


default search action
CyberSA 2019: Oxford, UK
- International Conference on Cyber Situational Awareness, Data Analytics And Assessment, Cyber SA 2019, Oxford, United Kingdom, June 3-4, 2019. IEEE 2019, ISBN 978-1-7281-0232-0
- Louise Axon, Arnau Erola, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
Analysing cyber-insurance claims to design harm-propagation trees. 1-4 - Ganbayar Uuganbayar, Fabio Massacci
, Artsiom Yautsiukhin
, Fabio Martinelli:
Cyber Insurance and Time-to-Compromise: An Integrated Approach. 1-8 - Wenjun Xiong
, Robert Lagerström:
Threat Modeling of Connected Vehicles: A privacy analysis and extension of vehicleLang. 1-7 - Olivier Jacq, David Brosset, Yvon Kermarrec, Jacques Simonin:
Cyber attacks real time detection: towards a Cyber Situational Awareness for naval systems. 1-2 - Kimberly Tam
, Kevin D. Jones
:
Forensic Readiness within the Maritime Sector. 1-4 - Phil Legg
, Tim Blackman:
Tools and Techniques for Improving Cyber Situational Awareness of Targeted Phishing Attacks. 1-4 - Fiona Carroll
, Adam Chakof, Phil Legg
:
What Makes for Effective Visualisation in Cyber Situational Awareness for Non-Expert Users? 1-8 - Bertrand Venard
:
The determinants of individual cyber security behaviours: Qualitative research among French students. 1-4 - Ferenc Leitold:
Practical approach for measuring the level of user behaviour. 1-2 - Abraham Althonayan
, Alina Andronache:
Resiliency under Strategic Foresight: The effects of Cybersecurity Management and Enterprise Risk Management Alignment. 1-9 - Aguinaldo Bezerra, Gisliany Alves, Ivanovitch Silva
, Pierangelo Rosati
, Patricia Takako Endo
, Theo Lynn
:
A Preliminary Exploration of Uber Data as an Indicator of Urban Liveability. 1-8 - Mary C. Kay Michel, Michael C. King:
The Future of Cyber Analytics: Identity Classification for Systematic and Predictive Insight. 1-4 - Ulrik Franke, Joachim Draeger
:
Two simple models of business interruption accumulation risk in cyber insurance. 1-7 - Theo Lynn
, Patricia Takako Endo
, Pierangelo Rosati
, Ivanovitch Silva
, Guto Leoni Santos, Debbie Ging
:
A Comparison of Machine Learning Approaches for Detecting Misogynistic Speech in Urban Dictionary. 1-8 - Eszter Diána Oroszi:
Security awareness escape room - a possible new method in improving security awareness of users. 1-4 - Lakshmi Prayaga:
Empowering Citizen Data Scientists - Cyber Science Social Media track. 1-2 - Andrew Mason, Yifan Zhao, Hongmei He
, Raymon Gompelman, Srikanth Mandava:
Online Anomaly Detection of Time Series at Scale. 1-8 - Renate Schubert, Ioana Marinica:
Facebook Data: Sharing, Caring, and Selling. 1-3 - Cyril Onwubiko
, Austine Onwubiko:
Cyber KPI for Return on Security Investment. 1-8 - Christopher D. McDermott
, Bastien Jeannelle, John P. Isaacs:
Towards a Conversational Agent for Threat Detection in the Internet of Things. 1-8 - Ulrik Franke, Per Håkon Meland:
Demand side expectations of cyber insurance. 1-8 - Aunshul Rege, Scott VanZant:
Examining the Roles of Muhajirahs in the Islamic State via Twitter. 1-8 - Thomas D. Wagner
:
Cyber Threat Intelligence for "Things". 1-2 - Nima Asadi, Aunshul Rege, Zoran Obradovic:
Pattern discovery in intrusion chains and adversarial movement. 1-4 - Adam Zibak, Andrew Simpson
:
Towards Better Understanding of Cyber Security Information Sharing. 1-8 - Yuanyuan Zhu
, Mee Chi So, Paul Harrigan
:
Domain Identification for Commercial Intention-holding Posts on Twitter. 1-10 - Erik L. Moore
, Steven P. Fulton, Roberta A. Mancuso, Tristen K. Amador, Daniel M. Likarish:
Collaborative Training and Response Communities - An Alternative to Traditional Cyber Defense Escalation. 1-8 - Alexiei Dingli, Bernhardt Engerer:
Big Social Data - Predicting Users' Interests from their Social Networking Activities. 1-8 - Maria Francesca Carfora
, Albina Orlando
:
Quantile based risk measures in cyber security. 1-4 - Kimberly Tam
, Kevin D. Jones
:
Factors Affecting Cyber Risk in Maritime. 1-8 - Alan Mills
, Theodoros Spyridopoulos
, Phil Legg
:
Efficient and Interpretable Real-Time Malware Detection Using Random-Forest. 1-8

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.