


default search action
CyberSA 2019: Oxford, UK
- International Conference on Cyber Situational Awareness, Data Analytics And Assessment, Cyber SA 2019, Oxford, United Kingdom, June 3-4, 2019. IEEE 2019, ISBN 978-1-7281-0232-0

- Louise Axon, Arnau Erola, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:

Analysing cyber-insurance claims to design harm-propagation trees. 1-4 - Ganbayar Uuganbayar, Fabio Massacci

, Artsiom Yautsiukhin
, Fabio Martinelli:
Cyber Insurance and Time-to-Compromise: An Integrated Approach. 1-8 - Wenjun Xiong

, Robert Lagerström:
Threat Modeling of Connected Vehicles: A privacy analysis and extension of vehicleLang. 1-7 - Olivier Jacq, David Brosset, Yvon Kermarrec, Jacques Simonin:

Cyber attacks real time detection: towards a Cyber Situational Awareness for naval systems. 1-2 - Kimberly Tam

, Kevin D. Jones
:
Forensic Readiness within the Maritime Sector. 1-4 - Phil Legg

, Tim Blackman:
Tools and Techniques for Improving Cyber Situational Awareness of Targeted Phishing Attacks. 1-4 - Fiona Carroll

, Adam Chakof, Phil Legg
:
What Makes for Effective Visualisation in Cyber Situational Awareness for Non-Expert Users? 1-8 - Bertrand Venard

:
The determinants of individual cyber security behaviours: Qualitative research among French students. 1-4 - Ferenc Leitold:

Practical approach for measuring the level of user behaviour. 1-2 - Abraham Althonayan

, Alina Andronache:
Resiliency under Strategic Foresight: The effects of Cybersecurity Management and Enterprise Risk Management Alignment. 1-9 - Aguinaldo Bezerra, Gisliany Alves, Ivanovitch Silva

, Pierangelo Rosati
, Patricia Takako Endo
, Theo Lynn
:
A Preliminary Exploration of Uber Data as an Indicator of Urban Liveability. 1-8 - Mary C. Kay Michel, Michael C. King:

The Future of Cyber Analytics: Identity Classification for Systematic and Predictive Insight. 1-4 - Ulrik Franke, Joachim Draeger

:
Two simple models of business interruption accumulation risk in cyber insurance. 1-7 - Theo Lynn

, Patricia Takako Endo
, Pierangelo Rosati
, Ivanovitch Silva
, Guto Leoni Santos, Debbie Ging
:
A Comparison of Machine Learning Approaches for Detecting Misogynistic Speech in Urban Dictionary. 1-8 - Eszter Diána Oroszi:

Security awareness escape room - a possible new method in improving security awareness of users. 1-4 - Lakshmi Prayaga:

Empowering Citizen Data Scientists - Cyber Science Social Media track. 1-2 - Andrew Mason, Yifan Zhao, Hongmei He

, Raymon Gompelman, Srikanth Mandava:
Online Anomaly Detection of Time Series at Scale. 1-8 - Renate Schubert, Ioana Marinica:

Facebook Data: Sharing, Caring, and Selling. 1-3 - Cyril Onwubiko

, Austine Onwubiko:
Cyber KPI for Return on Security Investment. 1-8 - Christopher D. McDermott

, Bastien Jeannelle, John P. Isaacs:
Towards a Conversational Agent for Threat Detection in the Internet of Things. 1-8 - Ulrik Franke, Per Håkon Meland:

Demand side expectations of cyber insurance. 1-8 - Aunshul Rege, Scott VanZant:

Examining the Roles of Muhajirahs in the Islamic State via Twitter. 1-8 - Thomas D. Wagner

:
Cyber Threat Intelligence for "Things". 1-2 - Nima Asadi, Aunshul Rege, Zoran Obradovic:

Pattern discovery in intrusion chains and adversarial movement. 1-4 - Adam Zibak, Andrew Simpson

:
Towards Better Understanding of Cyber Security Information Sharing. 1-8 - Yuanyuan Zhu

, Mee Chi So
, Paul Harrigan
:
Domain Identification for Commercial Intention-holding Posts on Twitter. 1-10 - Erik L. Moore

, Steven P. Fulton, Roberta A. Mancuso, Tristen K. Amador, Daniel M. Likarish:
Collaborative Training and Response Communities - An Alternative to Traditional Cyber Defense Escalation. 1-8 - Alexiei Dingli, Bernhardt Engerer:

Big Social Data - Predicting Users' Interests from their Social Networking Activities. 1-8 - Maria Francesca Carfora

, Albina Orlando
:
Quantile based risk measures in cyber security. 1-4 - Kimberly Tam

, Kevin D. Jones
:
Factors Affecting Cyber Risk in Maritime. 1-8 - Alan Mills

, Theodoros Spyridopoulos
, Phil Legg
:
Efficient and Interpretable Real-Time Malware Detection Using Random-Forest. 1-8

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














