The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "CECC"( http://dblp.L3S.de/Venues/CECC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/cecc

Publication years (Num. hits)
2017 (13) 2018 (20) 2019 (29)
Publication types (Num. hits)
inproceedings(59) proceedings(3)
Venues (Conferences, Journals, ...)
CECC(62)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 62 publication records. Showing 62 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Kaja Prislan, Igor Bernik, Gorazd Mesko, Rok Hacin, Blaz Markelj, Simon L. R. Vrhovec Cybercrime victimization and seeking help: A survey of students in Slovenia. Search on Bibsonomy CECC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Sebastiaan Alvarez Rodriguez, Erik van der Kouwe Meizodon: Security Benchmarking Framework for Static Android Malware Detectors. Search on Bibsonomy CECC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Martin Dietzfelbinger, Jörg Keller 0001 Determining Minimum Hash Width for Hash Chains. Search on Bibsonomy CECC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Antonios Dimitriadis, George Drosatos, Pavlos S. Efraimidis How much does a zero-permission Android app know about us? Search on Bibsonomy CECC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1 Proceedings of the Third Central European Cybersecurity Conference, CECC 2019, Munich, Germany, November 14-15, 2019 Search on Bibsonomy CECC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ziya Alper Genç, Gabriele Lenzini, Daniele Sgandurra Case Study: Analysis and Mitigation of a Novel Sandbox-Evasion Technique. Search on Bibsonomy CECC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Alexander Heckel, Daniel Spiekermann Network Forensic Investigation in OpenContrail Environments. Search on Bibsonomy CECC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Lamya Abdullah, Sebastian Hahn, Felix C. Freiling Achieving Consistency of Software Updates against Strong Attackers. Search on Bibsonomy CECC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Wojciech Mazurczyk, Krystian Powójski, Luca Caviglione IPv6 Covert Channels in the Wild. Search on Bibsonomy CECC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Andrew Sergeev, Eyal Ben-Sa'adon, Elad Tannenbaum, Asi Saar Combined side-channels malware detection for NFV infrastructure. Search on Bibsonomy CECC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Nico Vinzenz, Tobias Eggendorfer Forensic Investigations in Vehicle Data Stores. Search on Bibsonomy CECC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Andrej Cvetkovski, Flavio Esposito The Password Literacy in North Macedonia: A Case Study. Search on Bibsonomy CECC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Stefan Schorradt, Edita Bajramovic, Felix C. Freiling On the Feasibility of Secure Logging for Industrial Control Systems Using Blockchain. Search on Bibsonomy CECC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Maksim Goman A practical view on IT risk management process. Search on Bibsonomy CECC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Katarína Amrichová, Terézia Mézesová A Secure String Class Compliant with PCI DSS. Search on Bibsonomy CECC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Stefan Marksteiner, Zhendong Ma Approaching the Automation of Cyber Security Testing of Connected Vehicles. Search on Bibsonomy CECC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Pal-Stefan Murvay, Lucian Popa 0003, Bogdan Groza Accommodating Time-Triggered Authentication to FlexRay Demands. Search on Bibsonomy CECC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Anze Mihelic, Tomaz Hovelja, Simon L. R. Vrhovec Towards a delegation-type secure software development method. Search on Bibsonomy CECC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Aleksander Murko, Simon L. R. Vrhovec Bitcoin adoption: Scams and anonymity may not matter but trust into Bitcoin security does. Search on Bibsonomy CECC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Louis Tajan, Dirk Westhoff Retrospective Tracking of Suspects in GDPR Conform Mobile Access Networks Datasets. Search on Bibsonomy CECC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Tal Pavel From Fake News to Virtual Reality: Fake News and Digital Manipulations at the Age of Modern Technology. Search on Bibsonomy CECC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Uwe Ewald Digital Forensics vs. Due Process: Conflicting Standards or Complementary Approaches? Search on Bibsonomy CECC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Simon D. Duque Antón, Anna Pia Lohfink, Christoph Garth, Hans Dieter Schotten Security in Process: Detecting Attacks in Industrial Process Data. Search on Bibsonomy CECC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Simon D. Duque Antón, Anna Pia Lohfink, Hans Dieter Schotten Discussing the Feasibility of Acoustic Sensors for Side Channel-aided Industrial Intrusion Detection: An Essay. Search on Bibsonomy CECC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Andreas Schaffhauser SAT Solvers and their Limits with NFSR-based Stream Ciphers: an Example with Grain v1. Search on Bibsonomy CECC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Charles Varlei Neu, Ina Schiering, Avelino F. Zorzo Simulating and Detecting Attacks of Untrusted Clients in OPC UA Networks. Search on Bibsonomy CECC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Abdulaziz Altamimi, Nathan L. Clarke, Steven Furnell, Fudong Li 0001 Multi-Platform Authorship Verification. Search on Bibsonomy CECC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Pierre Graux, Jean-François Lalande, Valérie Viet Triem Tong Obfuscated Android Application Development. Search on Bibsonomy CECC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Stefan Marksteiner, Rudolf Ramler, Hannes Sochor Integrating Threat Modeling and Automated Test Case Generation into Industrialized Software Security Testing. Search on Bibsonomy CECC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Maksim Goman Towards unambiguous IT risk definition. Search on Bibsonomy CECC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Pal-Stefan Murvay, Bogdan Groza A brief look at the security of DeviceNet communication in industrial control systems. Search on Bibsonomy CECC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Peter Kieseberg, Sebastian Schrittwieser, Edgar R. Weippl Structural Limitations of B+-Tree forensics. Search on Bibsonomy CECC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Zoltán Szántó, Hunor Sándor, Béla Genge A Testbed for Performing Security Experiments with Software-Defined Industrial Control Systems. Search on Bibsonomy CECC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Damjan Fujs, Simon Vrhovec, Anze Mihelic What drives the motivation to self-protect on social networks?: The role of privacy concerns and perceived threats. Search on Bibsonomy CECC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mohammad Hajian Berenjestanaki, Mohammad Ali Akhaee Application Detection in Anonymous Communication Networks. Search on Bibsonomy CECC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Daniel Fraunholz, Daniel Schneider 0007, Janis Zemitis, Hans Dieter Schotten Hack My Company: An Empirical Assessment of Post-exploitation Behavior and Lateral Movement in Cloud Environments. Search on Bibsonomy CECC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Roman Pilipchuk, Stephan Seifermann, Robert Heinrich Aligning Business Process Access Control Policies with Enterprise Architecture. Search on Bibsonomy CECC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Gregor R. Krmelj, Matjaz Pancur, Miha Grohar, Mojca Ciglaric OpenSPA - An Open and Extensible Protocol for Single Packet Authorization. Search on Bibsonomy CECC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Tomás Bajtos, Pavol Sokol, Terézia Mézesová Virtual honeypots and detection of telnet botnets. Search on Bibsonomy CECC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sabine K. Witting Do ut des: Disseminating online child sexual abuse material for investigative purposes? Search on Bibsonomy CECC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Oliver Popov, Jesper Bergman, Christian Valassi A Framework for a Forensically Sound Harvesting the Dark Web. Search on Bibsonomy CECC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Petra Grd, Igor Tomicic, Miroslav Baca Privacy improvement model for biometric person recognition in ambient intelligence using perceptual hashing. Search on Bibsonomy CECC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Steffen Wendzel, Daniela Eller, Wojciech Mazurczyk One Countermeasure, Multiple Patterns: Countermeasure Variation for Covert Channels. Search on Bibsonomy CECC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1 Proceedings of the Central European Cybersecurity Conference 2018, CECC 2018, Ljubljana, Slovenia, November 15-16, 2018 Search on Bibsonomy CECC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Roman Pilipchuk Coping with Access Control Requirements in the Context of Mutual Dependencies between Business and IT. Search on Bibsonomy CECC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Melisa Geko, Simon Tjoa An Ontology Capturing the Interdependence of the General Data Protection Regulation (GDPR) and Information Security. Search on Bibsonomy CECC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Danaja Fabcic Povse It's all fun and games, and some legalese: data protection implications for increasing cyber-skills of employees through games. Search on Bibsonomy CECC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ziya Alper Genç, Gabriele Lenzini, Peter Y. A. Ryan Security Analysis of Key Acquiring Strategies Used by Cryptographic Ransomware. Search on Bibsonomy CECC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Daniel Spiekermann, Jörg Keller 0001, Tobias Eggendorfer Improving Lawful Interception in Virtual Datacenters. Search on Bibsonomy CECC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Petra Grd, Igor Tomicic, Miroslav Baca Children Privacy Protection in Video Surveillance Based on Automatic Age Estimation. Search on Bibsonomy CECC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jörg Keller 0001 Cycle Structure and Reachability Analysis for Cipher Spritz with Small N. Search on Bibsonomy CECC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Blaz Markelj, Sabina Zgaga Mobile Security: Two Generations of Potential Victims. Search on Bibsonomy CECC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Igor Bernik, Blaz Markelj, Simon Vrhovec (eds.) Advances in Cybersecurity - Proceedings of the 2017 Central European Cybersecurity Conference, CECC 2017, Ljubljana, Slovenia, November 16-17, 2017 Search on Bibsonomy CECC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Simon Vrhovec, Blaz Markelj Use of Mobile Devices in Hospitals and Perceived Data Breach Consequences: An Explorative Study. Search on Bibsonomy CECC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Irfan Bulut, Ali Gökhan Yavuz, R. Can Aygun Combat Mobile Evasive Malware via Deep Learning. Search on Bibsonomy CECC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Nerea Sainz de la Maza Doñabeitia, Miguel Hernández Boza, Javier Jiménez del Peso, José Ignacio Escribano Pablos Why Did I End Up Living in a Cave? Risks of IoT at home. Search on Bibsonomy CECC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Kaja Prislan, Branko Lobnikar, Igor Bernik Information Security Management Practices: Expectations and Reality. Search on Bibsonomy CECC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Anze Mihelic, Simon Vrhovec Explaining the Employment of Information Security Measures by Individuals in Organizations: The Self-protection Model. Search on Bibsonomy CECC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Samo Tomazic, Igor Bernik Preparation of Response Model to Cyber-attacks at Nuclear Facilities. Search on Bibsonomy CECC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Martin Böhm 0004, Ina Schiering, Diederich Wermser Security of IoT Cloud Services - A User-Oriented Test Approach. Search on Bibsonomy CECC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Michal Choras, Michal Wozniak 0001 Concept Drift Analysis for Improving Anomaly Detection Systems in Cybersecurity. Search on Bibsonomy CECC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ziya Alper Genç, Gabriele Lenzini, Peter Y. A. Ryan Cipher, the Random and the Ransom: A Survey on Current and Future Ransomware. Search on Bibsonomy CECC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #62 of 62 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license