The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "EISMC"( http://dblp.L3S.de/Venues/EISMC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/eismc

Publication years (Num. hits)
2013 (14)
Publication types (Num. hits)
inproceedings(13) proceedings(1)
Venues (Conferences, Journals, ...)
EISMC(14)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 14 publication records. Showing 14 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Rayne Reid, Johan Van Niekerk Towards a Brain-Compatible Approach for Web-Based, Information Security Education. Search on Bibsonomy EISMC The full citation details ... 2013 DBLP  BibTeX  RDF
1Melanie Volkamer, Steffen Bartsch, Michaela Kauer Contextualized Security Interventions in Password Transmission Scenarios. Search on Bibsonomy EISMC The full citation details ... 2013 DBLP  BibTeX  RDF
1Edwin Donald Frauenstein, Rossouw von Solms Using Theories and Best Practices to Bridge the Phishing Gap. Search on Bibsonomy EISMC The full citation details ... 2013 DBLP  BibTeX  RDF
1Waldo Rocha Flores Establishment of Security Knowledge Sharing in Organisations: An Empirical Study. Search on Bibsonomy EISMC The full citation details ... 2013 DBLP  BibTeX  RDF
1Christopher James Hargreaves Visualisation of allocated and unallocated data blocks in digital forensics. Search on Bibsonomy EISMC The full citation details ... 2013 DBLP  BibTeX  RDF
1Nickson M. Karie, Hein S. Venter An Ontological Framework for a Cloud Forensic Environment. Search on Bibsonomy EISMC The full citation details ... 2013 DBLP  BibTeX  RDF
1John Haggerty, Sheryllynne Haggerty, Mark John Taylor Visual Triage of Email Network Narratives for Digital Investigations. Search on Bibsonomy EISMC The full citation details ... 2013 DBLP  BibTeX  RDF
1Waldo Rocha Flores, Hannes Holm, Gustav Svensson, Göran Ericsson Using Phishing Experiments and Scenario-based Surveys to Understand Security Behaviours in Practice. Search on Bibsonomy EISMC The full citation details ... 2013 DBLP  BibTeX  RDF
1Maina M. Olembo, Timo Kilian, Simon Stockhardt, Andreas Hülsing, Melanie Volkamer Developing and Testing a Visual Hash Scheme. Search on Bibsonomy EISMC The full citation details ... 2013 DBLP  BibTeX  RDF
1Kathryn Parsons, Agata McCormac, Malcolm Robert Pattinson, Marcus A. Butavicius, Cate Jerram An Analysis of Information Security Vulnerabilities at Three Australian Government Organisations. Search on Bibsonomy EISMC The full citation details ... 2013 DBLP  BibTeX  RDF
1Steven Furnell, Nathan L. Clarke, Vasilios Katos (eds.) European Information Security Multi-Conference (EISMC 2013), Lisbon, Portugal, May 8-10, 2013. Proceedings Search on Bibsonomy EISMC The full citation details ... 2013 DBLP  BibTeX  RDF
1Karen Renaud, Joe Maguire 0001 Shrinking the Authentication Footprint. Search on Bibsonomy EISMC The full citation details ... 2013 DBLP  BibTeX  RDF
1Matthew Roberts, John Haggerty MetaFor: Metadata Signatures for Automated Remote File Identification in Forensic Investigations. Search on Bibsonomy EISMC The full citation details ... 2013 DBLP  BibTeX  RDF
1Kirsi Helkala, Tone Hoddø Bakås National Password Security Survey: Results. Search on Bibsonomy EISMC The full citation details ... 2013 DBLP  BibTeX  RDF
Displaying result #1 - #14 of 14 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license