


default search action
CyberSec 2014: Beirut, Lebanon
- Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2014, Beirut, Lebanon, April 29 - May 1, 2014. IEEE 2014, ISBN 978-1-4799-3905-3

- Murdoch Watney

:
Challenges pertaining to cyber war under international law. 1-5 - Eric Holm

, Geraldine Mackenzie:
The importance of mandatory data breach notification to identity crime. 6-11 - Iman Ahmeid Mohamed, Azizah Bt Abdul Manaf:

An enhancement of traceability model based-on scenario for digital forensic investigation process. 12-15 - Emsaieb Geepalla:

Comparison between Alloy and Timed Automata for modelling and analysing of access control specifications. 16-21 - Mohd Najwadi Yusoff

, Ramlan Mahmod
, Ali Dehghantanha, Mohd Taufik Abdullah:
An approach for forensic investigation in Firefox OS. 22-26 - Mohd Najwadi Yusoff

, Ramlan Mahmod
, Mohd Taufik Abdullah, Ali Dehghantanha:
Mobile forensic data acquisition in Firefox OS. 27-31 - Neila Rjaibi

, Nawel Gannouni, Latifa Ben Arfa Rabai, Anis Ben Aissa
:
Modeling the propagation of security threats: An e-learning case study. 32-37 - Zakaria Zakaria Hassan, Talaat A. Elgarf, Abdelhalim Zekry

:
Modifying authentication techniques in mobile communication systems. 38-44 - Omer K. Jasim Mohammad

, Safia Abbas
, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem:
Statistical analysis for random bits generation on quantum key distribution. 45-51 - Victor R. Kebande

, Hein S. Venter
:
A cognitive approach for botnet detection using Artificial Immune System in the cloud. 52-57 - Heshem A. El Zouka, Mustafa M. Hosni:

On the power of quantum cryptography and computers. 58-63 - M. Kaddour, Nourdine Ait Tmazirte, Maan El Badaoui El Najjar, Z. Naja, Nazih Moubayed

:
Autonomous integrity monitoring for GNSS localization using informational approach and iono-free measurements. 64-69

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














