Digital Threats: Research and Practice
Abbreviation | Digital Threats |
ISSN | 2576-5337, 2692-1626 |
h-index | 10 |
Publication Information | Publisher: Association for Computing Machinery (ACM),Publishing cycle: ,Journal Type: journal,Open Access Journals: No |
Basic data | Year of publication: 2020,Proportion of original research papers: ,Self Citation Rate:, Gold OA Rate: |
Journal Citation Format
Those examples are references to articles in scholarly journals and how they are supposed to appear in your bibliography.
Not all journals organize their published articles in volumes and issues, so these fields are optional. Some electronic journals do not provide a page range, but instead list an article identifier. In a case like this it's safe to use the article identifier instead of the page range.
A journal article with 1 author
A journal article with 2 authors
A journal article with 3 authors
A journal article with 5 or more authors
Books Citation Format
Here are examples of references for authored and edited books.
Thesis Citation Format
Web sites Citation Format
Sometimes references to web sites should appear directly in the text rather than in the bibliography.
Patent Citation Format
Staying up late manually editing references? ivySCI automatically matches journals and helps you generate references with a single click.
Click the button below to start a free trial!
A Survey on Network Attack Surface Mapping
2024-1-10
Mitigating Data-only Attacks by Protecting Memory-resident Sensitive Data
2020-12-22
Modeling Realistic Adversarial Attacks against Network Intrusion Detection Systems
2021-6-19
On Collaboration and Automation in the Context of Threat Detection and Response with Privacy-Preserving Features
2024-12-9
Mapping the Interdisciplinary Research on Non-consensual Pornography: Technical and Quantitative Perspectives
2023-7-21
On Collaboration and Automation in the Context of Threat Detection and Response with Privacy-Preserving Features
2024-12-9
Social Media Authentication and Combating Deepfakes using Semi-fragile Invisible Image Watermarking
2024-10-12
Fuzzing and Symbolic Execution for Multipath Malware Tracing: Bridging Theory and Practice via Survey and Experiments
2024-10-11
TTPXHunter: Actionable Threat Intelligence Extraction as TTPs from Finished Cyber Threat Reports
2024-9-19
Advanced Persistent Threat Attack Detection Systems: A Review of Approaches, Challenges, and Trends
2024-9-17