Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
106 | Brian A. Pashel |
Teaching students to hack: ethical implications in teaching students to hack at the university level. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
ethical hacking, student misuse, teaching hacking, hacking |
102 | Lisa Lancor, Robert Workman |
Using google hacking to enhance defense strategies. |
SIGCSE |
2007 |
DBLP DOI BibTeX RDF |
Google hacking, education, information security, information assurance, web security, hacking |
66 | Tzer-Shyong Chen, Fuh-Gwo Jeng, Yu-Chia Liu |
Hacking Tricks Toward Security on Network Environments. |
PDCAT |
2006 |
DBLP DOI BibTeX RDF |
Hacking tricks, Trojan programs, Intrusion detection system, Firewall, Phishing |
56 | Hangbae Chang, Kyung-kyu Kim, Hosin David Lee, Jungduk Kim |
The Design and Development of a Secure Keystroke System for u Business. |
ICCSA (4) |
2006 |
DBLP DOI BibTeX RDF |
|
52 | Eric Clark |
Hacking as a form of "self-improvement". |
ITiCSE |
2005 |
DBLP DOI BibTeX RDF |
cell phones, digital cameras, firmware, hacking, DVDs |
49 | Youngtae Yun, Sangseo Park, Yosik Kim, Jaecheol Ryou 0001 |
A Design and Implementation of Profile Based Web Application Securing Proxy. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
Web application, Anomaly detection, Proxy, Hacking |
45 | Jörg Preuß, Steven Furnell, Maria Papadaki |
Considering the potential of criminal profiling to combat hacking. |
J. Comput. Virol. |
2007 |
DBLP DOI BibTeX RDF |
|
45 | Syed A. Saleem |
Ethical hacking as a risk management technique. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
ethical hacker, white hat hacker, network security, information security, computer security, system security |
45 | Jia Wang, Insup Lee 0001 |
Measuring False-Positive by Automated Real-Time Correlated Hacking Behavior Analysis. |
ISC |
2001 |
DBLP DOI BibTeX RDF |
|
45 | Yang-Seo Choi, Dong-il Seo, Sung Won Sohn |
A New Stack Buffer Overflow Hacking Defense Technique with Memory Address Confirmation. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
|
42 | Ghi Paul Im, Richard L. Baskerville |
A longitudinal study of information system threat categories: the enduring problem of human error. |
Data Base |
2005 |
DBLP DOI BibTeX RDF |
information infrastructure protection, information system threat, information system threat taxonomy, software quality and reliability, information security, computer security, human error, software defects |
38 | Coen Hacking, Hilde Verbeek 0002, Jan P. H. Hamers, Sil Aarts |
The development of an automatic speech recognition model using interview data from long-term care for older adults. |
J. Am. Medical Informatics Assoc. |
2023 |
DBLP DOI BibTeX RDF |
|
38 | Chris Hacking, Nitesh K. Poona, Nicola Manzan, Carlos Poblete-Echeverría |
Investigating 2-D and 3-D Proximal Remote Sensing Techniques for Vineyard Yield Estimation. |
Sensors |
2019 |
DBLP DOI BibTeX RDF |
|
38 | Dipan Kumar Mandal, Srivatsava Jandhyala, Om Ji Omer, Gurpreet S. Kalsi, Biji George, Gopi Neela, Santhosh Kumar Rethinagiri, Sreenivas Subramoney, Lance Hacking, Jim Radford, Eagle Jones, Belliappa Kuttanna, Hong Wang 0003 |
Visual Inertial Odometry At the Edge: A Hardware-Software Co-design Approach for Ultra-low Latency and Power. |
DATE |
2019 |
DBLP DOI BibTeX RDF |
|
38 | Jane F. Hacking, Bruce L. Smith, Shawn L. Nissen, Hannah Allen |
Russian palatalized and unpalatalized coda consonants: An electropalatographic and acoustic analysis of native speaker and L2 learner productions. |
J. Phonetics |
2016 |
DBLP DOI BibTeX RDF |
|
38 | Andy Bond, Andrew Hacking, Zoran Milosevic, Andrew Zander |
Specifying and building interoperable eHealth systems: ODP benefits and lessons learned. |
Comput. Stand. Interfaces |
2013 |
DBLP DOI BibTeX RDF |
|
38 | Stuart Hacking, Benoit Hudzia |
Improving the live migration process of large enterprise applications. |
VTDC@ICAC |
2009 |
DBLP DOI BibTeX RDF |
|
38 | Ian Hacking |
Aristotelian Categories And Cognitive Domains. |
Synth. |
2001 |
DBLP DOI BibTeX RDF |
|
38 | Jan W. M. Jacobs, Roger J. H. Hacking |
An integrated microprogram development methodology based on APL. |
APL |
1987 |
DBLP DOI BibTeX RDF |
APL |
38 | Ian Hacking |
What is Strict Implication? |
J. Symb. Log. |
1963 |
DBLP DOI BibTeX RDF |
|
35 | Hyun-Uk Hwang, Minsoo Kim 0002, Bong-Nam Noh |
Expert System Using Fuzzy Petri Nets in Computer Forensics. |
ICHIT |
2006 |
DBLP DOI BibTeX RDF |
expert system, Computer forensics, inference rule, fuzzy Petri nets, hacking |
35 | Patricia Y. Logan, Allen Clarkson |
Teaching students to hack: curriculum issues in information security. |
SIGCSE |
2005 |
DBLP DOI BibTeX RDF |
ethics and computers, education, computer science education, information security, computer security, information assurance, hacking |
35 | Hector Zenil Chavez |
Getting to Know Your Enemy. |
IEEE Distributed Syst. Online |
2004 |
DBLP DOI BibTeX RDF |
computer hacking, Stuart McClure, Joel Scambray, George Kurtz, computer security, book review |
35 | Yeon-jin Park, Keun-Ho Lee |
Constructing a secure hacking-resistant IoT U-healthcare environment. |
J. Comput. Virol. Hacking Tech. |
2018 |
DBLP DOI BibTeX RDF |
|
35 | Sang-Won Bang, Byeong-Soo Jung, Sang-Cheol Lee |
Research on financial institutional network partition design for anti-hacking. |
J. Comput. Virol. Hacking Tech. |
2017 |
DBLP DOI BibTeX RDF |
|
35 | Kyung-Hwan Cha, Dae-Ki Kang |
Experimental analysis of hidden Markov model based secure misuse intrusion trace classification and hacking detection. |
J. Comput. Virol. Hacking Tech. |
2017 |
DBLP DOI BibTeX RDF |
|
35 | Sunkyung Rhyu, Sang-Yeob Oh |
Hacking and convergence computing. |
J. Comput. Virol. Hacking Tech. |
2017 |
DBLP DOI BibTeX RDF |
|
35 | Sunghyuck Hong |
Secure and light IoT protocol (SLIP) for anti-hacking. |
J. Comput. Virol. Hacking Tech. |
2017 |
DBLP DOI BibTeX RDF |
|
34 | Marsalis T. Gibson, David Babazadeh, Claire J. Tomlin, Shankar Sastry 0001 |
Hacking Predictors Means Hacking Cars: Using Sensitivity Analysis to Identify Trajectory Prediction Vulnerabilities for Autonomous Driving Security. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
34 | Richard Beno, Ron Poet |
Hacking Passwords that Satisfy Common Password Policies: Hacking Passwords. |
SIN |
2020 |
DBLP DOI BibTeX RDF |
|
34 | Leonardo de Araújo |
Hacking Cultural Heritage: the Hackathon as a Method for Heritage Interpretation (Hacking Cultural Heritage: der Hackathon als Methode zur Interpretation des Kulturerbes) |
|
2018 |
RDF |
|
34 | Youyang Hou, Cliff Lampe |
Sustainable Hacking: Characteristics of the Design and Adoption of Civic Hacking Projects. |
C&T |
2017 |
DBLP DOI BibTeX RDF |
|
34 | Donna Peacock |
From underground hacking to ethical hacking. |
|
2013 |
RDF |
|
34 | Alison E. Adam |
Hacking into Hacking: Gender and the Hacker Phenomenon. |
SIGCAS Comput. Soc. |
2003 |
DBLP DOI BibTeX RDF |
|
34 | Stuart McClure |
Hacking = Privacy: How Computer Hacking Can Shore Up Your Defenses and Deliver the Closest Ideal to Security Available. |
TOOLS (39) |
2001 |
DBLP DOI BibTeX RDF |
|
31 | Ugochi Acholonu |
Hacker's mentality: integrating games and hacking to build it fluency among middle school students. |
IDC |
2010 |
DBLP DOI BibTeX RDF |
task-based learning, digital games, middle-school, IT fluency |
31 | Daniela K. Rosner, Jonathan Bean |
Learning from IKEA hacking: i'm not one to decoupage a tabletop and call it a day. |
CHI |
2009 |
DBLP DOI BibTeX RDF |
Ikea, creative tools, design, DIY |
31 | Ernest A. Edmonds, Mark Fell |
Two generative pieces: port hacking and DC_release. |
Creativity & Cognition |
2009 |
DBLP DOI BibTeX RDF |
performance, generative art |
31 | Joseph A. Paradiso, John S. Heidemann, Thomas G. Zimmerman |
Hacking Is Pervasive. |
IEEE Pervasive Comput. |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Thomas G. Zimmerman |
Hacking in Industrial Research and Development. |
IEEE Pervasive Comput. |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Alexander E. Voiskounsky, Olga V. Smyslova |
Flow in Computer Hacking: A Model. |
Human.Society@Internet 2003 |
2003 |
DBLP DOI BibTeX RDF |
|
31 | Paul Thompson |
Semantic Hacking and Intelligence and Security Informatics (Extended Abstract). |
ISI |
2003 |
DBLP DOI BibTeX RDF |
|
31 | George Cybenko, Annarita Giani, Paul Thompson |
Cognitive Hacking: A Battle for the Mind. |
Computer |
2002 |
DBLP DOI BibTeX RDF |
|
31 | Rick Duley, Stanislaw P. Maj |
Cutting Hacking: Breaking from Tradition. |
CSEE&T |
2002 |
DBLP DOI BibTeX RDF |
|
31 | John A. N. Lee, Gerald Segal, Rosalie Steier |
Positive Alternatives: A Report on an ACM Panel on Hacking. |
Commun. ACM |
1986 |
DBLP DOI BibTeX RDF |
|
28 | David Alan Grier |
Harry and Georgie. |
Computer |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Ramkumar Chinchani, Duc T. Ha, Anusha Iyer, Hung Q. Ngo 0001, Shambhu J. Upadhyaya |
On the Hardness of Approximating the Min-Hack Problem. |
J. Comb. Optim. |
2005 |
DBLP DOI BibTeX RDF |
hardness of threat analysis, computer security |
28 | Slim Rekhis, Noureddine Boudriga |
A formal logic-based language and an automated verification tool for computer forensic investigation. |
SAC |
2005 |
DBLP DOI BibTeX RDF |
S-TLA+, S-TLC, formal forensic investigation, temporal logic of security actions |
28 | Yuichiro Kanzaki, Akito Monden, Masahide Nakamura, Ken-ichi Matsumoto |
Exploiting Self-Modification Mechanism for Program Protection. |
COMPSAC |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Yang-Seo Choi, Dong-il Seo, Sung Won Sohn, Sang-Ho Lee |
Network-Based Real-Time Connection Traceback System (NRCTS) with Packet Marking Technology. |
ICCSA (2) |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Quyen L. Nguyen, Arun Sood |
A Comparison of Intrusion-Tolerant System Architectures. |
IEEE Secur. Priv. |
2011 |
DBLP DOI BibTeX RDF |
D.0 General, D.2.4.d Formal methods, D.4.6.a Access controls, D.4.6.b Authentication, K.4.4.f Security, K.4.4.g Internet security policies, K.6.5.a Authentication, K.6.5.c Invasive software (viruses, worms, Trojan horses), K.6.5.e Unauthorized access (hacking, phreaking), K.6.m.b Security, C.4.f Reliability, D.2.9.m Risk management, D.4.5.e High availability, D.4.6.d Information flow controls, Data exfiltration, Intrusion Tolerance, availability and serviceability |
22 | John Paul Dunning |
Taming the Blue Beast: A Survey of Bluetooth Based Threats. |
IEEE Secur. Priv. |
2010 |
DBLP DOI BibTeX RDF |
security taxonomy, mobile computing, wireless communications, Bluetooth, hacking |
22 | Chang-Lung Tsai, Allen Y. Chang, Ming-Szu Huang |
Early Warning System for DDoS Attacking Based on Multilayer Deployment of Time Delay Neural Network. |
IIH-MSP |
2010 |
DBLP DOI BibTeX RDF |
Internet hacking, Information security, Denial of service, Distributed denial of service, Time-delay neural network |
22 | Amanda Williams, Daniela Karin Rosner |
Wiimote hackery studio proposal. |
TEI |
2010 |
DBLP DOI BibTeX RDF |
wii nunchuk, diy, hacking, wii remote |
22 | Juan M. Solá-Sloan, Isidoro Couvertier-Reyes |
A TCP offload engine emulator for estimating the impact of removing protocol processing from a host running Apache HTTP server. |
SpringSim |
2009 |
DBLP DOI BibTeX RDF |
TCP offload, TOE, hacking Apache, protocol offload, TCP/IP, web servers |
22 | Jamie Allen, Areti Galani, Kazuhiro Jo |
An ecology of practice: chiptune marching band. |
Creativity & Cognition |
2009 |
DBLP DOI BibTeX RDF |
performance, community, user studies, art, diy, hacking |
22 | Jon Callas, Yvo Desmedt, Daniel Nagy, Akira Otsuka, Jean-Jacques Quisquater, Moti Yung |
Real Electronic Cash Versus Academic Electronic Cash Versus Paper Cash (Panel Report). |
Financial Cryptography |
2008 |
DBLP DOI BibTeX RDF |
cash, chip card, deployed systems, reliability, anonymity, availability, advertising, electronic cash, hacking, fraud, credit card |
22 | Sean Peisert, Matt Bishop, Sidney Karin, Keith Marzullo |
Analysis of Computer Intrusions Using Sequences of Function Calls. |
IEEE Trans. Dependable Secur. Comput. |
2007 |
DBLP DOI BibTeX RDF |
unauthorized access (for example, hacking), Security, design, intrusion detection, management, anomaly detection, auditing, logging, forensic analysis |
22 | Elizabeth M. Losh |
Assembly lines: web generators as hypertexts. |
Hypertext |
2007 |
DBLP DOI BibTeX RDF |
PHP hacking, hypertext theory, participatory culture, web generators, web 2.0 |
22 | Kjell Jørgen Hole, Erlend Dyrnes, Per Thorsheim |
Securing Wi-Fi Networks. |
Computer |
2005 |
DBLP DOI BibTeX RDF |
wireless hacking, wireless security, virtual private networks, Wi-Fi networks |
22 | Jonathan Bannet, David W. Price, Algis Rudys, Justin Singer, Dan S. Wallach |
Hack-a-Vote: Security Issues with Electronic Voting Systems. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
election fraud, security, electronic voting, hacking |
22 | Susan W. Brenner |
U.S. Cybercrime Law: Defining Offenses. |
Inf. Syst. Frontiers |
2004 |
DBLP DOI BibTeX RDF |
stalking, child pornography, cybercrime, hacking, fraud, terrorism |
22 | Erik Johansson, Mikael Pettersson, Konstantinos Sagonas, Thomas Lindgren |
The development of the HiPE system: design and experience report. |
Int. J. Softw. Tools Technol. Transf. |
2003 |
DBLP DOI BibTeX RDF |
Programming language implementation, Virtual machines and compilation methods, Functional programming, Concurrent programming, Erlang, Hacking |
19 | Mila Dalla Preda, Michele Ianni |
Exploiting number theory for dynamic software watermarking. |
J. Comput. Virol. Hacking Tech. |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Santosh Kumar Ravva, K. L. N. C. Prakash, Sureddi R. M. Krishna |
Cryptanalysis of RSA with composed decryption exponent with few most significant bits of one of the primes. |
J. Comput. Virol. Hacking Tech. |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Mohamed Rasslan, Mahmoud M. Nasreldin, Doaa Abdelrahman, Aya Elshobaky, Heba Aslan |
Networking and cryptography library with a non-repudiation flavor for blockchain. |
J. Comput. Virol. Hacking Tech. |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Alexander V. Babash |
Attacks on the simple substitution cipher with the calculation of their reliability. |
J. Comput. Virol. Hacking Tech. |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Sergey Prokopev |
Cryptographic protocol conformance testing based on domain-specific state machine. |
J. Comput. Virol. Hacking Tech. |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Ritik Mehta, Olha Jurecková, Mark Stamp 0001 |
A natural language processing approach to Malware classification. |
J. Comput. Virol. Hacking Tech. |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Vrinda Malhotra, Katerina Potika, Mark Stamp 0001 |
A comparison of graph neural networks for malware classification. |
J. Comput. Virol. Hacking Tech. |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Nguyen Minh Tu, Viet Hung Nguyen, Nathan Shone |
Using deep graph learning to improve dynamic analysis-based malware detection in PE files. |
J. Comput. Virol. Hacking Tech. |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Christian Catalano, Franco Tommasi |
Persistent MobileApp-in-the-Middle (MAitM) attack. |
J. Comput. Virol. Hacking Tech. |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Rohit Dube |
Faulty use of the CIC-IDS 2017 dataset in information security research. |
J. Comput. Virol. Hacking Tech. |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Omid Kargarnovin, Amir Mahdi Sadeghzadeh, Rasool Jalili |
Mal2GCN: a robust malware detection approach using deep graph convolutional networks with non-negative weights. |
J. Comput. Virol. Hacking Tech. |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Eldar Boltachev |
Correction to: Potential cyber threats of adversarial attacks on autonomous driving models. |
J. Comput. Virol. Hacking Tech. |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Alexey Kurochkin, Denis Fomin |
MGM beyond the birthday bound. |
J. Comput. Virol. Hacking Tech. |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Akram Khalesi, Zahra Ahmadian |
Provably minimum data complexity integral distinguisher based on conventional division property. |
J. Comput. Virol. Hacking Tech. |
2024 |
DBLP DOI BibTeX RDF |
|
19 | François Dupont |
A new Shamir's three pass random matrix ciphering mechanism. |
J. Comput. Virol. Hacking Tech. |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Evgeniy K. Alekseev, Sergey Kyazhin, Stanislav Smyshlyaev |
The threat of forcing the identical roles for authenticated key establishment protocols. |
J. Comput. Virol. Hacking Tech. |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Jesper Bergman, Oliver Popov |
Recognition of tor malware and onion services. |
J. Comput. Virol. Hacking Tech. |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Guillaume Dupont, Daniel Ricardo dos Santos, Stanislav Dashevskyi, Sangavi Vijayakumar, Sashaank P. Murali, Elisa Costante, Jerry den Hartog, Sandro Etalle |
Demonstration of new attacks on three healthcare network protocols in a lab environment. |
J. Comput. Virol. Hacking Tech. |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Hassan Jameel Asghar, Benjamin Zi Hao Zhao, Muhammad Ikram 0001, Giang Linh Duc Nguyen, Dali Kaafar, Sean Lamont, Daniel Coscia |
Use of cryptography in malware obfuscation. |
J. Comput. Virol. Hacking Tech. |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Giovanni Ciaramella, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone |
Explainable Ransomware Detection with Deep Learning Techniques. |
J. Comput. Virol. Hacking Tech. |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Anatoly Konkin, Sergey Zapechnikov |
Systematization of knowledge: privacy methods and zero knowledge proofs in corporate blockchains. |
J. Comput. Virol. Hacking Tech. |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Hafiz Usama Ishtiaq, Areeb Ahmed Bhutta, Adnan Noor Mian |
DHCP DoS and starvation attacks on SDN controllers and their mitigation. |
J. Comput. Virol. Hacking Tech. |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Anna Epishkina, Sergey Zapechnikov, Anna Belozubova |
Historical notes on Russian cryptography. |
J. Comput. Virol. Hacking Tech. |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Santosh Kumar Ravva, K. L. N. C. Prakash, Sureddi R. M. Krishna |
Partial key exposure attack on RSA using some private key blocks. |
J. Comput. Virol. Hacking Tech. |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Dmitry Zakharov, M. Pudovkina |
Full round impossible differentials for Feistel ciphers. |
J. Comput. Virol. Hacking Tech. |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Grigory B. Marshalko, Svetlana Koreshkova |
Protection against adversarial attacks with randomization of recognition algorithm. |
J. Comput. Virol. Hacking Tech. |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Hashida Haidros Rahima Manzil, S. Manohar Naik |
Android ransomware detection using a novel hamming distance based feature selection. |
J. Comput. Virol. Hacking Tech. |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Rosangela Casolare, Stefano Fagnano, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone |
Picker Blinder: a framework for automatic injection of malicious inter-app communication. |
J. Comput. Virol. Hacking Tech. |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Manmeet Singh, Maninder Singh, Sanmeet Kaur |
Identifying bot infection using neural networks on DNS traffic. |
J. Comput. Virol. Hacking Tech. |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Puya Pakshad, Alireza Shameli-Sendi, Behzad Khalaji Emamzadeh Abbasi |
A security vulnerability predictor based on source code metrics. |
J. Comput. Virol. Hacking Tech. |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Alireza Sadeghi-Nasab, Vahid Rafe |
A comprehensive review of the security flaws of hashing algorithms. |
J. Comput. Virol. Hacking Tech. |
2023 |
DBLP DOI BibTeX RDF |
|
19 | |
Retraction Note: Artificial intelligence enabled fuzzy multimode decision support system for cyber threat security defense automation. |
J. Comput. Virol. Hacking Tech. |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Huy Nguyen, Fabio Di Troia, Genya Ishigaki, Mark Stamp 0001 |
Generative adversarial networks and image-based malware classification. |
J. Comput. Virol. Hacking Tech. |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Yoshihiro Oyama, Hirotaka Kokubo |
Forced continuation of malware execution beyond exceptions. |
J. Comput. Virol. Hacking Tech. |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Aparna Sunil Kale, Vinay Pandya, Fabio Di Troia, Mark Stamp 0001 |
Malware classification with Word2Vec, HMM2Vec, BERT, and ELMo. |
J. Comput. Virol. Hacking Tech. |
2023 |
DBLP DOI BibTeX RDF |
|
19 | |
Retraction Note: Artificial intelligence assisted cyber threat assessment and applications for the tourism industry. |
J. Comput. Virol. Hacking Tech. |
2023 |
DBLP DOI BibTeX RDF |
|
19 | |
Artificial intelligence assisted cyber threat assessment and applications for the tourism industry. |
J. Comput. Virol. Hacking Tech. |
2023 |
DBLP DOI BibTeX RDF |
|