The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "CyberSec"( http://dblp.L3S.de/Venues/CyberSec )

URL (DBLP): http://dblp.uni-trier.de/db/conf/cybersec

Publication years (Num. hits)
2012 (61) 2014 (13) 2015 (28)
Publication types (Num. hits)
inproceedings(99) proceedings(3)
Venues (Conferences, Journals, ...)
CyberSec(102)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 102 publication records. Showing 102 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Teddy Mantoro, M. Iman Wahyudi, Media A. Ayu, Wendi Usino Real-Time Printed Document Authentication Using Watermarked QR Code. Search on Bibsonomy CyberSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Nabil Laoufi From Risk Analysis to the Expression of Security Requirements for Systems Information. Search on Bibsonomy CyberSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Chyquitha Danuputri, Teddy Mantoro, Mardi Hardjianto Data Security Using LSB Steganography and Vigenere Chiper in an Android Environment. Search on Bibsonomy CyberSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Muhammad Hilmi Kamarudin, Carsten Maple, Tim Watson, Hasliza Sofian Packet Header Intrusion Detection with Binary Logistic Regression Approach in Detecting R2L and U2R Attacks. Search on Bibsonomy CyberSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Takumi Akiyama, Kazuya Otani, Yoshio Kakizaki, Ryôichi Sasaki Evaluation of a Risk-Based Management Method for Online Accounts. Search on Bibsonomy CyberSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Kazuki Hashimoto, Hiroyuki Hiruma, Takashi Matsumoto, Kosetus Kayama, Yoshio Kaikizaki, Hiroshi Yamaki, Tetsutaro Uehara, Ryôichi Sasaki Development of Intellectual Network Forensic System LIFT against Targeted Attacks. Search on Bibsonomy CyberSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1P. D. Persadha, A. A. Waskita, S. Yazid Comparative Study of Cyber Security Policies among Malaysia, Australia, Indonesia: A Responsibility Perspective. Search on Bibsonomy CyberSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Sriram Raghavan, S. V. Raghavan Estimating Posterior Probabilities to Identify Breach Points during Cyber-attacks. Search on Bibsonomy CyberSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Herny Ramadhani Mohd Husny Hamid, Norhaiza Ya Abdullah Physical Authentication Using Random Number Generated (RNG) Keypad Based on One Time Pad (OTP) Concept. Search on Bibsonomy CyberSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Hyoseok Yoon, Se-Ho Park, Kyung-Taek Lee Exploiting Ambient Light Sensor for Authentication on Wearable Devices. Search on Bibsonomy CyberSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ahmad Budi Setiawan, Aries Syamsudin, Ashwin Sasongko Sastrosubroto Implementation of Secure Smart Grid as Critical Information Infrastructure in Indonesia: A Case Study in Smart Grid Electricity. Search on Bibsonomy CyberSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Makoto Sato, Akihiko Sugimoto, Naoki Hayashi, Yoshiaki Isobe, Ryôichi Sasaki Proposal of a Method for Identifying the Infection Route for Targeted Attacks Based on Malware Behavior in a Network. Search on Bibsonomy CyberSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Dwiki Jatikusumo, Hanny Hikmayanti H., Feriadi, Wendi Usino Securing Official Account Twitter Using Social Media Management System: Accuracy of the Data and Information Publish with Twitter. Search on Bibsonomy CyberSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Victor Wahanggara, Yudi Prayudi Malware Detection through Call System on Android Smartphone Using Vector Machine Method. Search on Bibsonomy CyberSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mikhail Styugin Analysis of Awareness Structures in Information Security Systems. Search on Bibsonomy CyberSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Abdullah Said Alkalbani, Teddy Mantoro, Sardjoeni Moedjiono, Media A. Ayu Hybrid Solution for Secured and Energy Aware Routing Path in Wireless Sensor Networks. Search on Bibsonomy CyberSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mohammad Ahmad Abu Allawi, Ali Hadi, Arafat Awajan MLDED: Multi-layer Data Exfiltration Detection System. Search on Bibsonomy CyberSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1 Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015 Search on Bibsonomy CyberSec The full citation details ... 2015 DBLP  BibTeX  RDF
1Herny Ramadhani Mohd Husny Hamid, Megat Ahmad Izzat bin Megat Ahmad Kamil, Norhaiza Ya Abdullah Portable Toolkit for Penetration Testing and Firewall Configuration. Search on Bibsonomy CyberSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ryohei Koizumi, Ryôichi Sasaki Study on Countermeasures Using Mitigation Software against Vulnerability Attacks. Search on Bibsonomy CyberSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Delwar Alam, Md. Alamgir Kabir, Touhid Bhuiyan, Tanjila Farah A Case Study of SQL Injection Vulnerabilities Assessment of .bd Domain Web Applications. Search on Bibsonomy CyberSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mohammad Imran, Muhammad Tanvir Afzal, Muhammad Abdul Qadir 0001 Similarity-Based Malware Classification Using Hidden Markov Model. Search on Bibsonomy CyberSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Normaziah Abdul Aziz, Fakhrulrazi Mokhti, M. Nadhar M. Nozri Mobile Device Forensics: Extracting and Analysing Data from an Android-Based Smartphone. Search on Bibsonomy CyberSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Manh Cong Tran, Yasuhiro Nakamura An Approach to Mine Suspicious Domain Based on HTTP Automated Software Communication Behavior. Search on Bibsonomy CyberSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Naoto Nakagawa, Yoshimi Teshigawara, Ryôichi Sasaki Development of a Detection and Responding System for Malware Communications by Using OpenFlow and Its Evaluation. Search on Bibsonomy CyberSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Norhaiza Ya Abdullah, Herny Ramadhani Mohd Husny Hamid Folder Lock by Using Multimodal Biometric: Fingerprint and Signature Authentication. Search on Bibsonomy CyberSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ali Tamimi, D. Subbaram Naidu, Sanaz Kavianpour An Intrusion Detection System Based on NSGA-II Algorithm. Search on Bibsonomy CyberSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ahmad Luthfi, Yudi Prayudi Process Model of Digital Forensics Readiness Scheme (DFRS) as a Recommendation of Digital Evidence Preservation. Search on Bibsonomy CyberSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mohd Najwadi Yusoff, Ramlan Mahmod, Mohd Taufik Abdullah, Ali Dehghantanha Mobile forensic data acquisition in Firefox OS. Search on Bibsonomy CyberSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Zakaria Zakaria Hassan, Talaat A. Elgarf, Abdelhalim Zekry Modifying authentication techniques in mobile communication systems. Search on Bibsonomy CyberSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Eric Holm, Geraldine Mackenzie The importance of mandatory data breach notification to identity crime. Search on Bibsonomy CyberSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1 Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2014, Beirut, Lebanon, April 29 - May 1, 2014 Search on Bibsonomy CyberSec The full citation details ... 2014 DBLP  BibTeX  RDF
1Iman Ahmeid Mohamed, Azizah Bt Abdul Manaf An enhancement of traceability model based-on scenario for digital forensic investigation process. Search on Bibsonomy CyberSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Neila Rjaibi, Nawel Gannouni, Latifa Ben Arfa Rabai, Anis Ben Aissa Modeling the propagation of security threats: An e-learning case study. Search on Bibsonomy CyberSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Omer K. Jasim Mohammad, Safia Abbas, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem Statistical analysis for random bits generation on quantum key distribution. Search on Bibsonomy CyberSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Heshem A. El Zouka, Mustafa M. Hosni On the power of quantum cryptography and computers. Search on Bibsonomy CyberSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Murdoch Watney Challenges pertaining to cyber war under international law. Search on Bibsonomy CyberSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mohd Najwadi Yusoff, Ramlan Mahmod, Ali Dehghantanha, Mohd Taufik Abdullah An approach for forensic investigation in Firefox OS. Search on Bibsonomy CyberSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1M. Kaddour, Nourdine Ait Tmazirte, Maan El Badaoui El Najjar, Z. Naja, Nazih Moubayed Autonomous integrity monitoring for GNSS localization using informational approach and iono-free measurements. Search on Bibsonomy CyberSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Emsaieb Geepalla Comparison between Alloy and Timed Automata for modelling and analysing of access control specifications. Search on Bibsonomy CyberSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Victor R. Kebande, Hein S. Venter A cognitive approach for botnet detection using Artificial Immune System in the cloud. Search on Bibsonomy CyberSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Xiaomei Quan, Hongbin Zhang Copy-move forgery detection in digital images based on local dimension estimation. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Bilal Al Sabbagh, Stewart Kowalski ST(CS)2 - Featuring socio-technical cyber security warning systems. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ida Madieha bt. Abdul Ghani Azmi, Sonny Zulhuda, Sigit Puspito Wigati Jarot Data breach on the critical information infrastructures: Lessons from the Wikileaks. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ghassan Samara, Wafaa A. H. Ali Alsalihy A new security mechanism for vehicular communication networks. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ala A. Abdulrazeg, Norita Md Norwawi, Nurlida Basir Security metrics to improve misuse case model. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Latifa Ben Arfa Rabai, Mouna Jouini, Marwa Nafati, Anis Ben Aissa, Ali Mili 0001 An economic model of security threats for cloud computing systems. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Caiyi Zhu, Xiangkun Dai Model of trust management based on finite state machine. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Edna Dias Canedo, Rafael Timóteo de Sousa Júnior, Rhandy Rafhael de Carvalho, Robson de Oliveira Albuquerque Trust model for private cloud. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Maryam Savari, Mohammad Montazerolzohour, Eng-Thiam Yeoh Combining encryption methods in multipurpose smart card. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Liam Smit, Adrie Stander, Jacques Ophoff Investigating the accuracy of base station information for estimating cellphone location. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Acklyn Murray, Sherali Zeadally, Angelyn Flowers An assessment of U.S. legislation on cybersecurity. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Warusia Yassin, Nur Izura Udzir, Zaiton Muda, Azizol Abdullah, Mohd Taufik Abdullah A Cloud-based Intrusion Detection Service framework. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mohsen Damshenas, Ali Dehghantanha, Ramlan Mahmoud, Solahuddin bin Shamsuddin Forensics investigation challenges in cloud computing environments. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Huyam Al-Amro, Eyas El-Qawasmeh Discovering security vulnerabilities and leaks in ASP.NET websites. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Sohail Khan, Mohammad Nauman, Abu Talib Othman, Shahrulniza Musa How secure is your smartphone: An analysis of smartphone security mechanisms. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Alireza Tamjidyamcholo Information security risk reduction based on genetic algorithm. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mohd Anuar Mat Isa, Jamalul-lail Ab Manan, Ramlan Mahmod, Habibah Hashim, Mar Yah Said, Nur Izura Udzir, Ali Dehghantanha Finest authorizing member of common criteria certification. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1M. P. Azuwa, Rabiah Ahmad, Shahrin Sahib, Solahuddin Shamsuddin A propose technical security metrics model for SCADA systems. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ramya Dharam, Sajjan G. Shiva Runtime monitors for tautology based SQL injection attacks. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Sina Manavi, Sadra Mohammadalian, Nur Izura Udzir, Azizol Abdullah Hierarchical secure virtualization model for cloud. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1K. SuganyaDevi, N. Malmurugan, R. Sivakumar OF-SMED: An optimal foreground detection method in surveillance system for traffic monitoring. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Salasiah Sulaiman, Zaiton Muda, Julia Juremi The new approach of Rijndael key schedule. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Davoud Mougouei, Wan Nurhayati Wan Ab. Rahman, Mohammad Moein Almasi Evaluating fault tolerance in security requirements of web services. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Kee-Won Kim, Jun-Cheol Jeon Cellular semi-systolic Montgomery Multiplier on finite fields. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Farhood Norouzizadeh Dezfouli, Ali Dehghantanha, Ramlan Mahmoud, Nor Fazlida Binti Mohd Sani, Solahuddin bin Shamsuddin Volatile memory acquisition using backup for forensic investigation. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jung-Ho Eom, Nam-Uk Kim, Sung-Hwan Kim, Tai-Myoung Chung Cyber military strategy for cyberspace superiority in cyber warfare. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Newton Howard, Sergey Kanareykin Intention awareness in cyber security. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Somdip Dey SD-EI: A cryptographic technique to encrypt images. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Solmaz Salehian, Farzaneh Masoumiyan, Nur Izura Udzir Energy-efficient intrusion detection in Wireless Sensor Network. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Xiangkun Dai, Caiyi Zhu, Yucui Guo P2P dynamic trust management system based on trust network. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Kamarularifin Abd. Jalil, Qatrunnada Binti Abdul Rahman Multiple trusted devices authentication protocol for ubiquitous computing applications. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Abdullahi Arabo, Fadi El-Moussa 0001 Security framework for smart devices. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Maryam Savari, Mohammad Montazerolzohour All about encryption in smart card. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mohammad Faiz Liew Abdullah, A. Z. Yonis Performance of LTE Release 8 and Release 10 in wireless communications. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ali Alkhalifah, John D'Ambra The role of Identity Management Systems in enhancing protection of user privacy. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Salah Bindahman, Nasriah Zakaria, Norsaadah Zakaria 3D body scanning technology: Privacy and ethical issues. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Maryam Tanha, Seyed Dawood Sajjadi Torshizi, Mohd Taufik Abdullah, Fazirulhisyam Hashim An overview of attacks against digital watermarking and their respective countermeasures. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Enos K. Mabuto, Hein S. Venter User-generated digital forensic evidence in graphic design applications. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1S. A. I. Yazid, M. A. Faizal, Rabiah Ahmad, S. Shahrin, Solahuddin Shamsuddin Enhancement of Asset value classification for Mobile devices. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Hadi KhorasaniZadeh, Norbik Bashah Idris, Jamalul-lail Ab Manan Distributed Intrusion Detection trust management through integrity and expertise evaluation. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Majid Nasirinejad, Alireza Ahmadian Yazdi SASy username and password management on the cloud. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Sumit Kumar, Shashikala Tapaswi A centralized detection and prevention technique against ARP poisoning. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Julia Juremi, Ramlan Mahmod, Salasiah Sulaiman A proposal for improving AES S-box with rotation and key-dependent. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Fakariah Hani Mohd Ali, Rozita Yunos, Mohd Azuan Mohamad Alias Simple port knocking method: Against TCP replay attack and port scanning. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Farid Daryabar, Ali Dehghantanha, Nur Izura Udzir, Nor Fazlida Binti Mohd Sani, Solahuddin bin Shamsuddin Towards secure model for SCADA systems. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ahmad Abusukhon, Mohammad Talib A novel network security algorithm based on private key encryption. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mohammed Ibrahim 0003, Mohd Taufik Abdullah, Ali Dehghantanha VoIP evidence model: A new forensic method for investigating VoIP malicious attacks. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Maryam Savari, Mohammad Montazerolzohour, Eng-Thiam Yeoh Comparison of ECC and RSA algorithm in multipurpose smart card application. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Thilla Rajaretnam The problem to consent to the collection, use, and disclosure of personal information in cyberspace. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Rabiah Ahmad, Zahri Yunos, Shahrin Sahib Understanding cyber terrorism: The grounded theory method applied. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Hamed Khiabani, Norbik Bashah Idris, Jamalul-lail Ab Manan Leveraging Remote Attestation to enhance the Unified Trust Model for WSNs. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mohammad Mahboubian, Nur Izura Udzir, Shamala Subramaniam, Nor Asilah Wati Abdul Hamid An alert fusion model inspired by artificial immune system. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mark Evered A transitive access control model for dynamic roles and attributes. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Fazli Bin Mat Nor, Kamarularifin Abd. Jalil, Jamalul-lail Ab Manan An enhanced remote authentication scheme to mitigate man-in-the-browser attacks. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, Kuala Lumpur, Malaysia, June 26-28, 2012 Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  BibTeX  RDF
1Pin Shen Teh, Shigang Yue, Andrew Beng Jin Teoh Improving keystroke dynamics authentication system via multiple feature fusion scheme. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1S. M. Nirkhi, Rajiv V. Dharaskar, V. M. Thakre Analysis of online messages for identity tracing in cybercrime investigation. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mohammed A. Alzain, Ben Soh, Eric Pardede A New approach using redundancy technique to improve security in cloud computing. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Eric Holm Identity crime: The challenges in the regulation of identity crime. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 102 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license