default search action
CyberSA 2017: London, UK
- 2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), London, United Kingdom, June 19-20, 2017. IEEE 2017, ISBN 978-1-5090-5060-4
- David Brosset, Camille Cavelier, Benjamin Coste, Yvon Kermarrec, Joffrey Lartigaud, Pedro Merino Laso:
Cr@ck3n: A cyber alerts visualization object. 1-2 - Gavin Hales:
Visualisation of device datasets to assist digital forensic investigation. 1-4 - Sumaia Sabouni, Andrea J. Cullen, Lorna Armitage:
A preliminary radicalisation framework based on social engineering techniques. 1-5 - Boniface Kayode Alese, Aderonke F. Thompson, Patricia Yetunde Oni:
A location privacy system in mobile network using game theory. 1-5 - Anthony Arrott, Ivan Macalintal, Ian McMillan:
For cloud services on a user's multiple devices, how do we measure the trusted zone defended by anti-malware? 1-5 - Antti Evesti, Teemu Kanstrén, Tapio Frantti:
Cybersecurity situational awareness taxonomy. 1-8 - Ruth Ikwu:
Multi-dimensional structural data integration for proactive cyber-defence. 1-9 - Outi-Marja Latvala, Tommi Keränen, Sami Noponen, Niko Lehto, Mirko Sailio, Mikko Valta, Pia Olli:
Visualizing network events in a muggle friendly way. 1-4 - Patrik Lif, Magdalena Granåsen, Teodor Sommestad:
Development and validation of technique to measure cyber situation awareness. 1-8 - Boniface Kayode Alese, Abimbola Akindele, Folasade Mojisola Dahunsi, Aderonke F. Thompson, Tosin Adesuyi:
A graphic-based cryptographic model for authentication. 1-10 - Pablo Casais Solano, Antonio Jose Reinoso Peinado:
Socio-economic factors in cybercrime: Statistical study of the relation between socio-economic factors and cybercrime. 1-4 - Elochukwu Ukwandu, William J. Buchanan, Gordon Russell:
Performance evaluation of a fragmented secret share system. 1-6 - Eliana Stavrou:
A situation-aware user interface to assess users' ability to construct strong passwords: A conceptual architecture. 1-6 - Palvi Aggarwal, Cleotilde Gonzalez, Varun Dutt:
Modeling the effects of amount and timing of deception in simulated network scenarios. 1-7 - Martyn Weedon, Dimitris Tsaptsinos, James Denholm-Price:
Random forest explorations for URL classification. 1-4 - Marianne Junger, Lorena Montoya, Pieter H. Hartel, Maliheh Heydari:
Towards the normalization of cybercrime victimization: A routine activities analysis of cybercrime in europe. 1-8 - Scott Donaldson, Natalie Coull, David McLuskie:
A methodology for testing virtualisation security. 1-8 - Natalie Nakhla, Kathryn Perrett, Christopher McKenzie:
Automated computer network defence using ARMOUR: Mission-oriented decision support and vulnerability mitigation. 1-8 - Arnau Erola, Ioannis Agrafiotis, Jassim Happa, Michael Goldsmith, Sadie Creese, Philip A. Legg:
RicherPicture: Semi-automated cyber defence using context-aware data analytics. 1-8 - Shuili Du, Jing Wang, Kholekile L. Gwebu:
Stock market reaction to data breaches: The moderating role of corporate social responsibility. 1-2 - Lynsay A. Shepherd, Jacqueline Archibald:
Security awareness and affective feedback: Categorical behaviour vs. reported behaviour. 1-6 - Ferenc Leitold, Anthony Arrott, William Kam:
Measuring cloud-based anti-malware protection for office 365 user accounts. 1-7 - Cyril Onwubiko:
Security operations centre: Situation awareness, threat intelligence and cybercrime. 1-6 - Aunshul Rege, Zoran Obradovic, Nima Asadi, Brian Singer, Nicholas Masceri:
A temporal assessment of cyber intrusion chains using multidisciplinary frameworks and methodologies. 1-7
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.