


default search action
Cyber Security And Protection Of Digital Services 2016: London, UK
- 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), London, United Kingdom, June 13-14, 2016. IEEE 2016, ISBN 978-1-5090-0709-7

- Taolue Chen

, Tingting Han, Florian Kammueller, Ibrahim Nemli, Christian W. Probst
:
Model based analysis of insider threats. 1-3 - Abdulrahman Alruban, Nathan L. Clarke

, Fudong Li, Steven Furnell
:
Proactive biometric-enabled forensic imprinting. 1-15 - Gaofeng Zhang, Paolo Falcarin

, Elena Gómez-Martínez
, Shareeful Islam, Christophe Tartary, Bjorn De Sutter, Jérôme d'Annoville:
Attack simulation based software protection assessment method. 1-8 - Cyril Onwubiko

:
Exploring web analytics to enhance cyber situational awareness for the protection of online web services. 1-8 - BooJoong Kang, Suleiman Y. Yerima, Kieran McLaughlin, Sakir Sezer:

N-opcode analysis for android malware classification and categorization. 1-7 - Andrea J. Cullen, Lorna Armitage:

The social engineering attack spiral (SEAS). 1-6 - Marcelo Paiva Fontenele, Lily Sun:

Knowledge management of cyber security expertise: an ontological approach to talent discovery. 1-13 - Zbigniew Hulicki:

The IM system with a cryptographic feature. 1-4 - Aisha Abubakar, Pooneh Bagheri Zadeh, Helge Janicke

, Richard Howley:
Root cause analysis (RCA) as a preliminary tool into the investigation of identity theft. 1-5 - Catrin Burrows, Pooneh Bagheri Zadeh:

A mobile forensic investigation into steganography. 1-2 - Mary Geddes, Pooneh Bagheri Zadeh:

Forensic analysis of private browsing. 1-2 - Muhammad Aminu Ahmad

, Steve Woodhead, Diane Gan:
A countermeasure mechanism for fast scanning malware. 1-8 - Dylan Smyth, Victor Cionca

, Seán McSweeney
, Donna O'Shea
:
Exploiting pitfalls in software-defined networking implementation. 1-8 - Thomas Mundt, Peter Wickboldt:

Security in building automation systems - a first analysis. 1-8 - Tomas Sochor

, Matej Zuzcak
, Petr Bujok:
Statistical analysis of attacking autonomous systems. 1-6 - Kamile Nur Sevis, Ensar Seker

:
Cyber warfare: terms, issues, laws and controversies. 1-9 - Egon Kidmose

, Matija Stevanovic
, Jens Myrup Pedersen
:
Correlating intrusion detection alerts on bot malware infections using neural network. 1-8 - Louai Maghrabi

, Eckhard Pfluegel
, Senna Fathima Noorji:
Designing utility functions for game-theoretic cloud security assessment: a case for using the common vulnerability scoring system. 1-6 - Fara Yahya

, Robert John Walters, Gary B. Wills:
Goal-based security components for cloud storage security framework: a preliminary study. 1-5 - Reza Montasari

, Pekka Peltola
, Victoria Carpenter
:
Gauging the effectiveness of computer misuse act in dealing with cybercrimes. 1-5

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














