Login / Signup
Cyber Security
2016
2020
2016
2020
Keyphrases
Publications
2020
John O'Raw
,
David M. Laverty
Restricting Data Flows to Secure Against Remote Attack.
Cyber Security
(2020)
Andrew Rae
,
Asma Patel
Developing a security behavioural assessment approach for cyber rating UK MSBs.
Cyber Security
(2020)
Daniel Reti
,
Daniel Fraunholz
,
Janis Zemitis
,
Daniel Schneider
,
Hans Dieter Schotten
Deep Down the Rabbit Hole: On References in Networks of Decoy Elements.
Cyber Security
(2020)
Pascal Faurie
,
Arghir-Nicolae Moldovan
,
Irina Tal
Privacy Policy - "I agree"?! - Do alternatives to text-based policies increase the awareness of the users?
Cyber Security
(2020)
Gwyn Wilkinson
,
Phil Legg
"What did you say?": Extracting unintentional secrets from predictive text learning systems.
Cyber Security
(2020)
Martin Fejrskov
,
Jens Myrup Pedersen
,
Emmanouil Vasilomanolakis
Cyber-security research by ISPs: A NetFlow and DNS Anonymization Policy.
Cyber Security
(2020)
Joel Chacon
,
Sean McKeown
,
Richard Macfarlane
Towards Identifying Human Actions, Intent, and Severity of APT Attacks Applying Deception Techniques - An Experiment.
Cyber Security
(2020)
Aikaterini Kanta
,
Iwen Coisel
,
Mark Scanlon
Smarter Password Guessing Techniques Leveraging Contextual Information and OSINT.
Cyber Security
(2020)
Joseph Kaberuka
,
Christopher W. Johnson
Adapting STPA-sec for Socio-technical Cyber Security Challenges in Emerging Nations: A Case Study in Risk Management for Rwandan Health Care.
Cyber Security
(2020)
Sean McKeown
,
Gordon Russell
Forensic Considerations for the High Efficiency Image File Format (HEIF).
Cyber Security
(2020)
Yunjia Wang
,
Yang Liu
,
Tiejun Wu
,
Ishbel Duncan
A Cost-Effective OCR Implementation to Prevent Phishing on Mobile Platforms.
Cyber Security
(2020)
Martin Gilje Jaatun
,
Lars Bodsberg
,
Tor Olav Grøtan
,
Marie Elisabeth Gaup Moe
An Empirical Study of CERT Capacity in the North Sea.
Cyber Security
(2020)
Bertrand Venard
Protection Behaviours: a diversity of individual strategies.
Cyber Security
(2020)
Enoch Agyepong
,
Yulia Cherdantseva
,
Philipp Reinecke
,
Pete Burnap
Towards a Framework for Measuring the Performance of a Security Operations Center Analyst.
Cyber Security
(2020)
Tolga Ünlü
,
Lynsay A. Shepherd
,
Natalie Coull
,
Colin McLean
A Taxonomy of Approaches for Integrating Attack Awareness in Applications.
Cyber Security
(2020)
Théo Simon
,
Bertrand Venard
Technical codes'potentialities in cybersecurity. A contextual approach on the ethics of small digital organizations in France.
Cyber Security
(2020)
Xiaoyu Du
,
Quan Le
,
Mark Scanlon
Automated Artefact Relevancy Determination from Artefact Metadata and Associated Timeline Events.
Cyber Security
(2020)
2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020
Cyber Security
(2020)
Evangelos Moustakas
,
Nishtha Lamba
,
Dina Mahmoud
,
C. Ranganathan
Blurring lines between fiction and reality: Perspectives of experts on marketing effectiveness of virtual influencers.
Cyber Security
(2020)
Katia Raya
,
Nicole D'Almeida
,
Maroun Chamoun
Social big data: A Twitter text mining approach to the communication of universities during the Lebanese protests.
Cyber Security
(2020)
Joshua Talbot
,
Przemek Pikula
,
Craig Sweetmore
,
Samuel Rowe
,
Hanan Hindy
,
Christos Tachtatzis
,
Robert C. Atkinson
,
Xavier J. A. Bellekens
A Security Perspective on Unikernels.
Cyber Security
(2020)
Fadi N. Sibai
AI Crimes: A Classification.
Cyber Security
(2020)
Tharindu Ranathunga
,
Ramona Marfievici
,
Alan McGibney
,
Susan Rea
A DLT-based Trust Framework for IoT Ecosystems.
Cyber Security
(2020)
Inger Anne Tøndel
,
Ravishankar Borgaonkar
,
Martin Gilje Jaatun
,
Christian Frøystad
What Could Possibly Go Wrong? Smart Grid Misuse Case Scenarios.
Cyber Security
(2020)
Tapadhir Das
,
Abdel Rahman Eldosouky
,
Shamik Sengupta
Think Smart, Play Dumb: Analyzing Deception in Hardware Trojan Detection Using Game Theory.
Cyber Security
(2020)
Uchenna Daniel Ani
,
Hongmei He
,
Ashutosh Tiwari
Vulnerability-Based Impact Criticality Estimation for Industrial Control Systems.
Cyber Security
(2020)
Christopher Kelly
,
Nikolaos Pitropakis
,
Sean McKeown
,
Costas Lambrinoudakis
Testing And Hardening IoT Devices Against the Mirai Botnet.
Cyber Security
(2020)
Arman Zand
,
James Orwell
,
Eckhard Pfluegel
A Secure Framework for Anti-Money-Laundering using Machine Learning and Secret Sharing.
Cyber Security
(2020)
Clemens Krueger
,
Sean McKeown
Using Amazon Alexa APIs as a Source of Digital Evidence.
Cyber Security
(2020)
Sebastião Rogério da Silva Neto
,
Thomás Tabosa de Oliveira
,
Vanderson de Souza Sampaio
,
Theo Lynn
,
Patricia Takako Endo
Platform for monitoring and clinical diagnosis of arboviruses using computational models.
Cyber Security
(2020)
Andrei Lima Queiroz
,
Brian Keegan
,
Susan McKeever
Moving Targets: Addressing Concept Drift in Supervised Models for Hacker Communication Detection.
Cyber Security
(2020)
Jordan Richard Schoenherr
,
Robert Thomson
Insider Threat Detection: A Solution in Search of a Problem.
Cyber Security
(2020)
Andrew McCarthy
,
Benedict R. Gaster
,
Phil Legg
Shouting Through Letterboxes: A study on attack susceptibility of voice assistants.
Cyber Security
(2020)
Lukas Gressl
,
Michael Krisper
,
Christian Steger
,
Ulrich Neffe
Towards Security Attack and Risk Assessment during Early System Design.
Cyber Security
(2020)
Matthew Spradling
,
Jeremy Straub
,
Jay Strong
Introducing & Evaluating 'Nutrition Facts' for Online Content.
Cyber Security
(2020)
Marco Cook
,
Ioannis Stavrou
,
Sarah Dimmock
,
Chris W. Johnson
Introducing a forensics data type taxonomy of acquirable artefacts from programmable logic controllers.
Cyber Security
(2020)
Nebrase Elmrabit
,
Feixiang Zhou
,
Fengyin Li
,
Huiyu Zhou
Evaluation of Machine Learning Algorithms for Anomaly Detection.
Cyber Security
(2020)
Jonathan Francis Roscoe
,
Max Smith-Creasey
Acoustic Emanation of Haptics as a Side-Channel for Gesture-Typing Attacks.
Cyber Security
(2020)
Hanlin Chen
,
Hongmei He
,
Andrew Starr
An Overview of Web Robots Detection Techniques.
Cyber Security
(2020)
Drew Malzahn
,
Zachary Birnbaum
,
Cimone Wright-Hamor
Automated Vulnerability Testing via Executable Attack Graphs.
Cyber Security
(2020)
Waleed Alghamdi
,
Michael Schukat
Slave Clock Responses to Precision Time Protocol Attacks: A Case Study.
Cyber Security
(2020)
Joshua A. Sipper
Cyber Threat Intelligence and the Cyber Meta-Reality and Cyber Microbiome.
Cyber Security
(2020)
Pranshu Bajpai
,
Richard J. Enbody
Memory Forensics Against Ransomware.
Cyber Security
(2020)
Felix Anda
,
Brett A. Becker
,
David Lillis
,
Nhien-An Le-Khac
,
Mark Scanlon
Assessing the Influencing Factors on the Accuracy of Underage Facial Age Estimation.
Cyber Security
(2020)
Timothy D. Williams
Epistemological Questions for Cybersecurity.
Cyber Security
(2020)
Pranshu Bajpai
,
Richard J. Enbody
An Empirical Study of Key Generation in Cryptographic Ransomware.
Cyber Security
(2020)
Johannes Mols
,
Emmanouil Vasilomanolakis
ethVote: Towards secure voting with distributed ledgers.
Cyber Security
(2020)
2019
George O. M. Yee
Attack Surface Identification and Reduction Model Applied in Scrum.
Cyber Security
(2019)
Nora Tomas
,
Jingyue Li
,
Huang Huang
An Empirical Study on Culture, Automation, Measurement, and Sharing of DevSecOps.
Cyber Security
(2019)
Suleiman Y. Yerima
,
Sarmadullah Khan
Longitudinal performance analysis of machine learning based Android malware detectors.
Cyber Security
(2019)