default search action
10th ICGS3 2015: London, UK
- Hamid Jahankhani, Alex Carlile, Babak Akhgar, Amie Taal, Ali G. Hessami, Amin Hosseinian Far:
Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security - 10th International Conference, ICGS3 2015, London, UK, September 15-17, 2015. Proceedings. Communications in Computer and Information Science 534, Springer 2015, ISBN 978-3-319-23275-1
Intelligence Management
- Babak Akhgar, Helen Gibson:
Processing Social Media Data for Crisis Management in Athena. 3-14 - Petra Saskia Bayerl, Babak Akhgar:
Online Surveillance Awareness as Impact on Data Validity for Open-Source Intelligence? 15-20 - Sina Pournouri, Babak Akhgar:
Improving Cyber Situational Awareness Through Data Mining and Predictive Analytic Techniques. 21-34 - Marko Uotinen:
Detecting Deceit - Guessing or Assessing? Study on the Applicability of Veracity Assessment Methods in Human Intelligence. 35-49 - Reza Alavi, Shareeful Islam, Haris Mouratidis:
Human Factors of Social Engineering Attacks (SEAs) in Hybrid Cloud Environment: Threats and Risks. 50-56
Digital Forensics
- Amie Taal, Jenny Le, James A. Sherer:
A Consideration of eDiscovery Technologies for Internal Investigations. 59-73 - Wakas Mahmood, Hamid Jahankhani, Aykut Ozkaya:
Cloud Forensics Challenges Faced by Forensic Investigators. 74-82 - Reza Montasari, Pekka Peltola, David Evans:
Integrated Computer Forensics Investigation Process Model (ICFIPM) for Computer Crime Investigations. 83-95 - Reza Montasari, Pekka Peltola:
Computer Forensic Analysis of Private Browsing Modes. 96-109
IT and Cyber Crime
- Luigi Laura, Gianluigi Me:
Searching the Web for Illegal Content: The Anatomy of a Semantic Search Engine. 113-122 - Michael Reynolds:
The Enemy Within: The Challenge for Business from Cyber-attack. 123-136 - Anwar Ul Haq, Arshad Jamal, Usman Butt, Asim Majeed, Aykut Ozkaya:
Understanding Privacy Concerns in Online Courses: A Case Study of Proctortrack. 137-150 - Eleni-Laskarina Makri, Costas Lambrinoudakis:
Towards a Common Security and Privacy Requirements Elicitation Methodology. 151-159 - Nor Fatimah Bt. Awang, Azizah Abd Manaf:
Automated Security Testing Framework for Detecting SQL Injection Vulnerability in Web Application. 160-171 - Giovanni Bottazzi, Gianluigi Me:
A Survey on Financial Botnets Threat. 172-181 - Akbar Sheikh Akbari, Pooneh Bagheri Zadeh:
Wavelet Based Image Enlargement Technique. 182-188 - Gregor Robinson, George R. S. Weir:
Understanding Android Security. 189-199 - Fathiya Al Izki, George R. S. Weir:
Gender Impact on Information Security in the Arab World. 200-207
Systems Security, Safety and Sustainability
- David Lilburn Watson:
Some Security Perils of Smart Living - (A Day in the Life of John Q Smith, a Citizen of Utopia, and His Twin Brother, Who Isn't). 211-227 - Chris Moore, Ameer Al-Nemrat:
An Analysis of Honeypot Programs and the Attack Data Collected. 228-238 - Henrique M. Dinis Santos, Sérgio Tenreiro de Magalhães, Maria José Magalhães:
An Immunity Based Configuration for Multilayer Single Featured Biometric Authentication Algorithms. 239-243 - Ali Hosseinpour, Amin Hosseinian Far, Hamid Jahankhani, Alireza Ghadrdanizadi:
Security and Feasibility of Power Line Communication System. 244-251 - Faris Al-Baadani, Sufian Yousef:
A Comparison Study for Different Wireless Sensor Network Protocols. 252-259
Security Audit, Risk and Governance
- Ali G. Hessami, Hamid Jahankhani, Mathews Z. Nkhoma:
Responsive Cyber-Physical Risk Management (RECYPHR) - A Systems Framework. 263-274 - Hamid Jahankhani, Najib Altawell, Ali G. Hessami:
Risk and Privacy Issues of Digital Oil Fields in the Cloud. 275-284 - Krishan Chand, Muthu Ramachandran, Ah-Lian Kor:
Simulation of Cloud Data Security Processes and Performance. 285-295 - Umar Mukhtar Ismail, Shareeful Islam, Haralambos Mouratidis:
A Framework for Cloud Security Audit. 296-309
Secure Software Engineering
- Muthu Ramachandran:
Software Security Requirements Engineering: State of the Art. 313-322 - Daniel Ganji, Haralambos Mouratidis, Saeed Malekshahi Gheytassi, Miltos Petridis:
Conflicts Between Security and Privacy Measures in Software Requirements Engineering. 323-334 - Mohammed Fakrudeen, Sufian Yousef:
Securing the Blind User Visualization and Interaction in Touch Screen. 335-347 - Bobby L. Tait:
Behavioural Biometrics: Utilizing Eye-Tracking to Generate a Behavioural Pin Using the Eyewriter. 348-359
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.