Works matching DE "CYBER intelligence (Computer security)"
1
- Sensors (14248220), 2025, v. 25, n. 10, p. 3043, doi. 10.3390/s25103043
- Deshmukh, Amogh;
- de la Rosa, Peplluis Esteva;
- Rodriguez, Raul Villamarin;
- Dasari, Sandeep
- Article
2
- Washington Quarterly, 2022, v. 45, n. 1, p. 7, doi. 10.1080/0163660X.2022.2058185
- Article
3
- Simulation & Gaming, 2020, v. 51, n. 5, p. 586, doi. 10.1177/1046878120933312
- Coenraad, Merijke;
- Pellicone, Anthony;
- Ketelhut, Diane Jass;
- Cukier, Michel;
- Plane, Jan;
- Weintrop, David
- Article
4
- Government Technology, 2022, v. 35, n. 7, p. 42
- Article
5
- Government Technology, 2022, v. 35, n. 4, p. 10
- Article
6
- Government Technology, 2021, v. 34, n. 8, p. 18
- Article
7
- Government Technology, 2021, v. 34, n. 7, p. 24
- Article
8
- Government Technology, 2021, v. 34, n. 1, p. 42
- Article
9
- Government Technology, 2019, v. 32, n. 7, p. 44
- Article
10
- Government Technology, 2016, v. 29, n. 1, p. 8
- Article
11
- Government Technology, 2013, v. 26, n. 10, p. 30
- Article
12
- Artificial Intelligence Review, 2022, v. 55, n. 2, p. 1029, doi. 10.1007/s10462-021-09976-0
- Zhang, Zhimin;
- Ning, Huansheng;
- Shi, Feifei;
- Farha, Fadi;
- Xu, Yang;
- Xu, Jiabo;
- Zhang, Fan;
- Choo, Kim-Kwang Raymond
- Article
13
- Journal of Cybersecurity & Privacy, 2024, v. 4, n. 2, p. 340, doi. 10.3390/jcp4020017
- Burnap, Pete;
- Anthi, Eirini;
- Reineckea, Philipp;
- Williams, Lowri;
- Cao, Fengnian;
- Aldmoura, Rakan;
- Jones, Kevin
- Article
14
- Uporabna Informatika, 2022, v. 33, n. 5, p. 208
- Bregar, Andrej;
- Gjergjek, Sašo;
- Novak, Miran;
- Orlić, Damir
- Article
15
- Journal of Applied Information Science, 2024, v. 12, n. 2, p. 33
- Alexander, Cheryl Ann;
- Lidong Wang
- Article
16
- Mathematics & Informatics, 2019, v. 62, n. 3, p. 340
- Troitskaya, Olga;
- Bezumova, Olga;
- Lytkina, Elena;
- Shirikova, Tatyana
- Article
17
- Systems, 2022, v. 10, n. 2, p. N.PAG, doi. 10.3390/systems10020049
- Zeijlemaker, Sander;
- Rouwette, Etiënne A. J. A.;
- Cunico, Giovanni;
- Armenia, Stefano;
- von Kutzschenbach, Michael
- Article
18
- Systems, 2019, v. 7, n. 2, p. 21, doi. 10.3390/systems7020021
- Carter, Bryan;
- Adams, Stephen;
- Bakirtzis, Georgios;
- Sherburne, Tim;
- Beling, Peter;
- Horowitz, Barry;
- Fleming, Cody
- Article
19
- Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì, 2020, v. 10, n. 1/2, p. 84, doi. 10.15276/imms.v10.no1-2.84
- Хорошко, В. А.;
- Хохлачева, Ю. Е.;
- Аясрах, А.;
- Аль-Далваш, А.
- Article
20
- Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì, 2016, v. 6, n. 4, p. 322
- Gnatyuk, S.;
- Gnatyuk, V.;
- Kononovich, V.;
- Kononovich, I.
- Article
21
- Frontiers in Psychology, 2018, p. N.PAG, doi. 10.3389/fpsyg.2018.02133
- Buchler, Norbou;
- La Fleur, Claire Genevieve;
- Hoffman, Blaine;
- Rajivan, Prashanth;
- Marusich, Laura;
- Lightner, Lewis
- Article
22
- Middle East Report, 2023, n. 307/308, p. 7
- Article
23
- International Journal of Network Management, 2025, v. 35, n. 3, p. 1, doi. 10.1002/nem.70014
- Cunha Camargo, Arthur Vinícius;
- Granville, Lisandro;
- Bertholdo, Leandro M.
- Article
24
- Journal of Strategic Innovation & Sustainability, 2020, v. 15, n. 6, p. 68, doi. 10.33423/jsis.v15i6.3596
- Xiang (Michelle) Liu;
- Murphy, Diane
- Article
25
- Bulletin of the Atomic Scientists, 2012, v. 68, n. 5, p. 75, doi. 10.1177/0096340212459039
- Article
26
- Bulletin of the Atomic Scientists, 2012, v. 68, n. 2, p. 70, doi. 10.1177/0096340212438696
- Choucri, Nazli;
- Goldsmith, Daniel
- Article
27
- Security & Communication Networks, 2023, p. 1, doi. 10.1155/2023/3303122
- Chatziamanetoglou, Dimitrios;
- Rantos, Konstantinos
- Article
28
- Security & Communication Networks, 2022, v. 2022, p. 1, doi. 10.1155/2022/8477260
- Li, Yongfei;
- Guo, Yuanbo;
- Fang, Chen;
- Liu, Yingze;
- Chen, Qingli
- Article
29
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/5021125
- Kim, Heejung;
- Kim, Hwankuk
- Article
30
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/4577141
- Li, Jiawei;
- Zhang, Ru;
- Liu, Jianyi;
- Liu, Gongshen
- Article
31
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/8511258
- Zhang, Jiancong;
- Dong, Ping;
- Jin, Minyu;
- Tang, Yuting
- Article
32
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/7760509
- Zhang, Xiaohui;
- Miao, Xianghua;
- Xue, Mingying
- Article
33
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/3949292
- Gao, Chungang;
- Wang, Yongjie;
- Xiong, Xinli
- Article
34
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/2775249
- He, Ying;
- Maglaras, Leandros;
- Aliyu, Aliyu;
- Luo, Cunjin
- Article
35
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/7620125
- Odemis, Murat;
- Yucel, Cagatay;
- Koltuksuz, Ahmet
- Article
36
- Information & Security, 2024, v. 55, n. 1, p. 7, doi. 10.11610/isij.5500
- Tagarev, Todor;
- Sharkov, George;
- Kaloyanova, Kalinka;
- Yanakiev, Yantsislav;
- Stoianov, Nikolai
- Article
37
- Information & Security, 2021, v. 50, n. 1, p. 46, doi. 10.11610/isij.5024
- Yucel, Cagatay;
- Lockett, Adam;
- Chalkias, Ioannis;
- Mallis, Dimitrios;
- Katos, Vasilios
- Article
38
- Information & Security, 2020, v. 46, n. 2, p. 155, doi. 10.11610/isij.4611
- Sharkov, George;
- Papazov, Yavor;
- Todorova, Christina;
- Koykov, Georgi;
- Zahariev, Georgi
- Article
39
- Information & Security, 2020, v. 45, p. 35, doi. 10.11610/isij.4503
- Article
40
- Information & Security, 2020, v. 44, p. 53, doi. 10.11610/isij.4405
- Article
41
- Information & Security, 2020, v. 44, p. 39, doi. 10.11610/isij.4404
- Yanakiev, Yantsislav;
- Polimirova, Dimitrina
- Article
42
- Information & Security, 2020, v. 44, p. 9, doi. 10.11610/isij.4401
- Brill, Alan;
- Fairtlough, Jonathan
- Article
43
- Information & Security, 2019, v. 43, n. 1-3, p. 385, doi. 10.11610/isij.4329
- Article
44
- Information & Security, 2019, v. 43, n. 1-3, p. 175, doi. 10.11610/isij.4315
- Article
45
- Information & Security, 2019, v. 43, n. 1-3, p. 236, doi. 10.11610/isij.4318
- Pöyhönen, Jouni;
- Nuojua, Viivi;
- Lehto, Martti;
- Rajamäki, Jyri
- Article
46
- Information & Security, 2019, v. 43, n. 1-3, p. 215, doi. 10.11610/isij.4317
- Rajamäki, Jyri;
- Tikanmäki, Ilkka;
- Räsänen, Jari
- Article
47
- Information & Security, 2019, v. 43, n. 1-3, p. 21, doi. 10.11610/isij.4302
- Mengidis, Notis;
- Tsikrika, Theodora;
- Vrochidis, Stefanos;
- Kompatsiaris, Ioannis
- Article
48
- Information & Security, 2019, v. 43, n. 1-3, p. 7, doi. 10.11610/isij.4300
- Article
49
- Information (2078-2489), 2025, v. 16, n. 2, p. 126, doi. 10.3390/info16020126
- Jain, Vikas Kumar;
- Aggrawal, Jatin;
- Dangi, Ramraj;
- Prasad Shukla, Shiv Shankar;
- Yadav, Anil Kumar;
- Choudhary, Gaurav
- Article
50
- Information (2078-2489), 2023, v. 14, n. 10, p. 561, doi. 10.3390/info14100561
- Jeong, Giseok;
- Kim, Kookjin;
- Yoon, Sukjoon;
- Shin, Dongkyoo;
- Kang, Jiwon
- Article