Login / Signup
Int. J. Cyber Situational Aware.
2016
2019
2022
2016
2022
Keyphrases
Publications
volume 6, number 1, 2022
Cyril Onwubiko
,
Karim Ouazzane
Multidimensional Cybersecurity Framework for Strategic Foresight.
Int. J. Cyber Situational Aware.
6 (1) (2022)
Antonis Mouhtaropoulos
Digital Forensic Readiness of Information Systems: A cost-benefit variable analysis.
Int. J. Cyber Situational Aware.
6 (1) (2022)
Carolyn J. Swinney
,
John C. Woods
GPS Jamming Signal Classification with CNN Feature Extraction in low Signal-to-Noise Environments.
Int. J. Cyber Situational Aware.
6 (1) (2022)
volume 5, number 1, 2020
Olasehinde Olayemi Oladimeji
,
Boniface Kayode Alese
,
Adebayo Olusola Adetunmbi
,
Aladesote Olomi Isaiah
Evaluation of Selected Stacked Ensemble Models for the Optimal Multi-class Cyber-Attacks Detection.
Int. J. Cyber Situational Aware.
5 (1) (2020)
Max Eiza
,
Romanus Izuchukwu Okeke
,
John Dempsey
,
Vinh-Thong Ta
Keep Calm and Carry on with Cybersecurity @Home: A Framework for Securing Homeworking IT Environment.
Int. J. Cyber Situational Aware.
5 (1) (2020)
Cyril Onwubiko
CyberOps: Situational Awareness in Cybersecurity Operations.
Int. J. Cyber Situational Aware.
5 (1) (2020)
Tal Pavel
The Cyber Insurance Market in Israel.
Int. J. Cyber Situational Aware.
5 (1) (2020)
volume 4, number 1, 2019
Leonard Renners
,
Felix Heine
,
Carsten Kleiner
,
Gabi Dreo Rodosek
Concept and Practical Evaluation for Adaptive and Intelligible Prioritization for Network Security Incidents.
Int. J. Cyber Situational Aware.
4 (1) (2019)
Kimberly Tam
,
Kevin D. Jones
Situational Awareness: Examining Factors that Affect Cyber-Risks in the Maritime Sector.
Int. J. Cyber Situational Aware.
4 (1) (2019)
Cyril Onwubiko
,
Karim Ouazzane
Challenges towards Building an effective Cyber Security Operations Centre.
Int. J. Cyber Situational Aware.
4 (1) (2019)
Erik Bergström
,
Martin Lundgren
Stress Amongst Novice Information Security Risk Management Practitioners.
Int. J. Cyber Situational Aware.
4 (1) (2019)
Ruth Ikwu
,
Panos Louvieris
Monitoring 'Cyber Related' Discussions in Online Social Platforms.
Int. J. Cyber Situational Aware.
4 (1) (2019)
Zahid Maqbool
,
V. S. Chandrasekhar Pammi
,
Varun Dutt
Behavioral Cybersecurity: Investigating the influence of Patching Vulnerabilities in Markov Security Games via Cognitive Modeling.
Int. J. Cyber Situational Aware.
4 (1) (2019)
Florian Skopik
,
Stefan Filip
A blueprint and proof-of-concept for a national cyber security sensor network.
Int. J. Cyber Situational Aware.
4 (1) (2019)
volume 3, number 1, 2018
Per Håkon Meland
,
Fredrik Seehusen
When to Treat Security Risks with Cyber Insurance.
Int. J. Cyber Situational Aware.
3 (1) (2018)
Simon Duque Antón
,
Daniel Fraunholz
,
Christoph Lipps
,
Khurshid Alam
,
Hans Dieter Schotten
Putting Things in Context: Securing Industrial Authentication with Context Information.
Int. J. Cyber Situational Aware.
3 (1) (2018)
Domhnall Carlin
,
Philip O'Kane
,
Sakir Sezer
Dynamic Analysis of Ran-somware using Opcodes and Opcode Categories.
Int. J. Cyber Situational Aware.
3 (1) (2018)
Christopher D. McDermott
,
William Haynes
,
Andrei V. Petrovksi
Threat Detection and Analysis in the Internet of Things using Deep Packet Inspection.
Int. J. Cyber Situational Aware.
3 (1) (2018)
Egon Kidmose
,
Erwin Lansing
,
Søren Brandbyge
,
Jens Myrup Pedersen
Heuristic Methods for Efficient Identification of Abusive Domain Names.
Int. J. Cyber Situational Aware.
3 (1) (2018)
Palvi Aggarwal
,
Frédéric Moisan
,
Cleotilde Gonzalez
,
Varun Dutt
Understanding Cyber Situational Awareness in a Cyber Security Game involving.
Int. J. Cyber Situational Aware.
3 (1) (2018)
volume 2, number 1, 2017
Alberto Bullo
,
Eliana Stavrou
,
Stavros Stavrou
Transparent password policies: A case study of investigating end-user situational awareness.
Int. J. Cyber Situational Aware.
2 (1) (2017)
Geoffrey B. Dobson
,
Timothy J. Shimeall
,
Kathleen M. Carley
Towards Network Science Enhanced Cyber Situational Awareness.
Int. J. Cyber Situational Aware.
2 (1) (2017)
Gavin Hales
,
R. Ian Ferguson
,
Jacqueline Archibald
Insight: An Application of Information Visualisation Techniques to Digital Forensics Investigations.
Int. J. Cyber Situational Aware.
2 (1) (2017)
Timilehin Aderinola
,
Aderonke F. Thompson
,
Boniface K. Alese
Epidemic Response Model for Malware Defense on Computer Networks.
Int. J. Cyber Situational Aware.
2 (1) (2017)
Daniel Fraunholz
,
Daniel Krohmer
,
Simon Duque Antón
,
Hans Dieter Schotten
YAAS - On the Attribution of Honeypot Data.
Int. J. Cyber Situational Aware.
2 (1) (2017)
Jasmina Maric
The Valleys of Death in Refugee Crisis.
Int. J. Cyber Situational Aware.
2 (1) (2017)
volume 1, number 1, 2016
BooJoong Kang
,
Suleiman Y. Yerima
,
Sakir Sezer
,
Kieran McLaughlin
N-gram Opcode Analysis for Android Malware Detection.
Int. J. Cyber Situational Aware.
1 (1) (2016)
Timea Pahi
,
Florian Skopik
A Public-Private-Partnership Model for National Cyber Situational Awareness.
Int. J. Cyber Situational Aware.
1 (1) (2016)
Xavier J. A. Bellekens
,
Kamila Nieradzinska
,
Alexandra Bellekens
,
Preetila Seeam
,
Andrew W. Hamilton
,
Amar Seeam
A Study on Situational Awareness Security and Privacy of Wearable Health Monitoring Devices.
Int. J. Cyber Situational Aware.
1 (1) (2016)
Jameel Qadri
,
Thomas M. Chen
,
Jorge Blasco
A Review of Significance of Energy-Consumption Anomaly in Malware Detection in Mobile Devices.
Int. J. Cyber Situational Aware.
1 (1) (2016)
Matija Stevanovic
,
Jens Myrup Pedersen
Detecting bots using multi-level traffic analysis.
Int. J. Cyber Situational Aware.
1 (1) (2016)
Samir Puuska
,
Matti J. Kortelainen
,
Viljami Venekoski
,
Jouko Vankka
Instant Message Classification in Finnish Cyber Security Themed Free-Form Discussion.
Int. J. Cyber Situational Aware.
1 (1) (2016)
Abdulrahman Alruban
,
Nathan L. Clarke
,
Fudong Li
,
Steven Furnell
Leveraging Biometrics for Insider Misuse Identification.
Int. J. Cyber Situational Aware.
1 (1) (2016)
Cyril Onwubiko
Understanding Cyber Situation Awareness.
Int. J. Cyber Situational Aware.
1 (1) (2016)
Philip A. Legg
Visual Analytics for Non-Expert Users in Cyber Situation Awareness.
Int. J. Cyber Situational Aware.
1 (1) (2016)
Gaofeng Zhang
,
Paolo Falcarin
,
Elena Gómez-Martínez
,
Shareeful Islam
,
Christophe Tartary
,
Bjorn De Sutter
,
Jérôme d'Annoville
Attack Simulation based Software Protection Assessment Method with Petri Net.
Int. J. Cyber Situational Aware.
1 (1) (2016)
Ryan Heartfield
,
George Loukas
Predicting the performance of users as human sensors of security threats in social media.
Int. J. Cyber Situational Aware.
1 (1) (2016)