default search action
Search dblp for Publications
export results for "toc:db/conf/cybersa/cybersa2015.bht:"
@inproceedings{DBLP:conf/cybersa/AdenusiAKT15, author = {Dauda Adenusi and Boniface Kayode Alese and Bamidele Moses Kuboye and Aderonke Favour{-}Bethy Thompson}, title = {Development of cyber situation awareness model}, booktitle = {2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9, 2015}, pages = {1--11}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CyberSA.2015.7166135}, doi = {10.1109/CYBERSA.2015.7166135}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/AdenusiAKT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/AggarwalMGPSD15, author = {Palvi Aggarwal and Zahid Maqbool and Antra Grover and V. S. Chandrasekhar Pammi and Saumya Singh and Varun Dutt}, title = {Cyber security: {A} game-theoretic analysis of defender and attacker strategies in defacing-website games}, booktitle = {2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9, 2015}, pages = {1--8}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CyberSA.2015.7166127}, doi = {10.1109/CYBERSA.2015.7166127}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/AggarwalMGPSD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/AlSagriA15, author = {Hatoon S. AlSagri and Saad S. Alaboodi}, title = {Privacy awareness of online social networking in Saudi Arabia}, booktitle = {2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CyberSA.2015.7166111}, doi = {10.1109/CYBERSA.2015.7166111}, timestamp = {Tue, 13 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/AlSagriA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/AminIBK15, author = {Ruhul Amin and SK Hafizul Islam and G. P. Biswas and Muhammad Khurram Khan}, title = {An efficient remote mutual authentication scheme using smart mobile phone over insecure networks}, booktitle = {2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9, 2015}, pages = {1--7}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CyberSA.2015.7166114}, doi = {10.1109/CYBERSA.2015.7166114}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersa/AminIBK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/BhuttoDLM15, author = {Zulfiqar Bhutto and Kamran Dahri and Iqra Lakho and Shahzad Memon}, title = {Social Video Streaming {(SVS):} {A} prototype application for street crime reporting}, booktitle = {2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9, 2015}, pages = {1--4}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CyberSA.2015.7166131}, doi = {10.1109/CYBERSA.2015.7166131}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/BhuttoDLM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/BjerkestrandTP15, author = {Therese Bjerkestrand and Dimitris Tsaptsinos and Eckhard Pfluegel}, title = {An evaluation of feature selection and reduction algorithms for network {IDS} data}, booktitle = {2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9, 2015}, pages = {1--2}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CyberSA.2015.7166129}, doi = {10.1109/CYBERSA.2015.7166129}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/BjerkestrandTP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/BodeOAT15, author = {Moyinoluwa Abidemi Bode and Samuel Adebayo Oluwadare and Boniface Kayode Alese and Aderonke Favour{-}Bethy Thompson}, title = {Risk analysis in cyber situation awareness using Bayesian approach}, booktitle = {2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9, 2015}, pages = {1--12}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CyberSA.2015.7166119}, doi = {10.1109/CYBERSA.2015.7166119}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/BodeOAT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/ClarkePT15, author = {Charles A. Clarke and Eckhard Pfluegel and Dimitris Tsaptsinos}, title = {Multi-channel overlay protocols: Implementing ad-hoc message authentication in social media platforms}, booktitle = {2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CyberSA.2015.7166118}, doi = {10.1109/CYBERSA.2015.7166118}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/ClarkePT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/DahriRMD15, author = {Kamran Dahri and Shakeel Rajput and Shahzad Memon and Lachhman Das Dhomeja}, title = {Smart Activities Monitoring System {(SAMS)} for security applications}, booktitle = {2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9, 2015}, pages = {1--5}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CyberSA.2015.7166138}, doi = {10.1109/CYBERSA.2015.7166138}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/DahriRMD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/DehghanniriLB15, author = {Hashem Dehghanniri and Emmanuel Letier and Herv{\'{e}} Borrion}, title = {Improving security decision under uncertainty: {A} multidisciplinary approach}, booktitle = {2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9, 2015}, pages = {1--7}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CyberSA.2015.7166134}, doi = {10.1109/CYBERSA.2015.7166134}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/DehghanniriLB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/EnacheIS15, author = {Adriana{-}Cristina Enache and Mihai Ionita and Valentin Sgarciu}, title = {An immune intelligent approach for security assurance}, booktitle = {2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9, 2015}, pages = {1--5}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CyberSA.2015.7166116}, doi = {10.1109/CYBERSA.2015.7166116}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/EnacheIS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/EvangelopoulouJ15, author = {Maria Evangelopoulou and Christopher W. Johnson}, title = {Empirical framework for situation awareness measurement techniques in network defense}, booktitle = {2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9, 2015}, pages = {1--4}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CyberSA.2015.7166132}, doi = {10.1109/CYBERSA.2015.7166132}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/EvangelopoulouJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/FonteneleS15, author = {Marcelo Paiva Fontenele and Lily Sun}, title = {Talent discovery for cyber security: An organisational perspective}, booktitle = {2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9, 2015}, pages = {1--4}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CyberSA.2015.7166122}, doi = {10.1109/CYBERSA.2015.7166122}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/FonteneleS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/HallHJ15, author = {Mark John Hall and Devon David Hansen and Kevin Jones}, title = {Cross-domain situational awareness and collaborative working for cyber security}, booktitle = {2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9, 2015}, pages = {1--8}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CyberSA.2015.7166110}, doi = {10.1109/CYBERSA.2015.7166110}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/HallHJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/LaingV15, author = {Christopher Laing and Paul Vickers}, title = {Context informed intelligent information infrastructures for better situational awareness}, booktitle = {2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9, 2015}, pages = {1--7}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CyberSA.2015.7166136}, doi = {10.1109/CYBERSA.2015.7166136}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/LaingV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/MaghrabiP15, author = {Louai Maghrabi and Eckhard Pfluegel}, title = {Moving assets to the cloud: {A} game theoretic approach based on trust}, booktitle = {2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9, 2015}, pages = {1--5}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CyberSA.2015.7166120}, doi = {10.1109/CYBERSA.2015.7166120}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/MaghrabiP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/MemonMDP15, author = {Shahzad Memon and Sorath Mahar and Lachhman Das Dhomeja and Farman Pirzado}, title = {Prospects and challenges for social media in Pakistan}, booktitle = {2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9, 2015}, pages = {1--5}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CyberSA.2015.7166124}, doi = {10.1109/CYBERSA.2015.7166124}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/MemonMDP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/NasirSNM15, author = {Muhammad Ali Nasir and Shizra Sultan and Samia Nefti{-}Meziani and Umar Manzoor}, title = {Potential cyber-attacks against global oil supply chain}, booktitle = {2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9, 2015}, pages = {1--7}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CyberSA.2015.7166137}, doi = {10.1109/CYBERSA.2015.7166137}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/NasirSNM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/NassarODB15, author = {Mohamed Nassar and Adel Al{-}Rahal Orabi and Marwan Doha and Bechara al Bouna}, title = {An SQL-like query tool for data anonymization and outsourcing}, booktitle = {2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9, 2015}, pages = {1--3}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CyberSA.2015.7166130}, doi = {10.1109/CYBERSA.2015.7166130}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/NassarODB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/Neogy15, author = {Sarmistha Neogy}, title = {Security management in Wireless Sensor Networks}, booktitle = {2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9, 2015}, pages = {1--4}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CyberSA.2015.7166112}, doi = {10.1109/CYBERSA.2015.7166112}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/Neogy15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/NeogyS15, author = {Sarmistha Neogy and Sayantani Saha}, title = {Developing a secure remote patient monitoring system}, booktitle = {2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9, 2015}, pages = {1--4}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CyberSA.2015.7166123}, doi = {10.1109/CYBERSA.2015.7166123}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/NeogyS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/Onwubiko15, author = {Cyril Onwubiko}, title = {Cyber security operations centre: Security monitoring for protecting business and supporting cyber defense strategy}, booktitle = {2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9, 2015}, pages = {1--10}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CyberSA.2015.7166125}, doi = {10.1109/CYBERSA.2015.7166125}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/Onwubiko15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/PirscoveanuHLSP15, author = {Radu S. Pirscoveanu and Steven Strandlund Hansen and Thor M. T. Larsen and Matija Stevanovic and Jens Myrup Pedersen and Alexandre Czech}, title = {Analysis of Malware behavior: Type classification using machine learning}, booktitle = {2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9, 2015}, pages = {1--7}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CyberSA.2015.7166115}, doi = {10.1109/CYBERSA.2015.7166115}, timestamp = {Wed, 19 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/PirscoveanuHLSP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/PirscoveanuHLSP15a, author = {Radu S. Pirscoveanu and Steven Strandlund Hansen and Thor M. T. Larsen and Matija Stevanovic and Jens Myrup Pedersen and Alexandre Czech}, title = {Analysis of malware behavior: Type classification using machine learning}, booktitle = {2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9, 2015}, pages = {1--7}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CyberSA.2015.7166128}, doi = {10.1109/CYBERSA.2015.7166128}, timestamp = {Wed, 19 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/PirscoveanuHLSP15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/RickusPA15, author = {Andrius Rickus and Eckhard Pfluegel and Nigel Atkins}, title = {Chaos-based image encryption using an {AONT} mode of operation}, booktitle = {2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9, 2015}, pages = {1--5}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CyberSA.2015.7166113}, doi = {10.1109/CYBERSA.2015.7166113}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/RickusPA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/ShovgenyaST15, author = {Yegor Shovgenya and Florian Skopik and Klaus Theuerkauf}, title = {On demand for situational awareness for preventing attacks on the smart grid}, booktitle = {2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9, 2015}, pages = {1--4}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CyberSA.2015.7166133}, doi = {10.1109/CYBERSA.2015.7166133}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/ShovgenyaST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/SkopikWSF15, author = {Florian Skopik and Markus Wurzenberger and Giuseppe Settanni and Roman Fiedler}, title = {Establishing national cyber situational awareness through incident information clustering}, booktitle = {2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9, 2015}, pages = {1--8}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CyberSA.2015.7166126}, doi = {10.1109/CYBERSA.2015.7166126}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/SkopikWSF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/Timonen15, author = {Jussi Timonen}, title = {Improving situational awareness of cyber physical systems based on operator's goals}, booktitle = {2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CyberSA.2015.7166121}, doi = {10.1109/CYBERSA.2015.7166121}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/Timonen15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/WurzenbergerSSF15, author = {Markus Wurzenberger and Florian Skopik and Giuseppe Settanni and Roman Fiedler}, title = {Beyond gut instincts: Understanding, rating and comparing self-learning IDSs}, booktitle = {2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9, 2015}, pages = {1}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CyberSA.2015.7166117}, doi = {10.1109/CYBERSA.2015.7166117}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/WurzenbergerSSF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cybersa/2015, title = {2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9, 2015}, publisher = {{IEEE}}, year = {2015}, url = {https://ieeexplore.ieee.org/xpl/conhome/7153065/proceeding}, isbn = {978-0-9932-3380-7}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.