


default search action
Cyber Security And Protection Of Digital Services 2019: Oxford, UK
- 2019 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Oxford, United Kingdom, June 3-4, 2019. IEEE 2019, ISBN 978-1-7281-0229-0

- Martin Lundgren, Erik Bergström

:
Security-Related Stress: A Perspective on Information Security Risk Management. 1-8 - Belqassim Bouteghrine, Mohammed Rabiai, Camel Tanougast

, Said Sadoudi:
Hardware Implementation of Secured Socket Communication based on Chaotic Cryptosystem. 1-4 - Nora Tomas, Jingyue Li

, Huang Huang
:
An Empirical Study on Culture, Automation, Measurement, and Sharing of DevSecOps. 1-8 - George O. M. Yee:

Attack Surface Identification and Reduction Model Applied in Scrum. 1-8 - Meha Shukla, Shane D. Johnson, Peter Jones:

Does the NIS implementation strategy effectively address cyber security risks in the UK? 1-11 - Kamalakanta Sethi, Ankit Pradhan

, R. Punith, Padmalochan Bera:
A Scalable Attribute Based Encryption for Secure Data Storage and Access in Cloud. 1-8 - Peyman Kabiri

, Mahdieh Chavoshi:
Destructive Attacks Detection and Response System for Physical Devices in Cyber-Physical Systems. 1-6 - Jonah Burgess

, Domhnall Carlin
, Philip O'Kane, Sakir Sezer:
MANiC: Multi-step Assessment for Crypto-miners. 1-8 - Subhi Alrubei, Jonathan Michael Rigelsford, Callum Willis, Edward Ball

:
Ethereum Blockchain for Securing the Internet of Things: Practical Implementation and Performance Evaluation. 1-5 - Chunlei Li, Chunming Rong

, Martin Gilje Jaatun:
A Cost-efficient Protocol for Open Blockchains. 1-7 - Pranshu Bajpai

, Tyler Olsen, Seth Edgar, Rob McCurdy, Richard J. Enbody:
BATSense: Anomalous Security Event Detection using TBATS Machine Learning. 1-8 - Aunshul Rege, Katorah Williams, Alyssa Mendlein:

A Social Engineering Course Project for Undergraduate Students Across Multiple Disciplines. 1-8 - Mahin Talukder, Syed Islam, Paolo Falcarin

:
Analysis of Obfuscated Code with Program Slicing. 1-7 - Kalle Rindell, Johannes Holvitie:

Security Risk Assessment and Management as Technical Debt. 1-8 - Yunjia Wang, Ishbel Duncan

:
A Novel Method to Prevent Phishing by using OCR Technology. 1-5 - Florian Skopik, Stefan Filip:

Design principles for national cyber security sensor networks: Lessons learned from small-scale demonstrators. 1-8 - Sikha Bagui, Debarghya Nandi, Subhash C. Bagui, Robert Jamie White:

Classifying Phishing Email Using Machine Learning and Deep Learning. 1-2 - Karin Bernsmed, Martin Gilje Jaatun:

Threat modelling and agile software development: Identified practice in four Norwegian organisations. 1-8 - Terézia Mézesová, Hayretdin Bahsi

:
Expert Knowledge Elicitation for Skill Level Categorization of Attack Paths. 1-8 - Kamalakanta Sethi, Rahul Kumar, Lingaraj Sethi

, Padmalochan Bera, Prashanta Kumar Patra:
A Novel Machine Learning Based Malware Detection and Classification Framework. 1-4 - Yogesh Patel, Karim Ouazzane, Vassil T. Vassilev

, Ibrahim Faruqi, George L. Walker:
Keystroke Dynamics using Auto Encoders. 1-8 - Leonard Renners, Felix Heine

, Carsten Kleiner
, Gabi Dreo Rodosek:
Adaptive and Intelligible Prioritization for Network Security Incidents. 1-8 - Cyril Onwubiko

, Karim Ouazzane:
Cyber Onboarding is 'Broken'. 1-13 - Marios Ioannou, Eliana Stavrou, Maria Bada:

Cybersecurity Culture in Computer Security Incident Response Teams: Investigating difficulties in communication and coordination. 1-4 - J. D. Work:

In wolf's clothing: Complications of threat emulation in contemporary cyber intelligence practice. 1-8 - Muntaha Saleem:

Brexit Impact on Cyber Security of United Kingdom. 1-6 - Ruitao Kee, Jovan Sie, Rhys Wong, Chern Nam Yap:

Arithmetic Circuit Homomorphic Encryption and Multiprocessing Enhancements. 1-5 - Basil Alothman

:
Raw Network Traffic Data Preprocessing and Preparation for Automatic Analysis. 1-5 - Wenting Li, Haibo Cheng, Ping Wang:

Secure Chaotic Maps-based Authentication Scheme for Real-Time Data Access In Internet of Things. 1-8 - Suleiman Y. Yerima, Sarmadullah Khan:

Longitudinal performance analysis of machine learning based Android malware detectors. 1-8 - Adrian J. Duncan, Sadie Creese, Michael Goldsmith:

A Combined Attack-Tree and Kill-Chain Approach to Designing Attack-Detection Strategies for Malicious Insiders in Cloud Computing. 1-9 - Zirak Allaf, Mo Adda

, Alexander E. Gegov:
TrapMP: Malicious Process Detection By Utilising Program Phase Detection. 1-8 - Remy Remigius Zgraggen:

Cyber Security Supervision in the Insurance Sector: Smart Contracts and Chosen Issues. 1-4 - Yuxiang Hong, Steven Furnell:

Organizational formalization and employee information security behavioral intentions based on an extended TPB model. 1-4

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














