![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
CyberSA 2020: Dublin, Ireland
- 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment, CyberSA 2020, Dublin, Ireland, June 15-19, 2020. IEEE 2020, ISBN 978-1-7281-6690-2
- Urja Pawar, Donna O'Shea
, Susan Rea, Ruairi O'Reilly
:
Explainable AI in Healthcare. 1-2 - Tal Pavel
:
Cyber Insurance Market in Israel - What is the Official Policy? 1-6 - Jordan Richard Schoenherr, Robert Thomson:
Beyond the Prisoner's Dilemma: the Social Dilemmas of Cybersecurity. 1-7 - Farhad Foroughi, Hossein Hadipour, Ahmad M. Shafiee
:
High-Performance Monitoring Sensors for Home Computer Users Security Profiling. 1-7 - Felix Larbi Aryeh, Boniface Kayode Alese
, Olasehinde Olayemi Oladimeji:
Graphical analysis of captured network packets for detection of suspicious network nodes. 1-5 - Clet Boudehenn, Jean-Christophe Cexus
, Abdel A. Boudraa:
A Data Extraction Method for Anomaly Detection in Naval Systems. 1-4 - Jason R. C. Nurse, Louise Axon, Arnau Erola, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes. 1-8 - Jasmina Mairc:
5Es→ 4Cs 21st century skills learning. 1-7 - Ankit Pradhan
, R. Punith, Kamalakanta Sethi, Padmalochan Bera:
Smart Grid Data Security using Practical CP-ABE with Obfuscated Policy and Outsourcing Decryption. 1-8 - Cossi Blaise Avoussoukpo, Chunxiang Xu, Marius Tchenagnon, Nabeil Eltayieb
:
Towards an Aggregate Signature-based Authentication for Opportunistic Networks. 1-7 - Lukas Gressl, Alexander Rech, Christian Steger
, Andreas Daniel Sinnhofer, Ralph Weissnegger:
A Design Exploration Framework for Secure IoT-Systems. 1-8 - Nicolas Pelissero, Pedro Merino Laso, John Puentes:
Naval cyber-physical anomaly propagation analysis based on a quality assessed graph. 1-8 - Peter Maynard
, Kieran McLaughlin:
Big Fish, Little Fish, Critical Infrastructure: An Analysis of Phineas Fisher and the 'Hacktivist' Threat to Critical Infrastructure. 1-7 - Ulrik Franke, Joakim Wernberg:
A survey of cyber security in the Swedish manufacturing industry. 1-8 - Ahmed Abdulrahman Alghamdi
, Giles Reger:
Pattern Extraction for Behaviours of Multi-Stage Threats via Unsupervised Learning. 1-8 - Julian Jørgensen Teule, Marius Frilund Hensel, Victor Büttner, Jonathan Velgaard Sørensen, Magnus Melgaard, Rasmus Løvenstein Olsen:
Examining the Cyber Security of a Real World Access Control Implementation. 1-3 - Abdulmajeed Alahmari, Bob Duncan:
Cybersecurity Risk Management in Small and Medium-Sized Enterprises: A Systematic Review of Recent Evidence. 1-5 - Lale M. adahali, Margeret Hall
:
Application of the Benford's law to Social bots and Information Operations activities. 1-8 - Ankit Pradhan
, Venu Madhav Yatam, Padmalochan Bera:
Self-Attention for Cyberbullying Detection. 1-6 - Daniel Krohmer, Hans D. Schotten:
Decentralized Identifier Distribution for Moving Target Defense and Beyond. 1-8 - Konstantin Pozdniakov, Eduardo Alonso
, Vladimir Stankovic, Kimberly Tam
, Kevin D. Jones
:
Smart Security Audit: Reinforcement Learning with a Deep Neural Network Approximator. 1-8 - Maicon Herverton Lino Ferreira da Silva Barros
, Morgana Thalita da Silva Leite, Vanderson de Souza Sampaio, Theo Lynn
, Patricia Takako Endo
:
Application and analysis of record linkage techniques to integrate Brazilian health databases. 1-2 - Suleiman Y. Yerima, Mohammed K. Alzaylaee:
Mobile Botnet Detection: A Deep Learning Approach Using Convolutional Neural Networks. 1-8 - Fiona Carroll
, Phil Legg
, Bastian Bønkel:
The Visual Design of Network Data to Enhance Cyber Security Awareness of the Everyday Internet User. 1-7 - Katorah Williams, Mollie Rose Ducoste, Aunshul Rege:
Educating multidisciplinary undergraduates on security and privacy. 1-8 - Cyril Onwubiko:
Focusing on the Recovery Aspects of Cyber Resilience. 1-13 - Ahmet Aris
, Sema F. Oktug
:
Analysis of the RPL Version Number Attack with Multiple Attackers. 1-8 - Tania Wallis
, Chris W. Johnson:
Implementing the NIS Directive, driving cybersecurity improvements for Essential Services. 1-10
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.