


default search action
CyberSA 2018: Glasgow, Scotland, UK
- International Conference On Cyber Situational Awareness, Data Analytics And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018. IEEE 2018, ISBN 978-1-5386-4565-9

- Zahid Maqbool, V. S. Chandrasekhar Pammi, Varun Dutt

:
Cyber security: Influence of patching vulnerabilities on the decision-making of hackers and analysts. 1-8 - Per Håkon Meland, Fredrik Seehusen:

When to Treat Security Risks with Cyber Insurance. 1-8 - Mary C. Kay Michel, Michael C. King:

Towards An Adaptable System-based Classification Design for Cyber Identity. 1-2 - Daniel W. Woods

, Andrew C. Simpson
:
Towards Integrating Insurance Data into Information Security Investment Decision Making. 1-6 - Shane Miller, Kevin Curran

, Tom Lunney:
Multilayer Perceptron Neural Network for Detection of Encrypted VPN Network Traffic. 1-8 - Anthony Arrott, Arun Lakhotia, Ferenc Leitold, Charles LeDoux:

Cluster analysis for deobfuscation of malware variants during ransomware attacks. 1-9 - Hanan Hindy

, Elike Hodo, Ethan Bayne
, Amar Seeam
, Robert C. Atkinson
, Xavier J. A. Bellekens
:
A Taxonomy of Malicious Traffic for Intrusion Detection Systems. 1-4 - Adam Zibak, Andrew Simpson

:
Can We Evaluate the Impact of Cyber Security Information Sharing? 1-2 - Sungyoung Clio, Insung Han, Hyunsook Jeong, Jinsoo Kim, Sungmo Koo, Haengrok Oh, Moosung Park:

Cyber Kill Chain based Threat Taxonomy and its Application on Cyber Common Operational Picture. 1-8 - Nima Asadi, Aunshul Rege, Zoran Obradovic:

Analysis of Adversarial Movement Through Characteristics of Graph Topological Ordering. 1-6 - Eliana Stavrou:

Enhancing Cyber Situational Awareness: A New Perspective of Password Auditing Tools. 1-4 - Yara Fareed Fahmy Bayoumy, Per Håkon Meland, Guttorm Sindre:

A Netnographic Study on the Dark Net Ecosystem for Ransomware. 1-8 - Cyril Onwubiko

:
CoCoa: An Ontology for Cybersecurity Operations Centre Analysis Process. 1-8 - Zachary Hills, David F. Arppe, Amin Ibrahim, Khalil El-Khatib

:
Compound Password System for Mobile. 1-4 - Erin Kenneally, Lucien Randazzese, David M. Balenson

:
Cyber Risk Economics Capability Gaps Research Strategy. 1-6 - S. Rahulamathavan, Xuewen Yao

, R. Yogachandran, K. Cumanan, Muttukrishnan Rajarajan:
Redesign of Gaussian Mixture Model for Efficient and Privacy-preserving Speaker Recognition. 1-8 - Karen Renaud

, Lynsay A. Shepherd
:
How to Make Privacy Policies both GDPR-Compliant and Usable. 1-8 - Andrea J. Cullen, Lorna Armitage:

A Human Vulnerability Assessment Methodology. 1-2 - Arun Lakhotia, Vivek Notani

, Charles LeDoux:
Malware Economics and its Implication to Anti-Malware Situational Awareness. 1-8 - Ganbayar Uuganbayar, Artsiom Yautsiukhin

, Fabio Martinelli:
Cyber Insurance and Security Interdependence: Friends or Foes? 1-4 - Wei Xu

, Yaodong Tao, Xin Guan:
The Landscape of Industrial Control Systems (ICS) Devices on the Internet. 1-8 - Christopher D. McDermott

, Andrei V. Petrovski, Farzan Majdani:
Towards Situational Awareness of Botnet Activity in the Internet of Things. 1-8 - Patrik Lif, Teodor Sommestad, Dennis Granåsen:

Development and evaluation of information elements for simplified cyber-incident reports. 1-10

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














