![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
CECC 2017: Ljubljana, Slovenia
- Igor Bernik, Blaz Markelj, Simon Vrhovec
:
Advances in Cybersecurity - Proceedings of the 2017 Central European Cybersecurity Conference, CECC 2017, Ljubljana, Slovenia, November 16-17, 2017. University of Maribor Press 2017, ISBN 978-961-286-114-8
Cybersecurity
- Kaja Prislan
, Branko Lobnikar, Igor Bernik
:
Information Security Management Practices: Expectations and Reality. 5-22 - Anze Mihelic, Simon Vrhovec
:
Explaining the Employment of Information Security Measures by Individuals in Organizations: The Self-protection Model. 23-34 - Michal Choras, Michal Wozniak:
Concept Drift Analysis for Improving Anomaly Detection Systems in Cybersecurity. 35-42 - Samo Tomazic, Igor Bernik
:
Preparation of Response Model to Cyber-attacks at Nuclear Facilities. 43-54 - Simon Vrhovec
, Blaz Markelj:
Use of Mobile Devices in Hospitals and Perceived Data Breach Consequences: An Explorative Study. 55-64 - Blaz Markelj, Sabina Zgaga:
Mobile Security: Two Generations of Potential Victims. 65-76 - Irfan Bulut, Ali Gökhan Yavuz, R. Can Aygun:
Combat Mobile Evasive Malware via Deep Learning. 77-88 - Ziya Alper Genç, Gabriele Lenzini
, Peter Y. A. Ryan:
Cipher, the Random and the Ransom: A Survey on Current and Future Ransomware. 89-102 - Petra Grd, Igor Tomicic
, Miroslav Baca
:
Children Privacy Protection in Video Surveillance Based on Automatic Age Estimation. 103-114 - Martin Böhm
, Ina Schiering
, Diederich Wermser:
Security of IoT Cloud Services - A User-Oriented Test Approach. 115-130 - Nerea Sainz de la Maza Doñabeitia, Miguel Hernández Boza
, Javier Jiménez del Peso, José Ignacio Escribano Pablos
:
Why Did I End Up Living in a Cave? Risks of IoT at home. 131-144 - Jörg Keller:
Cycle Structure and Reachability Analysis for Cipher Spritz with Small N. 145-154
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.