default search action
Cyber Security And Protection Of Digital Services 2016: London, UK
- 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), London, United Kingdom, June 13-14, 2016. IEEE 2016, ISBN 978-1-5090-0709-7
- Taolue Chen, Tingting Han, Florian Kammueller, Ibrahim Nemli, Christian W. Probst:
Model based analysis of insider threats. 1-3 - Abdulrahman Alruban, Nathan L. Clarke, Fudong Li, Steven Furnell:
Proactive biometric-enabled forensic imprinting. 1-15 - Gaofeng Zhang, Paolo Falcarin, Elena Gómez-Martínez, Shareeful Islam, Christophe Tartary, Bjorn De Sutter, Jérôme d'Annoville:
Attack simulation based software protection assessment method. 1-8 - Cyril Onwubiko:
Exploring web analytics to enhance cyber situational awareness for the protection of online web services. 1-8 - BooJoong Kang, Suleiman Y. Yerima, Kieran McLaughlin, Sakir Sezer:
N-opcode analysis for android malware classification and categorization. 1-7 - Andrea J. Cullen, Lorna Armitage:
The social engineering attack spiral (SEAS). 1-6 - Marcelo Paiva Fontenele, Lily Sun:
Knowledge management of cyber security expertise: an ontological approach to talent discovery. 1-13 - Zbigniew Hulicki:
The IM system with a cryptographic feature. 1-4 - Aisha Abubakar, Pooneh Bagheri Zadeh, Helge Janicke, Richard Howley:
Root cause analysis (RCA) as a preliminary tool into the investigation of identity theft. 1-5 - Catrin Burrows, Pooneh Bagheri Zadeh:
A mobile forensic investigation into steganography. 1-2 - Mary Geddes, Pooneh Bagheri Zadeh:
Forensic analysis of private browsing. 1-2 - Muhammad Aminu Ahmad, Steve Woodhead, Diane Gan:
A countermeasure mechanism for fast scanning malware. 1-8 - Dylan Smyth, Victor Cionca, Seán McSweeney, Donna O'Shea:
Exploiting pitfalls in software-defined networking implementation. 1-8 - Thomas Mundt, Peter Wickboldt:
Security in building automation systems - a first analysis. 1-8 - Tomas Sochor, Matej Zuzcak, Petr Bujok:
Statistical analysis of attacking autonomous systems. 1-6 - Kamile Nur Sevis, Ensar Seker:
Cyber warfare: terms, issues, laws and controversies. 1-9 - Egon Kidmose, Matija Stevanovic, Jens Myrup Pedersen:
Correlating intrusion detection alerts on bot malware infections using neural network. 1-8 - Louai Maghrabi, Eckhard Pfluegel, Senna Fathima Noorji:
Designing utility functions for game-theoretic cloud security assessment: a case for using the common vulnerability scoring system. 1-6 - Fara Yahya, Robert John Walters, Gary B. Wills:
Goal-based security components for cloud storage security framework: a preliminary study. 1-5 - Reza Montasari, Pekka Peltola, Victoria Carpenter:
Gauging the effectiveness of computer misuse act in dealing with cybercrimes. 1-5
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.