default search action
CyberSA 2018: Glasgow, Scotland, UK
- International Conference On Cyber Situational Awareness, Data Analytics And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018. IEEE 2018, ISBN 978-1-5386-4565-9
- Zahid Maqbool, V. S. Chandrasekhar Pammi, Varun Dutt:
Cyber security: Influence of patching vulnerabilities on the decision-making of hackers and analysts. 1-8 - Per Håkon Meland, Fredrik Seehusen:
When to Treat Security Risks with Cyber Insurance. 1-8 - Mary C. Kay Michel, Michael C. King:
Towards An Adaptable System-based Classification Design for Cyber Identity. 1-2 - Daniel W. Woods, Andrew C. Simpson:
Towards Integrating Insurance Data into Information Security Investment Decision Making. 1-6 - Shane Miller, Kevin Curran, Tom Lunney:
Multilayer Perceptron Neural Network for Detection of Encrypted VPN Network Traffic. 1-8 - Anthony Arrott, Arun Lakhotia, Ferenc Leitold, Charles LeDoux:
Cluster analysis for deobfuscation of malware variants during ransomware attacks. 1-9 - Hanan Hindy, Elike Hodo, Ethan Bayne, Amar Seeam, Robert C. Atkinson, Xavier J. A. Bellekens:
A Taxonomy of Malicious Traffic for Intrusion Detection Systems. 1-4 - Adam Zibak, Andrew Simpson:
Can We Evaluate the Impact of Cyber Security Information Sharing? 1-2 - Sungyoung Clio, Insung Han, Hyunsook Jeong, Jinsoo Kim, Sungmo Koo, Haengrok Oh, Moosung Park:
Cyber Kill Chain based Threat Taxonomy and its Application on Cyber Common Operational Picture. 1-8 - Nima Asadi, Aunshul Rege, Zoran Obradovic:
Analysis of Adversarial Movement Through Characteristics of Graph Topological Ordering. 1-6 - Eliana Stavrou:
Enhancing Cyber Situational Awareness: A New Perspective of Password Auditing Tools. 1-4 - Yara Fareed Fahmy Bayoumy, Per Håkon Meland, Guttorm Sindre:
A Netnographic Study on the Dark Net Ecosystem for Ransomware. 1-8 - Cyril Onwubiko:
CoCoa: An Ontology for Cybersecurity Operations Centre Analysis Process. 1-8 - Zachary Hills, David F. Arppe, Amin Ibrahim, Khalil El-Khatib:
Compound Password System for Mobile. 1-4 - Erin Kenneally, Lucien Randazzese, David M. Balenson:
Cyber Risk Economics Capability Gaps Research Strategy. 1-6 - S. Rahulamathavan, Xuewen Yao, R. Yogachandran, K. Cumanan, Muttukrishnan Rajarajan:
Redesign of Gaussian Mixture Model for Efficient and Privacy-preserving Speaker Recognition. 1-8 - Karen Renaud, Lynsay A. Shepherd:
How to Make Privacy Policies both GDPR-Compliant and Usable. 1-8 - Andrea J. Cullen, Lorna Armitage:
A Human Vulnerability Assessment Methodology. 1-2 - Arun Lakhotia, Vivek Notani, Charles LeDoux:
Malware Economics and its Implication to Anti-Malware Situational Awareness. 1-8 - Ganbayar Uuganbayar, Artsiom Yautsiukhin, Fabio Martinelli:
Cyber Insurance and Security Interdependence: Friends or Foes? 1-4 - Wei Xu, Yaodong Tao, Xin Guan:
The Landscape of Industrial Control Systems (ICS) Devices on the Internet. 1-8 - Christopher D. McDermott, Andrei V. Petrovski, Farzan Majdani:
Towards Situational Awareness of Botnet Activity in the Internet of Things. 1-8 - Patrik Lif, Teodor Sommestad, Dennis Granåsen:
Development and evaluation of information elements for simplified cyber-incident reports. 1-10
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.