


default search action
Cyber Security And Protection Of Digital Services 2018: Glasgow, Scotland, UK
- 2018 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Glasgow, Scotland, United Kingdom, June 11-12, 2018. IEEE 2018, ISBN 978-1-5386-4683-0

- Egon Kidmose

, Matija Stevanovic
, Jens Myrup Pedersen
:
Detection of Malicious domains through lexical analysis. 1-5 - Halldis Sohoel, Martin Gilje Jaatun, Colin Boyd:

OWASP Top 10 - Do Startups Care? 1-8 - Domhnall Carlin

, Philip O'Kane, Sakir Sezer:
Dynamic Opcode Analysis of Ransomware. 1-4 - Martin Gilje Jaatun, Marie Elisabeth Gaup Moe

, Per Erik Nordbo:
Cyber Security Considerations for Self-healing Smart Grid Networks. 1-7 - Yassine Lemmou

, El Mamoun Souidi
:
Infection, Self-reproduction and Overinfection in Ransomware: The Case of TeslaCrypt. 1-8 - Sean McKeown

, Gordon Russell, Petra Leimich
:
Reducing the Impact of Network Bottlenecks on Remote Contraband Detection. 1-7 - Anastasios Balaskas, Virginia N. L. Franqueira

:
Analytical Tools for Blockchain: Review, Taxonomy and Open Challenges. 1-8 - Ensar Seker

, Hasan Huseyin Ozbenli:
The Concept of Cyber Defence Exercises (CDX): Planning, Execution, Evaluation. 1-9 - Santhosh Parampottupadam, Arghir-Nicolae Moldovan:

Cloud-based Real-time Network Intrusion Detection Using Deep Learning. 1-8 - Daniel Fraunholz, Daniel Krohmer, Hans Dieter Schotten, Carolina Nogueira:

Introducing Falcom: A Multifunctional High-Interaction Honeypot Framework for Industrial and Embedded Applications. 1-8 - Mirko Bottarelli, Gregory Epiphaniou

, Dhouha Kbaier Ben Ismail
, Petros Karadimas, Haider M. Al-Khateeb
:
Quantisation feasibility and performance of RSS-based secret key extraction in VANETs. 1-8 - Mahdi Madani, Camel Tanougast

:
Combined and Robust SNOW-ZUC Algorithm Based on Chaotic System. 1-7 - Baskoro Adi Pratomo

, Pete Burnap, George Theodorakopoulos:
Unsupervised Approach for Detecting Low Rate Attacks on Network Traffic with Autoencoder. 1-8 - Vladimir Eliseev

, Olga Eliseeva:
Lightweight Distributed Attack Detection and Prevention for the Safe Internet of Things. 1-6 - Sean McKeown

, Gordon Russell, Petra Leimich
:
Sub-file Hashing Strategies for Fast Contraband Detection. 1-7 - Shuai Fu, Nizar Bouguila:

A Bayesian Intrusion Detection Framework. 1-8 - Martin Trae Span, Logan O. Mailloux, Michael R. Grimaila, William Bill Young:

A Systems Security Approach for Requirements Analysis of Complex Cyber-Physical Systems. 1-8 - Andres Robles-Durazno

, Naghmeh Moradpoor, James McWhinnie, Gordon Russell:
A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system. 1-8 - Bob Duncan:

Attackers Constantly Threaten the Survival of Organisations, but there is a New Shark in the Water: Carcharodon Carcharias Moderator Europa Universalis. 1-5 - Paul A. Wortman, Fatemeh Tehranipoor, John A. Chandy

:
An Adversarial Risk-based Approach for Network Architecture Security Modeling and Design. 1-8 - Farhad Foroughi, Peter Luksch:

Observation Measures to Profile User Security Behaviour. 1-6 - Andre Sorensen, Maxime Jerome Remy, Nicolaj Kjettrup, Rasmi Vlad Mahmoud, Jens Myrup Pedersen

:
An Approach to Detect and Prevent Cybercrime in Large Complex Networks. 1-8 - Omego Obinna

, Eckhard Pfluegel
, Martin J. Tunnicliffe, Charles A. Clarke:
Ensuring Message Freshness in A Multi-Channel SMS Steganographic Banking Protocol. 1-7 - Dimitrios Kavallieros

, Christina Chalanouli, Georgios Kokkinis, Anastasios Panathanasiou, Efthimios Lissaris, Georgios Leventakis, Georgios Giataganas, Georgios Germanos:
Searching for crime on the web: Legal and Ethical perspectives. 1-8 - Kimberly Tam

, Kevin D. Jones
:
Cyber-Risk Assessment for Autonomous Ships. 1-8

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














