share record
persistent URL:
Eric Holm , Geraldine Mackenzie : The importance of mandatory data breach notification to identity crime. CyberSec 2014 : 6-11 export record
dblp key:
conf/cybersec/KaddourTNNM14 share record
persistent URL:
M. Kaddour , Nourdine Ait Tmazirte , Maan El Badaoui El Najjar , Z. Naja , Nazih Moubayed : Autonomous integrity monitoring for GNSS localization using informational approach and iono-free measurements. CyberSec 2014 : 64-69 share record
persistent URL:
Victor R. Kebande , Hein S. Venter : A cognitive approach for botnet detection using Artificial Immune System in the cloud. CyberSec 2014 : 52-57 share record
persistent URL:
Iman Ahmeid Mohamed , Azizah Bt Abdul Manaf : An enhancement of traceability model based-on scenario for digital forensic investigation process. CyberSec 2014 : 12-15 export record
dblp key:
conf/cybersec/MohammadAES14 share record
persistent URL:
Omer K. Jasim Mohammad , Safia Abbas , El-Sayed M. El-Horbaty , Abdel-Badeeh M. Salem : Statistical analysis for random bits generation on quantum key distribution. CyberSec 2014 : 45-51 export record
dblp key:
conf/cybersec/RjaibiGRA14 share record
persistent URL:
Neila Rjaibi , Nawel Gannouni , Latifa Ben Arfa Rabai , Anis Ben Aissa : Modeling the propagation of security threats: An e-learning case study. CyberSec 2014 : 32-37 share record
persistent URL:
Murdoch Watney : Challenges pertaining to cyber war under international law. CyberSec 2014 : 1-5 export record
dblp key:
conf/cybersec/YusoffMAD14 share record
persistent URL:
Mohd Najwadi Yusoff , Ramlan Mahmod , Mohd Taufik Abdullah , Ali Dehghantanha : Mobile forensic data acquisition in Firefox OS. CyberSec 2014 : 27-31 export record
dblp key:
conf/cybersec/YusoffMDA14 share record
persistent URL:
Mohd Najwadi Yusoff , Ramlan Mahmod , Ali Dehghantanha , Mohd Taufik Abdullah : An approach for forensic investigation in Firefox OS. CyberSec 2014 : 22-26 share record
persistent URL:
Heshem A. El Zouka , Mustafa M. Hosni : On the power of quantum cryptography and computers. CyberSec 2014 : 58-63 share record
persistent URL:
Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2014, Beirut, Lebanon, April 29 - May 1, 2014. IEEE 2014 , ISBN 978-1-4799-3905-3 [contents] 2012 share record
persistent URL:
Huyam Al-Amro , Eyas El-Qawasmeh : Discovering security vulnerabilities and leaks in ASP.NET websites. CyberSec 2012 : 329-333 export record
dblp key:
conf/cybersec/AbdullahY12 share record
persistent URL:
Mohammad Faiz Liew Abdullah , A. Z. Yonis : Performance of LTE Release 8 and Release 10 in wireless communications. CyberSec 2012 : 236-241 export record
dblp key:
conf/cybersec/AbdulrazegNB12 share record
persistent URL:
Ala A. Abdulrazeg , Norita Md Norwawi , Nurlida Basir : Security metrics to improve misuse case model. CyberSec 2012 : 94-99 export record
dblp key:
conf/cybersec/AbusukhonT12 share record
persistent URL:
Ahmad Abusukhon , Mohammad Talib : A novel network security algorithm based on private key encryption. CyberSec 2012 : 33-37 share record
persistent URL:
Rabiah Ahmad , Zahri Yunos , Shahrin Sahib : Understanding cyber terrorism: The grounded theory method applied. CyberSec 2012 : 323-328 share record
persistent URL:
Mohammed A. Alzain , Ben Soh , Eric Pardede : A New approach using redundancy technique to improve security in cloud computing. CyberSec 2012 : 230-235 share record
persistent URL:
Fakariah Hani Mohd Ali , Rozita Yunos , Mohd Azuan Mohamad Alias : Simple port knocking method: Against TCP replay attack and port scanning. CyberSec 2012 : 247-252 export record
dblp key:
conf/cybersec/AlkhalifahD12 share record
persistent URL:
Ali Alkhalifah , John D'Ambra : The role of Identity Management Systems in enhancing protection of user privacy. CyberSec 2012 : 144-149 share record
persistent URL:
Abdullahi Arabo , Fadi El-Moussa : Security framework for smart devices. CyberSec 2012 : 82-87 share record
persistent URL:
Ida Madieha bt. Abdul Ghani Azmi , Sonny Zulhuda , Sigit Puspito Wigati Jarot : Data breach on the critical information infrastructures: Lessons from the Wikileaks. CyberSec 2012 : 306-311 share record
persistent URL:
M. P. Azuwa , Rabiah Ahmad , Shahrin Sahib , Solahuddin Shamsuddin : A propose technical security metrics model for SCADA systems. CyberSec 2012 : 70-75 export record
dblp key:
conf/cybersec/BindahmanZZ12 share record
persistent URL:
Salah Bindahman , Nasriah Zakaria , Norsaadah Zakaria : 3D body scanning technology: Privacy and ethical issues. CyberSec 2012 : 150-154 export record
dblp key:
conf/cybersec/CanedoJCA12 share record
persistent URL:
Edna Dias Canedo , Rafael Timóteo de Sousa Júnior , Rhandy Rafhael de Carvalho , Robson de Oliveira Albuquerque : Trust model for private cloud. CyberSec 2012 : 128-132 share record
persistent URL:
Xiangkun Dai , Caiyi Zhu , Yucui Guo : P2P dynamic trust management system based on trust network. CyberSec 2012 : 165-170 export record
dblp key:
conf/cybersec/DamshenasDMS12 share record
persistent URL:
Mohsen Damshenas , Ali Dehghantanha , Ramlan Mahmoud , Solahuddin bin Shamsuddin : Forensics investigation challenges in cloud computing environments. CyberSec 2012 : 190-194 export record
dblp key:
conf/cybersec/DaryabarDUSS12 share record
persistent URL:
Farid Daryabar , Ali Dehghantanha , Nur Izura Udzir , Nor Fazlida Binti Mohd Sani , Solahuddin bin Shamsuddin : Towards secure model for SCADA systems. CyberSec 2012 : 60-64 share record
persistent URL:
Somdip Dey : SD-EI: A cryptographic technique to encrypt images. CyberSec 2012 : 28-32 export record
dblp key:
conf/cybersec/DezfouliDMSS12 share record
persistent URL:
Farhood Norouzizadeh Dezfouli , Ali Dehghantanha , Ramlan Mahmoud , Nor Fazlida Binti Mohd Sani , Solahuddin bin Shamsuddin : Volatile memory acquisition using backup for forensic investigation. CyberSec 2012 : 186-189 share record
persistent URL:
Ramya Dharam , Sajjan G. Shiva : Runtime monitors for tautology based SQL injection attacks. CyberSec 2012 : 253-258