Works matching IS 25233246 AND DT 2025 AND VI 8 AND IP 1
1
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00295-9
- Scheliga, Daniel;
- Mäder, Patrick;
- Seeland, Marco
- Article
2
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00335-4
- Liu, Jingqiang;
- Liang, Ruigang;
- Zhu, Xiaoxi;
- Zhang, Yue;
- Liu, Yuling;
- Liu, Qixu
- Article
3
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00344-3
- Tong, Yuxin;
- Li, Shimin;
- Wang, Zhiwei;
- Zhang, Rui;
- Xue, Rui
- Article
4
- 2025
- Zhang, Shihao;
- Xiao, Yanhui;
- Tian, Huawei;
- Li, Xiaolong
- Correction Notice
5
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-025-00357-6
- Article
6
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00333-6
- Zhang, Shihao;
- Xiao, Yanhui;
- Tian, Huawei;
- Li, Xiaolong
- Article
7
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00316-7
- Article
8
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00329-2
- Zhang, Yuan;
- Song, Jiaru;
- Sun, Yongxiong;
- Gao, Zhanheng;
- Hu, Zhe;
- Sun, Minghui
- Article
9
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-025-00396-z
- Castillo Camargo, Rodrigo;
- Murcia Nieto, Juan;
- Rojas, Nicolás;
- Díaz-López, Daniel;
- Alférez, Santiago;
- Perales Gómez, Angel Luis;
- Nespoli, Pantaleone;
- Gómez Mármol, Félix;
- Karabiyik, Umit
- Article
10
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00332-7
- Lin, Chen Yang;
- Zhao, Hui;
- Liu, Jing Han
- Article
11
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00327-4
- Hou, Zezhou;
- Ren, Jiongjiong;
- Chen, Shaozhen
- Article
12
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00296-8
- Wang, Yalu;
- Han, Zhijie;
- Du, Ying;
- Li, Jie;
- He, Xin
- Article
13
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00331-8
- Liu, Nan;
- Jin, Chenhui;
- Yu, Junwei
- Article
14
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00319-4
- Nazish, Mir;
- Javid, Munika;
- Banday, M. Tariq
- Article
15
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00352-3
- Xu, Birong;
- Ye, Ximei;
- Wang, Xiaoyuan;
- Zhang, Zhipeng
- Article
16
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00318-5
- Zhu, Pengcheng;
- Jin, Xin;
- Jiang, Qian;
- Gao, Xueshuai;
- Wang, Puming;
- Yao, Shaowen;
- Zhou, Wei
- Article
17
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00301-0
- Mengmeng, Ge;
- Ruitao, Feng;
- Likun, Liu;
- Xiangzhan, Yu;
- Vinay, Sachidananda;
- Xiaofei, Xie;
- Yang, Liu
- Article
18
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00330-9
- Qian, Yaguan;
- Tao, Renhui;
- Du, Huabin;
- Wang, Bin
- Article
19
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00308-7
- Wang, Huanwei;
- Hao, Weining;
- Tang, Yonghe;
- Zhu, Bing;
- Dong, Weiyu;
- Liu, Wei
- Article
20
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00325-6
- Yan, Lianglin;
- Luo, Ming;
- Wang, Mingsheng
- Article
21
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-025-00361-w
- Zhang, Jie;
- Bu, Haoyu;
- Wen, Hui;
- Liu, Yongji;
- Fei, Haiqiang;
- Xi, Rongrong;
- Li, Lun;
- Yang, Yun;
- Zhu, Hongsong;
- Meng, Dan
- Article
22
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00326-5
- Zheng, Jian;
- Ren, Shumiao;
- Zhang, Jingyue;
- Kui, Yu;
- Li, Jingyi;
- Jiang, Qin;
- Wang, Shiyan
- Article
23
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00333-6
- Zhanga, Shihao;
- Xiaob, Yanhui;
- Tianc, Huawei;
- Lid, Xiaolong
- Article
24
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00315-8
- He, Kai;
- Shi, Shengyuan;
- Yin, Chunxiao;
- Wan, Hongyan;
- Shi, Jiaoli
- Article
25
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00317-6
- Tang, Weixuan;
- Rao, Yuan;
- Yang, Zuopeng;
- Peng, Fei;
- Cui, Xutong;
- Huang, Junhao;
- Zhu, Peijun
- Article
26
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00321-w
- Tian, Tian;
- Zhang, Chen;
- Jiang, Bo;
- Feng, Huamin;
- Lu, Zhigang
- Article
27
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00302-z
- Li, Yanjun;
- Zhang, Lixian;
- Lin, Yiping;
- Liu, Jian;
- Sun, Yani
- Article
28
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00292-y
- Zhang, Jiachen;
- Han, Daoqi;
- Lv, Zhaoxuan;
- Lu, Yueming;
- Duan, Junke;
- Liu, Yang;
- Zhang, Xinyu
- Article
29
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00288-8
- Li, Qiuxiang;
- Wu, Jianping
- Article
30
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00309-6
- Zhang, Han;
- Shi, Yong;
- Liu, Ming;
- Chen, Libo;
- Wu, Songyang;
- Xue, Zhi
- Article
31
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00300-1
- Huang, Ruiqi;
- Wu, Hua;
- Wang, Xiaohui;
- Cheng, Guang;
- Hu, Xiaoyan
- Article
32
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00320-x
- Wang, Ri;
- Li, Chen;
- Zhang, Kun;
- Tu, Bibo
- Article
33
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00312-x
- Zhu, Xueqi;
- Liu, Fangzhou;
- Jia, Yan;
- Xu, Jun;
- Wang, Peng
- Article
34
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00290-0
- Zhou, Hongfang;
- Pan, Heng;
- Zheng, Kangyun;
- Wu, Zongling;
- Xiang, Qingyu
- Article
35
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00326-5
- Zheng, Jian;
- Ren, Shumiao;
- Zhang, Jingyue;
- Kui, Yu;
- Li, Jingyi;
- Jiang, Qin;
- Wang, Shiyan
- Article
36
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00311-y
- Wu, Lin;
- Xie, Yulai;
- Li, Jin;
- Feng, Dan;
- Liang, Jinyuan;
- Wu, Yafeng
- Article
37
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00323-8
- Kerl, Malte;
- Bodin, Ulf;
- Schelén, Olov
- Article
38
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00307-8
- Wu, Guangli;
- Wang, Xingyue
- Article
39
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00294-w
- Ma, Yucheng;
- Shen, Peisong;
- Tian, Xue;
- Lv, Kewei;
- Chen, Chi
- Article
40
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00310-z
- Quiroga-Sánchez, Laura;
- Montoya, Germán A.;
- Lozano-Garzon, Carlos
- Article
41
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00305-w
- Xing, Xiaogang;
- Xu, Ming;
- Bai, Yujing;
- Yang, Dongdong
- Article