


default search action
CyberSA 2015: London, UK
- 2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9, 2015. IEEE 2015, ISBN 978-0-9932-3380-7

- Sarmistha Neogy, Sayantani Saha:

Developing a secure remote patient monitoring system. 1-4 - Jussi Timonen:

Improving situational awareness of cyber physical systems based on operator's goals. 1-6 - Therese Bjerkestrand, Dimitris Tsaptsinos, Eckhard Pfluegel:

An evaluation of feature selection and reduction algorithms for network IDS data. 1-2 - Hashem Dehghanniri, Emmanuel Letier, Hervé Borrion:

Improving security decision under uncertainty: A multidisciplinary approach. 1-7 - Christopher Laing

, Paul Vickers:
Context informed intelligent information infrastructures for better situational awareness. 1-7 - Maria Evangelopoulou, Christopher W. Johnson:

Empirical framework for situation awareness measurement techniques in network defense. 1-4 - Palvi Aggarwal

, Zahid Maqbool, Antra Grover, V. S. Chandrasekhar Pammi, Saumya Singh, Varun Dutt
:
Cyber security: A game-theoretic analysis of defender and attacker strategies in defacing-website games. 1-8 - Adriana-Cristina Enache, Mihai Ionita, Valentin Sgarciu:

An immune intelligent approach for security assurance. 1-5 - Radu S. Pirscoveanu, Steven Strandlund Hansen, Thor M. T. Larsen, Matija Stevanovic

, Jens Myrup Pedersen
, Alexandre Czech:
Analysis of Malware behavior: Type classification using machine learning. 1-7 - Sarmistha Neogy:

Security management in Wireless Sensor Networks. 1-4 - Mohamed Nassar

, Adel Al-Rahal Orabi, Marwan Doha, Bechara al Bouna:
An SQL-like query tool for data anonymization and outsourcing. 1-3 - Kamran Dahri, Shakeel Rajput, Shahzad Memon

, Lachhman Das Dhomeja:
Smart Activities Monitoring System (SAMS) for security applications. 1-5 - Yegor Shovgenya, Florian Skopik

, Klaus Theuerkauf:
On demand for situational awareness for preventing attacks on the smart grid. 1-4 - Radu S. Pirscoveanu, Steven Strandlund Hansen, Thor M. T. Larsen, Matija Stevanovic, Jens Myrup Pedersen, Alexandre Czech:

Analysis of malware behavior: Type classification using machine learning. 1-7 - Markus Wurzenberger, Florian Skopik

, Giuseppe Settanni, Roman Fiedler:
Beyond gut instincts: Understanding, rating and comparing self-learning IDSs. 1 - Andrius Rickus, Eckhard Pfluegel, Nigel Atkins:

Chaos-based image encryption using an AONT mode of operation. 1-5 - Charles A. Clarke, Eckhard Pfluegel

, Dimitris Tsaptsinos:
Multi-channel overlay protocols: Implementing ad-hoc message authentication in social media platforms. 1-6 - Mark John Hall, Devon David Hansen, Kevin Jones:

Cross-domain situational awareness and collaborative working for cyber security. 1-8 - Marcelo Paiva Fontenele, Lily Sun:

Talent discovery for cyber security: An organisational perspective. 1-4 - Florian Skopik

, Markus Wurzenberger, Giuseppe Settanni, Roman Fiedler:
Establishing national cyber situational awareness through incident information clustering. 1-8 - Cyril Onwubiko

:
Cyber security operations centre: Security monitoring for protecting business and supporting cyber defense strategy. 1-10 - Hatoon S. AlSagri

, Saad S. Alaboodi:
Privacy awareness of online social networking in Saudi Arabia. 1-6 - Muhammad Ali Nasir, Shizra Sultan

, Samia Nefti-Meziani
, Umar Manzoor
:
Potential cyber-attacks against global oil supply chain. 1-7 - Louai Maghrabi

, Eckhard Pfluegel:
Moving assets to the cloud: A game theoretic approach based on trust. 1-5 - Shahzad Memon

, Sorath Mahar, Lachhman Das Dhomeja, Farman Pirzado:
Prospects and challenges for social media in Pakistan. 1-5 - Zulfiqar Bhutto, Kamran Dahri, Iqra Lakho, Shahzad Memon

:
Social Video Streaming (SVS): A prototype application for street crime reporting. 1-4 - Moyinoluwa Abidemi Bode, Samuel Adebayo Oluwadare, Boniface Kayode Alese

, Aderonke Favour-Bethy Thompson:
Risk analysis in cyber situation awareness using Bayesian approach. 1-12 - Dauda Adenusi, Boniface Kayode Alese

, Bamidele Moses Kuboye
, Aderonke Favour-Bethy Thompson:
Development of cyber situation awareness model. 1-11 - Ruhul Amin

, SK Hafizul Islam
, G. P. Biswas, Muhammad Khurram Khan
:
An efficient remote mutual authentication scheme using smart mobile phone over insecure networks. 1-7

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














