Search dblp for Publications

export results for "toc:db/conf/cybersa/cybersa2018.bht:"

 download as .bib file

@inproceedings{DBLP:conf/cybersa/ArrottLLL18,
  author       = {Anthony Arrott and
                  Arun Lakhotia and
                  Ferenc Leitold and
                  Charles LeDoux},
  title        = {Cluster analysis for deobfuscation of malware variants during ransomware
                  attacks},
  booktitle    = {International Conference On Cyber Situational Awareness, Data Analytics
                  And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CyberSA.2018.8551432},
  doi          = {10.1109/CYBERSA.2018.8551432},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/ArrottLLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/AsadiRO18,
  author       = {Nima Asadi and
                  Aunshul Rege and
                  Zoran Obradovic},
  title        = {Analysis of Adversarial Movement Through Characteristics of Graph
                  Topological Ordering},
  booktitle    = {International Conference On Cyber Situational Awareness, Data Analytics
                  And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CyberSA.2018.8551361},
  doi          = {10.1109/CYBERSA.2018.8551361},
  timestamp    = {Thu, 06 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersa/AsadiRO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/BayoumyMS18,
  author       = {Yara Fareed Fahmy Bayoumy and
                  Per H{\aa}kon Meland and
                  Guttorm Sindre},
  title        = {A Netnographic Study on the Dark Net Ecosystem for Ransomware},
  booktitle    = {International Conference On Cyber Situational Awareness, Data Analytics
                  And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CyberSA.2018.8551424},
  doi          = {10.1109/CYBERSA.2018.8551424},
  timestamp    = {Thu, 06 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersa/BayoumyMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/ClioHJKKOP18,
  author       = {Sungyoung Clio and
                  Insung Han and
                  Hyunsook Jeong and
                  Jinsoo Kim and
                  Sungmo Koo and
                  Haengrok Oh and
                  Moosung Park},
  title        = {Cyber Kill Chain based Threat Taxonomy and its Application on Cyber
                  Common Operational Picture},
  booktitle    = {International Conference On Cyber Situational Awareness, Data Analytics
                  And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CyberSA.2018.8551383},
  doi          = {10.1109/CYBERSA.2018.8551383},
  timestamp    = {Thu, 06 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersa/ClioHJKKOP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/CullenA18,
  author       = {Andrea J. Cullen and
                  Lorna Armitage},
  title        = {A Human Vulnerability Assessment Methodology},
  booktitle    = {International Conference On Cyber Situational Awareness, Data Analytics
                  And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CyberSA.2018.8551371},
  doi          = {10.1109/CYBERSA.2018.8551371},
  timestamp    = {Thu, 06 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersa/CullenA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/HillsAIE18,
  author       = {Zachary Hills and
                  David F. Arppe and
                  Amin Ibrahim and
                  Khalil El{-}Khatib},
  title        = {Compound Password System for Mobile},
  booktitle    = {International Conference On Cyber Situational Awareness, Data Analytics
                  And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CyberSA.2018.8551445},
  doi          = {10.1109/CYBERSA.2018.8551445},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/HillsAIE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/HindyHBSAB18,
  author       = {Hanan Hindy and
                  Elike Hodo and
                  Ethan Bayne and
                  Amar Seeam and
                  Robert C. Atkinson and
                  Xavier J. A. Bellekens},
  title        = {A Taxonomy of Malicious Traffic for Intrusion Detection Systems},
  booktitle    = {International Conference On Cyber Situational Awareness, Data Analytics
                  And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CyberSA.2018.8551386},
  doi          = {10.1109/CYBERSA.2018.8551386},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/HindyHBSAB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/KenneallyRB18,
  author       = {Erin Kenneally and
                  Lucien Randazzese and
                  David Balenson},
  title        = {Cyber Risk Economics Capability Gaps Research Strategy},
  booktitle    = {International Conference On Cyber Situational Awareness, Data Analytics
                  And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CyberSA.2018.8551399},
  doi          = {10.1109/CYBERSA.2018.8551399},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/KenneallyRB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/LakhotiaNL18,
  author       = {Arun Lakhotia and
                  Vivek Notani and
                  Charles LeDoux},
  title        = {Malware Economics and its Implication to Anti-Malware Situational
                  Awareness},
  booktitle    = {International Conference On Cyber Situational Awareness, Data Analytics
                  And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CyberSA.2018.8551388},
  doi          = {10.1109/CYBERSA.2018.8551388},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/LakhotiaNL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/LifSG18,
  author       = {Patrik Lif and
                  Teodor Sommestad and
                  Dennis Gran{\aa}sen},
  title        = {Development and evaluation of information elements for simplified
                  cyber-incident reports},
  booktitle    = {International Conference On Cyber Situational Awareness, Data Analytics
                  And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CyberSA.2018.8551402},
  doi          = {10.1109/CYBERSA.2018.8551402},
  timestamp    = {Thu, 06 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersa/LifSG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/MaqboolPD18,
  author       = {Zahid Maqbool and
                  V. S. Chandrasekhar Pammi and
                  Varun Dutt},
  title        = {Cyber security: Influence of patching vulnerabilities on the decision-making
                  of hackers and analysts},
  booktitle    = {International Conference On Cyber Situational Awareness, Data Analytics
                  And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CyberSA.2018.8551421},
  doi          = {10.1109/CYBERSA.2018.8551421},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/MaqboolPD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/McDermottPM18,
  author       = {Christopher D. McDermott and
                  Andrei V. Petrovski and
                  Farzan Majdani},
  title        = {Towards Situational Awareness of Botnet Activity in the Internet of
                  Things},
  booktitle    = {International Conference On Cyber Situational Awareness, Data Analytics
                  And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CyberSA.2018.8551408},
  doi          = {10.1109/CYBERSA.2018.8551408},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/McDermottPM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/MelandS18,
  author       = {Per H{\aa}kon Meland and
                  Fredrik Seehusen},
  title        = {When to Treat Security Risks with Cyber Insurance},
  booktitle    = {International Conference On Cyber Situational Awareness, Data Analytics
                  And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CyberSA.2018.8551456},
  doi          = {10.1109/CYBERSA.2018.8551456},
  timestamp    = {Thu, 06 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersa/MelandS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/MichelK18,
  author       = {Mary C. Kay Michel and
                  Michael C. King},
  title        = {Towards An Adaptable System-based Classification Design for Cyber
                  Identity},
  booktitle    = {International Conference On Cyber Situational Awareness, Data Analytics
                  And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CyberSA.2018.8551376},
  doi          = {10.1109/CYBERSA.2018.8551376},
  timestamp    = {Thu, 06 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersa/MichelK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/MillerCL18,
  author       = {Shane Miller and
                  Kevin Curran and
                  Tom Lunney},
  title        = {Multilayer Perceptron Neural Network for Detection of Encrypted {VPN}
                  Network Traffic},
  booktitle    = {International Conference On Cyber Situational Awareness, Data Analytics
                  And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CyberSA.2018.8551395},
  doi          = {10.1109/CYBERSA.2018.8551395},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/MillerCL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/Onwubiko18,
  author       = {Cyril Onwubiko},
  title        = {CoCoa: An Ontology for Cybersecurity Operations Centre Analysis Process},
  booktitle    = {International Conference On Cyber Situational Awareness, Data Analytics
                  And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CyberSA.2018.8551486},
  doi          = {10.1109/CYBERSA.2018.8551486},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/Onwubiko18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/RahulamathavanY18,
  author       = {S. Rahulamathavan and
                  Xuewen Yao and
                  R. Yogachandran and
                  K. Cumanan and
                  Muttukrishnan Rajarajan},
  title        = {Redesign of Gaussian Mixture Model for Efficient and Privacy-preserving
                  Speaker Recognition},
  booktitle    = {International Conference On Cyber Situational Awareness, Data Analytics
                  And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CyberSA.2018.8551477},
  doi          = {10.1109/CYBERSA.2018.8551477},
  timestamp    = {Sun, 30 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/RahulamathavanY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/RenaudS18,
  author       = {Karen Renaud and
                  Lynsay A. Shepherd},
  title        = {How to Make Privacy Policies both GDPR-Compliant and Usable},
  booktitle    = {International Conference On Cyber Situational Awareness, Data Analytics
                  And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CyberSA.2018.8551442},
  doi          = {10.1109/CYBERSA.2018.8551442},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersa/RenaudS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/Stavrou18,
  author       = {Eliana Stavrou},
  title        = {Enhancing Cyber Situational Awareness: {A} New Perspective of Password
                  Auditing Tools},
  booktitle    = {International Conference On Cyber Situational Awareness, Data Analytics
                  And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CyberSA.2018.8551404},
  doi          = {10.1109/CYBERSA.2018.8551404},
  timestamp    = {Thu, 06 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersa/Stavrou18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/UuganbayarYM18,
  author       = {Ganbayar Uuganbayar and
                  Artsiom Yautsiukhin and
                  Fabio Martinelli},
  title        = {Cyber Insurance and Security Interdependence: Friends or Foes?},
  booktitle    = {International Conference On Cyber Situational Awareness, Data Analytics
                  And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CyberSA.2018.8551447},
  doi          = {10.1109/CYBERSA.2018.8551447},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/UuganbayarYM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/WoodsS18,
  author       = {Daniel W. Woods and
                  Andrew C. Simpson},
  title        = {Towards Integrating Insurance Data into Information Security Investment
                  Decision Making},
  booktitle    = {International Conference On Cyber Situational Awareness, Data Analytics
                  And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CyberSA.2018.8551375},
  doi          = {10.1109/CYBERSA.2018.8551375},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/WoodsS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/XuTG18,
  author       = {Wei Xu and
                  Yaodong Tao and
                  Xin Guan},
  title        = {The Landscape of Industrial Control Systems {(ICS)} Devices on the
                  Internet},
  booktitle    = {International Conference On Cyber Situational Awareness, Data Analytics
                  And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CyberSA.2018.8551422},
  doi          = {10.1109/CYBERSA.2018.8551422},
  timestamp    = {Mon, 19 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/XuTG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/ZibakS18,
  author       = {Adam Zibak and
                  Andrew Simpson},
  title        = {Can We Evaluate the Impact of Cyber Security Information Sharing?},
  booktitle    = {International Conference On Cyber Situational Awareness, Data Analytics
                  And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CyberSA.2018.8551462},
  doi          = {10.1109/CYBERSA.2018.8551462},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/ZibakS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cybersa/2018,
  title        = {International Conference On Cyber Situational Awareness, Data Analytics
                  And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8536739/proceeding},
  isbn         = {978-1-5386-4565-9},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics