Results
Found 6468 publication records. Showing 6468 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
41 | Peyman Kabiri, Mahdieh Chavoshi |
Destructive Attacks Detection and Response System for Physical Devices in Cyber-Physical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2019 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Oxford, United Kingdom, June 3-4, 2019, pp. 1-6, 2019, IEEE, 978-1-7281-0229-0. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
41 | Kalle Rindell, Johannes Holvitie |
Security Risk Assessment and Management as Technical Debt. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2019 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Oxford, United Kingdom, June 3-4, 2019, pp. 1-8, 2019, IEEE, 978-1-7281-0229-0. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
41 | Mahin Talukder, Syed Islam, Paolo Falcarin |
Analysis of Obfuscated Code with Program Slicing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2019 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Oxford, United Kingdom, June 3-4, 2019, pp. 1-7, 2019, IEEE, 978-1-7281-0229-0. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
41 | Yogesh Patel 0001, Karim Ouazzane, Vassil T. Vassilev, Ibrahim Faruqi, George L. Walker |
Keystroke Dynamics using Auto Encoders. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2019 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Oxford, United Kingdom, June 3-4, 2019, pp. 1-8, 2019, IEEE, 978-1-7281-0229-0. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
41 | Yunjia Wang, Ishbel Duncan |
A Novel Method to Prevent Phishing by using OCR Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2019 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Oxford, United Kingdom, June 3-4, 2019, pp. 1-5, 2019, IEEE, 978-1-7281-0229-0. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
41 | Marios Ioannou, Eliana Stavrou, Maria Bada |
Cybersecurity Culture in Computer Security Incident Response Teams: Investigating difficulties in communication and coordination. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2019 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Oxford, United Kingdom, June 3-4, 2019, pp. 1-4, 2019, IEEE, 978-1-7281-0229-0. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
41 | J. D. Work |
In wolf's clothing: Complications of threat emulation in contemporary cyber intelligence practice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2019 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Oxford, United Kingdom, June 3-4, 2019, pp. 1-8, 2019, IEEE, 978-1-7281-0229-0. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
41 | George O. M. Yee |
Attack Surface Identification and Reduction Model Applied in Scrum. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2019 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Oxford, United Kingdom, June 3-4, 2019, pp. 1-8, 2019, IEEE, 978-1-7281-0229-0. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
41 | Suleiman Y. Yerima, Sarmadullah Khan |
Longitudinal performance analysis of machine learning based Android malware detectors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2019 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Oxford, United Kingdom, June 3-4, 2019, pp. 1-8, 2019, IEEE, 978-1-7281-0229-0. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
41 | Zirak Allaf, Mo Adda, Alexander E. Gegov |
TrapMP: Malicious Process Detection By Utilising Program Phase Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2019 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Oxford, United Kingdom, June 3-4, 2019, pp. 1-8, 2019, IEEE, 978-1-7281-0229-0. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
41 | Ruitao Kee, Jovan Sie, Rhys Wong, Chern Nam Yap |
Arithmetic Circuit Homomorphic Encryption and Multiprocessing Enhancements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2019 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Oxford, United Kingdom, June 3-4, 2019, pp. 1-5, 2019, IEEE, 978-1-7281-0229-0. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
41 | Sikha Bagui, Debarghya Nandi, Subhash C. Bagui, Robert Jamie White |
Classifying Phishing Email Using Machine Learning and Deep Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2019 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Oxford, United Kingdom, June 3-4, 2019, pp. 1-2, 2019, IEEE, 978-1-7281-0229-0. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
41 | Pranshu Bajpai, Tyler Olsen, Seth Edgar, Rob McCurdy, Richard J. Enbody |
BATSense: Anomalous Security Event Detection using TBATS Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2019 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Oxford, United Kingdom, June 3-4, 2019, pp. 1-8, 2019, IEEE, 978-1-7281-0229-0. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
41 | Kamalakanta Sethi, Rahul Kumar, Lingaraj Sethi, Padmalochan Bera, Prashanta Kumar Patra |
A Novel Machine Learning Based Malware Detection and Classification Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2019 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Oxford, United Kingdom, June 3-4, 2019, pp. 1-4, 2019, IEEE, 978-1-7281-0229-0. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
41 | Aunshul Rege, Katorah Williams, Alyssa Mendlein |
A Social Engineering Course Project for Undergraduate Students Across Multiple Disciplines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2019 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Oxford, United Kingdom, June 3-4, 2019, pp. 1-8, 2019, IEEE, 978-1-7281-0229-0. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
41 | Martin Lundgren, Erik Bergström |
Security-Related Stress: A Perspective on Information Security Risk Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2019 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Oxford, United Kingdom, June 3-4, 2019, pp. 1-8, 2019, IEEE, 978-1-7281-0229-0. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
41 | |
2018 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Glasgow, Scotland, United Kingdom, June 11-12, 2018 ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![IEEE, 978-1-5386-4683-0 The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
41 | Rajesh Ganesan, Ankit Shah 0002 |
A Strategy for Effective Alert Analysis at a Cyber Security Operations Center. ![Search on Bibsonomy](Pics/bibsonomy.png) |
From Database to Cyber Security ![In: From Database to Cyber Security - Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday, pp. 206-226, 2018, Springer, 978-3-030-04833-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
41 | Mirko Bottarelli, Gregory Epiphaniou, Dhouha Kbaier Ben Ismail, Petros Karadimas, Haider M. Al-Khateeb |
Quantisation feasibility and performance of RSS-based secret key extraction in VANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2018 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Glasgow, Scotland, United Kingdom, June 11-12, 2018, pp. 1-8, 2018, IEEE, 978-1-5386-4683-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
41 | Baskoro Adi Pratomo, Pete Burnap, George Theodorakopoulos 0001 |
Unsupervised Approach for Detecting Low Rate Attacks on Network Traffic with Autoencoder. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2018 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Glasgow, Scotland, United Kingdom, June 11-12, 2018, pp. 1-8, 2018, IEEE, 978-1-5386-4683-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
41 | Daniel Fraunholz, Daniel Krohmer, Hans Dieter Schotten, Carolina Nogueira |
Introducing Falcom: A Multifunctional High-Interaction Honeypot Framework for Industrial and Embedded Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2018 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Glasgow, Scotland, United Kingdom, June 11-12, 2018, pp. 1-8, 2018, IEEE, 978-1-5386-4683-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
41 | Halldis Sohoel, Martin Gilje Jaatun, Colin Boyd |
OWASP Top 10 - Do Startups Care? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2018 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Glasgow, Scotland, United Kingdom, June 11-12, 2018, pp. 1-8, 2018, IEEE, 978-1-5386-4683-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
41 | Andre Sorensen, Maxime Jerome Remy, Nicolaj Kjettrup, Rasmi Vlad Mahmoud, Jens Myrup Pedersen |
An Approach to Detect and Prevent Cybercrime in Large Complex Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2018 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Glasgow, Scotland, United Kingdom, June 11-12, 2018, pp. 1-8, 2018, IEEE, 978-1-5386-4683-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
41 | Domhnall Carlin, Philip O'Kane, Sakir Sezer |
Dynamic Opcode Analysis of Ransomware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2018 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Glasgow, Scotland, United Kingdom, June 11-12, 2018, pp. 1-4, 2018, IEEE, 978-1-5386-4683-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
41 | Egon Kidmose, Matija Stevanovic, Jens Myrup Pedersen |
Detection of Malicious domains through lexical analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2018 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Glasgow, Scotland, United Kingdom, June 11-12, 2018, pp. 1-5, 2018, IEEE, 978-1-5386-4683-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
41 | Paul A. Wortman, Fatemeh Tehranipoor, John A. Chandy |
An Adversarial Risk-based Approach for Network Architecture Security Modeling and Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2018 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Glasgow, Scotland, United Kingdom, June 11-12, 2018, pp. 1-8, 2018, IEEE, 978-1-5386-4683-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
41 | Kimberly Tam, Kevin D. Jones |
Cyber-Risk Assessment for Autonomous Ships. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2018 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Glasgow, Scotland, United Kingdom, June 11-12, 2018, pp. 1-8, 2018, IEEE, 978-1-5386-4683-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
41 | Farhad Foroughi, Peter Luksch 0001 |
Observation Measures to Profile User Security Behaviour. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2018 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Glasgow, Scotland, United Kingdom, June 11-12, 2018, pp. 1-6, 2018, IEEE, 978-1-5386-4683-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
41 | Andres Robles-Durazno, Naghmeh Moradpoor, James McWhinnie, Gordon Russell 0001 |
A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2018 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Glasgow, Scotland, United Kingdom, June 11-12, 2018, pp. 1-8, 2018, IEEE, 978-1-5386-4683-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
41 | Sean McKeown, Gordon Russell 0001, Petra Leimich |
Reducing the Impact of Network Bottlenecks on Remote Contraband Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2018 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Glasgow, Scotland, United Kingdom, June 11-12, 2018, pp. 1-7, 2018, IEEE, 978-1-5386-4683-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
41 | Santhosh Parampottupadam, Arghir-Nicolae Moldovan |
Cloud-based Real-time Network Intrusion Detection Using Deep Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2018 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Glasgow, Scotland, United Kingdom, June 11-12, 2018, pp. 1-8, 2018, IEEE, 978-1-5386-4683-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
41 | Bob Duncan |
Attackers Constantly Threaten the Survival of Organisations, but there is a New Shark in the Water: Carcharodon Carcharias Moderator Europa Universalis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2018 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Glasgow, Scotland, United Kingdom, June 11-12, 2018, pp. 1-5, 2018, IEEE, 978-1-5386-4683-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
41 | Vladimir Eliseev, Olga Eliseeva |
Lightweight Distributed Attack Detection and Prevention for the Safe Internet of Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2018 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Glasgow, Scotland, United Kingdom, June 11-12, 2018, pp. 1-6, 2018, IEEE, 978-1-5386-4683-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
41 | Anastasios Balaskas, Virginia N. L. Franqueira |
Analytical Tools for Blockchain: Review, Taxonomy and Open Challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2018 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Glasgow, Scotland, United Kingdom, June 11-12, 2018, pp. 1-8, 2018, IEEE, 978-1-5386-4683-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
41 | Dimitrios Kavallieros, Christina Chalanouli, Georgios Kokkinis, Anastasios Panathanasiou, Efthimios Lissaris, Georgios Leventakis, Georgios Giataganas, Georgios Germanos |
Searching for crime on the web: Legal and Ethical perspectives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2018 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Glasgow, Scotland, United Kingdom, June 11-12, 2018, pp. 1-8, 2018, IEEE, 978-1-5386-4683-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
41 | Martin Trae Span, Logan O. Mailloux, Michael R. Grimaila, William Bill Young |
A Systems Security Approach for Requirements Analysis of Complex Cyber-Physical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2018 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Glasgow, Scotland, United Kingdom, June 11-12, 2018, pp. 1-8, 2018, IEEE, 978-1-5386-4683-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
41 | Sean McKeown, Gordon Russell 0001, Petra Leimich |
Sub-file Hashing Strategies for Fast Contraband Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2018 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Glasgow, Scotland, United Kingdom, June 11-12, 2018, pp. 1-7, 2018, IEEE, 978-1-5386-4683-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
41 | Ensar Seker, Hasan Huseyin Ozbenli |
The Concept of Cyber Defence Exercises (CDX): Planning, Execution, Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2018 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Glasgow, Scotland, United Kingdom, June 11-12, 2018, pp. 1-9, 2018, IEEE, 978-1-5386-4683-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
41 | Omego Obinna, Eckhard Pfluegel, Martin J. Tunnicliffe, Charles A. Clarke |
Ensuring Message Freshness in A Multi-Channel SMS Steganographic Banking Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2018 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Glasgow, Scotland, United Kingdom, June 11-12, 2018, pp. 1-7, 2018, IEEE, 978-1-5386-4683-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
41 | Mahdi Madani, Camel Tanougast |
Combined and Robust SNOW-ZUC Algorithm Based on Chaotic System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2018 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Glasgow, Scotland, United Kingdom, June 11-12, 2018, pp. 1-7, 2018, IEEE, 978-1-5386-4683-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
41 | Shuai Fu, Nizar Bouguila |
A Bayesian Intrusion Detection Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2018 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Glasgow, Scotland, United Kingdom, June 11-12, 2018, pp. 1-8, 2018, IEEE, 978-1-5386-4683-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
41 | Yassine Lemmou, El Mamoun Souidi |
Infection, Self-reproduction and Overinfection in Ransomware: The Case of TeslaCrypt. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2018 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Glasgow, Scotland, United Kingdom, June 11-12, 2018, pp. 1-8, 2018, IEEE, 978-1-5386-4683-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
41 | |
2017 International Conference on Cyber Security And Protection Of Digital Services, Cyber Security 2017, London, United Kingdom, June 19-20, 2017 ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![IEEE, 978-1-5090-5063-5 The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
41 | Feng Yao, Suleiman Y. Yerima, BooJoong Kang, Sakir Sezer |
Continuous implicit authentication for mobile devices based on adaptive neuro-fuzzy inference system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2017 International Conference on Cyber Security And Protection Of Digital Services, Cyber Security 2017, London, United Kingdom, June 19-20, 2017, pp. 1-7, 2017, IEEE, 978-1-5090-5063-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
41 | Amala V. Rajan, Rejitha Ravikumar, Mariam Al Shaer |
UAE cybercrime law and cybercrimes - An analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2017 International Conference on Cyber Security And Protection Of Digital Services, Cyber Security 2017, London, United Kingdom, June 19-20, 2017, pp. 1-6, 2017, IEEE, 978-1-5090-5063-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
41 | Clement Guitton |
Foiling cyber attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2017 International Conference on Cyber Security And Protection Of Digital Services, Cyber Security 2017, London, United Kingdom, June 19-20, 2017, pp. 1-7, 2017, IEEE, 978-1-5090-5063-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
41 | Mohammed K. Alzaylaee, Suleiman Y. Yerima, Sakir Sezer |
Improving dynamic analysis of android apps using hybrid test input generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2017 International Conference on Cyber Security And Protection Of Digital Services, Cyber Security 2017, London, United Kingdom, June 19-20, 2017, pp. 1-8, 2017, IEEE, 978-1-5090-5063-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
41 | Cyril Onwubiko |
Security operations centre: Situation awareness, threat intelligence and cybercrime. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2017 International Conference on Cyber Security And Protection Of Digital Services, Cyber Security 2017, London, United Kingdom, June 19-20, 2017, pp. 1-6, 2017, IEEE, 978-1-5090-5063-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
41 | Stephen Singam |
Securing an US$ 2.8B digital asset: The movie - Avatar. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2017 International Conference on Cyber Security And Protection Of Digital Services, Cyber Security 2017, London, United Kingdom, June 19-20, 2017, pp. 1-3, 2017, IEEE, 978-1-5090-5063-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
41 | Yassine Lemmou, El Mamoun Souidi |
PrincessLocker analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2017 International Conference on Cyber Security And Protection Of Digital Services, Cyber Security 2017, London, United Kingdom, June 19-20, 2017, pp. 1-10, 2017, IEEE, 978-1-5090-5063-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
41 | Taniya Bhatia, Rishabh Kaushal |
Malware detection in android based on dynamic analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2017 International Conference on Cyber Security And Protection Of Digital Services, Cyber Security 2017, London, United Kingdom, June 19-20, 2017, pp. 1-6, 2017, IEEE, 978-1-5090-5063-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
41 | Vahid Moula, Salman Niksefat |
ROPK++: An enhanced ROP attack detection framework for Linux operating system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2017 International Conference on Cyber Security And Protection Of Digital Services, Cyber Security 2017, London, United Kingdom, June 19-20, 2017, pp. 1-6, 2017, IEEE, 978-1-5090-5063-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
41 | Tianhui Meng, Zhihao Shang, Katinka Wolter |
An empirical performance and security evaluation of android container solutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2017 International Conference on Cyber Security And Protection Of Digital Services, Cyber Security 2017, London, United Kingdom, June 19-20, 2017, pp. 1-8, 2017, IEEE, 978-1-5090-5063-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
41 | Daniel Fraunholz, Daniel Krohmer, Simon Duque Antón, Hans Dieter Schotten |
Investigation of cyber crime conducted by abusing weak or default passwords with a medium interaction honeypot. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2017 International Conference on Cyber Security And Protection Of Digital Services, Cyber Security 2017, London, United Kingdom, June 19-20, 2017, pp. 1-7, 2017, IEEE, 978-1-5090-5063-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
41 | Kamalakanta Sethi, Amartya Majumdar, Padmalochan Bera |
A novel implementation of parallel homomorphic encryption for secure data storage in cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2017 International Conference on Cyber Security And Protection Of Digital Services, Cyber Security 2017, London, United Kingdom, June 19-20, 2017, pp. 1-7, 2017, IEEE, 978-1-5090-5063-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
41 | Yuanyuan Grace Zeng |
Identifying email threats using predictive analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2017 International Conference on Cyber Security And Protection Of Digital Services, Cyber Security 2017, London, United Kingdom, June 19-20, 2017, pp. 1-2, 2017, IEEE, 978-1-5090-5063-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
41 | Louai Maghrabi, Eckhard Pfluegel, Luluwah Al-Fagih, Roman Graf, Giuseppe Settanni, Florian Skopik |
Improved software vulnerability patching techniques using CVSS and game theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2017 International Conference on Cyber Security And Protection Of Digital Services, Cyber Security 2017, London, United Kingdom, June 19-20, 2017, pp. 1-6, 2017, IEEE, 978-1-5090-5063-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
41 | Michelle Omoogun, Preetila Seeam, Visham Ramsurrun, Xavier J. A. Bellekens, Amar Seeam |
When eHealth meets the internet of things: Pervasive security and privacy challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![In: 2017 International Conference on Cyber Security And Protection Of Digital Services, Cyber Security 2017, London, United Kingdom, June 19-20, 2017, pp. 1-7, 2017, IEEE, 978-1-5090-5063-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
41 | |
2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), London, United Kingdom, June 13-14, 2016 ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security ![IEEE, 978-1-5090-0709-7 The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
41 | Mary Geddes, Pooneh Bagheri Zadeh |
Forensic analysis of private browsing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security And Protection Of Digital Services ![In: 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), London, United Kingdom, June 13-14, 2016, pp. 1-2, 2016, IEEE, 978-1-5090-0709-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
41 | BooJoong Kang, Suleiman Y. Yerima, Kieran McLaughlin, Sakir Sezer |
N-opcode analysis for android malware classification and categorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security And Protection Of Digital Services ![In: 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), London, United Kingdom, June 13-14, 2016, pp. 1-7, 2016, IEEE, 978-1-5090-0709-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
41 | Zbigniew Hulicki |
The IM system with a cryptographic feature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security And Protection Of Digital Services ![In: 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), London, United Kingdom, June 13-14, 2016, pp. 1-4, 2016, IEEE, 978-1-5090-0709-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
41 | Egon Kidmose, Matija Stevanovic, Jens Myrup Pedersen |
Correlating intrusion detection alerts on bot malware infections using neural network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security And Protection Of Digital Services ![In: 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), London, United Kingdom, June 13-14, 2016, pp. 1-8, 2016, IEEE, 978-1-5090-0709-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
41 | Aisha Abubakar, Pooneh Bagheri Zadeh, Helge Janicke, Richard Howley |
Root cause analysis (RCA) as a preliminary tool into the investigation of identity theft. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security And Protection Of Digital Services ![In: 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), London, United Kingdom, June 13-14, 2016, pp. 1-5, 2016, IEEE, 978-1-5090-0709-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
41 | Dylan Smyth, Victor Cionca, Seán McSweeney, Donna O'Shea |
Exploiting pitfalls in software-defined networking implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security And Protection Of Digital Services ![In: 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), London, United Kingdom, June 13-14, 2016, pp. 1-8, 2016, IEEE, 978-1-5090-0709-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
41 | Muhammad Aminu Ahmad, Steve Woodhead, Diane Gan |
A countermeasure mechanism for fast scanning malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security And Protection Of Digital Services ![In: 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), London, United Kingdom, June 13-14, 2016, pp. 1-8, 2016, IEEE, 978-1-5090-0709-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
41 | Kamile Nur Sevis, Ensar Seker |
Cyber warfare: terms, issues, laws and controversies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security And Protection Of Digital Services ![In: 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), London, United Kingdom, June 13-14, 2016, pp. 1-9, 2016, IEEE, 978-1-5090-0709-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
41 | Reza Montasari, Pekka Peltola, Victoria Carpenter |
Gauging the effectiveness of computer misuse act in dealing with cybercrimes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security And Protection Of Digital Services ![In: 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), London, United Kingdom, June 13-14, 2016, pp. 1-5, 2016, IEEE, 978-1-5090-0709-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
41 | Taolue Chen, Tingting Han 0001, Florian Kammueller, Ibrahim Nemli, Christian W. Probst |
Model based analysis of insider threats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security And Protection Of Digital Services ![In: 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), London, United Kingdom, June 13-14, 2016, pp. 1-3, 2016, IEEE, 978-1-5090-0709-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
41 | Tomas Sochor, Matej Zuzcak, Petr Bujok |
Statistical analysis of attacking autonomous systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security And Protection Of Digital Services ![In: 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), London, United Kingdom, June 13-14, 2016, pp. 1-6, 2016, IEEE, 978-1-5090-0709-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
41 | Abdulrahman Alruban, Nathan L. Clarke, Fudong Li 0001, Steven Furnell |
Proactive biometric-enabled forensic imprinting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security And Protection Of Digital Services ![In: 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), London, United Kingdom, June 13-14, 2016, pp. 1-15, 2016, IEEE, 978-1-5090-0709-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
41 | Thomas Mundt, Peter Wickboldt |
Security in building automation systems - a first analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security And Protection Of Digital Services ![In: 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), London, United Kingdom, June 13-14, 2016, pp. 1-8, 2016, IEEE, 978-1-5090-0709-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
41 | Cyril Onwubiko |
Exploring web analytics to enhance cyber situational awareness for the protection of online web services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security And Protection Of Digital Services ![In: 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), London, United Kingdom, June 13-14, 2016, pp. 1-8, 2016, IEEE, 978-1-5090-0709-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
41 | Louai Maghrabi, Eckhard Pfluegel, Senna Fathima Noorji |
Designing utility functions for game-theoretic cloud security assessment: a case for using the common vulnerability scoring system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security And Protection Of Digital Services ![In: 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), London, United Kingdom, June 13-14, 2016, pp. 1-6, 2016, IEEE, 978-1-5090-0709-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
41 | Catrin Burrows, Pooneh Bagheri Zadeh |
A mobile forensic investigation into steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security And Protection Of Digital Services ![In: 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), London, United Kingdom, June 13-14, 2016, pp. 1-2, 2016, IEEE, 978-1-5090-0709-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
41 | Gaofeng Zhang, Paolo Falcarin, Elena Gómez-Martínez, Shareeful Islam, Christophe Tartary, Bjorn De Sutter, Jérôme d'Annoville |
Attack simulation based software protection assessment method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security And Protection Of Digital Services ![In: 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), London, United Kingdom, June 13-14, 2016, pp. 1-8, 2016, IEEE, 978-1-5090-0709-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
41 | Fara Yahya, Robert John Walters, Gary B. Wills |
Goal-based security components for cloud storage security framework: a preliminary study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security And Protection Of Digital Services ![In: 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), London, United Kingdom, June 13-14, 2016, pp. 1-5, 2016, IEEE, 978-1-5090-0709-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
41 | Andrea J. Cullen, Lorna Armitage |
The social engineering attack spiral (SEAS). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security And Protection Of Digital Services ![In: 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), London, United Kingdom, June 13-14, 2016, pp. 1-6, 2016, IEEE, 978-1-5090-0709-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
41 | Luben Boyanov, Zlatogor Minchev |
Cyber Security Challenges in Smart Homes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security and Resiliency Policy Framework ![In: Cyber Security and Resiliency Policy Framework, pp. 99-114, 2014, IOS Press, 978-1-61499-445-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
41 | Metodi Hadji-Janev |
Toward Effective National Cyber Security Strategy: The Path Forward For Macedonia. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security and Resiliency Policy Framework ![In: Cyber Security and Resiliency Policy Framework, pp. 57-64, 2014, IOS Press, 978-1-61499-445-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
41 | Nazife Baykal |
Turkey's Approaches on Cyber Security Policy Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security and Resiliency Policy Framework ![In: Cyber Security and Resiliency Policy Framework, pp. 82-98, 2014, IOS Press, 978-1-61499-445-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
41 | Predrag Pale |
Education as a Long-Term Strategy for Cyber Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security and Resiliency Policy Framework ![In: Cyber Security and Resiliency Policy Framework, pp. 127-134, 2014, IOS Press, 978-1-61499-445-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
41 | Gevorg Margarov |
Strengthening Cyber Security Policy by Means of End-Users Dedicated Training. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security and Resiliency Policy Framework ![In: Cyber Security and Resiliency Policy Framework, pp. 49-56, 2014, IOS Press, 978-1-61499-445-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
41 | Aleksandar Risteski, Mitko Bogdanoski, Marjan Stoilkovski, Miroslav Jovanovic |
Cyber Security Issues of Telecommunication Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Security and Resiliency Policy Framework ![In: Cyber Security and Resiliency Policy Framework, pp. 18-35, 2014, IOS Press, 978-1-61499-445-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
41 | Frank L. Greitzer, Deborah A. Frincke |
Combining Traditional Cyber Security Audit Data with Psychosocial Data: Towards Predictive Modeling for Insider Threat Mitigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Insider Threats in Cyber Security ![In: Insider Threats in Cyber Security, pp. 85-113, 2010, Springer, 978-1-4419-7132-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
40 | Carl Hauser |
Minitrack: Cyber Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), CD-ROM / Abstracts Proceedings, 3-6 January 2007, Waikoloa, Big Island, HI, USA, pp. 114, 2007, IEEE Computer Society, 0-7695-2755-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Shince Thomas, Devesh Misra, P. R. Lakshmi Eswari, N. Sarat Chandra Babu |
A Transparent End-to-End Security Solution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings, pp. 336-339, 2005, Springer, 3-540-30706-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
38 | Bob G. Schlicher |
Emergence of cyber anti-forensics impacting cyber security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSIIRW ![In: Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, CSIIRW '08, Oak Ridge, Tennessee, USA, May 12-14, 2008, pp. 22:1-22:12, 2008, ACM, 978-1-60558-098-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Art Conklin, Gregory B. White |
e-Government and Cyber Security: The Role of Cyber Security Exercises. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), CD-ROM / Abstracts Proceedings, 4-7 January 2006, Kauai, HI, USA, 2006, IEEE Computer Society, 0-7695-2507-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Dan Assaf |
Government Intervention in Information Infrastructure Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection, Post-Proceedings of the First Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA, March 19-21, 2007, pp. 29-39, 2007, Springer, 978-0-387-75461-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Critical information infrastructure protection, market failures, cyber security, government regulation |
34 | Paul Mullins 0001, Jim Wolfe, Michael Fry 0003, Erik L. Wynters, William C. Calhoun, Robert Montante, William Oblitey |
Panel on integrating security concepts into existing computer courses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 33rd SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2002, Cincinnati, Kentucky, USA, February 27 - March 3, 2002, pp. 365-366, 2002, ACM, 1-58113-473-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
33 | Ruby B. Lee |
Challenges in the Design of Security-Aware Processors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASAP ![In: 14th IEEE International Conference on Application-Specific Systems, Architectures, and Processors (ASAP 2003), 24-26 June 2003, The Hague, The Netherlands, pp. 2-, 2003, IEEE Computer Society, 0-7695-1992-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Dennis K. Holstein, Jose Diaz |
Cyber Security Management for Utility Operations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), CD-ROM / Abstracts Proceedings, 4-7 January 2006, Kauai, HI, USA, 2006, IEEE Computer Society, 0-7695-2507-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Galen Rasche, Erin Allwein, Michael S. Moore, Ben Abbott |
Model-Based Cyber Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECBS ![In: 14th Annual IEEE International Conference and Workshop on Engineering of Computer Based Systems (ECBS 2007), 26-29 March 2007, Tucson, Arizona, USA, pp. 405-412, 2007, IEEE Computer Society, 0-7695-2772-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Thierry Mbah Mbelli, Barry Dwolatzky |
Cyber Security, a Threat to Cyber Banking in South Africa: An Approach to Network and Application Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCloud ![In: 3rd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2016, Beijing, China, June 25-27, 2016, pp. 1-6, 2016, IEEE Computer Society, 978-1-5090-0946-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
31 | Zeta Dooly, Kenny Doyle, Jamie Power |
Uncovering Innovation Practices and Requirements in Privacy and Cyber Security Organisations: Insights from IPACSO. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSP Forum ![In: Cyber Security and Privacy - 4th Cyber Security and Privacy Innovation Forum, CSP Innovation Forum 2015, Brussels, Belgium, April 28-29, 2015, Revised Selected Papers, pp. 140-150, 2015, Springer, 978-3-319-25359-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
31 | Kenny Doyle, Zeta Dooly, Paul J. Kearney |
What's so Unique about Cyber Security? ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSP Forum ![In: Cyber Security and Privacy - 4th Cyber Security and Privacy Innovation Forum, CSP Innovation Forum 2015, Brussels, Belgium, April 28-29, 2015, Revised Selected Papers, pp. 131-139, 2015, Springer, 978-3-319-25359-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
31 | Dharm Kapletia, Massimo Felici, Nick Wainwright |
An Integrated Framework for Innovation Management in Cyber Security and Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSP Forum ![In: Cyber Security and Privacy - Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papers, pp. 135-147, 2014, Springer, 978-3-319-12573-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
31 | Ryan S. Bennink |
Quantum information: opportunities and challenges or "What's this quantum stuff and what does it have to do with cyber security?". ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSIIRW ![In: Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, CSIIRW '08, Oak Ridge, Tennessee, USA, May 12-14, 2008, pp. 27:1, 2008, ACM, 978-1-60558-098-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Mohammad M. Masud 0001, Jing Gao 0004, Latifur Khan, Jiawei Han 0001, Bhavani Thuraisingham |
Peer to peer botnet detection for cyber-security: a data mining approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSIIRW ![In: Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, CSIIRW '08, Oak Ridge, Tennessee, USA, May 12-14, 2008, pp. 39:1-39:2, 2008, ACM, 978-1-60558-098-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
Displaying result #101 - #200 of 6468 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |