


default search action
Cyber Security And Protection Of Digital Services 2017: London, UK
- 2017 International Conference on Cyber Security And Protection Of Digital Services, Cyber Security 2017, London, United Kingdom, June 19-20, 2017. IEEE 2017, ISBN 978-1-5090-5063-5

- Cyril Onwubiko

:
Security operations centre: Situation awareness, threat intelligence and cybercrime. 1-6 - Mohammed K. Alzaylaee

, Suleiman Y. Yerima, Sakir Sezer:
Improving dynamic analysis of android apps using hybrid test input generation. 1-8 - Feng Yao, Suleiman Y. Yerima, BooJoong Kang, Sakir Sezer:

Continuous implicit authentication for mobile devices based on adaptive neuro-fuzzy inference system. 1-7 - Taniya Bhatia, Rishabh Kaushal

:
Malware detection in android based on dynamic analysis. 1-6 - Yuanyuan Grace Zeng:

Identifying email threats using predictive analysis. 1-2 - Vahid Moula, Salman Niksefat:

ROPK++: An enhanced ROP attack detection framework for Linux operating system. 1-6 - Tianhui Meng, Zhihao Shang, Katinka Wolter:

An empirical performance and security evaluation of android container solutions. 1-8 - Kamalakanta Sethi, Amartya Majumdar, Padmalochan Bera:

A novel implementation of parallel homomorphic encryption for secure data storage in cloud. 1-7 - Stephen Singam:

Securing an US$ 2.8B digital asset: The movie - Avatar. 1-3 - Clement Guitton

:
Foiling cyber attacks. 1-7 - Yassine Lemmou

, El Mamoun Souidi
:
PrincessLocker analysis. 1-10 - Daniel Fraunholz, Daniel Krohmer, Simon Duque Antón

, Hans Dieter Schotten:
Investigation of cyber crime conducted by abusing weak or default passwords with a medium interaction honeypot. 1-7 - Louai Maghrabi

, Eckhard Pfluegel
, Luluwah Al-Fagih
, Roman Graf, Giuseppe Settanni, Florian Skopik:
Improved software vulnerability patching techniques using CVSS and game theory. 1-6 - Michelle Omoogun

, Preetila Seeam, Visham Ramsurrun, Xavier J. A. Bellekens
, Amar Seeam
:
When eHealth meets the internet of things: Pervasive security and privacy challenges. 1-7 - Amala V. Rajan, Rejitha Ravikumar

, Mariam Al Shaer:
UAE cybercrime law and cybercrimes - An analysis. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














