Showing
1 - 20
results of
82
Skip to content
Warning:
Full texts of licensed resources are only available from the TBU university network. You are currently outside this network.
Please log in to access full texts
×
Portal K.UTB
Čeština
Login
TBU Catalog
e-resources
E-THESES
All Fields
Title
Author
Subject
Find
Advanced Search
Page will reload when a filter is removed.
Applied Filters:
Limit to articles with full text available
Page will reload when a filter is removed.
Show filters (1)
Limit to articles with full text available
Search Results - "Proceedings of the 18th International Conference on Availability, Reliability and Security"
Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
Showing
1 - 20
results of
82
Refine Results
Sort
Relevance
Date Descending
Date Ascending
1
Loading…
The DYNABIC approach to resilience of critical infrastructures
Published in
Proceedings of the 18th International Conference on Availability
,
Reliability and Security
Get full text
Conference Proceeding
Save to List
Saved in:
2
Loading…
HoneyICS: A High-interaction Physics-aware Honeynet for Industrial Control Systems
Published in
Proceedings of the 18th International Conference on Availability
,
Reliability and Security
Get full text
Conference Proceeding
Save to List
Saved in:
3
Loading…
Implementing Data Sovereignty: Requirements & Challenges from Practice
Published in
Proceedings of the 18th International Conference on Availability
,
Reliability and Security
Get full text
Conference Proceeding
Save to List
Saved in:
4
Loading…
STIXnet: A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports
Published in
Proceedings of the 18th International Conference on Availability
,
Reliability and Security
Get full text
Conference Proceeding
Save to List
Saved in:
5
Loading…
Exploiting Digital Twin technology for Cybersecurity Monitoring in Smart Grids
Published in
Proceedings of the 18th International Conference on Availability
,
Reliability and Security
Get full text
Conference Proceeding
Save to List
Saved in:
6
Loading…
Explainable AI-based Intrusion Detection in the Internet of Things
Published in
Proceedings of the 18th International Conference on Availability
,
Reliability and Security
Get full text
Conference Proceeding
Save to List
Saved in:
7
Loading…
Breaching the Defense: Investigating FGSM and CTGAN Adversarial Attacks on IEC 60870-5-104 AI-enabled Intrusion Detection Systems
Published in
Proceedings of the 18th International Conference on Availability
,
Reliability and Security
Get full text
Conference Proceeding
Save to List
Saved in:
8
Loading…
Digital Twin-Enhanced Incident Response for Cyber-Physical Systems
Published in
Proceedings of the 18th International Conference on Availability
,
Reliability and Security
Get full text
Conference Proceeding
Save to List
Saved in:
9
Loading…
Exploring Federated Learning for Speech-based Parkinson’s Disease Detection
Published in
Proceedings of the 18th International Conference on Availability
,
Reliability and Security
Get full text
Conference Proceeding
Save to List
Saved in:
10
Loading…
Key Management Systems for Large-Scale Quantum Key Distribution Networks
Published in
Proceedings of the 18th International Conference on Availability
,
Reliability and Security
Get full text
Conference Proceeding
Save to List
Saved in:
11
Loading…
SoK: A Systematic Review of TEE Usage for Developing Trusted Applications
Published in
Proceedings of the 18th International Conference on Availability
,
Reliability and Security
Get full text
Conference Proceeding
Save to List
Saved in:
12
Loading…
A Systematic Review of Threat Analysis and Risk Assessment Methodologies for Connected and Automated Vehicles
Published in
Proceedings of the 18th International Conference on Availability
,
Reliability and Security
Get full text
Conference Proceeding
Save to List
Saved in:
13
Loading…
Canary in Twitter Mine: Collecting Phishing Reports from Experts and Non-experts
Published in
Proceedings of the 18th International Conference on Availability
,
Reliability and Security
Get full text
Conference Proceeding
Save to List
Saved in:
14
Loading…
TRUSTEE: Towards the creation of secure, trustworthy and privacy-preserving framework
Published in
Proceedings of the 18th International Conference on Availability
,
Reliability and Security
Get full text
Conference Proceeding
Save to List
Saved in:
15
Loading…
Artificial Intelligence for next generation cybersecurity: The AI4CYBER framework
Published in
Proceedings of the 18th International Conference on Availability
,
Reliability and Security
Get full text
Conference Proceeding
Save to List
Saved in:
16
Loading…
Adversarial Machine Learning Attacks on Multiclass Classification of IoT Network Traffic
Published in
Proceedings of the 18th International Conference on Availability
,
Reliability and Security
Get full text
Conference Proceeding
Save to List
Saved in:
17
Loading…
Fairness of AI in Predicting the Risk of Recidivism: Review and Phase Mapping of AI Fairness Techniques
Published in
Proceedings of the 18th International Conference on Availability
,
Reliability and Security
Get full text
Conference Proceeding
Save to List
Saved in:
18
Loading…
On Deploying Quantum-Resistant Cybersecurity in Intelligent Infrastructures
Published in
Proceedings of the 18th International Conference on Availability
,
Reliability and Security
Get full text
Conference Proceeding
Save to List
Saved in:
19
Loading…
Risk Assessments in Virtual Power Plants with NESCOR Criteria, Practical Application, Advantages and Disadvantages
Published in
Proceedings of the 18th International Conference on Availability
,
Reliability and Security
Get full text
Conference Proceeding
Save to List
Saved in:
20
Loading…
A Quic(k) Security Overview: A Literature Research on Implemented Security Recommendations
Published in
Proceedings of the 18th International Conference on Availability
,
Reliability and Security
Get full text
Conference Proceeding
Save to List
Saved in:
1
2
3
4
5
Next
[5]
RSS Feed
Email Search
Save Search
Search History
Back
Refine Results
Page will reload when a filter is selected or excluded.
Limit to articles from scholarly journals
Clear Filter
Limit to articles with full text available
Limit to Open Access content
Exclude newspaper articles
Include articles at other libraries
Expand results using synonyms
Format
Conference Proceeding
82 results
82
Subject Area
computer science
82 results
82
education
4 results
4
architecture
1 results
1
Topic
computer science
82 results
82
computer science, information systems
82 results
82
computer science, theory & methods
82 results
82
science & technology
82 results
82
technology
82 results
82
security and privacy
19 results
19
See more
Language
English
82 results
82
Year of Publication
From:
To:
Database
Unpaywall
82 results
82