default search action
Cyber Security And Protection Of Digital Services 2019: Oxford, UK
- 2019 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Oxford, United Kingdom, June 3-4, 2019. IEEE 2019, ISBN 978-1-7281-0229-0
- Martin Lundgren, Erik Bergström:
Security-Related Stress: A Perspective on Information Security Risk Management. 1-8 - Belqassim Bouteghrine, Mohammed Rabiai, Camel Tanougast, Said Sadoudi:
Hardware Implementation of Secured Socket Communication based on Chaotic Cryptosystem. 1-4 - Nora Tomas, Jingyue Li, Huang Huang:
An Empirical Study on Culture, Automation, Measurement, and Sharing of DevSecOps. 1-8 - George O. M. Yee:
Attack Surface Identification and Reduction Model Applied in Scrum. 1-8 - Meha Shukla, Shane D. Johnson, Peter Jones:
Does the NIS implementation strategy effectively address cyber security risks in the UK? 1-11 - Kamalakanta Sethi, Ankit Pradhan, R. Punith, Padmalochan Bera:
A Scalable Attribute Based Encryption for Secure Data Storage and Access in Cloud. 1-8 - Peyman Kabiri, Mahdieh Chavoshi:
Destructive Attacks Detection and Response System for Physical Devices in Cyber-Physical Systems. 1-6 - Jonah Burgess, Domhnall Carlin, Philip O'Kane, Sakir Sezer:
MANiC: Multi-step Assessment for Crypto-miners. 1-8 - Subhi Alrubei, Jonathan Michael Rigelsford, Callum Willis, Edward Ball:
Ethereum Blockchain for Securing the Internet of Things: Practical Implementation and Performance Evaluation. 1-5 - Chunlei Li, Chunming Rong, Martin Gilje Jaatun:
A Cost-efficient Protocol for Open Blockchains. 1-7 - Pranshu Bajpai, Tyler Olsen, Seth Edgar, Rob McCurdy, Richard J. Enbody:
BATSense: Anomalous Security Event Detection using TBATS Machine Learning. 1-8 - Aunshul Rege, Katorah Williams, Alyssa Mendlein:
A Social Engineering Course Project for Undergraduate Students Across Multiple Disciplines. 1-8 - Mahin Talukder, Syed Islam, Paolo Falcarin:
Analysis of Obfuscated Code with Program Slicing. 1-7 - Kalle Rindell, Johannes Holvitie:
Security Risk Assessment and Management as Technical Debt. 1-8 - Yunjia Wang, Ishbel Duncan:
A Novel Method to Prevent Phishing by using OCR Technology. 1-5 - Florian Skopik, Stefan Filip:
Design principles for national cyber security sensor networks: Lessons learned from small-scale demonstrators. 1-8 - Sikha Bagui, Debarghya Nandi, Subhash C. Bagui, Robert Jamie White:
Classifying Phishing Email Using Machine Learning and Deep Learning. 1-2 - Karin Bernsmed, Martin Gilje Jaatun:
Threat modelling and agile software development: Identified practice in four Norwegian organisations. 1-8 - Terézia Mézesová, Hayretdin Bahsi:
Expert Knowledge Elicitation for Skill Level Categorization of Attack Paths. 1-8 - Kamalakanta Sethi, Rahul Kumar, Lingaraj Sethi, Padmalochan Bera, Prashanta Kumar Patra:
A Novel Machine Learning Based Malware Detection and Classification Framework. 1-4 - Yogesh Patel, Karim Ouazzane, Vassil T. Vassilev, Ibrahim Faruqi, George L. Walker:
Keystroke Dynamics using Auto Encoders. 1-8 - Leonard Renners, Felix Heine, Carsten Kleiner, Gabi Dreo Rodosek:
Adaptive and Intelligible Prioritization for Network Security Incidents. 1-8 - Cyril Onwubiko, Karim Ouazzane:
Cyber Onboarding is 'Broken'. 1-13 - Marios Ioannou, Eliana Stavrou, Maria Bada:
Cybersecurity Culture in Computer Security Incident Response Teams: Investigating difficulties in communication and coordination. 1-4 - J. D. Work:
In wolf's clothing: Complications of threat emulation in contemporary cyber intelligence practice. 1-8 - Muntaha Saleem:
Brexit Impact on Cyber Security of United Kingdom. 1-6 - Ruitao Kee, Jovan Sie, Rhys Wong, Chern Nam Yap:
Arithmetic Circuit Homomorphic Encryption and Multiprocessing Enhancements. 1-5 - Basil Alothman:
Raw Network Traffic Data Preprocessing and Preparation for Automatic Analysis. 1-5 - Wenting Li, Haibo Cheng, Ping Wang:
Secure Chaotic Maps-based Authentication Scheme for Real-Time Data Access In Internet of Things. 1-8 - Suleiman Y. Yerima, Sarmadullah Khan:
Longitudinal performance analysis of machine learning based Android malware detectors. 1-8 - Adrian J. Duncan, Sadie Creese, Michael Goldsmith:
A Combined Attack-Tree and Kill-Chain Approach to Designing Attack-Detection Strategies for Malicious Insiders in Cloud Computing. 1-9 - Zirak Allaf, Mo Adda, Alexander E. Gegov:
TrapMP: Malicious Process Detection By Utilising Program Phase Detection. 1-8 - Remy Remigius Zgraggen:
Cyber Security Supervision in the Insurance Sector: Smart Contracts and Chosen Issues. 1-4 - Yuxiang Hong, Steven Furnell:
Organizational formalization and employee information security behavioral intentions based on an extended TPB model. 1-4
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.