default search action
Cyber Security And Protection Of Digital Services 2020: Dublin, Ireland
- 2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020. IEEE 2020, ISBN 978-1-7281-6428-1
- Arman Zand, James Orwell, Eckhard Pfluegel:
A Secure Framework for Anti-Money-Laundering using Machine Learning and Secret Sharing. 1-7 - Hanlin Chen, Hongmei He, Andrew Starr:
An Overview of Web Robots Detection Techniques. 1-6 - Jonathan Francis Roscoe, Max Smith-Creasey:
Acoustic Emanation of Haptics as a Side-Channel for Gesture-Typing Attacks. 1-4 - Aikaterini Kanta, Iwen Coisel, Mark Scanlon:
Smarter Password Guessing Techniques Leveraging Contextual Information and OSINT. 1-2 - Drew Malzahn, Zachary Birnbaum, Cimone Wright-Hamor:
Automated Vulnerability Testing via Executable Attack Graphs. 1-10 - Evangelos Moustakas, Nishtha Lamba, Dina Mahmoud, C. Ranganathan:
Blurring lines between fiction and reality: Perspectives of experts on marketing effectiveness of virtual influencers. 1-6 - Pranshu Bajpai, Richard J. Enbody:
Memory Forensics Against Ransomware. 1-8 - Felix Anda, Brett A. Becker, David Lillis, Nhien-An Le-Khac, Mark Scanlon:
Assessing the Influencing Factors on the Accuracy of Underage Facial Age Estimation. 1-8 - Joel Chacon, Sean McKeown, Richard Macfarlane:
Towards Identifying Human Actions, Intent, and Severity of APT Attacks Applying Deception Techniques - An Experiment. 1-8 - Bertrand Venard:
Protection Behaviours: a diversity of individual strategies. 1-7 - Gwyn Wilkinson, Phil Legg:
"What did you say?": Extracting unintentional secrets from predictive text learning systems. 1-8 - Martin Gilje Jaatun, Lars Bodsberg, Tor Olav Grøtan, Marie Elisabeth Gaup Moe:
An Empirical Study of CERT Capacity in the North Sea. 1-8 - Waleed Alghamdi, Michael Schukat:
Slave Clock Responses to Precision Time Protocol Attacks: A Case Study. 1-4 - Joshua A. Sipper:
Cyber Threat Intelligence and the Cyber Meta-Reality and Cyber Microbiome. 1-5 - Andrew Rae, Asma Patel:
Developing a security behavioural assessment approach for cyber rating UK MSBs. 1-8 - Sebastião Rogério da Silva Neto, Thomás Tabosa de Oliveira, Vanderson de Souza Sampaio, Theo Lynn, Patricia Takako Endo:
Platform for monitoring and clinical diagnosis of arboviruses using computational models. 1-3 - Clemens Krueger, Sean McKeown:
Using Amazon Alexa APIs as a Source of Digital Evidence. 1-8 - Théo Simon, Bertrand Venard:
Technical codes'potentialities in cybersecurity. A contextual approach on the ethics of small digital organizations in France. 1-8 - Sean McKeown, Gordon Russell:
Forensic Considerations for the High Efficiency Image File Format (HEIF). 1-8 - Jordan Richard Schoenherr, Robert Thomson:
Insider Threat Detection: A Solution in Search of a Problem. 1-7 - Johannes Mols, Emmanouil Vasilomanolakis:
ethVote: Towards secure voting with distributed ledgers. 1-8 - Lukas Gressl, Michael Krisper, Christian Steger, Ulrich Neffe:
Towards Security Attack and Risk Assessment during Early System Design. 1-8 - Uchenna Daniel Ani, Hongmei He, Ashutosh Tiwari:
Vulnerability-Based Impact Criticality Estimation for Industrial Control Systems. 1-8 - Pranshu Bajpai, Richard J. Enbody:
An Empirical Study of Key Generation in Cryptographic Ransomware. 1-8 - Enoch Agyepong, Yulia Cherdantseva, Philipp Reinecke, Pete Burnap:
Towards a Framework for Measuring the Performance of a Security Operations Center Analyst. 1-8 - Christopher Kelly, Nikolaos Pitropakis, Sean McKeown, Costas Lambrinoudakis:
Testing And Hardening IoT Devices Against the Mirai Botnet. 1-8 - Matthew Spradling, Jeremy Straub, Jay Strong:
Introducing & Evaluating 'Nutrition Facts' for Online Content. 1-8 - Daniel Reti, Daniel Fraunholz, Janis Zemitis, Daniel Schneider, Hans Dieter Schotten:
Deep Down the Rabbit Hole: On References in Networks of Decoy Elements. 1-11 - Tapadhir Das, Abdel Rahman Eldosouky, Shamik Sengupta:
Think Smart, Play Dumb: Analyzing Deception in Hardware Trojan Detection Using Game Theory. 1-8 - Yunjia Wang, Yang Liu, Tiejun Wu, Ishbel Duncan:
A Cost-Effective OCR Implementation to Prevent Phishing on Mobile Platforms. 1-8 - Joshua Talbot, Przemek Pikula, Craig Sweetmore, Samuel Rowe, Hanan Hindy, Christos Tachtatzis, Robert C. Atkinson, Xavier J. A. Bellekens:
A Security Perspective on Unikernels. 1-7 - Pascal Faurie, Arghir-Nicolae Moldovan, Irina Tal:
Privacy Policy - "I agree"?! - Do alternatives to text-based policies increase the awareness of the users? 1-6 - Tharindu Ranathunga, Ramona Marfievici, Alan McGibney, Susan Rea:
A DLT-based Trust Framework for IoT Ecosystems. 1-8 - Martin Fejrskov, Jens Myrup Pedersen, Emmanouil Vasilomanolakis:
Cyber-security research by ISPs: A NetFlow and DNS Anonymization Policy. 1-8 - Andrew McCarthy, Benedict R. Gaster, Phil Legg:
Shouting Through Letterboxes: A study on attack susceptibility of voice assistants. 1-8 - Fadi N. Sibai:
AI Crimes: A Classification. 1-8 - Nebrase Elmrabit, Feixiang Zhou, Fengyin Li, Huiyu Zhou:
Evaluation of Machine Learning Algorithms for Anomaly Detection. 1-8 - Inger Anne Tøndel, Ravishankar Borgaonkar, Martin Gilje Jaatun, Christian Frøystad:
What Could Possibly Go Wrong? Smart Grid Misuse Case Scenarios. 1-8 - Joseph Kaberuka, Christopher W. Johnson:
Adapting STPA-sec for Socio-technical Cyber Security Challenges in Emerging Nations: A Case Study in Risk Management for Rwandan Health Care. 1-9 - John O'Raw, David M. Laverty:
Restricting Data Flows to Secure Against Remote Attack. 1-4 - Timothy D. Williams:
Epistemological Questions for Cybersecurity. 1-4 - Marco M. Cook, Ioannis Stavrou, Sarah Dimmock, Chris W. Johnson:
Introducing a forensics data type taxonomy of acquirable artefacts from programmable logic controllers. 1-8 - Xiaoyu Du, Quan Le, Mark Scanlon:
Automated Artefact Relevancy Determination from Artefact Metadata and Associated Timeline Events. 1-8 - Katia Raya, Nicole D'Almeida, Maroun Chamoun:
Social big data: A Twitter text mining approach to the communication of universities during the Lebanese protests. 1-8 - Andrei Lima Queiroz, Brian Keegan, Susan McKeever:
Moving Targets: Addressing Concept Drift in Supervised Models for Hacker Communication Detection. 1-7 - Tolga Ünlü, Lynsay A. Shepherd, Natalie Coull, Colin McLean:
A Taxonomy of Approaches for Integrating Attack Awareness in Applications. 1-4
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.