The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "NSPW"( http://dblp.L3S.de/Venues/NSPW )

URL (DBLP): http://dblp.uni-trier.de/db/conf/nspw

Publication years (Num. hits)
1993 (29) 1994 (15) 1995-1996 (30) 1997-1999 (30) 2000 (16) 2001 (17) 2002 (19) 2003-2004 (26) 2005 (19) 2006-2007 (24) 2008-2009 (26) 2010 (15) 2011-2012 (26) 2013 (15) 2014-2015 (26) 2016-2017 (22) 2018-2019 (23) 2020-2021 (20) 2022-2023 (21)
Publication types (Num. hits)
inproceedings(388) proceedings(31)
Venues (Conferences, Journals, ...)
NSPW(419)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 116 occurrences of 95 keywords

Results
Found 419 publication records. Showing 419 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Florian Alt, Mariam Hassib, Verena Distler Human-centered Behavioral and Physiological Security. Search on Bibsonomy NSPW The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Conner Bradley, David Barrera 0003 Escaping Vendor Mortality: A New Paradigm for Extending IoT Device Longevity. Search on Bibsonomy NSPW The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Filipo Sharevski, Aziz N. Zeidieh "I Just Didn't Notice It: " Experiences with Misinformation Warnings on Social Media amongst Users Who Are Low Vision or Blind. Search on Bibsonomy NSPW The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Ivan Flechais, George Chalhoub Practical Cybersecurity Ethics: Mapping CyBOK to Ethical Concerns. Search on Bibsonomy NSPW The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Fangfei Yang, Weijie Huang, Kelly Kaoudis, Anjo Vahldiek-Oberwagner, Nathan Dautenhahn Endoprocess: Programmable and Extensible Subprocess Isolation. Search on Bibsonomy NSPW The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Mattea Sim, Kurt Hugenberg, Tadayoshi Kohno, Franziska Roesner A Scalable Inclusive Security Intervention to Center Marginalized & Vulnerable Populations in Security & Privacy Design. Search on Bibsonomy NSPW The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1 Proceedings of the 2023 New Security Paradigms Workshop, NSPW 2023, Segovia, Spain, September 18-21, 2023 Search on Bibsonomy NSPW The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Kopo Marvin Ramokapane, Awais Rashid ExD: Explainable Deletion. Search on Bibsonomy NSPW The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Partha Das Chowdhury, Karen Renaud 'Ought' should not assume 'Can'? Basic Capabilities in Cybersecurity to Ground Sen's Capability Approach. Search on Bibsonomy NSPW The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Laura Anna Kocksch, Estrid Sørensen Towards a Typology of Interdisciplinarity in Cybersecurity: Trade, Choice, and Agnostic-Antagonist. Search on Bibsonomy NSPW The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Michael Clark, Kent E. Seamons Passwords and Cryptwords: The Final Limits on Lengths. Search on Bibsonomy NSPW The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Partha Das Chowdhury, Andrés Domínguez Hernández, Kopo Marvin Ramokapane, Awais Rashid From Utility to Capability: A New Paradigm to Conceptualize and Develop Inclusive PETs. Search on Bibsonomy NSPW The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Yan Long, Kevin Fu Side Auth: Synthesizing Virtual Sensors for Authentication. Search on Bibsonomy NSPW The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Ian Slesinger, Lizzie Coles-Kemp, Niki Panteli, René Rydhof Hansen Designing Through The Stack: The Case for a Participatory Digital Security By Design. Search on Bibsonomy NSPW The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Caleb Malchik, Joan Feigenbaum Toward User Control over Information Access: A Sociotechnical Approach. Search on Bibsonomy NSPW The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Michael Clifford, Miriam Heller, Karl N. Levitt, Matt Bishop Autonomous Vehicle Security: Composing Attack, Defense, and Policy Surfaces. Search on Bibsonomy NSPW The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Gerard Buckley, Tristan Caulfield, Ingolf Becker "It may be a pain in the backside but..." Insights into the resilience of business after GDPR. Search on Bibsonomy NSPW The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1 Proceedings of the 2022 New Security Paradigms Workshop, NSPW 2022, North Conway, NH, USA, October 24-27, 2022 Search on Bibsonomy NSPW The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Alexander Hicks Transparency, Compliance, And Contestability When Code Is(n't) Law. Search on Bibsonomy NSPW The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Nathan Malkin Incidental Incremental In-Band Fingerprint Verification: a Novel Authentication Ceremony for End-to-End Encrypted Messaging. Search on Bibsonomy NSPW The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Karen Renaud, Rosalind Searle, Marc J. Dupuis Cybersecurity Regrets: I've had a few.... Je Ne Regrette. Search on Bibsonomy NSPW The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Kevin Gallagher 0001, Santiago Torres-Arias, Nasir D. Memon, Jessica Feldman COLBAC: Shifting Cybersecurity from Hierarchical to Horizontal Designs. Search on Bibsonomy NSPW The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Daniel W. Woods, Aaron Ceross Blessed Are The Lawyers, For They Shall Inherit Cybersecurity. Search on Bibsonomy NSPW The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Raúl Aranovich, Muting Wu, Dian Yu 0002, Katya Katsy, Benyamin Ahmadnia, Matthew Bishop, Vladimir Filkov, Kenji Sagae Beyond NVD: Cybersecurity meets the Semantic Web. Search on Bibsonomy NSPW The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Simon Parkin, Simon Arnell, Jeremy Ward Change that Respects Business Expertise: Stories as Prompts for a Conversation about Organisation Security. Search on Bibsonomy NSPW The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Karen Renaud, Rosalind Searle, Marc J. Dupuis Shame in Cyber Security: Effective Behavior Modification Tool or Counterproductive Foil? Search on Bibsonomy NSPW The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1 NSPW '21: New Security Paradigms Workshop, Virtual Event, USA, October 25 - 28, 2021 Search on Bibsonomy NSPW The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Jonas Hielscher, Annette Kluge, Uta Menges, M. Angela Sasse "Taking out the Trash": Why Security Behavior Change requires Intentional Forgetting. Search on Bibsonomy NSPW The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Arturs Lavrenovs, Éireann Leverett, Aaron Kaplan The tragedy of common bandwidth: rDDoS. Search on Bibsonomy NSPW The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Filipo Sharevski, Peter Jachim, Emma Pieroni, Nate Jachim VoxPop: An Experimental Social Media Platform for Calibrated (Mis)information Discourse. Search on Bibsonomy NSPW The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Scott Brookes Transcending the Teetering Tower of Trust: Demonstrated with Virtual Memory Fuses for Software Enclaves. Search on Bibsonomy NSPW The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Susan Landau 0001 Categorizing Uses of Communications Metadata: Systematizing Knowledge and Presenting a Path for Privacy. Search on Bibsonomy NSPW The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Jonathan M. Spring, April Galyardt, Allen D. Householder, Nathan M. VanHoudnos On managing vulnerabilities in AI/ML systems. Search on Bibsonomy NSPW The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Verena Distler, Gabriele Lenzini, Carine Lallemand, Vincent Koenig The Framework of Security-Enhancing Friction: How UX Can Help Users Behave More Securely. Search on Bibsonomy NSPW The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1 NSPW '20: New Security Paradigms Workshop 2020, Virtual Event, USA, October 26-29, 2020 Search on Bibsonomy NSPW The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Abe Singer, Matt Bishop Trust-Based Security; Or, Trust Considered Harmful. Search on Bibsonomy NSPW The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Debi Ashenden, Gail Ollis Putting the Sec in DevSecOps: Using Social Practice Theory to Improve Secure Software Development. Search on Bibsonomy NSPW The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Peter Jachim, Filipo Sharevski, Paige Treebridge TrollHunter [Evader]: Automated Detection [Evasion] of Twitter Trolls During the COVID-19 Pandemic. Search on Bibsonomy NSPW The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Justin Joque, S. M. Taiabul Haque Deconstructing Cybersecurity: From Ontological Security to Ontological Insecurity. Search on Bibsonomy NSPW The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Eric Spero, Robert Biddle Out of Sight, Out of Mind: UI Design and the Inhibition of Mental Models of Security. Search on Bibsonomy NSPW The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Nour Dabbour, Anil Somayaji Towards In-Band Non-Cryptographic Authentication. Search on Bibsonomy NSPW The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Marco Carvalho, Wolter Pieters, Elizabeth Stobert (eds.) NSPW '19: New Security Paradigms Workshop, San Carlos, Costa Rica, September 23-26, 2019 Search on Bibsonomy NSPW The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Simon Parkin, Trupti Patel, Isabel Lopez-Neira, Leonie Maria Tanczer Usability analysis of shared device ecosystem security: informing support for survivors of IoT-facilitated tech-abuse. Search on Bibsonomy NSPW The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Filipo Sharevski, Paige Treebridge, Jessica Westbrook Manipulation of perceived politeness in a web-based email discourse through a malicious browser extension. Search on Bibsonomy NSPW The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Alaadin Addas, Julie Thorpe, Amirali Salehi-Abari Towards models for quantifying the known adversary. Search on Bibsonomy NSPW The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Tristan Caulfield, Jonathan M. Spring, M. Angela Sasse Why Jenny can't figure out which of these messages is a covert information operation. Search on Bibsonomy NSPW The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Nathan Malkin, Serge Egelman, David A. Wagner 0001 Privacy controls for always-listening devices. Search on Bibsonomy NSPW The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Frank Capobianco, Rahul George, Kaiming Huang, Trent Jaeger, Srikanth V. Krishnamurthy, Zhiyun Qian, Mathias Payer, Paul L. Yu Employing attack graphs for intrusion detection. Search on Bibsonomy NSPW The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Mansoor Ahmed-Rengers FrameProv: towards end-to-end video provenance. Search on Bibsonomy NSPW The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Wolter Pieters Everything-as-a-hack: claims-making for access to digital and social resources. Search on Bibsonomy NSPW The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Fiona Westin, Sonia Chiasson Opt out of privacy or "go home": understanding reluctant privacy behaviours through the FoMO-centric design paradigm. Search on Bibsonomy NSPW The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Karen Renaud, Marc J. Dupuis Cyber security fear appeals: unexpectedly complicated. Search on Bibsonomy NSPW The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Vivien M. Rooney, Simon N. Foley An Online Consent Maturity Model: Moving from Acceptable Use Towards Ethical Practice. Search on Bibsonomy NSPW The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mark Burgess, Anil Somayaji After the BlockCLoud Apocalypse. Search on Bibsonomy NSPW The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Adam Trowbridge, Filipo Sharevski, Jessica Westbrook Malicious User Experience Design Research for Cybersecurity. Search on Bibsonomy NSPW The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Steve Dierker, Volker Roth 0002 Can Software Licenses Contribute to Cyberarms Control? Search on Bibsonomy NSPW The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Heather Vescent, Bob Blakley 0001 Shifting Paradigms: Using Strategic Foresight to Plan for Security Evolution. Search on Bibsonomy NSPW The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Matt Bishop, Carrie Gates, Karl N. Levitt Augmenting Machine Learning with Argumentation. Search on Bibsonomy NSPW The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Aaron Ceross, Andrew Simpson Rethinking the Proposition of Privacy Engineering. Search on Bibsonomy NSPW The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Marco Carvalho 0001, Matt Bishop, Anil Somayaji, Wolter Pieters, Mohammad Mannan (eds.) Proceedings of the New Security Paradigms Workshop, NSPW 2018, Windsor, UK, August 28-31, 2018 Search on Bibsonomy NSPW The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Diptendu Mohan Kar, Indrajit Ray, Jenna Gallegos, Jean Peccoud Digital Signatures to Ensure the Authenticity and Integrity of Synthetic DNA Molecules. Search on Bibsonomy NSPW The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Arne Padmos Against Mindset. Search on Bibsonomy NSPW The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Prashant Anantharaman, J. Peter Brady, Patrick Flathers, Vijay H. Kothari, Michael C. Millian, Jason Reeves, Nathan Reitinger, William G. Nisen, Sean W. Smith Going Dark: A Retrospective on the North American Blackout of 2038. Search on Bibsonomy NSPW The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Wolter Pieters On Security Singularities. Search on Bibsonomy NSPW The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Nick Merrill, Max T. Curran, John Chuang Is the Future of Authenticity All In Our Heads?: Moving Passthoughts From the Lab to the World. Search on Bibsonomy NSPW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1George Bissias, Brian Neil Levine, Nikunj Kapadia Market-based Security for Distributed Applications. Search on Bibsonomy NSPW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sean Peisert, Matt Bishop, Edward B. Talbot A Model of Owner Controlled, Full-Provenance, Non-Persistent, High-Availability Information Sharing. Search on Bibsonomy NSPW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Carlos Hernandez Gañán, Michael Ciere, Michel van Eeten Beyond the pretty penny: the Economic Impact of Cybercrime. Search on Bibsonomy NSPW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1 Proceedings of the 2017 New Security Paradigms Workshop, NSPW 2017, Santa Cruz, CA, USA, October 01-04, 2017 Search on Bibsonomy NSPW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sam Weber, Adam Shostack, Jon A. Solworth, Mary Ellen Zurko Panel: Empirically-based Secure OS Design. Search on Bibsonomy NSPW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yang Wang 0005 The Third Wave?: Inclusive Privacy and Security. Search on Bibsonomy NSPW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Borke Obada-Obieh, Anil Somayaji Can I believe you?: Establishing Trust in Computer Mediated Introductions. Search on Bibsonomy NSPW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Olgierd Pieczul, Simon N. Foley, Mary Ellen Zurko Developer-centered security and the symmetry of ignorance. Search on Bibsonomy NSPW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Scott Ruoti, Kent E. Seamons End-to-End Passwords. Search on Bibsonomy NSPW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jonathan M. Spring, Tyler Moore 0001, David J. Pym Practicing a Science of Security: A Philosophy of Science Perspective. Search on Bibsonomy NSPW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Karen Renaud, Merrill Warkentin Risk Homeostasis in Information Security: Challenges in Confirming Existence and Verifying Impact. Search on Bibsonomy NSPW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Gilmore R. Lundquist, Vishwath Mohan, Kevin W. Hamlen Searching for software diversity: attaining artificial diversity through program synthesis. Search on Bibsonomy NSPW The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Laura Fichtner, Wolter Pieters, André Teixeira 0001 Cybersecurity as a Politikum: implications of security discourses for infrastructures. Search on Bibsonomy NSPW The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Chad Heitzenrater, Andrew C. Simpson A case for the economics of secure software development. Search on Bibsonomy NSPW The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Scott Brookes, Stephen Taylor Rethinking operating system design: asymmetric multiprocessing for security and performance. Search on Bibsonomy NSPW The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Alexander Afanasyev, J. Alex Halderman, Scott Ruoti, Kent E. Seamons, Yingdi Yu, Daniel Zappala, Lixia Zhang 0001 Content-based security for the web. Search on Bibsonomy NSPW The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Hassan Halawa, Konstantin Beznosov, Yazan Boshmaf, Baris Coskun, Matei Ripeanu, Elizeu Santos-Neto Harvesting the low-hanging fruits: defending against automated large-scale cyber-intrusions by focusing on the vulnerable population. Search on Bibsonomy NSPW The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ranjbar A. Balisane, Andrew C. Martin Trusted execution environment-based authentication gauge (TEEBAG). Search on Bibsonomy NSPW The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Aokun Chen, Pratik Prabhanjan Brahma, Dapeng Oliver Wu, Natalie C. Ebner, Brandon Matthews, Jedidiah R. Crandall, Xuetao Wei, Michalis Faloutsos, Daniela Oliveira 0001 Cross-layer personalization as a first-class citizen for situation awareness and computer infrastructure security. Search on Bibsonomy NSPW The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Carrie Gates, Rainer Böhme, Mohammad Mannan, Serge Egelman (eds.) Proceedings of the 2016 New Security Paradigms Workshop, NSPW 2016, Granby, Colorado, USA, September 26-29, 2016 Search on Bibsonomy NSPW The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mark E. Fioravanti II, Matt Bishop, Richard Ford I'm not sure if we're okay: uncertainty for attackers and defenders. Search on Bibsonomy NSPW The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Alain Forget, Sonia Chiasson, Robert Biddle Choose Your Own Authentication. Search on Bibsonomy NSPW The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Raquel Hill, Devan Ray Donaldson Bridging the Trust Gap: Integrating Models of Behavior and Perception. Search on Bibsonomy NSPW The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Serge Egelman, Eyal Péer The Myth of the Average User: Improving Privacy and Security Systems through Individualization. Search on Bibsonomy NSPW The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Aaron Elliott, Scott Knight Towards Managed Role Explosion. Search on Bibsonomy NSPW The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mohammad Mannan, Arash Shahkar, Atieh Saberi Pirouz, Vladimir Rabotka Peace vs. Privacy: Leveraging Conflicting Jurisdictions for Email Security. Search on Bibsonomy NSPW The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Zinaida Benenson, Gabriele Lenzini, Daniela Oliveira 0001, Simon Parkin, Sven Uebelacker Maybe Poor Johnny Really Cannot Encrypt: The Case for a Complexity Theory for Usable Security. Search on Bibsonomy NSPW The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Peter Hall 0002, Claude Heath, Lizzie Coles-Kemp, Axel Tanner Examining the Contribution of Critical Visualisation to Information Security. Search on Bibsonomy NSPW The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Anil Somayaji, Paul C. van Oorschot, Mohammad Mannan, Rainer Böhme (eds.) Proceedings of the 2015 New Security Paradigms Workshop, NSPW 2015, Twente, The Netherlands, September 8-11, 2015 Search on Bibsonomy NSPW The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Odette Beris, Adam Beautement, M. Angela Sasse Employee Rule Breakers, Excuse Makers and Security Champions: : Mapping the risk perceptions and emotions that drive security behaviors. Search on Bibsonomy NSPW The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Riccardo Pelizzi, R. Sekar 0001 WebSheets: Web Applications for Non-Programmers. Search on Bibsonomy NSPW The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Trey Herr, Eric Armbrust Milware: Identification and Implications of State Authored Malicious Software. Search on Bibsonomy NSPW The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Christian T. Zenger, Jan Zimmer, Mario Pietersz, Jan-Felix Posielek, Christof Paar Exploiting the Physical Environment for Securing the Internet of Things. Search on Bibsonomy NSPW The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Cormac Herley, Wolter Pieters "If you were attacked, you'd be sorry": Counterfactuals as security arguments. Search on Bibsonomy NSPW The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Wolter Pieters, Dina Hadziosmanovic, Francien Dechesne Cyber Security as Social Experiment. Search on Bibsonomy NSPW The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 419 (100 per page; Change: )
Pages: [1][2][3][4][5][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license