Showing
1 - 20
results of
87
Skip to content
Warning:
Full texts of licensed resources are only available from the TBU university network. You are currently outside this network.
Please log in to access full texts
×
Portal K.UTB
Čeština
Login
TBU Catalog
e-resources
E-THESES
All Fields
Title
Author
Subject
Find
Advanced Search
Page will reload when a filter is removed.
Applied Filters:
Limit to articles with full text available
Page will reload when a filter is removed.
Show filters (1)
Limit to articles with full text available
Search Results - "Proceedings of the 18th International Conference on Availability, Reliability and Security"
Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
Showing
1 - 20
results of
87
Refine Results
Sort
Relevance
Date Descending
Date Ascending
1
Loading…
Real-world actor-based image steganalysis via classifier inconsistency detection
by
Lerch-Hostalot, Daniel
,
Megías, David
Year of Publication
08.01.2025
Get full text
Journal Article
Save to List
Saved in:
2
Loading…
A deep learning anomaly detection framework with explainability and robustness
Published in
Proceedings of the 18th International Conference on Availability, Reliability and Security
Get full text
Conference Proceeding
Save to List
Saved in:
3
Loading…
The DYNABIC approach to resilience of critical infrastructures
Published in
Proceedings of the 18th International Conference on Availability, Reliability and Security
Get full text
Conference Proceeding
Save to List
Saved in:
4
Loading…
Cookiescanner: An Automated Tool for Detecting and Evaluating GDPR Consent Notices on Websites
by
Gundelach, Ralf
,
Herrmann, Dominik
Published in
arXiv.org
(12.09.2023)
Get full text
Paper
Journal Article
Save to List
Saved in:
5
Loading…
HoneyICS: A High-interaction Physics-aware Honeynet for Industrial Control Systems
Published in
Proceedings of the 18th International Conference on Availability, Reliability and Security
Get full text
Conference Proceeding
Save to List
Saved in:
6
Loading…
Implementing Data Sovereignty: Requirements & Challenges from Practice
Published in
Proceedings of the 18th International Conference on Availability, Reliability and Security
Get full text
Conference Proceeding
Save to List
Saved in:
7
Loading…
STIXnet: A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports
Published in
Proceedings of the 18th International Conference on Availability, Reliability and Security
Get full text
Conference Proceeding
Save to List
Saved in:
8
Loading…
Exploiting Digital Twin technology for Cybersecurity Monitoring in Smart Grids
Published in
Proceedings of the 18th International Conference on Availability, Reliability and Security
Get full text
Conference Proceeding
Save to List
Saved in:
9
Loading…
Key Management Systems for Large-Scale Quantum Key Distribution Networks
Published in
Proceedings of the 18th International Conference on Availability, Reliability and Security
Get full text
Conference Proceeding
Save to List
Saved in:
10
Loading…
Explainable AI-based Intrusion Detection in the Internet of Things
Published in
Proceedings of the 18th International Conference on Availability, Reliability and Security
Get full text
Conference Proceeding
Save to List
Saved in:
11
Loading…
Breaching the Defense: Investigating FGSM and CTGAN Adversarial Attacks on IEC 60870-5-104 AI-enabled Intrusion Detection Systems
Published in
Proceedings of the 18th International Conference on Availability, Reliability and Security
Get full text
Conference Proceeding
Save to List
Saved in:
12
Loading…
Exploring Federated Learning for Speech-based Parkinson’s Disease Detection
Published in
Proceedings of the 18th International Conference on Availability, Reliability and Security
Get full text
Conference Proceeding
Save to List
Saved in:
13
Loading…
Digital Twin-Enhanced Incident Response for Cyber-Physical Systems
Published in
Proceedings of the 18th International Conference on Availability, Reliability and Security
Get full text
Conference Proceeding
Save to List
Saved in:
14
Loading…
SoK: A Systematic Review of TEE Usage for Developing Trusted Applications
Published in
Proceedings of the 18th International Conference on Availability, Reliability and Security
Get full text
Conference Proceeding
Save to List
Saved in:
15
Loading…
A Systematic Review of Threat Analysis and Risk Assessment Methodologies for Connected and Automated Vehicles
Published in
Proceedings of the 18th International Conference on Availability, Reliability and Security
Get full text
Conference Proceeding
Save to List
Saved in:
16
Loading…
Canary in Twitter Mine: Collecting Phishing Reports from Experts and Non-experts
Published in
Proceedings of the 18th International Conference on Availability, Reliability and Security
Get full text
Conference Proceeding
Save to List
Saved in:
17
Loading…
TRUSTEE: Towards the creation of secure, trustworthy and privacy-preserving framework
Published in
Proceedings of the 18th International Conference on Availability, Reliability and Security
Get full text
Conference Proceeding
Save to List
Saved in:
18
Loading…
Fairness of AI in Predicting the Risk of Recidivism: Review and Phase Mapping of AI Fairness Techniques
Published in
Proceedings of the 18th International Conference on Availability, Reliability and Security
Get full text
Conference Proceeding
Save to List
Saved in:
19
Loading…
Artificial Intelligence for next generation cybersecurity: The AI4CYBER framework
Published in
Proceedings of the 18th International Conference on Availability, Reliability and Security
Get full text
Conference Proceeding
Save to List
Saved in:
20
Loading…
Adversarial Machine Learning Attacks on Multiclass Classification of IoT Network Traffic
Published in
Proceedings of the 18th International Conference on Availability, Reliability and Security
Get full text
Conference Proceeding
Save to List
Saved in:
1
2
3
4
5
Next
[5]
RSS Feed
Email Search
Save Search
Search History
Back
Refine Results
Page will reload when a filter is selected or excluded.
Limit to articles from scholarly journals
Clear Filter
Limit to articles with full text available
Limit to Open Access content
Exclude newspaper articles
Include articles at other libraries
Expand results using synonyms
Format
Conference Proceeding
85 results
85
Journal Article
2 results
2
Subject Area
computer science
85 results
85
education
4 results
4
architecture
1 results
1
physics
1 results
1
Topic
computer science
85 results
85
computer science, information systems
85 results
85
computer science, theory & methods
85 results
85
science & technology
85 results
85
technology
85 results
85
security and privacy
19 results
19
See more
Language
English
87 results
87
Year of Publication
From:
To:
Database
Unpaywall
85 results
85
arXiv.org
2 results
2
ProQuest Technology Collection
1 results
1
ProQuest Central
1 results
1
ROAD: Directory of Open Access Scholarly Resources
1 results
1