


default search action
10th ICGS3 2015: London, UK
- Hamid Jahankhani, Alex Carlile, Babak Akhgar, Amie Taal, Ali G. Hessami, Amin Hosseinian Far

:
Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security - 10th International Conference, ICGS3 2015, London, UK, September 15-17, 2015. Proceedings. Communications in Computer and Information Science 534, Springer 2015, ISBN 978-3-319-23275-1
Intelligence Management
- Babak Akhgar, Helen Gibson:

Processing Social Media Data for Crisis Management in Athena. 3-14 - Petra Saskia Bayerl, Babak Akhgar:

Online Surveillance Awareness as Impact on Data Validity for Open-Source Intelligence? 15-20 - Sina Pournouri, Babak Akhgar:

Improving Cyber Situational Awareness Through Data Mining and Predictive Analytic Techniques. 21-34 - Marko Uotinen:

Detecting Deceit - Guessing or Assessing? Study on the Applicability of Veracity Assessment Methods in Human Intelligence. 35-49 - Reza Alavi, Shareeful Islam, Haris Mouratidis:

Human Factors of Social Engineering Attacks (SEAs) in Hybrid Cloud Environment: Threats and Risks. 50-56
Digital Forensics
- Amie Taal, Jenny Le, James A. Sherer:

A Consideration of eDiscovery Technologies for Internal Investigations. 59-73 - Wakas Mahmood, Hamid Jahankhani, Aykut Ozkaya:

Cloud Forensics Challenges Faced by Forensic Investigators. 74-82 - Reza Montasari

, Pekka Peltola
, David Evans:
Integrated Computer Forensics Investigation Process Model (ICFIPM) for Computer Crime Investigations. 83-95 - Reza Montasari

, Pekka Peltola
:
Computer Forensic Analysis of Private Browsing Modes. 96-109
IT and Cyber Crime
- Luigi Laura, Gianluigi Me:

Searching the Web for Illegal Content: The Anatomy of a Semantic Search Engine. 113-122 - Michael Reynolds:

The Enemy Within: The Challenge for Business from Cyber-attack. 123-136 - Anwar Ul Haq, Arshad Jamal, Usman Butt, Asim Majeed

, Aykut Ozkaya:
Understanding Privacy Concerns in Online Courses: A Case Study of Proctortrack. 137-150 - Eleni-Laskarina Makri

, Costas Lambrinoudakis
:
Towards a Common Security and Privacy Requirements Elicitation Methodology. 151-159 - Nor Fatimah Bt. Awang

, Azizah Abd Manaf:
Automated Security Testing Framework for Detecting SQL Injection Vulnerability in Web Application. 160-171 - Giovanni Bottazzi, Gianluigi Me

:
A Survey on Financial Botnets Threat. 172-181 - Akbar Sheikh Akbari

, Pooneh Bagheri Zadeh:
Wavelet Based Image Enlargement Technique. 182-188 - Gregor Robinson, George R. S. Weir:

Understanding Android Security. 189-199 - Fathiya Al Izki, George R. S. Weir:

Gender Impact on Information Security in the Arab World. 200-207
Systems Security, Safety and Sustainability
- David Lilburn Watson:

Some Security Perils of Smart Living - (A Day in the Life of John Q Smith, a Citizen of Utopia, and His Twin Brother, Who Isn't). 211-227 - Chris Moore

, Ameer Al-Nemrat:
An Analysis of Honeypot Programs and the Attack Data Collected. 228-238 - Henrique M. Dinis Santos

, Sérgio Tenreiro de Magalhães
, Maria José Magalhães:
An Immunity Based Configuration for Multilayer Single Featured Biometric Authentication Algorithms. 239-243 - Ali Hosseinpour, Amin Hosseinian Far

, Hamid Jahankhani, Alireza Ghadrdanizadi:
Security and Feasibility of Power Line Communication System. 244-251 - Faris Al-Baadani, Sufian Yousef:

A Comparison Study for Different Wireless Sensor Network Protocols. 252-259
Security Audit, Risk and Governance
- Ali G. Hessami, Hamid Jahankhani, Mathews Z. Nkhoma:

Responsive Cyber-Physical Risk Management (RECYPHR) - A Systems Framework. 263-274 - Hamid Jahankhani, Najib Altawell

, Ali G. Hessami:
Risk and Privacy Issues of Digital Oil Fields in the Cloud. 275-284 - Krishan Chand, Muthu Ramachandran

, Ah-Lian Kor
:
Simulation of Cloud Data Security Processes and Performance. 285-295 - Umar Mukhtar Ismail, Shareeful Islam, Haralambos Mouratidis:

A Framework for Cloud Security Audit. 296-309
Secure Software Engineering
- Muthu Ramachandran

:
Software Security Requirements Engineering: State of the Art. 313-322 - Daniel Ganji, Haralambos Mouratidis, Saeed Malekshahi Gheytassi, Miltos Petridis:

Conflicts Between Security and Privacy Measures in Software Requirements Engineering. 323-334 - Mohammed Fakrudeen, Sufian Yousef:

Securing the Blind User Visualization and Interaction in Touch Screen. 335-347 - Bobby L. Tait:

Behavioural Biometrics: Utilizing Eye-Tracking to Generate a Behavioural Pin Using the Eyewriter. 348-359

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














