Sign in
Cyber Security And Protection Of Digital Services
2016
2016
2016
Keyphrases
Publications
2016
Mary Geddes
,
Pooneh Bagheri Zadeh
Forensic analysis of private browsing.
Cyber Security And Protection Of Digital Services
(2016)
BooJoong Kang
,
Suleiman Y. Yerima
,
Kieran McLaughlin
,
Sakir Sezer
N-opcode analysis for android malware classification and categorization.
Cyber Security And Protection Of Digital Services
(2016)
Zbigniew Hulicki
The IM system with a cryptographic feature.
Cyber Security And Protection Of Digital Services
(2016)
Egon Kidmose
,
Matija Stevanovic
,
Jens Myrup Pedersen
Correlating intrusion detection alerts on bot malware infections using neural network.
Cyber Security And Protection Of Digital Services
(2016)
Aisha Abubakar
,
Pooneh Bagheri Zadeh
,
Helge Janicke
,
Richard Howley
Root cause analysis (RCA) as a preliminary tool into the investigation of identity theft.
Cyber Security And Protection Of Digital Services
(2016)
Dylan Smyth
,
Victor Cionca
,
Seán McSweeney
,
Donna O'Shea
Exploiting pitfalls in software-defined networking implementation.
Cyber Security And Protection Of Digital Services
(2016)
Muhammad Aminu Ahmad
,
Steve Woodhead
,
Diane Gan
A countermeasure mechanism for fast scanning malware.
Cyber Security And Protection Of Digital Services
(2016)
Kamile Nur Sevis
,
Ensar Seker
Cyber warfare: terms, issues, laws and controversies.
Cyber Security And Protection Of Digital Services
(2016)
Reza Montasari
,
Pekka Peltola
,
Victoria Carpenter
Gauging the effectiveness of computer misuse act in dealing with cybercrimes.
Cyber Security And Protection Of Digital Services
(2016)
Taolue Chen
,
Tingting Han
,
Florian Kammueller
,
Ibrahim Nemli
,
Christian W. Probst
Model based analysis of insider threats.
Cyber Security And Protection Of Digital Services
(2016)
Tomas Sochor
,
Matej Zuzcak
,
Petr Bujok
Statistical analysis of attacking autonomous systems.
Cyber Security And Protection Of Digital Services
(2016)
Abdulrahman Alruban
,
Nathan L. Clarke
,
Fudong Li
,
Steven Furnell
Proactive biometric-enabled forensic imprinting.
Cyber Security And Protection Of Digital Services
(2016)
Thomas Mundt
,
Peter Wickboldt
Security in building automation systems - a first analysis.
Cyber Security And Protection Of Digital Services
(2016)
Cyril Onwubiko
Exploring web analytics to enhance cyber situational awareness for the protection of online web services.
Cyber Security And Protection Of Digital Services
(2016)
Louai Maghrabi
,
Eckhard Pfluegel
,
Senna Fathima Noorji
Designing utility functions for game-theoretic cloud security assessment: a case for using the common vulnerability scoring system.
Cyber Security And Protection Of Digital Services
(2016)
Catrin Burrows
,
Pooneh Bagheri Zadeh
A mobile forensic investigation into steganography.
Cyber Security And Protection Of Digital Services
(2016)
Gaofeng Zhang
,
Paolo Falcarin
,
Elena Gómez-Martínez
,
Shareeful Islam
,
Christophe Tartary
,
Bjorn De Sutter
,
Jérôme d'Annoville
Attack simulation based software protection assessment method.
Cyber Security And Protection Of Digital Services
(2016)
Fara Yahya
,
Robert John Walters
,
Gary B. Wills
Goal-based security components for cloud storage security framework: a preliminary study.
Cyber Security And Protection Of Digital Services
(2016)
Andrea J. Cullen
,
Lorna Armitage
The social engineering attack spiral (SEAS).
Cyber Security And Protection Of Digital Services
(2016)
Marcelo Paiva Fontenele
,
Lily Sun
Knowledge management of cyber security expertise: an ontological approach to talent discovery.
Cyber Security And Protection Of Digital Services
(2016)