|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 883 occurrences of 602 keywords
|
|
|
Results
Found 31319 publication records. Showing 31319 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
207 | Heum Park, SunHo Cho, Hyuk-Chul Kwon |
Cyber Forensics Ontology for Cyber Criminal Investigation. |
e-Forensics |
2009 |
DBLP DOI BibTeX RDF |
criminal investigation, cyber forensics, ontology, digital evidence, cyber crime |
116 | Flora S. Tsai, Kap Luk Chan |
Detecting Cyber Security Threats in Weblogs Using Probabilistic Models. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
cyber terrorism, data mining, blog, weblog, probabilistic latent semantic analysis, cyber security, cyber crime |
113 | Peeter Lorents, Rain Ottis, Raul Rikk |
Cyber Society and Cooperative Cyber Defence. |
HCI (14) |
2009 |
DBLP DOI BibTeX RDF |
cyber society, cooperative cyber defence, CCD COE, Knowledge, information, cyber attacks |
80 | Mohamed Dâfir Ech-Cherif El Kettani, Taieb Debbagh |
NCSec: a national cyber security referential for the development of a code of practice in national cyber security management. |
ICEGOV |
2008 |
DBLP DOI BibTeX RDF |
ISO27002, cyber criminality, referential, organizational structure, cyber security |
79 | Mi Sun Lee, Mi-Gi Han, Joo-Youn Park, Su-e Park |
Factors formatting perceptional impression in 3-D cyber spaces: a cross-cultural study of Korean and American users. |
SIGGRAPH Posters |
2009 |
DBLP DOI BibTeX RDF |
|
76 | Jason K. Kopylec, Anita D'Amico, John R. Goodall |
Visualizing Cascading Failures in Critical Cyber Infrastructures. |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
Cyber infrastructure, infrastructure dependencies, cascading failures, situational awareness, actor-network theory |
73 | Tomoko Itao, Tetsuya Nakamura, Masato Matsuo, Tatsuya Suda, Tomonori Aoyama |
Service Emergence based on Relationship among Self-Organizing Entities. |
SAINT |
2002 |
DBLP DOI BibTeX RDF |
|
70 | Leonard Kwan, Pradeep Ray, Greg Stephens |
Towards a Methodology for Profiling Cyber Criminals. |
HICSS |
2008 |
DBLP DOI BibTeX RDF |
|
70 | Eung-Kon Kim, Jong-Chan Kim |
Fish Schooling Behavior Simulator for Cyber Aquarium. |
FBIT |
2007 |
DBLP DOI BibTeX RDF |
|
67 | Ayman Z. Faza, Sahra Sedigh, Bruce M. McMillin |
Reliability Analysis for the Advanced Electric Power Grid: From Cyber Control and Communication to Physical Manifestations of Failure. |
SAFECOMP |
2009 |
DBLP DOI BibTeX RDF |
failure propagation, cyber-physical, FACTS devices, reliability analysis, power grid |
67 | Mads Darø Kristensen |
Execution plans for cyber foraging. |
Mobile Middleware |
2008 |
DBLP DOI BibTeX RDF |
middleware, distributed computing, cyber foraging |
67 | Nong Ye, Toni Farley, Deepak Lakshminarasimhan |
An attack-norm separation approach for detecting cyber attacks. |
Inf. Syst. Frontiers |
2006 |
DBLP DOI BibTeX RDF |
Computer and network security, Intrusion detection, Signal processing, Signal detection, Cyber attacks |
67 | Sangho Lee, Dong Hwi Lee, Kuinam J. Kim |
A Conceptual Design of Knowledge-Based Real-Time Cyber-Threat Early Warning System. |
ISPA Workshops |
2006 |
DBLP DOI BibTeX RDF |
Cyber-threat, TMS, Early-Warning, ESM |
64 | Himanshu Maheshwari, Harvey S. Hyman, Manish Agrawal |
A Comparison of Cyber-Crime Definitions in India and the United States. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
61 | Jing Lin 0007, Sahra Sedigh, Ann Miller |
A General Framework for Quantitative Modeling of Dependability in Cyber-Physical Systems: A Proposal for Doctoral Research. |
COMPSAC (1) |
2009 |
DBLP DOI BibTeX RDF |
|
61 | Nian-Shing Chen, Kinshuk, Chun-Wang Wei, Yi-Ru Chen, Yu-Chun Wang |
Classroom Climate and Learning Effectiveness Comparison for Physical and Cyber F2F Interaction in Holistic-Blended Learning Environment. |
ICALT |
2007 |
DBLP DOI BibTeX RDF |
|
61 | Newton Lee |
2007 World Cyber Games Grand Final in Seattle: WCG 2006 in Monaz, Italy, October 18-22, 2006. |
Comput. Entertain. |
2006 |
DBLP DOI BibTeX RDF |
|
61 | Nian-Shing Chen, Kinshuk, Yi-Hung Wang |
Cyber Schooling Framework: Improving Mobility and Situated Learning. |
ICALT |
2005 |
DBLP DOI BibTeX RDF |
|
61 | Hiroshi Matsuda, Yoshiaki Shindo |
Design and Implementation of Cyber Assistant Professor: CAP. |
ICALT |
2005 |
DBLP DOI BibTeX RDF |
|
61 | Han Tang, Bruce M. McMillin |
Security of Information Flow in the Electric Power Grid. |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
information flow, confidentiality, power grid, Cyber-physical systems |
59 | Tosiyasu L. Kunii |
Cyber Graphics (Keynote). |
CW |
2002 |
DBLP DOI BibTeX RDF |
adjunction spaces, cell attaching functions, a hierarchy of invariants, cellular spatial structures |
58 | M. Sindhu, S. Kumar Sajan, M. Sethumadhavan 0001 |
Error Linear Complexity Measures of Binary Multisequences. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
58 | N. V. Narendra Kumar, Harshit J. Shah, R. K. Shyamasundar |
Towards Checking Tampering of Software. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
58 | Asoke K. Talukder |
Securing Next Generation Internet Services. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
58 | N. Harini, C. K. Shyamala, T. R. Padmanabhan |
Securing Cloud Environment. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
58 | Rajbir Kaur, Manoj Singh Gaur, P. Lalith Suresh, Vijay Laxmi |
DoS Attacks in MANETs: Detection and Countermeasures. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
58 | Divya Shankar, Manish Agrawal, H. Raghav Rao |
Emergency Response to Mumbai Terror Attacks: An Activity Theory Analysis. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
58 | Narayanankutty Karuppath, P. Achuthan |
Einstein-Podolsky-Rosen Paradox and Certain Aspects of Quantum Cryptology with Some Applications. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
58 | Kenneth J. Giuliani, V. Kumar Murty |
An Examination of Identity Management Models in an Internet Setting. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
58 | C. Warren Axelrod, Sukumar Haldar |
Combined Impact of Outsourcing and Hard Times on BPO Risk and Security. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
58 | Charulata Chaudhary, Ishupal Singh Kang |
Pirates of the Copyright and Cyberspace: Issues Involved. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
58 | Chungath Srinivasan, K. V. Lakshmy, Madathil Sethumadhavan |
Complexity Measures of Cryptographically Secure Boolean Functions. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
58 | P. Vinod 0001, Vijay Laxmi, Manoj Singh Gaur |
Metamorphic Malware Analysis and Detection Methods. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
58 | Rajarshi Chakraborty, Haricharan Rengamani, Ponnurangam Kumaraguru, H. Raghav Rao |
The UID Project: Lessons Learned from the West and Challenges Identified for India. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
58 | P. P. Amritha, T. Gireesh Kumar |
A Survey on Digital Image Steganographic Methods. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
58 | S. Sajan Kumar, M. Hari Krishna Prasad, Suresh Raju Pilli |
Extended Time Machine Design using Reconfigurable Computing for Efficient Recording and Retrieval of Gigabit Network Traffic. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
58 | Mohit Virendra, Qi Duan, Shambhu J. Upadhyaya |
Detecting Cheating Aggregators and Report Dropping Attacks in Wireless Sensor Networks. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
58 | Suja Ramachandran, R. S. Mundada, A. K. Bhattacharjee, C. S. R. C. Murthy, R. Sharma |
Classifying Host Anomalies: Using Ontology in Information Security Monitoring. |
Cyber Security, Cyber Crime and Cyber Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
52 | Bei-tseng Chu, Gail-Joon Ahn, Steven Blanchard, James Deese, Richard Kelly, Huiming Yu, Ashika Young |
Collegiate Cyber Game Design Criteria and Participation. |
ACIS-ICIS |
2007 |
DBLP DOI BibTeX RDF |
|
52 | Seungbong Park, Jaemin Han, Jongsoo Yoon |
The New Perspective on Private Cyber Coins in Electronic Commerce: A Korean Case. |
EC-Web |
2005 |
DBLP DOI BibTeX RDF |
|
52 | Nong Ye, Yebin Zhang, Connie M. Borror |
Robustness of the Markov-chain model for cyber-attack detection. |
IEEE Trans. Reliab. |
2004 |
DBLP DOI BibTeX RDF |
|
52 | Jong-Keun Lee, Min-Woo Lee, Jang-Se Lee, Sung-Do Chi, Syng-Yup Ohn |
Automated Cyber-attack Scenario Generation Using the Symbolic Simulation. |
AIS |
2004 |
DBLP DOI BibTeX RDF |
|
52 | Ayaz Khan, Uffe Kock Wiil, Nasrullah Memon |
Digital Forensics and Crime Investigation: Legal Issues in Prosecution at National Level. |
SADFE |
2010 |
DBLP DOI BibTeX RDF |
Cyber Laws, Electronic Devices, Digital Forensics, Digital Evidence, Forensic Analysis |
52 | Edward A. Lee |
CPS foundations. |
DAC |
2010 |
DBLP DOI BibTeX RDF |
embedded systems, cyber-physical systems |
52 | Sai Ho Kwok, Anthony C. T. Lai, Jason C. K. Yeung |
A study of online service and information exposure of public companies. |
KDD Workshop on CyberSecurity and Intelligence Informatics |
2009 |
DBLP DOI BibTeX RDF |
malicious hackers, public company, public server, web server, ports, cyber security |
49 | Hiroshi Matsuda, Tomomi Morita, Yoshiaki Shindo |
Development of Cyber Theater and Cyber Theater Scenario Language. |
ICALT |
2003 |
DBLP DOI BibTeX RDF |
|
49 | Ragunathan Rajkumar, Insup Lee 0001, Lui Sha, John A. Stankovic |
Cyber-physical systems: the next computing revolution. |
DAC |
2010 |
DBLP DOI BibTeX RDF |
new frontiers, computer science, engineering, cyber-physical systems, grand challenges |
49 | Don Wan Kang, Kay Huang, Jun Ohya |
Analysis of expressing audiences in a cyber-theater. |
ICME |
2005 |
DBLP DOI BibTeX RDF |
audience effect, cyber-theater, virtual network environment |
49 | A. B. Patki, S. Lakshminarayanan, S. Sivasubramanian, S. S. Sarma |
Cyber Crime Information System for Cyberethics Awareness. |
CW |
2003 |
DBLP DOI BibTeX RDF |
Cyber crime services, IT Act 2000, Data overload, Fuzzy Database, Intelligent Information System |
48 | Shouhuai Xu |
Collaborative Attack vs. Collaborative Defense. |
CollaborateCom |
2008 |
DBLP DOI BibTeX RDF |
collaborative attack, collaborative defense, cyber security, cyber attack |
48 | Franz Witzeling |
Demo CD "Relationship", a Demonstration. |
ICMCS, Vol. 2 |
1999 |
DBLP DOI BibTeX RDF |
Interface man - multimedia, cyber-office, cyber doctor, role game, search for human synergy, problem-solving and co-operation between partners and in teams, relationship between virtual reality, real life, senso-mental-identity |
46 | Insup Lee 0001, Oleg Sokolsky |
Medical cyber physical systems. |
DAC |
2010 |
DBLP DOI BibTeX RDF |
high-confidence medical systems, medical cyber-physical systems, medical device interoperability & compositionality, physiological closed loop, cyber-physical systems |
45 | Joshua A. Sipper |
Cyber Threat Intelligence and the Cyber Meta-Reality and Cyber Microbiome. |
Cyber Security |
2020 |
DBLP DOI BibTeX RDF |
|
45 | Ayman Z. Faza, Sahra Sedigh, Bruce M. McMillin |
Reliability Modeling for the Advanced Electric Power Grid: A Proposal for Doctoral Research. |
COMPSAC (1) |
2009 |
DBLP DOI BibTeX RDF |
|
45 | Satoshi Tanaka, Tomoko Itao, Atsushi Yamamoto, Tatsuya Suda, Shigeki Yamada |
The Design and Implementation of Service Emergence Platform Software. |
SAINT Workshops |
2004 |
DBLP DOI BibTeX RDF |
|
45 | Tomoko Itao, Tetsuya Nakamura, Masato Matsuo, Tatsuya Suda, Tomonori Aoyama |
Adaptive Creation of Network Applications in the Jack-in-the-Net Architecture. |
NETWORKING |
2002 |
DBLP DOI BibTeX RDF |
|
43 | Ravi Akella, Bruce M. McMillin |
Model-Checking BNDC Properties in Cyber-Physical Systems. |
COMPSAC (1) |
2009 |
DBLP DOI BibTeX RDF |
|
43 | Shangping Ren, Kevin A. Kwiat |
A Non-Intrusive Approach to Enhance Legacy Embedded Control Systems with Cyber Protection Features. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
legacy control systems, behavior observation, feedback loop |
43 | Wen-Kung Lin, Chieh-Peng Lin, Chou-Kang Chiu |
Understanding Cyber Trust Using a Triadic Functioning Analysis. |
APSCC |
2008 |
DBLP DOI BibTeX RDF |
|
43 | Yuanfang Zhang, Christopher D. Gill, Chenyang Lu 0001 |
Reconfigurable Real-Time Middleware for Distributed Cyber-Physical Systems with Aperiodic Events. |
ICDCS |
2008 |
DBLP DOI BibTeX RDF |
|
43 | Kun Xiao, Shangping Ren, Kevin A. Kwiat |
Retrofitting Cyber Physical Systems for Survivability through External Coordination. |
HICSS |
2008 |
DBLP DOI BibTeX RDF |
|
43 | Natalie Granado, Gregory White 0001 |
Cyber Security and Government Fusion Centers. |
HICSS |
2008 |
DBLP DOI BibTeX RDF |
|
43 | David H. C. Du |
Cyber Security: An Obtainable Goal? |
ICDCS Workshops |
2008 |
DBLP DOI BibTeX RDF |
|
43 | Michael E. Kuhl, Jason Kistner, Kevin Costantini, Moises Sudit |
Cyber attack modeling and simulation for network security analysis. |
WSC |
2007 |
DBLP DOI BibTeX RDF |
|
43 | Gregory B. White |
The Community Cyber Security Maturity Model. |
HICSS |
2007 |
DBLP DOI BibTeX RDF |
|
43 | Abdul Quaiyum Ansari, Tapasya Patki, A. B. Patki, V. Kumar |
Integrating Fuzzy Logic and Data Mining: Impact on Cyber Security. |
FSKD (4) |
2007 |
DBLP DOI BibTeX RDF |
|
43 | Yusuke Hideshima, Hideki Koike |
STARMINE: a visualization system for cyber attacks. |
APVIS |
2006 |
DBLP DOI BibTeX RDF |
virus visualization, information visualization, intrusion detection, information security, internet worm |
43 | Rainer Böhme, Gaurav Kataria |
On the Limits of Cyber-Insurance. |
TrustBus |
2006 |
DBLP DOI BibTeX RDF |
|
43 | Wei Li, Lei Wang |
Real-Time Solution in Petroleum Industry's Cyber Data Acquisition Simulation System. |
RTCSA |
2005 |
DBLP DOI BibTeX RDF |
|
43 | Horace Ho-Shing Ip, Ken C. K. Law, Belton Kwong |
Cyber Composer: Hand Gesture-Driven Intelligent Music Composition and Generation. |
MMM |
2005 |
DBLP DOI BibTeX RDF |
|
43 | Jang-Se Lee, Jung-Rae Jung, Jong Sou Park, Sung-Do Chi |
Linux-Based System Modelling for Cyber-attack Simulation. |
AIS |
2004 |
DBLP DOI BibTeX RDF |
|
43 | Jiang Yu Zheng, Min Shi 0003 |
Mapping Cityscapes to Cyber Space. |
CW |
2003 |
DBLP DOI BibTeX RDF |
|
43 | Ninad Jog |
The Dimensions of the Cyber Universe. |
ECAL |
2001 |
DBLP DOI BibTeX RDF |
|
43 | Kan-Min Lin, Nian-Shing Chen |
Exploring Learning Problems of Cyber University. |
ICALT |
2001 |
DBLP DOI BibTeX RDF |
|
42 | M. Luckas |
Performance evaluation of a formally supercomputer-based Monte Carlo program on a T800 transputer network. |
ICS |
1988 |
DBLP DOI BibTeX RDF |
CYBER 205 |
40 | Jan Kleissl, Yuvraj Agarwal |
Cyber-physical energy systems: focus on smart buildings. |
DAC |
2010 |
DBLP DOI BibTeX RDF |
LEED, ZNEB, cyber-physical, energy metering, embedded, energy management, buildings, smart grid |
40 | Mudasser Iqbal, Hock-Beng Lim |
A cyber-physical middleware framework for continuous monitoring of water distribution systems. |
SenSys |
2009 |
DBLP DOI BibTeX RDF |
scheduling, modeling, middleware, cyber-physical systems |
40 | John A. Stankovic |
Cyber physical systems: aspects as a basis for robustness and openness. |
AOSD |
2009 |
DBLP DOI BibTeX RDF |
robustness, aspect oriented programming, openness, cyber physical systems |
40 | Marius C. Bujorianu, Manuela-Luminita Bujorianu, Howard Barringer |
A Formal Framework for User Centric Control of Probabilistic Multi-agent Cyber-Physical Systems. |
CLIMA |
2008 |
DBLP DOI BibTeX RDF |
user centric control, stochastic model checking, multi agent systems, symmetries, bisimulation, runtime analysis, cyber-physical systems |
40 | In-Jung Kim, Cheol Won Lee, Eul-Gyu Im |
Changes of Cyber-Terrorism: Autonomous Terrors and Counter-Measures. |
ICCSA (2) |
2007 |
DBLP DOI BibTeX RDF |
autogenous terror, cyber terrorism, CERT, ISAC |
40 | Robin Snyder |
Combining an e-commerce simulation with a cyber-survivor exercise. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
cyber-survivor exercises, e-commerce simulation |
40 | Raquel L. Hill, Jalal Al-Muhtadi, Roy H. Campbell, Apu Kapadia, Prasad Naldurg, Anand Ranganathan |
A Middleware Architecture for Securing Ubiquitous Computing Cyber Infrastructures. |
IEEE Distributed Syst. Online |
2004 |
DBLP DOI BibTeX RDF |
Hestia, critical cyber infrastructure, security, ubiquitous computing, middleware |
39 | Yimin Cui, Tao Zou, Lufeng Zhang, Jinjing Zhao |
Network security simulation and evaluation. |
CSTST |
2008 |
DBLP DOI BibTeX RDF |
attack impacts, cyber attack modeling, cyber attack simulation, network security evaluation, network modeling |
39 | Massimiliano Albanese |
From Cyber Situational Awareness to Adaptive Cyber Defense: Leveling the Cyber Playing Field. |
From Database to Cyber Security |
2018 |
DBLP DOI BibTeX RDF |
|
37 | Ranjan Pal, Leana Golubchik |
Analyzing Self-Defense Investments in Internet Security under Cyber-Insurance Coverage. |
ICDCS |
2010 |
DBLP DOI BibTeX RDF |
cyber-insurance, Internet risks, self-defense investments, cyber-insurance coverage, co-operative and non co-operative users |
37 | Hai Zhuge |
Socio-Natural Thought Semantic Link Network: A Method of Semantic Networking in the Cyber Physical Society. |
AINA |
2010 |
DBLP DOI BibTeX RDF |
cyber physical society, humanlevel AI, semantics, cyber physical system, semantic link network |
36 | Jigang Liu, Tetsutaro Uehara |
Computer Forensics in Japan: A Preliminary Study. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
36 | Lim Seow San, Djasliana Binte Hussain, Lim Heng Loo, Zhuang Ronglin, Suraj Balasubramanian, Kelvin W. C. Foong, Tok Wee Wah, Muhammad Taufiq Bin Mahmud, Seah her Yuh, Lim Minmin, Emilia Joey Yim Shao'en, Jeremiah K. S. Seah, Sheryl Lim Jia Jin, Low Minghui, Lu Zhiyin |
Dental VR application for dental training. |
VRCAI |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Michael G. Hinchey, Yuan-Shun Dai, James L. Rash, Walt Truszkowski, Manish Madhusoodan |
Bionic autonomic nervous system and self-healing for NASA ANTS-like missions. |
SAC |
2007 |
DBLP DOI BibTeX RDF |
autonomous nano-technology swarm, reliability, autonomic computing, self-healing |
36 | Dong Hwi Lee, Kyong Ho Choi, Kuinam J. Kim, Sang Min Park |
Routing Information System and HOIDS for Detection Method of Vicious Attack in Large Networks. |
ISPA Workshops |
2006 |
DBLP DOI BibTeX RDF |
Vicious Attack, Early Warining, Routing Information, Intrusion Detection System |
36 | Carl Livadas, Robert Walsh, David E. Lapsley, W. Timothy Strayer |
Using Machine Learning Techniques to Identify Botnet Traffic. |
LCN |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Kam-Pui Chow, C. F. Chong, Pierre K. Y. Lai, Lucas Chi Kwong Hui, Kevin K. H. Pun, Wai Wan Tsang, H. W. Chan |
Digital Evidence Search Kit. |
SADFE |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Quentin Jones, Sheizaf Rafaeli |
What Do Virtual "Tells" Tell? Placing Cybersociety Research into a Hierarchy of Social Explanation. |
HICSS |
2000 |
DBLP DOI BibTeX RDF |
|
35 | Rino Falcone, Munindar P. Singh, Yao-Hua Tan |
Introduction: Bringing Together Humans and Artificial Agents in Cyber-Societies: A New Field of Trust Research. |
Trust in Cyber-societies |
2000 |
DBLP DOI BibTeX RDF |
|
34 | Ronald C. Dodge, Brian Hay, Kara L. Nance |
Standards-Based Cyber Exercises. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
34 | Nian-Shing Chen, Kinshuk, Chun-Wang Wei, Mao-Jui Wang |
A Framework for Social Presence in Synchronous Cyber Classrooms. |
ICALT |
2009 |
DBLP DOI BibTeX RDF |
|
34 | Ying Tan, Mehmet C. Vuran, Steve Goddard |
Spatio-Temporal Event Model for Cyber-Physical Systems. |
ICDCS Workshops |
2009 |
DBLP DOI BibTeX RDF |
|
34 | Marius C. Bujorianu, Howard Barringer |
An Integrated Specification Logic for Cyber-Physical Systems. |
ICECCS |
2009 |
DBLP DOI BibTeX RDF |
|
34 | Raghu K. Ganti, Yu-En Tsai, Tarek F. Abdelzaher |
SenseWorld: Towards Cyber-Physical Social Networks. |
IPSN |
2008 |
DBLP DOI BibTeX RDF |
Sensor map, Sensor networks, Social networking |
34 | Samuel N. Hamilton, Wendy L. Hamilton |
Adversary Modeling and Simulation in Cyber Warfare. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 31319 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|