The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "EICC"( http://dblp.L3S.de/Venues/EICC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/eicc

Publication years (Num. hits)
2020 (16) 2021 (19) 2022 (27) 2023 (35)
Publication types (Num. hits)
inproceedings(93) proceedings(4)
Venues (Conferences, Journals, ...)
EICC(97)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 97 publication records. Showing 97 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Johanna Henrich, Andreas Heinemann, Martin Stiemerling, Fabian Seidl Crypto-agile Design and Testbed for QKD-Networks. Search on Bibsonomy EICC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Frédéric Tronnier, Patrick Biker, Erik Baur, Sascha Löbner An Evaluation of Information Flows in Digital Euro Transactions Using Contextual Integrity Theory. Search on Bibsonomy EICC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Venkata Sai Charan Putrevu, Hrushikesh Chunduri, Mohan Anand Putrevu, Sandeep K. Shukla A Framework for Advanced Persistent Threat Attribution using Zachman Ontology. Search on Bibsonomy EICC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Martin Atzmueller, Sophia Sylvester, Rushed Kanawati Exploratory and Explanation-Aware Network Intrusion Profiling using Subgroup Discovery and Complex Network Analysis. Search on Bibsonomy EICC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Peter Hamm, Sebastian Pape 0001, David Harborth Acceptance Factors and Obstacles for Cryptocurrency Adoption. Search on Bibsonomy EICC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Lasse Nitz, Avikarsha Mandal DGA Detection Using Similarity-Preserving Bloom Encodings. Search on Bibsonomy EICC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Farzana Quayyum Collaboration between parents and children to raise cybersecurity awareness. Search on Bibsonomy EICC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Sascha Löbner, Christian Gartner, Frédéric Tronnier Privacy Preserving Data Analysis with the Encode, Shuffle, Analyse Architecture in Vehicular Data Sharing. Search on Bibsonomy EICC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Chibuzo Ukegbu, Ramesh Neupane, Hoda Mehrpouyan Ontology-based Framework for Boundary Verification of Safety and Security Properties in Industrial Control Systems. Search on Bibsonomy EICC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Umit Cali, Murat Kuzlu, Onur Elma, Osman Gazi Gucluturk, Ahmet Kilic, Ferhat Özgür Çatak Cybersecurity and Digital Privacy Aspects of V2X in the EV Charging Structure. Search on Bibsonomy EICC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Ciaran Reilly, Stephen O'Shaughnessy, Christina Thorpe Robustness of Image-Based Malware Classification Models trained with Generative Adversarial Networks. Search on Bibsonomy EICC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Allison Wylde In Alice and Bob, I trust? Search on Bibsonomy EICC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Yichao Wang, Budi Arief, Virginia Nunes Leal Franqueira, Anna Grace Coates, Caoilte Ó Ciardha Investigating the Availability of Child Sexual Abuse Materials in Dark Web Markets: Evidence Gathered and Lessons Learned. Search on Bibsonomy EICC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Chia-Mei Chen, Fang-Hsuan Hsu, Jenq-Neng Hwang Useful Cyber Threat Intelligence Relation Retrieval Using Transfer Learning. Search on Bibsonomy EICC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Agustín Walabonso Lara Romero, Juan Antonio Ternero Muñiz, Rafael M. Estepa-Alonso, Antonio Jose Estepa Alonso, Fernando Ruiz Robles, Jesús Esteban Díaz Verdejo HTTP Cyberattacks Detection through Automatic Signature Generation in multi-site IoT Deployments. Search on Bibsonomy EICC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Umit Cali, Ferhat Özgür Çatak, Zsolt György Balogh, Rita Maria Ugarelli, Martin Gilje Jaatun Cyber-physical Hardening of the Digital Water Infrastructure. Search on Bibsonomy EICC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Matteo Curcio Cybercrime and Video Games: Exploring children's safety in the gaming environment. Search on Bibsonomy EICC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Fariborz Lohrabi Pour, Dong Sam Ha Effect of Power Conversion Efficiency of the RF Energy Harvester on the Security and Data Rate of the Self-Sustainable IoT Devices. Search on Bibsonomy EICC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Vahiny Gnanasekaran, Katrien De Moor Usability, Security, and Privacy Recommendations for Mobile Parental Control. Search on Bibsonomy EICC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Jörg Keller 0001, Carina Heßeling Improving Covert Channel Bandwidth by Variable-Length Exponent Re-Coding in Floating-Point Representations. Search on Bibsonomy EICC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Aleksandra Mileva, Steffen Wendzel, Virginia N. L. Franqueira (eds.) Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference, EICC 2023, Stavanger, Norway, June 14-15, 2023 Search on Bibsonomy EICC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Anze Mihelic, Igor Bernik, Simon Vrhovec Older adults and tablet computers: Adoption and the role of perceived threat of cyber attacks. Search on Bibsonomy EICC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Georgios Agrafiotis, Eftychia Makri, Antonios Lalas, Konstantinos Votis, Dimitrios Tzovaras, Nikolaos Tsampieris A Deep Learning-based Malware Traffic Classifier for 5G Networks Employing Protocol-Agnostic and PCAP-to-Embeddings Techniques. Search on Bibsonomy EICC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Mordechai Guri CLOUDOSCOPE: Detecting Anti-Forensic Malware using Public Cloud Environments. Search on Bibsonomy EICC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Sidra Aslam, Ala Altaweel, Ibrahim Kamel Exposed-mode of Wormhole Attack in Opportunistic Mobile Networks: Impact Study and Analysis. Search on Bibsonomy EICC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Petra Grd, Ena Barcic, Igor Tomicic, Bogdan Okresa Duric Analysing the Impact of Gender Classification on Age Estimation. Search on Bibsonomy EICC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Umit Cali, Marthe Fogstad Dynge, Ahmed Idries, Sambeet Mishra, Ivanko Dmytro, Naser Hashemipour, Murat Kuzlu Digital Energy Platforms Considering Digital Privacy and Security by Design Principles. Search on Bibsonomy EICC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Robin Duraz, David Espes, Julien Francq, Sandrine Vaton Cyber Informedness: A New Metric using CVSS to Increase Trust in Intrusion Detection Systems. Search on Bibsonomy EICC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Alvhild Skjelvik, Arnstein Vestad Digital safety alarms - Exploring the understandings of the cybersecurity practice in Norwegian municipalities. Search on Bibsonomy EICC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Kris Heid, Vincent Andrae, Jens Heider Towards detecting device fingerprinting on iOS with API function hooking. Search on Bibsonomy EICC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Patrick Himler, Max Landauer, Florian Skopik, Markus Wurzenberger Towards Detecting Anomalies in Log-Event Sequences with Deep Learning: Open Research Challenges. Search on Bibsonomy EICC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Elvira Castillo-Fernández, Jesús Esteban Díaz Verdejo, Rafael M. Estepa-Alonso, Antonio Jose Estepa Alonso, Javier Muñoz-Calle, Germán Madinabeitia Multistep Cyberattacks Detection using a Flexible Multilevel System for Alerts and Events Correlation. Search on Bibsonomy EICC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Yashovardhan Sharma, Simon Birnbach, Ivan Martinovic RADAR: A TTP-based Extensible, Explainable, and Effective System for Network Traffic Analysis and Malware Detection. Search on Bibsonomy EICC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Omer Said Ozturk, Emre Ekmekcioglu, Orçun Çetin, Budi Arief, Julio C. Hernandez-Castro New Tricks to Old Codes: Can AI Chatbots Replace Static Code Analysis Tools? Search on Bibsonomy EICC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Venkata Satya Sai Ajay Daliparthi, Nurul Momen, Kurt Tutschku, Miguel de Prado ViSDM: A Liquid Democracy based Visual Data Marketplace for Sovereign Crowdsourcing Data Collection. Search on Bibsonomy EICC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Jan Wohlwender, Rolf Huesmann, Andreas Heinemann, Alexander Wiesmaier cryptolib: Comparing and selecting cryptography libraries. Search on Bibsonomy EICC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Steffen Wendzel, Luca Caviglione, Bernhard Fechner Steganography Hiding Patterns: A Brief Review. Search on Bibsonomy EICC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Andraz Hovnik, Luka Jelovcan, Anze Mihelic, Simon Vrhovec Exploring the Associations between Website Trustworthiness, Cookie Consent and Taking an Online Survey. Search on Bibsonomy EICC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Marek Janiszewski, Marcin Rytel, Piotr Lewandowski, Hubert Romanowski Creating vulnerabilities and exploits database of IoT devices. Search on Bibsonomy EICC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Febrianti Wibawa, Ferhat Özgür Çatak, Murat Kuzlu, Salih Sarp, Umit Cali Homomorphic Encryption and Federated Learning based Privacy-Preserving CNN Training: COVID-19 Detection Use-Case. Search on Bibsonomy EICC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Carina Heßeling, Jörg Keller 0001 Pareto-Optimal Covert Channels in Sensor Data Transmission. Search on Bibsonomy EICC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Gerhard Steinke, Ryan C. LaBrie, Satadipa Sarkar Recommendation for Continuous Ethical Analysis of AI Algorithms. Search on Bibsonomy EICC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Marek Pawlicki, Rafal Kozik, Michal Choras Comparison of neural network paradigms for their usefulness in a real-world network intrusion detection deployment and a proposed optimised approach. Search on Bibsonomy EICC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Jelizaveta Vakarjuk, Nikita Snetkov, Jan Willemson Russian Federal Remote E-voting Scheme of 2021 - Protocol Description and Analysis. Search on Bibsonomy EICC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Christian Oliva, Santiago Palmero Muñoz, Luis Fernando Lago-Fernández, David Arroyo Improving LSTMs' under-performance in Authorship Attribution for short texts. Search on Bibsonomy EICC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Aykan Inan Method for Approximating RSA Prime Factors. Search on Bibsonomy EICC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Carina Heßeling, Jörg Keller 0001, Sebastian Litzinger Kleptography in Authentication Protocols: Why is it Still Possible? Search on Bibsonomy EICC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Tin Tironsakkul, Manuel Maarek, Andrea Eross, Mike Just The Unique Dressing of Transactions: Wasabi CoinJoin Transaction Detection. Search on Bibsonomy EICC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Slawomir Matelski Human-Computable OTP Generator as an Alternative of the Two-Factor Authentication. Search on Bibsonomy EICC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Josep Domingo-Ferrer Ethics by Design in Decentralized Computing. Search on Bibsonomy EICC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Daniel Bub, Laura Hartmann, Zdravko Bozakov, Steffen Wendzel Towards Passive Identification of Aged Android Devices in the Home Network. Search on Bibsonomy EICC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Agathe Blaise, Elena Mihailescu, Bruno Vidalenc, Laurent Aufrechter, Darius Mihai, Mihai Carabas Learning Model Generalisation for Bot Detection. Search on Bibsonomy EICC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Alberto Pedrouzo-Ulloa, Fernando Pérez-González, David Vázquez-Padín Secure Collaborative Camera Attribution✱. Search on Bibsonomy EICC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Martin Atzmueller, Rushed Kanawati Explainability in Cyber Security using Complex Network Analysis: A Brief Methodological Overview. Search on Bibsonomy EICC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Inger Anne Tøndel, Gunnar Brataas SecureScale: Exploring Synergies between Security and Scalability in Software Development and Operation. Search on Bibsonomy EICC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Fulvio Valenza Next Generation of Hybrid Threats. Search on Bibsonomy EICC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1David Megías 0001, Roberto Di Pietro, Joaquín García-Alfaro (eds.) EICC 2022: European Interdisciplinary Cybersecurity Conference, Barcelona, Spain, June 15 - 16, 2022 Search on Bibsonomy EICC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Aleksandar Velinov, Aleksandra Mileva POSTER: Launching a ZIP Bomb on the DICOM-enabled Devices. Search on Bibsonomy EICC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Pawel Szumelda, Natan Orzechowski, Mariusz Rawski, Artur Janicki VHS-22 - A Very Heterogeneous Set of Network Traffic Data for Threat Detection. Search on Bibsonomy EICC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Ena Barcic, Petra Grd, Igor Tomicic, Bogdan Okresa Duric Age Estimation of Occluded Faces using EfficientNet-B3 CNN Model. Search on Bibsonomy EICC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Venkata Sai Charan Putrevu, Gowtham Ratnakaram, Sandeep K. Shukla DARK-KERNEL: Design and Implementation of a Kernel Level Active Darknet Sensor. Search on Bibsonomy EICC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Eileen Köhler, Daniel Spiekermann Smart Home as a Silent Witness - A Survey. Search on Bibsonomy EICC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Susanne Kießling, Thomas Hanka, Dominik Merli Salt&Pepper: Spice up Security Behavior with Cognitive Triggers. Search on Bibsonomy EICC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Miao Zhang, Shaoning Chen, Barbara Graziano Key Exchange and Management Schemes for Automotive Control Units. Search on Bibsonomy EICC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Teri Lenard, Roland Bolboaca A Statefull Firewall and Intrusion Detection System Enforced with Secure Logging for Controller Area Network. Search on Bibsonomy EICC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Anne Wagner, Anna Bakas, Shelia Kennison, Eric Chan-Tin A Comparison of SONA and MTurk for Cybersecurity Surveys. Search on Bibsonomy EICC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Laura Hartmann, Steffen Wendzel Detection of Anomalous Values within TIA Project Data History for Industrial Control Systems. Search on Bibsonomy EICC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Laura Hartmann, Steffen Wendzel How Feasible are Steganographic and Stealth Attacks on TIA Project Metadata of ICS: A Case Study with Real-world Data. Search on Bibsonomy EICC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Tomasz Koziak, Katarzyna Wasielewska, Artur Janicki How to Make an Intrusion Detection SystemAware of Steganographic Transmission. Search on Bibsonomy EICC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Mordechai Guri USBCulprit: USB-borne Air-Gap Malware. Search on Bibsonomy EICC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Jörg Keller 0001 Multilevel Network Steganography in Fountain Codes. Search on Bibsonomy EICC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Mari Langås, Sanna Løfqvist, Basel Katt, Thomas Haugan, Martin Gilje Jaatun With a Little Help from Your Friends: Collaboration with Vendors During Smart Grid Incident Response Exercises. Search on Bibsonomy EICC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Martin Gilje Jaatun, Geir M. Køien, Oksana Kulyk (eds.) EICC '21: European Interdisciplinary Cybersecurity Conference, Virtual Event, Romania, November 10-11, 2021 Search on Bibsonomy EICC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Manfred Hofmeier, Ulrike Lechner Operation Digital Ant: A Serious Game Approach to Collect Insider Threat Scenarios and Raise Awareness. Search on Bibsonomy EICC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Jörg Keller 0001 How to Tweak a Cryptographic Permutation by Direct Manipulation. Search on Bibsonomy EICC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Javier Hospital, David Megías 0001, Wojciech Mazurczyk Retransmission steganography in real-world scenarios: a practical study. Search on Bibsonomy EICC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Fabian Sterk, Andreas Heinemann It is not as simple as that: Playing out password security trainings in order to nudge password changes. Search on Bibsonomy EICC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Laura Hartmann, Sebastian Zillien, Steffen Wendzel Reset- and Reconnection-based Covert Channels in CoAP. Search on Bibsonomy EICC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Kris Heid, Jens Heider Automated, Dynamic Android App Vulnerability and Privacy Leak Analysis: Design Considerations, Required Components and Available Tools. Search on Bibsonomy EICC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Mayank Raikwar, Danilo Gligoroski Non-Interactive VDF Client Puzzle for DoS Mitigation. Search on Bibsonomy EICC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Roberto Román, Iluminada Baturone Sealed Storage for Low-Cost IoT Devices: an Approach Using SRAM PUFs and Post-Quantum Cryptography. Search on Bibsonomy EICC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Maria Leitner, Maximilian Frank, Wolfgang Hotwagner, Gregor Langner, Oliver Maurhart, Timea Pahi, Lenhard Reuter, Florian Skopik, Paul Smith 0001, Manuel Warum AIT Cyber Range: Flexible Cyber Security Environment for Exercises, Training and Research. Search on Bibsonomy EICC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Saffija Kasem-Madani, Timo Malderle, Felix Boes, Michael Meier 0001 Privacy-Preserving Warning Management for an Identity Leakage Warning Network. Search on Bibsonomy EICC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Daniel Spiekermann FAP: Design of an Architecture of a Forensic Access Point to Perform Online Access in a Forensically Sound Manner. Search on Bibsonomy EICC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Luka Jelovcan, Damjan Fujs, Simon Vrhovec, Anze Mihelic The role of information sensitivity in adoption of E2EE communication software. Search on Bibsonomy EICC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1David Megías 0001 Data hiding: New opportunities for security and privacy? Search on Bibsonomy EICC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Corinna Heinz, Wojciech Mazurczyk, Luca Caviglione Covert Channels in Transport Layer Security. Search on Bibsonomy EICC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Laura Hartmann, Steffen Wendzel Anomaly Detection in ICS based on Data-history Analysis. Search on Bibsonomy EICC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Luca Caviglione, Aleksandra Mileva, Steffen Wendzel (eds.) EICC 2020: European Interdisciplinary Cybersecurity Conference, Rennes, France, November 18, 2020 Search on Bibsonomy EICC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Jörg Keller 0001, Steffen Wendzel Covert Channels in One-Time Passwords Based on Hash Chains. Search on Bibsonomy EICC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Johannes Bouché, Lukas Atkinson, Martin Kappes Shadow-Heap: Preventing Heap-based Memory Corruptions by Metadata Validation. Search on Bibsonomy EICC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Damjan Fujs, Simon Vrhovec, Damjan Vavpotic A Novel Approach for Acquiring Training and Software Security Requirements. Search on Bibsonomy EICC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Sayar Karmakar, Sanchari Das Evaluating the Impact of COVID-19 on Cyberbullying through Bayesian Trend Analysis. Search on Bibsonomy EICC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Mario Kahlhofer, Michael Hölzl, Andreas Berger Towards Reconstructing Multi-Step Cyber Attacks in Modern Cloud Environments with Tripwires. Search on Bibsonomy EICC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Kris Heid, Jens Heider, Kasra Qasempour Raising Security Awareness on Mobile Systems through Gamification. Search on Bibsonomy EICC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Jongho Shin Cross-domain meta-learning for bug finding in the source codes with a small dataset. Search on Bibsonomy EICC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Hilde G. Corneliussen What Brings Women to Cybersecurity?: A Qualitative Study of Women's Pathways to Cybersecurity in Norway. Search on Bibsonomy EICC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #97 of 97 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license