|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 40 occurrences of 24 keywords
|
|
|
Results
Found 388 publication records. Showing 388 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
343 | Heum Park, SunHo Cho, Hyuk-Chul Kwon |
Cyber Forensics Ontology for Cyber Criminal Investigation. |
e-Forensics |
2009 |
DBLP DOI BibTeX RDF |
criminal investigation, cyber forensics, ontology, digital evidence, cyber crime |
107 | Himanshu Maheshwari, Harvey S. Hyman, Manish Agrawal |
A Comparison of Cyber-Crime Definitions in India and the United States. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
106 | Flora S. Tsai, Kap Luk Chan |
Detecting Cyber Security Threats in Weblogs Using Probabilistic Models. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
cyber terrorism, data mining, blog, weblog, probabilistic latent semantic analysis, cyber security, cyber crime |
88 | M. Sindhu, S. Kumar Sajan, M. Sethumadhavan 0001 |
Error Linear Complexity Measures of Binary Multisequences. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
88 | N. V. Narendra Kumar, Harshit J. Shah, R. K. Shyamasundar |
Towards Checking Tampering of Software. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
88 | Asoke K. Talukder |
Securing Next Generation Internet Services. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
88 | N. Harini, C. K. Shyamala, T. R. Padmanabhan |
Securing Cloud Environment. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
88 | Rajbir Kaur, Manoj Singh Gaur, P. Lalith Suresh, Vijay Laxmi |
DoS Attacks in MANETs: Detection and Countermeasures. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
88 | Divya Shankar, Manish Agrawal, H. Raghav Rao |
Emergency Response to Mumbai Terror Attacks: An Activity Theory Analysis. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
88 | Narayanankutty Karuppath, P. Achuthan |
Einstein-Podolsky-Rosen Paradox and Certain Aspects of Quantum Cryptology with Some Applications. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
88 | Kenneth J. Giuliani, V. Kumar Murty |
An Examination of Identity Management Models in an Internet Setting. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
88 | C. Warren Axelrod, Sukumar Haldar |
Combined Impact of Outsourcing and Hard Times on BPO Risk and Security. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
88 | Charulata Chaudhary, Ishupal Singh Kang |
Pirates of the Copyright and Cyberspace: Issues Involved. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
88 | Chungath Srinivasan, K. V. Lakshmy, Madathil Sethumadhavan |
Complexity Measures of Cryptographically Secure Boolean Functions. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
88 | P. Vinod 0001, Vijay Laxmi, Manoj Singh Gaur |
Metamorphic Malware Analysis and Detection Methods. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
88 | Rajarshi Chakraborty, Haricharan Rengamani, Ponnurangam Kumaraguru, H. Raghav Rao |
The UID Project: Lessons Learned from the West and Challenges Identified for India. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
88 | P. P. Amritha, T. Gireesh Kumar |
A Survey on Digital Image Steganographic Methods. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
88 | S. Sajan Kumar, M. Hari Krishna Prasad, Suresh Raju Pilli |
Extended Time Machine Design using Reconfigurable Computing for Efficient Recording and Retrieval of Gigabit Network Traffic. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
88 | Mohit Virendra, Qi Duan, Shambhu J. Upadhyaya |
Detecting Cheating Aggregators and Report Dropping Attacks in Wireless Sensor Networks. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
88 | Suja Ramachandran, R. S. Mundada, A. K. Bhattacharjee, C. S. R. C. Murthy, R. Sharma |
Classifying Host Anomalies: Using Ontology in Information Security Monitoring. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
81 | H. C. Lee |
Cyber crime and challenges for crime investigation in the information era. |
ISI |
2008 |
DBLP DOI BibTeX RDF |
|
68 | Kam-Pui Chow, C. F. Chong, Pierre K. Y. Lai, Lucas Chi Kwong Hui, Kevin K. H. Pun, Wai Wan Tsang, H. W. Chan |
Digital Evidence Search Kit. |
SADFE |
2005 |
DBLP DOI BibTeX RDF |
|
62 | Da-Yu Kao, Shiuh-Jeng Wang, Frank Fu-Yuan Huang |
Digitized Forensic Investigation at P2P Copyright Controversy, Infringement. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
P2P Model, Copyright Protection, Digital Content, Forensic Analysis, Cyber-crime |
57 | Ed Gabrys |
The International Dimensions of Cyber-Crime, Part 2: A Look at the Council of Europe's Cyber-Crime Convention and the Need for an International Regime to Fight Cyber-Crime. |
Inf. Secur. J. A Glob. Perspect. |
2002 |
DBLP DOI BibTeX RDF |
|
51 | A. B. Patki, S. Lakshminarayanan, S. Sivasubramanian, S. S. Sarma |
Cyber Crime Information System for Cyberethics Awareness. |
CW |
2003 |
DBLP DOI BibTeX RDF |
Cyber crime services, IT Act 2000, Data overload, Fuzzy Database, Intelligent Information System |
47 | Jigang Liu, Tetsutaro Uehara |
Computer Forensics in Japan: A Preliminary Study. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Abdul Quaiyum Ansari, Tapasya Patki, A. B. Patki, V. Kumar |
Integrating Fuzzy Logic and Data Mining: Impact on Cyber Security. |
FSKD (4) |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Kweku Kwakye Arthur, Martin S. Olivier, Hein S. Venter, Jan H. P. Eloff |
Considerations Towards a Cyber Crime Profiling System. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
|
38 | Michael Mundt, Harald Baier |
Cyber Crime Undermines Data Privacy Efforts - On the Balance Between Data Privacy and Security. |
ICDF2C |
2022 |
DBLP DOI BibTeX RDF |
|
38 | Indira Mahalingam Carr, Katherine S. Williams |
Draft Cyber-Crime Convention: Criminalization and The Council of Europe (Draft) Convention on Cyber-Crime. |
Comput. Law Secur. Rev. |
2002 |
DBLP DOI BibTeX RDF |
|
32 | Clare Chambers, Umut Turksen |
E-Banking and e-Fraud: A Comparison Investigation in Jamaica and the UK. |
ICDS |
2010 |
DBLP DOI BibTeX RDF |
E-fraud, E-commerce, E-banking, Cyber crime |
32 | Chun Wei, Alan P. Sprague, Gary Warner |
Clustering malware-generated spam emails with a novel fuzzy string matching algorithm. |
SAC |
2009 |
DBLP DOI BibTeX RDF |
data mining, spam, electronic mail, forensics, cyber crime |
32 | Chun Wei, Alan P. Sprague, Gary Warner, Anthony Skjellum |
Mining spam email to identify common origins for forensic application. |
SAC |
2008 |
DBLP DOI BibTeX RDF |
data mining, spam, electronic mail, forensic analysis, cyber crime |
32 | Chun Wei, Alan P. Sprague, Gary Warner |
Detection of networks blocks used by the Storm Worm botnet. |
ACM Southeast Regional Conference |
2008 |
DBLP DOI BibTeX RDF |
data mining, spam, electronic mail, forensic analysis, cyber crime |
32 | Enid Mumford |
Problems, knowledge, solutions: solving complex problems (invited session). |
ICIS |
1998 |
DBLP BibTeX RDF |
methods, solutions, problems, cyber crime, drugs |
32 | Harjinder Singh Lallie 0001, Lynsay A. Shepherd, Jason R. C. Nurse, Arnau Erola, Gregory Epiphaniou, Carsten Maple, Xavier J. A. Bellekens |
Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. |
Comput. Secur. |
2021 |
DBLP DOI BibTeX RDF |
|
32 | Harjinder Singh Lallie 0001, Lynsay A. Shepherd, Jason R. C. Nurse, Arnau Erola, Gregory Epiphaniou, Carsten Maple, Xavier J. A. Bellekens |
Cyber Security in the Age of COVID-19: A Timeline and Analysis of Cyber-Crime and Cyber-Attacks during the Pandemic. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
32 | Raghu Santanam 0001, M. Sethumadhavan 0001, Mohit Virendra (eds.) |
Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives. |
|
2011 |
DBLP DOI BibTeX RDF |
|
32 | Peter Adewale Amosun, Olugbenga Adedayo Ige, Kim-Kwang Raymond Choo |
Impact of a participatory cyber crime prevention programme on secondary school students' attainment in crime prevention concepts in civic education and social studies. |
Educ. Inf. Technol. |
2015 |
DBLP DOI BibTeX RDF |
|
32 | Kit Burden, Creole Palmer |
Internet crime: Cyber Crime - A new breed of criminal? |
Comput. Law Secur. Rev. |
2003 |
DBLP DOI BibTeX RDF |
|
32 | Peter Csonka |
Internet Crima: The Draft Council of Europe Convention on Cyber-Crime: A Response to the Challenge of Crime in the Age of the Internet? |
Comput. Law Secur. Rev. |
2000 |
DBLP DOI BibTeX RDF |
|
29 | Felicia R. Doswell |
A case study on computer security for non-expert computer user. |
ACM Southeast Regional Conference |
2008 |
DBLP DOI BibTeX RDF |
intrusion detection, computer security |
29 | Georgia Frantzeskou, Efstathios Stamatatos, Stefanos Gritzalis, Sokratis K. Katsikas |
Source Code Author Identification Based on N-gram Author Profiles. |
AIAI |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Paulo Veríssimo |
Thou Shalt Not Trust non-Trustworthy Systems. |
ICDCS Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Georgia Frantzeskou, Efstathios Stamatatos, Stefanos Gritzalis, Sokratis K. Katsikas |
Effective identification of source code authors using byte-level information. |
ICSE |
2006 |
DBLP DOI BibTeX RDF |
software forensics, source code authorship identification |
26 | Ramesh Chandra, Vaibhav Bhatnagar |
Cyber-squatting: a cyber crime more than an unethical act. |
Int. J. Soc. Comput. Cyber Phys. Syst. |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Matthew Hull, Thaddeus Eze, Lee Speakman |
Policing The Cyber Threat: Exploring the Threat from Cyber Crime and the Ability of Local Law Enforcement to Respond. |
EISIC |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Minhee Joo, Junwoo Seo, Junhyoung Oh, Mookyu Park, Kyungho Lee |
Situational Awareness Framework for Cyber Crime Prevention Model in Cyber Physical System. |
ICUFN |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Sabina Barakovic, Mladen Mrkaja, Amir Husic, Adnan Kulovac, Jasmina Barakovic Husic |
Overview of the Current Situation in Bosnia and Herzegovina with Focus on Cyber Security and Fighting Cyber-Crime by Establishment of BIH CERT Body. |
Cyber Security and Resiliency Policy Framework |
2014 |
DBLP DOI BibTeX RDF |
|
26 | Poonam Kumar, Saurabh Mittal |
The Perpetration and Prevention of Cyber Crime: An Analysis of Cyber Terrorism in India. |
Int. J. Technoethics |
2012 |
DBLP DOI BibTeX RDF |
|
26 | Susan Haugen |
E-government, cyber-crime and cyber-terrorism: a population at risk. |
Electron. Gov. an Int. J. |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Talania Grobler, Buks Louwrens |
Digital Forensic Readiness as a Component of Information Security Best Practice. |
SEC |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Ming-Yuh Huang |
Critical Information Assurance Challenges for Modern Large-Scale Infrastructures. |
MMM-ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Swati Sharma, Varsha Sharma |
IGO_CM: An Improved Grey-Wolf Optimization Based Classification Model for Cyber Crime Data Analysis Using Machine Learning. |
Wirel. Pers. Commun. |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Sanjay Goel, Paulo Roberto Nunes de Souza (eds.) |
Digital Forensics and Cyber Crime - 14th EAI International Conference, ICDF2C 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part I |
ICDF2C (1) |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Sanjay Goel, Paulo Roberto Nunes de Souza (eds.) |
Digital Forensics and Cyber Crime - 14th EAI International Conference, ICDF2C 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part II |
ICDF2C (2) |
2024 |
DBLP DOI BibTeX RDF |
|
19 | V. S. Nageswara Rao Kadiyala, Ripon Patgiri |
Chapter Seventeen - An investigation on socio-cyber crime graph. |
Adv. Comput. |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Yijun Cai, Dian Li, Yuyue Wang 0002 |
Social IoT data mining and cyber-crime forensics under complex cloud environment. |
Internet Technol. Lett. |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Abdulelah Alshammari, Vladlena Benson, Luciano C. Batista |
Emotional Cost of Cyber Crime and Cybersecurity Protection Motivation Behaviour: A Systematic Literature Review. |
PACIS |
2023 |
DBLP BibTeX RDF |
|
19 | Dimitrios Georgoulias, Ricardo Yaben, Emmanouil Vasilomanolakis |
Cheaper than you thought? A dive into the darkweb market of cyber-crime products. |
ARES |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Sanjay Goel, Pavel Gladyshev, Akatyev Nikolay, George Markowsky, Daryl Johnson (eds.) |
Digital Forensics and Cyber Crime - 13th EAI International Conference, ICDF2C 2022, Boston, MA, November 16-18, 2022, Proceedings |
ICDF2C |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Rasheed Yousef, Mahmoud Jazzar, Amna Eleyan, Tarek Bejaoui |
A Machine Learning Framework & Development for Insider Cyber-crime Threats Detection. |
SmartNets |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Bart Somers, Asanka P. Sayakkara, Darren R. Hayes, Nhien-An Le-Khac |
Finding Forensic Artefacts in Long-Term Frequency Band Occupancy Measurements Using Statistics and Machine Learning. |
ICDF2C (1) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Jia Hu, Weina Niu, Qingjun Yuan, Lingfeng Yao, Junpeng He, Yanfeng Zhang, Xiaosong Zhang 0001 |
DEML: Data-Enhanced Meta-Learning Method for IoT APT Traffic Detection. |
ICDF2C (1) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Xubo Yang, Linsen Li, Cunqing Hua, Changhao Yao |
CCBA: Code Poisoning-Based Clean-Label Covert Backdoor Attack Against DNNs. |
ICDF2C (1) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Zeshan Pang, Yuyuan Sun, Shasha Guo, Yuliang Lu |
Backdoor Learning on Siamese Networks Using Physical Triggers: FaceNet as a Case Study. |
ICDF2C (1) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | John Jankura, Hannah Catallo-Stooks, Ibrahim M. Baggili, Golden Richard |
Catch Me if You Can: Analysis of Digital Devices and Artifacts Used in Murder Cases. |
ICDF2C (1) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Cheuk Yu Ip, Fu Kay Frankie Li, Yi Anson Lam, Siu Ming Yiu |
Removing Noise (Opinion Messages) for Fake News Detection in Discussion Forum Using BERT Model. |
ICDF2C (1) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Xiao Yang, Gaolei Li, Meng Han |
Persistent Clean-Label Backdoor on Graph-Based Semi-supervised Cybercrime Detection. |
ICDF2C (1) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Michael Mundt, Harald Baier |
Enhancing Incident Management by an Improved Understanding of Data Exfiltration: Definition, Evaluation, Review. |
ICDF2C (1) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Joseph Brown, Ibrahim Baggili |
Retruth Reconnaissance: A Digital Forensic Analysis of Truth Social. |
ICDF2C (1) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Michael Madden 0003, Dan Szafaran, Philomena Gray, Justin Pelletier, Ted Selker |
A Canary in the Voting Booth: Attacks on a Virtual Voting Machine. |
ICDF2C (1) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Xiaohong Fan, Ye Huang, Xue Wang, Ziran Nie, Zhenyang Yu, Xuhui Cheng, Xiaoyi Duan |
Research on Feature Selection Algorithm of Energy Curve. |
ICDF2C (1) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Shuai Ren, Yuxiao Li, Bo Li, Hao Gong, Qiuyu Feng |
A Multi-carrier Information Hiding Algorithm Based on Layered Compression of 3D Point Cloud Model. |
ICDF2C (1) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Shuai Ren, Liming Ma, Qiuyu Feng |
A Multi-carrier Information Hiding Algorithm Based on Dual 3D Model Spectrum Analysis. |
ICDF2C (1) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Shuai Ren, Bo Li, Shengxia Liu |
An Information Hiding Algorithm Based on Multi-carrier Fusion State Partitioning of 3D Models. |
ICDF2C (1) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Paul Stenzel, Nhien-An Le-Khac |
Identify Users on Dating Applications: A Forensic Perspective. |
ICDF2C (1) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Yi Shen, Yuhan Zhang, Yuwei Li, Wanmeng Ding, Miao Hu, Yang Li, Cheng Huang 0003, Jie Wang |
IoT Malicious Traffic Detection Based on Federated Learning. |
ICDF2C (1) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Xiaoyi Duan, Ye Huang, Yuting Wang, Yu Gu, Jianmin Tong, Zunyang Wang, Ronglei Hu |
Power Analysis Attack Based on GA-Based Ensemble Learning. |
ICDF2C (1) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Shuai Ren, Hao Gong, Huirong Cheng, Zejing Cheng |
Point Cloud Model Information Hiding Algorithm Based on Multi-scale Transformation and Composite Operator. |
ICDF2C (1) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Clinton Walker, Ibrahim Baggili, Hao Wang |
Decoding HDF5: Machine Learning File Forensics and Data Injection. |
ICDF2C (1) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Lilian Noronha Nassif, Jonny Silva de Oliveira |
Learning Framework for Guessing Alphanumeric Passwords on Mobile Phones Based on User Context and Fragment Semantics. |
ICDF2C (2) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Zhiqiang Wang 0006, Zhuoyue Wang, Ying Zhang |
An Android Malware Detection Method Based on Optimized Feature Extraction Using Graph Convolutional Network. |
ICDF2C (2) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Zhi Lu, Haochen Dou, Songfeng Lu, Xueming Tang, Junjun Wu, Samir Mohammed Umran |
A PUF Based Audio Fingerprint Based for Device Authentication and Tamper Location. |
ICDF2C (2) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Songshou Dong, Yanqing Yao, Yihua Zhou 0001, Yuguang Yang 0001 |
Improvement of an Identity-Based Aggregate Signature Protocol from Lattice. |
ICDF2C (2) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Songshou Dong, Yanqing Yao, Yihua Zhou, Yuguang Yang 0001 |
Lattice-Based Secret Sharing Scheme (Chinese Remainder Theorem). |
ICDF2C (2) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Ivan Cvitic, Dragan Perakovic |
A Quantum Physics Approach for Enabling Information-Theoretic Secure Communication Channels. |
ICDF2C (2) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Hassan Jalil Hadi, Yue Cao, Mohammed Ali Alshara, Naveed Ahmad, Muhammad Saqib Riaz, Jun Li |
Quantum Computing Challenges and Impact on Cyber Security. |
ICDF2C (2) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Josep Pegueroles Valles, Sebastien Kanj Bongard, Arnau Estebanell Castellví |
XSS Vulnerability Test Enhancement for Progressive Web Applications. |
ICDF2C (2) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Quan Hong, Jiaqi Li, Xizhong Guo, Pan Xie, Lidong Zhai |
Assessing the Effectiveness of Deception-Based Cyber Defense with CyberBattleSim. |
ICDF2C (2) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Weimiao Feng, Rui Hu, Cong Zhou, Lei Yu |
DynVMDroid: Android App Protection via Code Disorder and Dynamic Recovery. |
ICDF2C (2) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Steven Seiden, Ibrahim M. Baggili, Aisha I. Ali-Gombe |
I've Got You, Under My Skin: Biohacking Augmentation Implant Forensics. |
ICDF2C (2) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Abdul Majid Jamil, Hassan Jalil Hadi, Sifan Li, Yue Cao 0002, Naveed Ahmed, Faisal Bashir Hussain, Chakkaphong Suthaputchakun, Xinyuan Wang |
Detection of Targeted Attacks Using Medium-Interaction Honeypot for Unmanned Aerial Vehicle. |
ICDF2C (2) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Yiran Li |
Power Analysis Attack Based on BS-XGboost Scheme. |
ICDF2C (2) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Yintong Yan, Lu Yu, Taiyan Wang, Yuwei Li, Zulie Pan |
Optir-SBERT: Cross-Architecture Binary Code Similarity Detection Based on Optimized LLVM IR. |
ICDF2C (2) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Ruipeng Zhang, Mengjun Xie |
ForensiQ: A Knowledge Graph Question Answering System for IoT Forensics. |
ICDF2C (2) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Chenxin Zhou, Cheng Huang 0003, Yanghao Wang, Zheng Zuo |
APTBert: Abstract Generation and Event Extraction from APT Reports. |
ICDF2C (2) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Aleck Nash, Hudan Studiawan, George Grispos, Kim-Kwang Raymond Choo |
Security Analysis of Google Authenticator, Microsoft Authenticator, and Authy. |
ICDF2C (2) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Martin Husák, Shanchieh Jay Yang, Joseph Khoury, Dorde Klisura, Elias Bou-Harb |
Unraveling Network-Based Pivoting Maneuvers: Empirical Insights and Challenges. |
ICDF2C (2) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Aleck Nash, Kim-Kwang Raymond Choo |
Password Managers and Vault Application Security and Forensics: Research Challenges and Future Opportunities. |
ICDF2C (2) |
2023 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 388 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ >>] |
|