default search action
CyberSA 2015: London, UK
- 2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9, 2015. IEEE 2015, ISBN 978-0-9932-3380-7
- Sarmistha Neogy, Sayantani Saha:
Developing a secure remote patient monitoring system. 1-4 - Jussi Timonen:
Improving situational awareness of cyber physical systems based on operator's goals. 1-6 - Therese Bjerkestrand, Dimitris Tsaptsinos, Eckhard Pfluegel:
An evaluation of feature selection and reduction algorithms for network IDS data. 1-2 - Hashem Dehghanniri, Emmanuel Letier, Hervé Borrion:
Improving security decision under uncertainty: A multidisciplinary approach. 1-7 - Christopher Laing, Paul Vickers:
Context informed intelligent information infrastructures for better situational awareness. 1-7 - Maria Evangelopoulou, Christopher W. Johnson:
Empirical framework for situation awareness measurement techniques in network defense. 1-4 - Palvi Aggarwal, Zahid Maqbool, Antra Grover, V. S. Chandrasekhar Pammi, Saumya Singh, Varun Dutt:
Cyber security: A game-theoretic analysis of defender and attacker strategies in defacing-website games. 1-8 - Adriana-Cristina Enache, Mihai Ionita, Valentin Sgarciu:
An immune intelligent approach for security assurance. 1-5 - Radu S. Pirscoveanu, Steven Strandlund Hansen, Thor M. T. Larsen, Matija Stevanovic, Jens Myrup Pedersen, Alexandre Czech:
Analysis of Malware behavior: Type classification using machine learning. 1-7 - Sarmistha Neogy:
Security management in Wireless Sensor Networks. 1-4 - Mohamed Nassar, Adel Al-Rahal Orabi, Marwan Doha, Bechara al Bouna:
An SQL-like query tool for data anonymization and outsourcing. 1-3 - Kamran Dahri, Shakeel Rajput, Shahzad Memon, Lachhman Das Dhomeja:
Smart Activities Monitoring System (SAMS) for security applications. 1-5 - Yegor Shovgenya, Florian Skopik, Klaus Theuerkauf:
On demand for situational awareness for preventing attacks on the smart grid. 1-4 - Radu S. Pirscoveanu, Steven Strandlund Hansen, Thor M. T. Larsen, Matija Stevanovic, Jens Myrup Pedersen, Alexandre Czech:
Analysis of malware behavior: Type classification using machine learning. 1-7 - Markus Wurzenberger, Florian Skopik, Giuseppe Settanni, Roman Fiedler:
Beyond gut instincts: Understanding, rating and comparing self-learning IDSs. 1 - Andrius Rickus, Eckhard Pfluegel, Nigel Atkins:
Chaos-based image encryption using an AONT mode of operation. 1-5 - Charles A. Clarke, Eckhard Pfluegel, Dimitris Tsaptsinos:
Multi-channel overlay protocols: Implementing ad-hoc message authentication in social media platforms. 1-6 - Mark John Hall, Devon David Hansen, Kevin Jones:
Cross-domain situational awareness and collaborative working for cyber security. 1-8 - Marcelo Paiva Fontenele, Lily Sun:
Talent discovery for cyber security: An organisational perspective. 1-4 - Florian Skopik, Markus Wurzenberger, Giuseppe Settanni, Roman Fiedler:
Establishing national cyber situational awareness through incident information clustering. 1-8 - Cyril Onwubiko:
Cyber security operations centre: Security monitoring for protecting business and supporting cyber defense strategy. 1-10 - Hatoon S. AlSagri, Saad S. Alaboodi:
Privacy awareness of online social networking in Saudi Arabia. 1-6 - Muhammad Ali Nasir, Shizra Sultan, Samia Nefti-Meziani, Umar Manzoor:
Potential cyber-attacks against global oil supply chain. 1-7 - Louai Maghrabi, Eckhard Pfluegel:
Moving assets to the cloud: A game theoretic approach based on trust. 1-5 - Shahzad Memon, Sorath Mahar, Lachhman Das Dhomeja, Farman Pirzado:
Prospects and challenges for social media in Pakistan. 1-5 - Zulfiqar Bhutto, Kamran Dahri, Iqra Lakho, Shahzad Memon:
Social Video Streaming (SVS): A prototype application for street crime reporting. 1-4 - Moyinoluwa Abidemi Bode, Samuel Adebayo Oluwadare, Boniface Kayode Alese, Aderonke Favour-Bethy Thompson:
Risk analysis in cyber situation awareness using Bayesian approach. 1-12 - Dauda Adenusi, Boniface Kayode Alese, Bamidele Moses Kuboye, Aderonke Favour-Bethy Thompson:
Development of cyber situation awareness model. 1-11 - Ruhul Amin, SK Hafizul Islam, G. P. Biswas, Muhammad Khurram Khan:
An efficient remote mutual authentication scheme using smart mobile phone over insecure networks. 1-7
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.