default search action
Cyber Science 2022: Wales, UK [hybrid]
- Cyril Onwubiko, Pierangelo Rosati, Aunshul Rege, Arnau Erola, Xavier J. A. Bellekens, Hanan Hindy, Martin Gilje Jaatun:
Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media, Cyber Science 2022, Wales, UK, June 20-21, 2022. Springer Proceedings in Complexity, Springer 2023, ISBN 978-981-19-6414-5 - Alan Paice, Sean McKeown:
Practical Cyber Threat Intelligence in the UK Energy Sector. 3-23 - Aunshul Rege, Rachel Bleiman:
A Free and Community-Driven Critical Infrastructure Ransomware Dataset. 25-37 - Andrea Skytterholm, Guro Hotvedt:
Criteria for Realistic and Expedient Scenarios for Tabletop Exercises on Cyber Attacks Against Industrial Control Systems in the Petroleum Industry. 39-54 - Andrea Neverdal Skytterholm, Martin Gilje Jaatun:
Exploring the Need for a CERT for the Norwegian Construction Sector. 57-73 - Clet Boudehenn, Jean-Christophe Cexus, Ramla Abdelkader, Maxence Lannuzel, Olivier Jacq, David Brosset, Abdel Boudraa:
Holistic Approach of Integrated Navigation Equipment for Cybersecurity at Sea. 75-86 - Georgios Potamos, Savvas Theodoulou, Eliana Stavrou, Stavros Stavrou:
Building Maritime Cybersecurity Capacity Against Ransomware Attacks. 87-101 - Robert Murimi, Sandra Blanke, Renita Murimi:
A Decade of Development of Mental Models in Cybersecurity and Lessons for the Future. 105-132 - Rachel Bleiman, Jamie Williams, Aunshul Rege, Katorah Williams:
Exploring the MITRE ATT&CK® Matrix in SE Education. 133-149 - Arnstein Vestad, Bian Yang:
Municipal Cybersecurity - A Neglected Research Area? A Survey of Current Research. 151-165 - Robert Sherry, Ethan Bayne, David McLuskie:
Near-Ultrasonic Covert Channels Using Software-Defined Radio Techniques. 169-189 - Cimone Wright-Hamor, Steffanie Bisinger, Jeffrey Neel, Benjamin A. Blakely, Nathaniel Evans:
A Preventative Moving Target Defense Solution for Web Servers Using Iptables. 191-205 - Sachet Rajat Kumar Patil, Neil John, Poorvi Sameep Kunja, Anushka Dwivedi, S. Suganthi, Prasad B. Honnnavali:
Hardening Containers with Static and Dynamic Analysis. 207-227 - Arman Zand, Eckhard Pfluegel:
Efficient Cyber-Evidence Sharing Using Zero-Knowledge Proofs. 229-242 - Joel Pinney, Fiona Carroll:
Uncertainty and Risk: Investigating Line Graph Aesthetic for Enhanced Cybersecurity Awareness. 245-253 - Richard Wheeler, Fiona Carroll:
An Explainable AI Solution: Exploring Extended Reality as a Way to Make Artificial Intelligence More Transparent and Trustworthy. 255-276 - Young Jin Shin:
A Study on the Development of Crisis Management Compliance by Personal Information Infringement Factors in Artificial Intelligence Service. 277-299 - Anjuli R. K. Shere, Jason R. C. Nurse, Andrew Martin:
Threats to Journalists from the Consumer Internet of Things. 303-326 - Paula Contreras:
The Transnational Dimension of Cybersecurity: The NIS Directive and Its Jurisdictional Challenges. 327-341 - Sandra Schmitz-Berndt:
Refining the Mandatory Cybersecurity Incident Reporting Under the NIS Directive 2.0: Event Types and Reporting Processes. 343-351 - Elochukwu Ukwandu, Ephraim N. C. Okafor, Charles Ikerionwu, Comfort Olebara, Celestine Ugwu:
Assessing Cyber-Security Readiness of Nigeria to Industry 4.0. 355-374 - Joseph Kaberuka, Christopher W. Johnson:
Case Studies in the Socio-technical Analysis of Cybersecurity Incidents: Comparing Attacks on the UK NHS and Irish Healthcare Systems. 375-387 - Celestine Ugwu, Modesta Ezema, Uchenna Ome, Lizzy Ofusori, Comfort Olebera, Elochukwu Ukwandu:
A Study on the Impact of Gender, Employment Status, and Academic Discipline on Cyber-Hygiene: A Case Study of University of Nigeria, Nsukka. 389-407 - Aniket Agrawal, Kamalakanta Sethi, Padmalochan Bera:
Blockchain-Based Cardinal E-Voting System Using Biometrics, Watermarked QR Code and Partial Homomorphic Encryption. 411-436 - Naghmeh Moradpoor, Masoud Barati, Andres Robles-Durazno, Ezra Abah, James McWhinnie:
Neutralizing Adversarial Machine Learning in Industrial Control Systems Using Blockchain. 437-451 - Gonzalo Faura, Cezary Siewiersky, Irina Tal:
A User-Centric Evaluation of Smart Contract Analysis Tools in Decentralised Finance (DeFi). 453-476
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.