyber-physical systems with stochastic cyber attacks. |
J. Syst. Control. Eng. |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Dario Stabili, Raffaele Romagnoli, Mirco Marchetti, Bruno Sinopoli, Michele Colajanni |
A multidisciplinary detection system for cyber attacks on Powertrain Cyber Physical Systems. |
Future Gener. Comput. Syst. |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Dmytro S. Morozov, Tetiana A. Vakaliuk, Andrii A. Yefimenko, Tetiana M. Nikitchuk, Roman O. Kolomiiets |
Honeypot and cyber deception as a tool for detecting cyber attacks on critical infrastructure. |
doors |
2023 |
DBLP BibTeX RDF |
|
19 | Kadir Korkmaz 0001 |
Securing the blockchain against IoT cyber attacks. (Protection de la Blockchain IoT face aux cyber attaques). |
|
2023 |
RDF |
|
19 | Akashdeep Bhardwaj, Mohammad Dahman Alshehri, Keshav Kaushik, Hasan J. Alyamani, Manoj Kumar 0009 |
Secure framework against cyber attacks on cyber-physical robotic systems. |
J. Electronic Imaging |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Keith S. Jones, Natalie R. Lodinger, Benjamin P. Widlus, Akbar Siami Namin, Emily Maw, Miriam Armstrong |
Grouping and Determining Perceived Severity of Cyber-Attack Consequences: Gaining Information Needed to Sonify Cyber-Attacks. |
J. Multimodal User Interfaces |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Abbas Nemati, Mansour Peimani, Saleh Mobayen, Sayyedjavad Sayyedfattahi |
Adaptive non-singular finite time control of nonlinear disturbed cyber-physical systems with actuator cyber-attacks and time-varying delays. |
Inf. Sci. |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Yue Zhao, Chunjie Zhou, Yu-Chu Tian, Yuanqing Qin, Xiaoya Hu |
$L_2$ Gain Secure Control of Cyber-Physical Systems Under Fast Time-Varying Cyber Attacks. |
IEEE Trans. Netw. Sci. Eng. |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Rasmi Vlad Mahmoud, Marios Anagnostopoulos, Jens Myrup Pedersen |
Detecting Cyber Attacks through Measurements: Learnings from a Cyber Range. |
IEEE Instrum. Meas. Mag. |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Aaisha Makkar, Jong Hyuk Park |
SecureCPS: Cognitive inspired framework for detection of cyber attacks in cyber-physical systems. |
Inf. Process. Manag. |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Lijuan Zha, Rongfei Liao, Jinliang Liu, Jinde Cao, Xiangpeng Xie |
Dynamic event-triggered security control of cyber-physical systems against missing measurements and cyber-attacks. |
Neurocomputing |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Bingjun Wan, Chengwei Xu, Rajendra Prasad Mahapatra, P. Selvaraj |
Understanding the Cyber-Physical System in International Stadiums for Security in the Network from Cyber-Attacks and Adversaries using AI. |
Wirel. Pers. Commun. |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Eleftherios E. Vlahakis, Gregory M. Provan, Gordon Werner, Shanchieh Yang, Nikolaos Athanasopoulos |
Quantifying impact on safety from cyber-attacks on cyber-physical systems. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Dario Stabili, Raffaele Romagnoli, Mirco Marchetti, Bruno Sinopoli, Michele Colajanni |
Exploring the consequences of cyber attacks on Powertrain Cyber Physical Systems. |
CoRR |
2022 |
DBLP BibTeX RDF |
|
19 | Tala Talaei Khoei, Hadjar Ould Slimane, Naima Kaabouch |
A Comprehensive Survey on the Cyber-Security of Smart Grids: Cyber-Attacks, Detection, Countermeasure Techniques, and Future Directions. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Bruno Fischer, Dirk Meissner, Richard Nyuur, David Sarpong |
Guest Editorial: Cyber-Attacks, Strategic Cyber-Foresight, and Security. |
IEEE Trans. Engineering Management |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Wenli Duo, MengChu Zhou, Abdullah Abusorrah |
A Survey of Cyber Attacks on Cyber Physical Systems: Recent Advances and Challenges. |
IEEE CAA J. Autom. Sinica |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Maryam Farajzadeh-Zanjani, Ehsan Hallaji, Roozbeh Razavi-Far, Mehrdad Saif |
Generative-Adversarial Class-Imbalance Learning for Classifying Cyber-Attacks and Faults - A Cyber-Physical Power System. |
IEEE Trans. Dependable Secur. Comput. |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Fereidoun Moradi, Maryam Bagheri 0001, Hanieh Rahmati, Hamed Yazdi, Sara Abbaspour Asadollah, Marjan Sirjani |
Monitoring Cyber-Physical Systems Using a Tiny Twin to Prevent Cyber-Attacks. |
SPIN |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Mahdi Taheri, Khashayar Khorasani, Nader Meskin, Iman Shames |
Data-Driven Koopman Operator Based Cyber-Attacks for Nonlinear Control Affine Cyber-Physical Systems. |
CDC |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Kang-Di Lu, Zheng-Guang Wu |
An Ensemble Learning-Based Cyber-Attacks Detection Method of Cyber-Physical Power Systems. |
ICARM |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Rasim M. Alguliyev, Yadigar N. Imamverdiyev, Lyudmila V. Sukhostat |
Hybrid DeepGCL model for cyber-attacks detection on cyber-physical systems. |
Neural Comput. Appl. |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Amir Namavar Jahromi, Hadis Karimipour, Ali Dehghantanha, Kim-Kwang Raymond Choo |
Toward Detection and Attribution of Cyber-Attacks in IoT-Enabled Cyber-Physical Systems. |
IEEE Internet Things J. |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Peter R. J. Trim, Yang-Im Lee |
The Global Cyber Security Model: Counteracting Cyber Attacks through a Resilient Partnership Arrangement. |
Big Data Cogn. Comput. |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Xinrui Liu, Yuan Meng, Peng Chang |
Node Importance Evaluation of Cyber-Physical System under Cyber-Attacks Spreading. |
Complex. |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Ziwen Sun, Shuguo Zhang |
Modeling of Security Risk for Industrial Cyber-Physics System under Cyber-attacks. |
ICPS |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Mahdi Taheri, Khashayar Khorasani, Iman Shames, Nader Meskin |
Towards Privacy Preserving Consensus Control in Multi-Agent Cyber-Physical Systems Subject to Cyber Attacks. |
ECC |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Jokha Ali |
Intrusion Detection Systems Trends to Counteract Growing Cyber-Attacks on Cyber-Physical Systems. |
ACIT |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Zengji Liu, Qi Wang 0035, Yi Tang 0009 |
Design of a Cosimulation Platform With Hardware-in-the-Loop for Cyber-Attacks on Cyber-Physical Power Systems. |
IEEE Access |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Mahdi Taheri, Khashayar Khorasani, Iman Shames, Nader Meskin |
Undetectable Cyber Attacks on Communication Links in Multi-Agent Cyber-Physical Systems. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
19 | Ashraf Tantawy, Sherif Abdelwahed, Abdelkarim Erradi |
Cyber LOPA: A New Approach for CPS Safety Design in the Presence of Cyber Attacks. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
19 | Sheng Xu, Yongxiang Xia, Hui-Liang Shen |
Analysis of Malware-Induced Cyber Attacks in Cyber-Physical Power Systems. |
IEEE Trans. Circuits Syst. |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Mahdi Taheri, Khashayar Khorasani, Iman Shames, Nader Meskin |
Undetectable Cyber Attacks on Communication Links in Multi-Agent Cyber-Physical Systems. |
CDC |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Michaël Timbert |
Protections des processeurs contre les cyber-attaques par vérification de l'intégrité du flot d'exécution. (Protections of processors against cyber attacks by control flow checking). |
|
2020 |
RDF |
|
19 | Rong Lai, Xiaoyu Qiu, Jiajing Wu |
Robustness of Asymmetric Cyber-Physical Power Systems Against Cyber Attacks. |
IEEE Access |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Tianlei Zang, Shibin Gao, Baoxu Liu, Tao Huang 0002, Tao Wang 0029, Xiaoguang Wei |
Integrated fault propagation model based vulnerability assessment of the electrical cyber-physical system under cyber attacks. |
Reliab. Eng. Syst. Saf. |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Arif Sari |
Turkish national cyber-firewall to mitigate countrywide cyber-attacks. |
Comput. Electr. Eng. |
2019 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 1184 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|