


default search action
Cyber Security And Protection Of Digital Services 2020: Dublin, Ireland
- 2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020. IEEE 2020, ISBN 978-1-7281-6428-1

- Arman Zand, James Orwell, Eckhard Pfluegel

:
A Secure Framework for Anti-Money-Laundering using Machine Learning and Secret Sharing. 1-7 - Hanlin Chen, Hongmei He

, Andrew Starr:
An Overview of Web Robots Detection Techniques. 1-6 - Jonathan Francis Roscoe

, Max Smith-Creasey:
Acoustic Emanation of Haptics as a Side-Channel for Gesture-Typing Attacks. 1-4 - Aikaterini Kanta

, Iwen Coisel, Mark Scanlon:
Smarter Password Guessing Techniques Leveraging Contextual Information and OSINT. 1-2 - Drew Malzahn, Zachary Birnbaum, Cimone Wright-Hamor

:
Automated Vulnerability Testing via Executable Attack Graphs. 1-10 - Evangelos Moustakas

, Nishtha Lamba
, Dina Mahmoud, C. Ranganathan:
Blurring lines between fiction and reality: Perspectives of experts on marketing effectiveness of virtual influencers. 1-6 - Pranshu Bajpai

, Richard J. Enbody:
Memory Forensics Against Ransomware. 1-8 - Felix Anda, Brett A. Becker

, David Lillis
, Nhien-An Le-Khac
, Mark Scanlon:
Assessing the Influencing Factors on the Accuracy of Underage Facial Age Estimation. 1-8 - Joel Chacon, Sean McKeown

, Richard Macfarlane:
Towards Identifying Human Actions, Intent, and Severity of APT Attacks Applying Deception Techniques - An Experiment. 1-8 - Bertrand Venard

:
Protection Behaviours: a diversity of individual strategies. 1-7 - Gwyn Wilkinson, Phil Legg

:
"What did you say?": Extracting unintentional secrets from predictive text learning systems. 1-8 - Martin Gilje Jaatun, Lars Bodsberg, Tor Olav Grøtan, Marie Elisabeth Gaup Moe

:
An Empirical Study of CERT Capacity in the North Sea. 1-8 - Waleed Alghamdi, Michael Schukat:

Slave Clock Responses to Precision Time Protocol Attacks: A Case Study. 1-4 - Joshua A. Sipper:

Cyber Threat Intelligence and the Cyber Meta-Reality and Cyber Microbiome. 1-5 - Andrew Rae, Asma Patel

:
Developing a security behavioural assessment approach for cyber rating UK MSBs. 1-8 - Sebastião Rogério da Silva Neto

, Thomás Tabosa de Oliveira
, Vanderson de Souza Sampaio, Theo Lynn
, Patricia Takako Endo
:
Platform for monitoring and clinical diagnosis of arboviruses using computational models. 1-3 - Clemens Krueger

, Sean McKeown
:
Using Amazon Alexa APIs as a Source of Digital Evidence. 1-8 - Théo Simon

, Bertrand Venard
:
Technical codes'potentialities in cybersecurity. A contextual approach on the ethics of small digital organizations in France. 1-8 - Sean McKeown

, Gordon Russell:
Forensic Considerations for the High Efficiency Image File Format (HEIF). 1-8 - Jordan Richard Schoenherr, Robert Thomson:

Insider Threat Detection: A Solution in Search of a Problem. 1-7 - Johannes Mols

, Emmanouil Vasilomanolakis
:
ethVote: Towards secure voting with distributed ledgers. 1-8 - Lukas Gressl, Michael Krisper

, Christian Steger
, Ulrich Neffe:
Towards Security Attack and Risk Assessment during Early System Design. 1-8 - Uchenna Daniel Ani

, Hongmei He
, Ashutosh Tiwari
:
Vulnerability-Based Impact Criticality Estimation for Industrial Control Systems. 1-8 - Pranshu Bajpai

, Richard J. Enbody:
An Empirical Study of Key Generation in Cryptographic Ransomware. 1-8 - Enoch Agyepong, Yulia Cherdantseva, Philipp Reinecke, Pete Burnap:

Towards a Framework for Measuring the Performance of a Security Operations Center Analyst. 1-8 - Christopher Kelly, Nikolaos Pitropakis

, Sean McKeown
, Costas Lambrinoudakis
:
Testing And Hardening IoT Devices Against the Mirai Botnet. 1-8 - Matthew Spradling, Jeremy Straub, Jay Strong:

Introducing & Evaluating 'Nutrition Facts' for Online Content. 1-8 - Daniel Reti, Daniel Fraunholz, Janis Zemitis, Daniel Schneider

, Hans Dieter Schotten:
Deep Down the Rabbit Hole: On References in Networks of Decoy Elements. 1-11 - Tapadhir Das

, Abdel Rahman Eldosouky, Shamik Sengupta:
Think Smart, Play Dumb: Analyzing Deception in Hardware Trojan Detection Using Game Theory. 1-8 - Yunjia Wang, Yang Liu, Tiejun Wu, Ishbel Duncan

:
A Cost-Effective OCR Implementation to Prevent Phishing on Mobile Platforms. 1-8 - Joshua Talbot, Przemek Pikula, Craig Sweetmore, Samuel Rowe, Hanan Hindy

, Christos Tachtatzis, Robert C. Atkinson, Xavier J. A. Bellekens:
A Security Perspective on Unikernels. 1-7 - Pascal Faurie, Arghir-Nicolae Moldovan, Irina Tal:

Privacy Policy - "I agree"?! - Do alternatives to text-based policies increase the awareness of the users? 1-6 - Tharindu Ranathunga

, Ramona Marfievici, Alan McGibney, Susan Rea
:
A DLT-based Trust Framework for IoT Ecosystems. 1-8 - Martin Fejrskov

, Jens Myrup Pedersen
, Emmanouil Vasilomanolakis
:
Cyber-security research by ISPs: A NetFlow and DNS Anonymization Policy. 1-8 - Andrew McCarthy

, Benedict R. Gaster, Phil Legg
:
Shouting Through Letterboxes: A study on attack susceptibility of voice assistants. 1-8 - Fadi N. Sibai

:
AI Crimes: A Classification. 1-8 - Nebrase Elmrabit

, Feixiang Zhou, Fengyin Li, Huiyu Zhou:
Evaluation of Machine Learning Algorithms for Anomaly Detection. 1-8 - Inger Anne Tøndel, Ravishankar Borgaonkar, Martin Gilje Jaatun, Christian Frøystad:

What Could Possibly Go Wrong? Smart Grid Misuse Case Scenarios. 1-8 - Joseph Kaberuka, Christopher W. Johnson:

Adapting STPA-sec for Socio-technical Cyber Security Challenges in Emerging Nations: A Case Study in Risk Management for Rwandan Health Care. 1-9 - John O'Raw, David M. Laverty

:
Restricting Data Flows to Secure Against Remote Attack. 1-4 - Timothy D. Williams

:
Epistemological Questions for Cybersecurity. 1-4 - Marco M. Cook

, Ioannis Stavrou, Sarah Dimmock, Chris W. Johnson:
Introducing a forensics data type taxonomy of acquirable artefacts from programmable logic controllers. 1-8 - Xiaoyu Du, Quan Le, Mark Scanlon:

Automated Artefact Relevancy Determination from Artefact Metadata and Associated Timeline Events. 1-8 - Katia Raya

, Nicole D'Almeida, Maroun Chamoun:
Social big data: A Twitter text mining approach to the communication of universities during the Lebanese protests. 1-8 - Andrei Lima Queiroz

, Brian Keegan
, Susan McKeever
:
Moving Targets: Addressing Concept Drift in Supervised Models for Hacker Communication Detection. 1-7 - Tolga Ünlü

, Lynsay A. Shepherd
, Natalie Coull
, Colin McLean:
A Taxonomy of Approaches for Integrating Attack Awareness in Applications. 1-4

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














