Free database of papers and journals






Results 1 to 18 of 18 articles found
2021

Toward Detection and Attribution of Cyber-Attacks in IoT-Enabled Cyber–Physical Systems

IEEE Internet of Things Journal (6.8 88), 8, 13712-13722.
2020

A systematic literature review of blockchain cyber security

2015

Cyber security readiness in the South Australian Government

Computer Standards & Interfaces (2.3 60), 37, 1-8.
2020

Energy Management for Cyber-Physical Cloud Systems

Future Generation Computer Systems (6.8 122), 105, 754-756.
2021

Cyber Security Challenges in Aviation Communication, Navigation, and Surveillance

Computers & Security (4.4 89), , 102516.

Artificial intelligence in cyber security: research advances, challenges, and opportunities

2018

Cyber-physical systems information gathering: A smart home case study

Computer Networks (4.3 131★★), 138, 1-12.
2020

Guest Editorial: Introduction to the Special Section on Cyber Security Threats and Defense Advance

2018

A cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence

Journal of Computational Science (3.6 49), 27, 394-409.
2018

Leakage Models and Inference Attacks on Searchable Encryption for Cyber-Physical Social Systems

IEEE Access (3 137), 6, 21828-21839.
2020

Efficient NTRU Lattice-Based Certificateless Signature Scheme for Medical Cyber-Physical Systems

Journal of Medical Systems (3.7 80), 44, .
2020

Have You Been a Victim of COVID-19-Related Cyber Incidents? Survey, Taxonomy, and Mitigation Strategies

IEEE Access (3 137), 8, 124134-124144.
2020

An Ensemble of Deep Recurrent Neural Networks for Detecting IoT Cyber Attacks Using Network Traffic

IEEE Internet of Things Journal (6.8 88), 7, 8852-8859.
2020

A novel proxy-oriented public auditing scheme for cloud-based medical cyber physical systems

2019

A Deep and Scalable Unsupervised Machine Learning System for Cyber-Attack Detection in Large-Scale Smart Grids

IEEE Access (3 137), 7, 80778-80788.
2019

A machine learning-based FinTech cyber threat attribution framework using high-level indicators of compromise

Future Generation Computer Systems (6.8 122), 96, 227-242.
2021

Provably Secure and Lightweight Identity-Based Authenticated Data Sharing Protocol for Cyber-Physical Cloud Environment

2019

Comprehending the IoT cyber threat landscape: A data dimensionality reduction technique to infer and characterize Internet-scale IoT probing campaigns

Digital Investigation (2.4 55), 28, S40-S49.
Anatomy of Results
The left numbers are the publication year, and the number of citations (hyperlink to the full citation report of the paper)
paranthesis after the journal provides its impact factor.
paranthesis after the author indicates the number of publications and Author's Impact Factor
EXALY
Authors
Journals
Institutions