1. Toward A Secure Account Recovery: Machine Learning Based User Modeling for protection of Account Recovery in a Managed Environment Alubala, Amos Imbati 2023 Theses Computer scienceMachine learning--Industrial applicationsData recovery (Computer science)CyberterrorismRandom noise theory
2. Preparing for compounding crises: Staff shortages and cyber-attack vulnerability in the era of COVID-19 Klindienst, Joshua; Ayanian, Shant; Schlegelmilch, Jeffrey; Akselrod, Hana 2022 Articles Computer networks--Security measuresCyberterrorismMedical careMedical personnelCOVID-19 (Disease)
3. Hard Drive Heritage: Digital Cultural Property in the Law of Armed Conflict Ong, Richard 2021 Articles CyberterrorismHumanitarian lawInternational relations--Law and legislationDigital media--Law and legislation
4. Security and Statistics on Power Grids Escobar Santoro, Mauro 2019 Theses Industrial engineeringElectrical engineeringCyberterrorismElectric power systems--Security measuresPower resources--Data processing
5. Stochastic defense against complex grid attacks Bienstock, Daniel; Escobar, Mauro 2018 Reports Computer securityStochastic systemsCyberterrorismElectric power
6. Understanding and Detecting Concurrency Attacks Gu, Rui; Gan, Bo; Ning, Yi; Cui, Heming; Yang, Junfeng 2016 Reports Computer scienceCyberterrorismSoftware engineering
7. Casting Out Demons: Sanitizing Training Data for Anomaly Sensors Cretu, Gabriela F.; Stavrou, Angelos; Locasto, Michael E.; Stolfo, Salvatore J.; Keromytis, Angelos D. 2008 Articles Computer scienceAnomaly detection (Computer security)Computer securityCyberterrorism