Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/cybersa/cybersa2018.bht:"
@inproceedings{DBLP:conf/cybersa/ArrottLLL18, author = {Anthony Arrott and Arun Lakhotia and Ferenc Leitold and Charles LeDoux}, title = {Cluster analysis for deobfuscation of malware variants during ransomware attacks}, booktitle = {International Conference On Cyber Situational Awareness, Data Analytics And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CyberSA.2018.8551432}, doi = {10.1109/CYBERSA.2018.8551432}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/ArrottLLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/AsadiRO18, author = {Nima Asadi and Aunshul Rege and Zoran Obradovic}, title = {Analysis of Adversarial Movement Through Characteristics of Graph Topological Ordering}, booktitle = {International Conference On Cyber Situational Awareness, Data Analytics And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CyberSA.2018.8551361}, doi = {10.1109/CYBERSA.2018.8551361}, timestamp = {Thu, 06 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersa/AsadiRO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/BayoumyMS18, author = {Yara Fareed Fahmy Bayoumy and Per H{\aa}kon Meland and Guttorm Sindre}, title = {A Netnographic Study on the Dark Net Ecosystem for Ransomware}, booktitle = {International Conference On Cyber Situational Awareness, Data Analytics And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CyberSA.2018.8551424}, doi = {10.1109/CYBERSA.2018.8551424}, timestamp = {Thu, 06 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersa/BayoumyMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/ClioHJKKOP18, author = {Sungyoung Clio and Insung Han and Hyunsook Jeong and Jinsoo Kim and Sungmo Koo and Haengrok Oh and Moosung Park}, title = {Cyber Kill Chain based Threat Taxonomy and its Application on Cyber Common Operational Picture}, booktitle = {International Conference On Cyber Situational Awareness, Data Analytics And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CyberSA.2018.8551383}, doi = {10.1109/CYBERSA.2018.8551383}, timestamp = {Thu, 06 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersa/ClioHJKKOP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/CullenA18, author = {Andrea J. Cullen and Lorna Armitage}, title = {A Human Vulnerability Assessment Methodology}, booktitle = {International Conference On Cyber Situational Awareness, Data Analytics And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018}, pages = {1--2}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CyberSA.2018.8551371}, doi = {10.1109/CYBERSA.2018.8551371}, timestamp = {Thu, 06 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersa/CullenA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/HillsAIE18, author = {Zachary Hills and David F. Arppe and Amin Ibrahim and Khalil El{-}Khatib}, title = {Compound Password System for Mobile}, booktitle = {International Conference On Cyber Situational Awareness, Data Analytics And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018}, pages = {1--4}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CyberSA.2018.8551445}, doi = {10.1109/CYBERSA.2018.8551445}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/HillsAIE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/HindyHBSAB18, author = {Hanan Hindy and Elike Hodo and Ethan Bayne and Amar Seeam and Robert C. Atkinson and Xavier J. A. Bellekens}, title = {A Taxonomy of Malicious Traffic for Intrusion Detection Systems}, booktitle = {International Conference On Cyber Situational Awareness, Data Analytics And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018}, pages = {1--4}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CyberSA.2018.8551386}, doi = {10.1109/CYBERSA.2018.8551386}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/HindyHBSAB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/KenneallyRB18, author = {Erin Kenneally and Lucien Randazzese and David Balenson}, title = {Cyber Risk Economics Capability Gaps Research Strategy}, booktitle = {International Conference On Cyber Situational Awareness, Data Analytics And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CyberSA.2018.8551399}, doi = {10.1109/CYBERSA.2018.8551399}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/KenneallyRB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/LakhotiaNL18, author = {Arun Lakhotia and Vivek Notani and Charles LeDoux}, title = {Malware Economics and its Implication to Anti-Malware Situational Awareness}, booktitle = {International Conference On Cyber Situational Awareness, Data Analytics And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CyberSA.2018.8551388}, doi = {10.1109/CYBERSA.2018.8551388}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/LakhotiaNL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/LifSG18, author = {Patrik Lif and Teodor Sommestad and Dennis Gran{\aa}sen}, title = {Development and evaluation of information elements for simplified cyber-incident reports}, booktitle = {International Conference On Cyber Situational Awareness, Data Analytics And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018}, pages = {1--10}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CyberSA.2018.8551402}, doi = {10.1109/CYBERSA.2018.8551402}, timestamp = {Thu, 06 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersa/LifSG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/MaqboolPD18, author = {Zahid Maqbool and V. S. Chandrasekhar Pammi and Varun Dutt}, title = {Cyber security: Influence of patching vulnerabilities on the decision-making of hackers and analysts}, booktitle = {International Conference On Cyber Situational Awareness, Data Analytics And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CyberSA.2018.8551421}, doi = {10.1109/CYBERSA.2018.8551421}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/MaqboolPD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/McDermottPM18, author = {Christopher D. McDermott and Andrei V. Petrovski and Farzan Majdani}, title = {Towards Situational Awareness of Botnet Activity in the Internet of Things}, booktitle = {International Conference On Cyber Situational Awareness, Data Analytics And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CyberSA.2018.8551408}, doi = {10.1109/CYBERSA.2018.8551408}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/McDermottPM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/MelandS18, author = {Per H{\aa}kon Meland and Fredrik Seehusen}, title = {When to Treat Security Risks with Cyber Insurance}, booktitle = {International Conference On Cyber Situational Awareness, Data Analytics And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CyberSA.2018.8551456}, doi = {10.1109/CYBERSA.2018.8551456}, timestamp = {Thu, 06 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersa/MelandS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/MichelK18, author = {Mary C. Kay Michel and Michael C. King}, title = {Towards An Adaptable System-based Classification Design for Cyber Identity}, booktitle = {International Conference On Cyber Situational Awareness, Data Analytics And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018}, pages = {1--2}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CyberSA.2018.8551376}, doi = {10.1109/CYBERSA.2018.8551376}, timestamp = {Thu, 06 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersa/MichelK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/MillerCL18, author = {Shane Miller and Kevin Curran and Tom Lunney}, title = {Multilayer Perceptron Neural Network for Detection of Encrypted {VPN} Network Traffic}, booktitle = {International Conference On Cyber Situational Awareness, Data Analytics And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CyberSA.2018.8551395}, doi = {10.1109/CYBERSA.2018.8551395}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/MillerCL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/Onwubiko18, author = {Cyril Onwubiko}, title = {CoCoa: An Ontology for Cybersecurity Operations Centre Analysis Process}, booktitle = {International Conference On Cyber Situational Awareness, Data Analytics And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CyberSA.2018.8551486}, doi = {10.1109/CYBERSA.2018.8551486}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/Onwubiko18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/RahulamathavanY18, author = {S. Rahulamathavan and Xuewen Yao and R. Yogachandran and K. Cumanan and Muttukrishnan Rajarajan}, title = {Redesign of Gaussian Mixture Model for Efficient and Privacy-preserving Speaker Recognition}, booktitle = {International Conference On Cyber Situational Awareness, Data Analytics And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CyberSA.2018.8551477}, doi = {10.1109/CYBERSA.2018.8551477}, timestamp = {Sun, 30 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/RahulamathavanY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/RenaudS18, author = {Karen Renaud and Lynsay A. Shepherd}, title = {How to Make Privacy Policies both GDPR-Compliant and Usable}, booktitle = {International Conference On Cyber Situational Awareness, Data Analytics And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CyberSA.2018.8551442}, doi = {10.1109/CYBERSA.2018.8551442}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersa/RenaudS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/Stavrou18, author = {Eliana Stavrou}, title = {Enhancing Cyber Situational Awareness: {A} New Perspective of Password Auditing Tools}, booktitle = {International Conference On Cyber Situational Awareness, Data Analytics And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018}, pages = {1--4}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CyberSA.2018.8551404}, doi = {10.1109/CYBERSA.2018.8551404}, timestamp = {Thu, 06 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersa/Stavrou18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/UuganbayarYM18, author = {Ganbayar Uuganbayar and Artsiom Yautsiukhin and Fabio Martinelli}, title = {Cyber Insurance and Security Interdependence: Friends or Foes?}, booktitle = {International Conference On Cyber Situational Awareness, Data Analytics And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018}, pages = {1--4}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CyberSA.2018.8551447}, doi = {10.1109/CYBERSA.2018.8551447}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/UuganbayarYM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/WoodsS18, author = {Daniel W. Woods and Andrew C. Simpson}, title = {Towards Integrating Insurance Data into Information Security Investment Decision Making}, booktitle = {International Conference On Cyber Situational Awareness, Data Analytics And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CyberSA.2018.8551375}, doi = {10.1109/CYBERSA.2018.8551375}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/WoodsS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/XuTG18, author = {Wei Xu and Yaodong Tao and Xin Guan}, title = {The Landscape of Industrial Control Systems {(ICS)} Devices on the Internet}, booktitle = {International Conference On Cyber Situational Awareness, Data Analytics And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CyberSA.2018.8551422}, doi = {10.1109/CYBERSA.2018.8551422}, timestamp = {Mon, 19 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/XuTG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/ZibakS18, author = {Adam Zibak and Andrew Simpson}, title = {Can We Evaluate the Impact of Cyber Security Information Sharing?}, booktitle = {International Conference On Cyber Situational Awareness, Data Analytics And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018}, pages = {1--2}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CyberSA.2018.8551462}, doi = {10.1109/CYBERSA.2018.8551462}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/ZibakS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cybersa/2018, title = {International Conference On Cyber Situational Awareness, Data Analytics And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018}, publisher = {{IEEE}}, year = {2018}, url = {https://ieeexplore.ieee.org/xpl/conhome/8536739/proceeding}, isbn = {978-1-5386-4565-9}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.