default search action
CyberSA 2021: Dublin, Ireland
- International Conference on Cyber Situational Awareness, Data Analytics and Assessment, CyberSA 2021, Dublin, Ireland, June 14-18, 2021. IEEE 2021, ISBN 978-1-6654-2529-2
- Clet Boudehenn, Olivier Jacq, Maxence Lannuzel, Jean-Christophe Cexus, Abdel A. Boudraa:
Navigation anomaly detection: An added value for Maritime Cyber Situational Awareness. 1-4 - Mohamed Alji, Khalid Chougdali:
File Slack Handling Tool. 1-3 - Andrew McCarthy, Panagiotis Andriotis, Essam Ghadafi, Phil Legg:
Feature Vulnerability and Robustness Assessment against Adversarial Machine Learning Attacks. 1-8 - Dinesh Mohanty, Kamalakanta Sethi, Sai Prasath, Rashmi Ranjan Rout, Padmalochan Bera:
Intelligent Intrusion Detection System for Smart Grid Applications. 1-8 - Daniel Reti, David Klaaßen, Simon Duque Antón, Hans Dieter Schotten:
Secure (S)Hell: Introducing an SSH Deception Proxy Framework. 1-6 - Abubakar Gidado Halilu, Martin Hope:
Energy Efficiency in Low power and Lossy Networks. 1-8 - Jordan Richard Schoenherr, Robert Thomson:
The Cybersecurity (CSEC) Questionnaire: Individual Differences in Unintentional Insider Threat Behaviours. 1-8 - Erlend Bygdås, Lars Andreassen Jaatun, Stian Brekken Antonsen, Anders Ringen, Erlend Eiring:
Evaluating Threat Modeling Tools: Microsoft TMT versus OWASP Threat Dragon. 1-7 - Théo Simon:
Revolution and stability in the study of the human factor in the security of information systems field : A systematic literature review over 30 years of publication. 1-8 - Yunjia Wang, Ziling Li, Tiejun Wu, Ishbel Duncan, Qixin Lyu:
An Empirical Study: Automated Subdomain Takeover Threat Detection. 1-10 - Shobhit, Padmalochan Bera:
ModCGAN: A Multimodal Approach to Detect New Malware. 1-2 - Ferenc Leitold, Krisztina Gyorffyné Holló, Zoltán Király:
Quantitative metrics characterizing malicious samples. 1-2 - Rasmi Vlad Mahmoud, Egon Kidmose, Ahmet Türkmen, Olga Pilawka, Jens Myrup Pedersen:
DefAtt - Architecture of Virtual Cyber Labs for Research and Education. 1-7 - Peya Mowar, Mini Jain:
Fishing out the Phishing Websites. 1-6 - Bertrand Venard:
Cybersecurity behavior under covid-19 influence. 1-9 - Samir Jarjoui, Robert Murimi, Renita Murimi:
Hold My Beer: A Case Study of how Ransomware Affected an Australian Beverage Company. 1-6 - Sumitra Biswal:
Real-Time Intelligent Vishing Prediction and Awareness Model (RIVPAM). 1-2 - Annika Andreasson, Henrik Artman, Joel Brynielsson, Ulrik Franke:
A Census of Swedish Public Sector Employee Communication on Cybersecurity during the COVID-19 Pandemic. 1-8 - Smriti Dangwal, Arghir-Nicolae Moldovan:
Feature Selection for Machine Learning-based Phishing Websites Detection. 1-6 - Toby Staton-Bevan, Charles Clarke:
Modelling Malicious Potential: A Prototype of a Preemptive Strategy for Mitigating Attacks on London's Bus Network. 1-6 - Allison Wylde:
Zero trust: Never trust, always verify. 1-4 - Cyril Onwubiko:
Rethinking Security Operations Centre Onboarding. 1-9 - Maria Bada, Jason R. C. Nurse:
Profiling the Cybercriminal: A Systematic Review of Research. 1-8 - Comfort Olebara, Obianuju Ezugwu, Adaora Obayi, Elochukwu A. Ukwandu:
Determining the Impacts of Social Media on Students' Mood, Time Management and Academic Activities: The Nigerian Perspective. 1-7 - Jonathan White, Phil Legg:
Unsupervised One-Class Learning for Anomaly Detection on Home IoT Network Devices. 1-8 - Lars Bodsberg, Tor Olav Grøtan, Martin Gilje Jaatun, Irene Wærø:
HSE and Cyber Security in Remote Work. 1-8 - Carolyn J. Swinney, John C. Woods:
GNSS Jamming Classification via CNN, Transfer Learning & the Novel Concatenation of Signal Representations. 1-9 - Phil Legg, Thomas Higgs, Pennie Spruhan, Jonathan White, Ian Johnson:
"Hacking an IoT Home": New opportunities for cyber security education combining remote learning with cyber-physical systems. 1-4 - Rachel Bleiman, Mollie Rose Ducoste, Aunshul Rege:
Understanding cybercriminals through analysis of penetration testing group dynamics. 1-8 - Martin Gilje Jaatun, Daniela Soares Cruzes:
Care and Feeding of Your Security Champion. 1-7 - Kristine Hovhannisyan, Piotr Bogacki, Consuelo Assunta Colabuono, Domenico Lofù, Maria Vittoria Marabello, Brady Eugene Maxwell:
Towards a Healthcare Cybersecurity Certification Scheme. 1-9 - Mitali Sinha, Padmalochan Bera, Manoranjan Satpathy:
An Anomaly Free Distributed Firewall System for SDN. 1-8 - Subhi Alrubei, Edward A. Ball, Jonathan Michael Rigelsford:
Securing IoT-Blockchain Applications Through Honesty-Based Distributed Proof of Authority Consensus Algorithm. 1-7 - Lars Halvdan Flå, Ravishankar Borgaonkar, Inger Anne Tøndel, Martin Gilje Jaatun:
Tool-assisted Threat Modeling for Smart Grid Cyber Security. 1-8
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.