Works matching IS 25233246 AND DT 2022 AND VI 5 AND IP 1
1
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00131-y
- Yang, Ruipeng;
- Yu, Aimin;
- Cai, Lijun;
- Meng, Dan
- Article
2
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00125-w
- Wang, Feng;
- Zhou, Hang;
- Fang, Han;
- Zhang, Weiming;
- Yu, Nenghai
- Article
3
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00121-0
- Zhang, Weiwei;
- Xu, Zhengzi;
- Xiao, Yang;
- Xue, Yinxing
- Article
4
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00130-z
- Xiao, Haiyan;
- Wang, Lifang;
- Chang, Jinyong
- Article
5
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00126-9
- Awasthi, Anjaneya;
- Goel, Noopur
- Article
6
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00120-1
- Zhang, Yu;
- Zhong, Nanyu;
- You, Wei;
- Zou, Yanyan;
- Jian, Kunpeng;
- Xu, Jiahuan;
- Sun, Jian;
- Liu, Baoxu;
- Huo, Wei
- Article
7
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00132-x
- Renganathan, Vishnu;
- Yurtsever, Ekim;
- Ahmed, Qadeer;
- Yener, Aylin
- Article
8
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00128-7
- Jia, Kun;
- Liu, Chaoge;
- Liu, Qixu;
- Wang, Junnan;
- Liu, Jiazhi;
- Liu, Feng
- Article
9
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00122-z
- Liao, Zhijian;
- Huang, Qiong;
- Chen, Xinjian
- Article
10
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00124-x
- Fan, Zhaoshan;
- Wang, Qing;
- Jiao, Haoran;
- Liu, Junrong;
- Cui, Zelin;
- Liu, Song;
- Liu, Yuling
- Article
11
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00127-8
- Heino, Jenny;
- Hakkala, Antti;
- Virtanen, Seppo
- Article
12
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00123-y
- Eisele, Max;
- Maugeri, Marcello;
- Shriwas, Rachna;
- Huth, Christopher;
- Bella, Giampaolo
- Article
13
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00116-x
- Shi, Ji;
- Zou, Wei;
- Zhang, Chao;
- Tan, Lingxiao;
- Zou, Yanyan;
- Peng, Yue;
- Huo, Wei
- Article
14
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00129-6
- Varma, Gatha;
- Chauhan, Ritu;
- Singh, Dhananjay
- Article
15
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00129-6
- Varma, Gatha;
- Chauhan, Ritu;
- Singh, Dhananjay
- Article
16
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00115-y
- Bi, Lei;
- Lu, Xianhui;
- Luo, Junjie;
- Wang, Kunpeng;
- Zhang, Zhenfei
- Article
17
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00118-9
- Li, Ruishi;
- Yang, Yunfei;
- Liu, Jinghua;
- Hu, Peiwei;
- Meng, Guozhu
- Article
18
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00117-w
- Li, Lingyun;
- Lu, Xianhui;
- Wang, Kunpeng
- Article
19
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00117-w
- Li, Lingyun;
- Lu, Xianhui;
- Wang, Kunpeng
- Article
20
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-021-00108-3
- Lu, Xiaojuan;
- Li, Bohan;
- Liu, Meicheng;
- Lin, Dongdai
- Article
21
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00111-2
- Yang, Fengyu;
- Han, Yanni;
- Ding, Ying;
- Tan, Qian;
- Xu, Zhen
- Article
22
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00109-w
- Fernandez, Eduardo B.;
- Yoshioka, Nobukazu;
- Washizaki, Hironori;
- Yoder, Joseph
- Article
23
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00114-z
- Pinto, Rui;
- Gonçalves, Gil;
- Delsing, Jerker;
- Tovar, Eduardo
- Article
24
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00112-1
- Parkinson, Simon;
- Khana, Saad
- Article
25
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00113-0
- Sun, Shuo;
- Zhou, Yongbin;
- Ji, Yunfeng;
- Zhang, Rui;
- Tao, Yang
- Article
26
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00114-z
- Pinto, Rui;
- Gonçalves, Gil;
- Delsing, Jerker;
- Tovar, Eduardo
- Article
27
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00110-3
- Liu, Jian;
- Yan, Junjie;
- Jiang, Jun;
- He, Yitong;
- Wang, Xuren;
- Jiang, Zhengwei;
- Yang, Peian;
- Li, Ning
- Article
28
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00110-3
- Liu, Jian;
- Yan, Junjie;
- Jiang, Jun;
- He, Yitong;
- Wang, Xuren;
- Jiang, Zhengwei;
- Yang, Peian;
- Li, Ning
- Article
29
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-021-00107-4
- Yan, Chuyi;
- Zhang, Chen;
- Lu, Zhigang;
- Wang, Zehui;
- Liu, Yuling;
- Liu, Baoxu
- Article
30
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-021-00103-8
- Disha, Raisa Abedin;
- Waheed, Sajjad
- Article
31
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-021-00105-6
- Liu, Pengrui;
- Xu, Xiangrui;
- Wang, Wei
- Article
32
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-021-00106-5
- You, Yizhe;
- Jiang, Jun;
- Jiang, Zhengwei;
- Yang, Peian;
- Liu, Baoxu;
- Feng, Huamin;
- Wang, Xuren;
- Li, Ning
- Article
33
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-021-00104-7
- Rajmohan, Tanusan;
- Nguyen, Phu H.;
- Ferry, Nicolas
- Article