Results
Found 6468 publication records. Showing 6468 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
21 | Raffaele Bolla, Paolo Maria Comi, Matteo Repetto |
A Distributed Cyber-security Framework for Heterogeneous Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITASEC ![In: Proceedings of the Second Italian Conference on Cyber Security, Milan, Italy, February 6th - to - 9th, 2018., 2018, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
21 | Abhik Roychoudhury, Yang Liu 0003 (eds.) |
A Systems Approach to Cyber Security - Proceedings of the 2nd Singapore Cyber-Security R&D Conference (SG-CRC 2017), Singapore, February 21-22, 2017 ![Search on Bibsonomy](Pics/bibsonomy.png) |
SG-CRC ![IOS Press, 978-1-61499-743-6 The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
21 | Jin-Ning Tioh, Mani Mina, Douglas W. Jacobson |
Cyber security training a survey of serious games in cyber security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FIE ![In: 2017 IEEE Frontiers in Education Conference, FIE 2017, Indianapolis, IN, USA, October 18-21, 2017, pp. 1-5, 2017, IEEE Computer Society, 978-1-5090-5920-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Kanthithasan Kauthamy, Noushin Ashrafi, Jean-Pierre Kuilboer |
Mobile Devices and Cyber Security - An Exploratory Study on User's Response to Cyber Security Challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEBIST ![In: Proceedings of the 13th International Conference on Web Information Systems and Technologies, WEBIST 2017, Porto, Portugal, April 25-27, 2017, pp. 306-311, 2017, SciTePress, 978-989-758-246-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Maximilian Frank, Maria Leitner, Timea Pahi |
Design Considerations for Cyber Security Testbeds: A Case Study on a Cyber Security Testbed for Education. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASC/PiCom/DataCom/CyberSciTech ![In: 15th IEEE Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress, DASC/PiCom/DataCom/CyberSciTech 2017, Orlando, FL, USA, November 6-10, 2017, pp. 38-46, 2017, IEEE Computer Society, 978-1-5386-1956-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Aneesha Sethi, Gary B. Wills |
Expert-interviews led analysis of EEVi - A model for effective visualization in cyber-security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 14th IEEE Symposium on Visualization for Cyber Security, VizSec 2017, Phoenix, AZ, USA, October 2, 2017, pp. 1-8, 2017, IEEE Computer Society, 978-1-5386-2693-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Marco Angelini, Simone Lenti, Giuseppe Santucci |
CRUMBS: A cyber security framework browser. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 14th IEEE Symposium on Visualization for Cyber Security, VizSec 2017, Phoenix, AZ, USA, October 2, 2017, pp. 1-8, 2017, IEEE Computer Society, 978-1-5386-2693-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Margarita Osadchy, Yan Wang, Orr Dunkelman, Stuart J. Gibson, Julio C. Hernandez-Castro, Christopher J. Solomon |
GenFace: Improving Cyber Security Using Realistic Synthetic Face Generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCML ![In: Cyber Security Cryptography and Machine Learning - First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings, pp. 19-33, 2017, Springer, 978-3-319-60079-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Chien Eao Lee, Lilei Zheng, Ying Zhang 0047, Vrizlynn L. L. Thing |
Low-Dimensional Bigram Analysis for Mobile Data Fragment Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SG-CRC ![In: A Systems Approach to Cyber Security - Proceedings of the 2nd Singapore Cyber-Security R&D Conference (SG-CRC 2017), Singapore, February 21-22, 2017, pp. 129-142, 2017, IOS Press, 978-1-61499-743-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Matthew David Smith 0001, Marie-Elisabeth Paté-Cornell |
Cyber Risk Analysis for a Smart Grid: How Smart is Smart Enough? A Multi-Armed Bandit Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SG-CRC ![In: A Systems Approach to Cyber Security - Proceedings of the 2nd Singapore Cyber-Security R&D Conference (SG-CRC 2017), Singapore, February 21-22, 2017, pp. 37-56, 2017, IOS Press, 978-1-61499-743-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Wilayat Khan, Alwen Tiu, David Sanán |
VeriFormal: An Executable Formal Model of a Hardware Description Language. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SG-CRC ![In: A Systems Approach to Cyber Security - Proceedings of the 2nd Singapore Cyber-Security R&D Conference (SG-CRC 2017), Singapore, February 21-22, 2017, pp. 19-36, 2017, IOS Press, 978-1-61499-743-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Victor Pomponiu, Vrizlynn L. L. Thing |
A Deep Convolutional Neural Network for Anomalous Online Forum Incident Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SG-CRC ![In: A Systems Approach to Cyber Security - Proceedings of the 2nd Singapore Cyber-Security R&D Conference (SG-CRC 2017), Singapore, February 21-22, 2017, pp. 57-69, 2017, IOS Press, 978-1-61499-743-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Hwajung Seo |
Faster ECC over (feat. PMULL). ![Search on Bibsonomy](Pics/bibsonomy.png) |
SG-CRC ![In: A Systems Approach to Cyber Security - Proceedings of the 2nd Singapore Cyber-Security R&D Conference (SG-CRC 2017), Singapore, February 21-22, 2017, pp. 97-106, 2017, IOS Press, 978-1-61499-743-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Nir Nissim, Aviad Cohen 0002, Jian Wu 0006, Andrea Lanzi, Lior Rokach, Yuval Elovici, C. Lee Giles |
Scholarly Digital Libraries as a Platform for Malware Distribution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SG-CRC ![In: A Systems Approach to Cyber Security - Proceedings of the 2nd Singapore Cyber-Security R&D Conference (SG-CRC 2017), Singapore, February 21-22, 2017, pp. 107-128, 2017, IOS Press, 978-1-61499-743-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
21 | G. Sumathi, L. Srivani, D. Thirugnana Murthy, Anish Kumar, K. Madhusoodanan |
Hardware Obfuscation Using Different Obfuscation Cell Structures for PLDs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SG-CRC ![In: A Systems Approach to Cyber Security - Proceedings of the 2nd Singapore Cyber-Security R&D Conference (SG-CRC 2017), Singapore, February 21-22, 2017, pp. 143-157, 2017, IOS Press, 978-1-61499-743-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Zhongmin Dai, Tong-Wei Chua, Dinesh Kumar Balakrishnan, Vrizlynn L. L. Thing |
Chat-App Decryption Key Extraction Through Information Flow Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SG-CRC ![In: A Systems Approach to Cyber Security - Proceedings of the 2nd Singapore Cyber-Security R&D Conference (SG-CRC 2017), Singapore, February 21-22, 2017, pp. 3-18, 2017, IOS Press, 978-1-61499-743-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Zhi Yuan Poh, Hui Cui 0001, Robert H. Deng, Yingjiu Li |
Attribute-Based Secure Messaging in the Public Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SG-CRC ![In: A Systems Approach to Cyber Security - Proceedings of the 2nd Singapore Cyber-Security R&D Conference (SG-CRC 2017), Singapore, February 21-22, 2017, pp. 86-96, 2017, IOS Press, 978-1-61499-743-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Luying Zhou, Huaqun Guo, Dong Li, Jun Wen Wong, Jianying Zhou 0001 |
Mind the Gap: Security Analysis of Metro Platform Screen Door System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SG-CRC ![In: A Systems Approach to Cyber Security - Proceedings of the 2nd Singapore Cyber-Security R&D Conference (SG-CRC 2017), Singapore, February 21-22, 2017, pp. 70-85, 2017, IOS Press, 978-1-61499-743-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Maurice Hendrix, Ali Al-Sherbaz, Victoria Bloom |
Game Based Cyber Security Training: are Serious Games suitable for cyber security training? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Serious Games ![In: Int. J. Serious Games 3(1), 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Riza Azmi, William Tibben, Khin Than Win |
Motives behind Cyber Security Strategy Development: A Literature Review of National Cyber Security Strategy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIS ![In: Australasian Conference on Information Systems, ACIS 2016, Wollongong, NSW, Australia, 5-7 December 2016., pp. 52, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
21 | Aditya Mathur, Abhik Roychoudhury (eds.) |
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016 - Cyber-Security by Design, Singapore, January 14-15, 2016. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SG-CRC ![IOS Press, 978-1-61499-616-3 The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
21 | Abdullahi Arabo |
Mobile App Collusions and Its Cyber Security Implications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCloud ![In: 3rd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2016, Beijing, China, June 25-27, 2016, pp. 178-183, 2016, IEEE Computer Society, 978-1-5090-0946-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Claude Asamoah, Lixin Tao, Keke Gai, Ning Jiang |
Powering Filtration Process of Cyber Security Ecosystem Using Knowledge Graph. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCloud ![In: 3rd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2016, Beijing, China, June 25-27, 2016, pp. 240-246, 2016, IEEE Computer Society, 978-1-5090-0946-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Edward Jero Sam Jeeva Raj, Palaniappan Ramu |
ECG Steganography Using Contourlet Transform For Transmission of Secured Patient Identity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SG-CRC ![In: Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016 - Cyber-Security by Design, Singapore, January 14-15, 2016., pp. 131-138, 2016, IOS Press, 978-1-61499-616-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Weizhi Meng 0001, Lee Wang Hao, S. P. T. Krishnan |
A Framework for Large-Scale Collection of Information from Smartphone Users based on Juice Filming Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SG-CRC ![In: Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016 - Cyber-Security by Design, Singapore, January 14-15, 2016., pp. 99-106, 2016, IOS Press, 978-1-61499-616-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Ying Zhang 0047, Jonathan Goh, Lei Lei Win, Vrizlynn L. L. Thing |
Image Region Forgery Detection: A Deep Learning Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SG-CRC ![In: Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016 - Cyber-Security by Design, Singapore, January 14-15, 2016., pp. 1-11, 2016, IOS Press, 978-1-61499-616-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Riccardo Taormina, Stefano Galelli, Nils Ole Tippenhauer, Elad Salomons, Avi Ostfeld |
Simulation of Cyber-Physical Attacks on Water Distribution Systems with EPANET. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SG-CRC ![In: Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016 - Cyber-Security by Design, Singapore, January 14-15, 2016., pp. 123-130, 2016, IOS Press, 978-1-61499-616-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Khurum Nazir Junejo, David K. Y. Yau |
Data Driven Physical Modelling For Intrusion Detection In Cyber Physical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SG-CRC ![In: Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016 - Cyber-Security by Design, Singapore, January 14-15, 2016., pp. 43-57, 2016, IOS Press, 978-1-61499-616-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Dinil Mon Divakaran, Yung Siang Liau, Vrizlynn L. L. Thing |
Accurate in-network file-type classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SG-CRC ![In: Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016 - Cyber-Security by Design, Singapore, January 14-15, 2016., pp. 139-146, 2016, IOS Press, 978-1-61499-616-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Jia Xu 0006, Ee-Chien Chang, Jianying Zhou 0001 |
Directed Transitive Signature on Directed Tree. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SG-CRC ![In: Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016 - Cyber-Security by Design, Singapore, January 14-15, 2016., pp. 91-98, 2016, IOS Press, 978-1-61499-616-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
21 | David I. Urbina, Jairo Alonso Giraldo, Nils Ole Tippenhauer, Alvaro A. Cárdenas |
Attacking Fieldbus Communications in ICS: Applications to the SWaT Testbed. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SG-CRC ![In: Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016 - Cyber-Security by Design, Singapore, January 14-15, 2016., pp. 75-89, 2016, IOS Press, 978-1-61499-616-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Jia Xu 0006, Jianying Zhou 0001, Liming Lu |
Cyber and Physical Access Control in Legacy System Using Passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SG-CRC ![In: Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016 - Cyber-Security by Design, Singapore, January 14-15, 2016., pp. 27-42, 2016, IOS Press, 978-1-61499-616-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
21 | John Henry Castellanos, Tobias Wüchner, Martín Ochoa, Sandra Julieta Rueda |
Q-Floid: Android Malware detection with Quantitative Data Flow Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SG-CRC ![In: Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016 - Cyber-Security by Design, Singapore, January 14-15, 2016., pp. 13-25, 2016, IOS Press, 978-1-61499-616-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Jan-Willem Bullee, Lorena Montoya, Marianne Junger, Pieter H. Hartel |
Telephone-based social engineering attacks: An experiment testing the success and time decay of an intervention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SG-CRC ![In: Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016 - Cyber-Security by Design, Singapore, January 14-15, 2016., pp. 107-114, 2016, IOS Press, 978-1-61499-616-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Ngoc Hieu Tran, Robert H. Deng, HweeHwa Pang |
Privacy-Preserving and Verifiable Data Aggregation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SG-CRC ![In: Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016 - Cyber-Security by Design, Singapore, January 14-15, 2016., pp. 115-122, 2016, IOS Press, 978-1-61499-616-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Sridhar Adepu, Aditya P. Mathur |
Detecting Multi-Point Attacks in a Water Treatment System Using Intermittent Control Actions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SG-CRC ![In: Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016 - Cyber-Security by Design, Singapore, January 14-15, 2016., pp. 59-74, 2016, IOS Press, 978-1-61499-616-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Cyril Onwubiko |
Cyber security operations centre: Security monitoring for protecting business and supporting cyber defense strategy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSA ![In: 2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9, 2015, pp. 1-10, 2015, IEEE, 978-0-9932-3380-7. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Malek Ben Salem, Chris Wacek |
Enabling New Technologies for Cyber Security Defense with the ICAS Cyber Security Ontology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STIDS ![In: Proceedings of the Tenth Conference on Semantic Technology for Intelligence, Defense, and Security, Fairfax VA, USA, November 18-20, 2015., pp. 42-49, 2015, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
21 | Frances Cleary, Massimo Felici (eds.) |
Cyber Security and Privacy - 4th Cyber Security and Privacy Innovation Forum, CSP Innovation Forum 2015, Brussels, Belgium, April 28-29, 2015, Revised Selected Papers ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSP Forum ![Springer, 978-3-319-25359-6 The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Sean McKenna, Diane Staheli, Miriah D. Meyer |
Unlocking user-centered design methods for building cyber security visualizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 12th IEEE Symposium on Visualization for Cyber Security, VizSec 2015, Chicago, IL, USA, October 25, 2015, pp. 1-8, 2015, IEEE Computer Society, 978-1-4673-7599-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Prateek Singh, Saurabh Garg, Vinod Kumar, Zia Saquib |
A testbed for SCADA cyber security and intrusion detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIC ![In: International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications, SSIC 2015, Shanghai, China, August 5-7, 2015, pp. 1-6, 2015, IEEE, 978-1-4673-7977-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Xiaohe Fan, Kefeng Fan, Yong Wang, Ruikang Zhou |
Overview of cyber-security of industrial control system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIC ![In: International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications, SSIC 2015, Shanghai, China, August 5-7, 2015, pp. 1-7, 2015, IEEE, 978-1-4673-7977-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Zakarya Drias, Ahmed Serhrouchni, Olivier Vogel |
Analysis of cyber security for industrial control systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIC ![In: International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications, SSIC 2015, Shanghai, China, August 5-7, 2015, pp. 1-8, 2015, IEEE, 978-1-4673-7977-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Emma Osborn, Andrew Simpson |
Small-Scale Cyber Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCloud ![In: IEEE 2nd International Conference on Cyber Security and Cloud Computing, CSCloud 2015, New York, NY, USA, November 3-5, 2015, pp. 247-252, 2015, IEEE Computer Society, 978-1-4673-9300-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Johannes Schneider 0002, Sebastian Obermeier 0001, Roman Schlegel |
Cyber Security Maintenance for SCADA Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICS-CSR ![In: 3rd International Symposium for ICS & SCADA Cyber Security Research 2015, ICS-CSR 2015, 17-18 September 2015, University of Applied Sciences Ingolstadt, Germany, 2015, BCS. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Dónal McCarthy, Paul Malone, Johannes Hange, Kenny Doyle, Eric Robson, Dylan Conway, Stepan Ivanov, Lukasz Radziwonowicz, Robert Kleinfeld, Theodoros Michalareas, Timotheos Kastrinogiannis, Nikos Stasinos, Fenareti Lampathaki |
Privacy Aware Access Control for Cloud-Based Data Platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSP Forum ![In: Cyber Security and Privacy - 4th Cyber Security and Privacy Innovation Forum, CSP Innovation Forum 2015, Brussels, Belgium, April 28-29, 2015, Revised Selected Papers, pp. 26-37, 2015, Springer, 978-3-319-25359-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Denis Butin, Stefan-Lukas Gazdag, Johannes Buchmann 0001 |
Real-World Post-Quantum Digital Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSP Forum ![In: Cyber Security and Privacy - 4th Cyber Security and Privacy Innovation Forum, CSP Innovation Forum 2015, Brussels, Belgium, April 28-29, 2015, Revised Selected Papers, pp. 41-52, 2015, Springer, 978-3-319-25359-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Roland Rieke, Maria Zhdanova, Jürgen Repp |
Security and Business Situational Awareness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSP Forum ![In: Cyber Security and Privacy - 4th Cyber Security and Privacy Innovation Forum, CSP Innovation Forum 2015, Brussels, Belgium, April 28-29, 2015, Revised Selected Papers, pp. 103-115, 2015, Springer, 978-3-319-25359-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Ludovic Jacquin, Antonio Lioy, Diego R. López, Adrian L. Shaw, Tao Su |
The Trust Problem in Modern Network Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSP Forum ![In: Cyber Security and Privacy - 4th Cyber Security and Privacy Innovation Forum, CSP Innovation Forum 2015, Brussels, Belgium, April 28-29, 2015, Revised Selected Papers, pp. 116-127, 2015, Springer, 978-3-319-25359-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Juan Manuel Marín Pérez, Antonio Moragón Juan, Jaime Arrazola Pérez, Javier Monge Rabadán, Antonio F. Skarmeta-Gómez |
Security and Privacy in Vehicular Communications with INTER-TRUST. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSP Forum ![In: Cyber Security and Privacy - 4th Cyber Security and Privacy Innovation Forum, CSP Innovation Forum 2015, Brussels, Belgium, April 28-29, 2015, Revised Selected Papers, pp. 53-64, 2015, Springer, 978-3-319-25359-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Claudio Caimi, Michela D'Errico, Carmela Gambardella, Mirko Manea, Nick Wainwright |
Implementing Privacy Policies in the Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSP Forum ![In: Cyber Security and Privacy - 4th Cyber Security and Privacy Innovation Forum, CSP Innovation Forum 2015, Brussels, Belgium, April 28-29, 2015, Revised Selected Papers, pp. 3-13, 2015, Springer, 978-3-319-25359-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Thomas Lorünser, Charles Bastos Rodriguez, Denise Demirel, Simone Fischer-Hübner, Thomas Groß 0001, Thomas Länger, Mathieu Des Noes, Henrich C. Pöhls, Boris Rozenberg, Daniel Slamanig |
Towards a New Paradigm for Privacy and Security in Cloud Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSP Forum ![In: Cyber Security and Privacy - 4th Cyber Security and Privacy Innovation Forum, CSP Innovation Forum 2015, Brussels, Belgium, April 28-29, 2015, Revised Selected Papers, pp. 14-25, 2015, Springer, 978-3-319-25359-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Cataldo Basile, Christian Pitscheider, Fulvio Risso, Fulvio Valenza, Marco Vallini |
Towards the Dynamic Provision of Virtualized Security Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSP Forum ![In: Cyber Security and Privacy - 4th Cyber Security and Privacy Innovation Forum, CSP Innovation Forum 2015, Brussels, Belgium, April 28-29, 2015, Revised Selected Papers, pp. 65-76, 2015, Springer, 978-3-319-25359-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Nineta Polemi, Panayiotis Kotzanikolaou |
Medusa: A Supply Chain Risk Assessment Methodology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSP Forum ![In: Cyber Security and Privacy - 4th Cyber Security and Privacy Innovation Forum, CSP Innovation Forum 2015, Brussels, Belgium, April 28-29, 2015, Revised Selected Papers, pp. 79-90, 2015, Springer, 978-3-319-25359-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Francesco Di Cerbo, Nazila Gol Mohammadi, Sachar Paulus |
Evidence-Based Trustworthiness of Internet-Based Services Through Controlled Software Development. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSP Forum ![In: Cyber Security and Privacy - 4th Cyber Security and Privacy Innovation Forum, CSP Innovation Forum 2015, Brussels, Belgium, April 28-29, 2015, Revised Selected Papers, pp. 91-102, 2015, Springer, 978-3-319-25359-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Beatriz Gallego-Nicasio Crespo, Alan Garwood |
Fighting Botnets with Cyber-Security Analytics: Dealing with Heterogeneous Cyber-Security Information in New Generation SIEMs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Ninth International Conference on Availability, Reliability and Security, ARES 2014, Fribourg, Switzerland, September 8-12, 2014, pp. 192-198, 2014, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | William Casey, Jose Andre Morales, Thomson Nguyen, Jonathan M. Spring, Rhiannon Weaver, Evan Wright, Leigh Metcalf, Bud Mishra |
Cyber Security via Signaling Games: Toward a Science of Cyber Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCIT ![In: Distributed Computing and Internet Technology - 10th International Conference, ICDCIT 2014, Bhubaneswar, India, February 6-9, 2014. Proceedings, pp. 34-42, 2014, Springer, 978-3-319-04482-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Frances Cleary, Massimo Felici (eds.) |
Cyber Security and Privacy - Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papers ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSP Forum ![Springer, 978-3-319-12573-2 The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Hajar Iguer, Hicham Medromi, Adil Sayouti, Soukaina Elhasnaoui, Sophia Faris |
The Impact of Cyber Security Issues on Businesses and Governments: A Framework for Implementing a Cyber Security Plan. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FiCloud ![In: 2014 International Conference on Future Internet of Things and Cloud, FiCloud 2014, Barcelona, Spain, August 27-29, 2014, pp. 316-321, 2014, IEEE Computer Society, 978-1-4799-4358-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Diane Staheli, Tamara Yu, R. Jordan Crouser, Suresh Damodaran, Kevin Nam, B. David O'Gwynn, Sean McKenna, Lane Harrison |
Visualization evaluation for cyber security: trends and future directions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 11th Workshop on Visualization for Cyber Security, VizSec 2014, Paris, France, November 10, 2014, pp. 49-56, 2014, ACM, 978-1-4503-2826-5. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Melissa Danforth, Charles Lam |
Four-Week Summer Program in Cyber Security for High School Students: Practice and Experience Report. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSET ![In: 7th Workshop on Cyber Security Experimentation and Test, CSET '14, San Diego, CA, USA, August 18, 2014., 2014, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
21 | Chris Dalton, Antonio Lioy, Diego R. López, Fulvio Risso, Roberto Sassu |
Exploiting the Network for Securing Personal Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSP Forum ![In: Cyber Security and Privacy - Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papers, pp. 16-27, 2014, Springer, 978-3-319-12573-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Vasilios Tountopoulos, Massimo Felici, Alain Pannetrat, Daniele Catteddu, Siani Pearson |
Interoperability Analysis of Accountable Data Governance in the Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSP Forum ![In: Cyber Security and Privacy - Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papers, pp. 77-88, 2014, Springer, 978-3-319-12573-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Martina de Gramatica, Fabio Massacci, Olga Gadyatskaya |
An Empirical Study of the Technology Transfer Potential of EU Security and Trust R&D Projects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSP Forum ![In: Cyber Security and Privacy - Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papers, pp. 159-170, 2014, Springer, 978-3-319-12573-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Susan Perry, Claudia Roda |
Teaching Privacy by Design to Non-technical Audiences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSP Forum ![In: Cyber Security and Privacy - Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papers, pp. 120-132, 2014, Springer, 978-3-319-12573-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Michele Paolino, Mian Muhammad Hamayun, Daniel Raho |
A Performance Analysis of ARM Virtual Machines Secured Using SELinux. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSP Forum ![In: Cyber Security and Privacy - Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papers, pp. 28-36, 2014, Springer, 978-3-319-12573-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Nicolás Notario, Alberto Crespo, Antonio Kung, Inga Kroener, Daniel Le Métayer, Carmela Troncoso, José M. del Álamo, Yod Samuel Martín |
PRIPARE: A New Vision on Engineering Privacy and Security by Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSP Forum ![In: Cyber Security and Privacy - Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papers, pp. 65-76, 2014, Springer, 978-3-319-12573-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Zeta Dooly, Seamus Galvin, Jamie Power, Bart Renard, Ulrich Seldeslachts |
IPACSO: Towards Developing an Innovation Framework for ICT Innovators in the Privacy and CyberSecurity Markets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSP Forum ![In: Cyber Security and Privacy - Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papers, pp. 148-158, 2014, Springer, 978-3-319-12573-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Vasilios Tountopoulos, Ira Giannakoudaki, Konstantinos Giannakakis, Lefteris Korres, Leonidas Kallipolitis |
Ensuring Trustworthiness and Security in Service Compositions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSP Forum ![In: Cyber Security and Privacy - Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papers, pp. 3-15, 2014, Springer, 978-3-319-12573-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Ahmad Sabouri, Souheil Bcheri, Kai Rannenberg |
Privacy-Respecting School Community Interaction Platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSP Forum ![In: Cyber Security and Privacy - Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papers, pp. 108-119, 2014, Springer, 978-3-319-12573-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Shahidul Hoque, Aneel Rahim, Francesco Di Cerbo |
Smart Grid Data Anonymization for Smart Grid Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSP Forum ![In: Cyber Security and Privacy - Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papers, pp. 89-96, 2014, Springer, 978-3-319-12573-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Alessandro Pollini, Alessandra Tedeschi, Lorenzo Falciani |
Airports as Critical Transportation Infrastructures Increasingly Impacted by Cyberattacks: A Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSP Forum ![In: Cyber Security and Privacy - Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papers, pp. 37-48, 2014, Springer, 978-3-319-12573-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Bernhard Katzmarski, Gunnar Schomaker, Wolfgang Nebel |
Mobile Agents Based on Virtual Machines to Protect Sensitive Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSP Forum ![In: Cyber Security and Privacy - Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papers, pp. 97-107, 2014, Springer, 978-3-319-12573-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Mattia Salnitri, Elda Paja, Paolo Giorgini |
Preserving Compliance with Security Requirements in Socio-Technical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSP Forum ![In: Cyber Security and Privacy - Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papers, pp. 49-61, 2014, Springer, 978-3-319-12573-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Martti Lehto |
The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Cyber Warf. Terror. ![In: Int. J. Cyber Warf. Terror. 3(3), pp. 1-18, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Simon Miller, Jonathan M. Garibaldi, Susan Appleby |
Evolving OWA operators for cyber security decision making problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: Proceedings of the 2013 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2013, IEEE Symposium Series on Computational Intelligence (SSCI), 16-19 April 2013, Singapore, pp. 15-22, 2013, IEEE, 978-1-4673-5867-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | William J. Matuszak, Lisa Cingiser DiPippo, Yan Lindsay Sun |
CyberSAVe: situational awareness visualization for cyber security of smart grid systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 10th Workshop on Visualization for Cyber Security, VizSec 2013, Atlanta, GA, USA, October 14, 2013, pp. 25-32, 2013, ACM, 978-1-4503-2173-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Ike Patterson, James J. Nutaro, Glenn Allgood, Phani Teja Kuruganti, David Fugate |
Optimizing investments in cyber-security for critical infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSIIRW ![In: Cyber Security and Information Intelligence, CSIIRW '13, Oak Ridge, TN, USA, January 8-10, 2013, pp. 20, 2013, ACM, 978-1-4503-1687-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Annarita Giani, Russell Bent |
Addressing smart grid cyber security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSIIRW ![In: Cyber Security and Information Intelligence, CSIIRW '13, Oak Ridge, TN, USA, January 8-10, 2013, pp. 44, 2013, ACM, 978-1-4503-1687-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Teodor Sommestad, Jonas Hallberg |
Cyber Security Exercises and Competitions as a Platform for Cyber Security Experiments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NordSec ![In: Secure IT Systems - 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012. Proceedings, pp. 47-60, 2012, Springer, 978-3-642-34209-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Chung-Wei Lin, Alberto L. Sangiovanni-Vincentelli |
Cyber-Security for the Controller Area Network (CAN) Communication Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSecurity ![In: 2012 ASE International Conference on Cyber Security, Alexandria, VA, USA, December 14-16, 2012, pp. 1-7, 2012, IEEE Computer Society, 978-1-4799-0219-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Denise Ferebee, Dipankar Dasgupta, Qishi Wu |
A Cyber-Security Storm MAP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSecurity ![In: 2012 ASE International Conference on Cyber Security, Alexandria, VA, USA, December 14-16, 2012, pp. 93-102, 2012, IEEE Computer Society, 978-1-4799-0219-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Basie von Solms, Elmarie Kritzinger |
Critical Information Infrastructure Protection (CIIP) and Cyber Security in Africa - Has the CIIP and Cyber Security Rubicon Been Crossed? ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFRICOMM ![In: e-Infrastructure and e-Services for Developing Countries - Third International ICST Conference, AFRICOMM 2011, Zanzibar, Tanzania, November 23-24, 2011, Revised Selected Papers, pp. 116-124, 2011, Springer, 978-3-642-29092-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Joseph Werther, Michael Zhivich, Tim Leek, Nickolai Zeldovich |
Experiences in Cyber Security Education: The MIT Lincoln Laboratory Capture-the-Flag Exercise. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSET ![In: 4th Workshop on Cyber Security Experimentation and Test, CSET '11, San Francisco, CA, USA, August 8, 2011, 2011, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
21 | Tudor Dumitras, Iulian Neamtiu |
Experimental Challenges in Cyber Security: A Story of Provenance and Lineage for Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSET ![In: 4th Workshop on Cyber Security Experimentation and Test, CSET '11, San Francisco, CA, USA, August 8, 2011, 2011, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
21 | Malek Ben Salem 0001, Salvatore J. Stolfo |
On the Design and Execution of Cyber-Security User Studies: Methodology, Challenges, and Lessons Learned. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSET ![In: 4th Workshop on Cyber Security Experimentation and Test, CSET '11, San Francisco, CA, USA, August 8, 2011, 2011, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
21 | Summer-Mistine Olmstead, Joseph Stites, Ferrol Aderholdt |
A layer cyber security defense strategy for smart grid programmable logic controllers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSIIRW ![In: Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, CSIIRW 2011, Oak Ridge, TN, USA, October 12-14, 2011, pp. 78, 2011, ACM, 978-1-4503-0945-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Sajjan G. Shiva, Sankardas Roy, Dipankar Dasgupta |
Game theory for cyber security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSIIRW ![In: Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, CSIIRW 2010, Oak Ridge, TN, USA, April 21-23, 2010, pp. 34, 2010, ACM, 978-1-4503-0017-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Michael Losavio, J. Eagle Shutt, Deborah W. Keeling |
Positing social and justice models for cyber security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSIIRW ![In: Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, CSIIRW 2010, Oak Ridge, TN, USA, April 21-23, 2010, pp. 78, 2010, ACM, 978-1-4503-0017-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Arpan Roy, Dong Seong Kim 0001, Kishor S. Trivedi |
Cyber security analysis using attack countermeasure trees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSIIRW ![In: Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, CSIIRW 2010, Oak Ridge, TN, USA, April 21-23, 2010, pp. 28, 2010, ACM, 978-1-4503-0017-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Haricharan Rengamani, Shambhu J. Upadhyaya, H. Raghav Rao, Ponnurangam Kumaraguru |
Protecting senior citizens from cyber security attacks in the e-health scenario: an international perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSIIRW ![In: Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, CSIIRW 2010, Oak Ridge, TN, USA, April 21-23, 2010, pp. 82, 2010, ACM, 978-1-4503-0017-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Dipankar Dasgupta |
Tutorial: computational intelligence in cyber security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Glenn A. Fink, Christopher L. North, Alex Endert, Stuart Rose |
Visualizing cyber security: Usable workspaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 6th International Workshop on Visualization for Cyber Security, VizSec 2009, Atlantic City, NJ, USA, October 11, 2009, pp. 45-56, 2009, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Jose Romero-Mariona, Hadar Ziv, Debra J. Richardson, Dennis Bystritsky |
Towards usable cyber security requirements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSIIRW ![In: Fifth Cyber Security and Information Intelligence Research Workshop, CSIIRW '09, Knoxville, TN, USA, April 13-15, 2009, pp. 64, 2009, ACM, 978-1-60558-518-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Doug Maughan |
National cyber security research assessment and roadmap. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSIIRW ![In: Fifth Cyber Security and Information Intelligence Research Workshop, CSIIRW '09, Knoxville, TN, USA, April 13-15, 2009, pp. 6, 2009, ACM, 978-1-60558-518-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Frederick T. Sheldon, Axel W. Krings, Robert K. Abercrombie, Ali Mili 0001 (eds.) |
Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, CSIIRW '08, Oak Ridge, Tennessee, USA, May 12-14, 2008 ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSIIRW ![ACM, 978-1-60558-098-2 The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Steve Lines |
Best practices on information sharing of threats and warnings between the USG and industry. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSIIRW ![In: Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, CSIIRW '08, Oak Ridge, Tennessee, USA, May 12-14, 2008, pp. 3:1, 2008, ACM, 978-1-60558-098-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Matt Bishop, Carrie Gates |
Defining the insider threat. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSIIRW ![In: Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, CSIIRW '08, Oak Ridge, Tennessee, USA, May 12-14, 2008, pp. 15:1-15:3, 2008, ACM, 978-1-60558-098-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Wenbing Zhao 0001 |
Towards practical intrusion tolerant systems: a blueprint. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSIIRW ![In: Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, CSIIRW '08, Oak Ridge, Tennessee, USA, May 12-14, 2008, pp. 19:1-19:3, 2008, ACM, 978-1-60558-098-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Geoffrey Mazeroff |
Markov models for application behavior analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSIIRW ![In: Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, CSIIRW '08, Oak Ridge, Tennessee, USA, May 12-14, 2008, pp. 38:1-38:2, 2008, ACM, 978-1-60558-098-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
|