![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Cyber Security And Protection Of Digital Services 2016: London, UK
- 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), London, United Kingdom, June 13-14, 2016. IEEE 2016, ISBN 978-1-5090-0709-7
- Taolue Chen
, Tingting Han, Florian Kammueller, Ibrahim Nemli, Christian W. Probst
:
Model based analysis of insider threats. 1-3 - Abdulrahman Alruban, Nathan L. Clarke
, Fudong Li, Steven Furnell
:
Proactive biometric-enabled forensic imprinting. 1-15 - Gaofeng Zhang, Paolo Falcarin
, Elena Gómez-Martínez
, Shareeful Islam, Christophe Tartary, Bjorn De Sutter, Jérôme d'Annoville:
Attack simulation based software protection assessment method. 1-8 - Cyril Onwubiko
:
Exploring web analytics to enhance cyber situational awareness for the protection of online web services. 1-8 - BooJoong Kang, Suleiman Y. Yerima, Kieran McLaughlin, Sakir Sezer:
N-opcode analysis for android malware classification and categorization. 1-7 - Andrea J. Cullen, Lorna Armitage:
The social engineering attack spiral (SEAS). 1-6 - Marcelo Paiva Fontenele, Lily Sun:
Knowledge management of cyber security expertise: an ontological approach to talent discovery. 1-13 - Zbigniew Hulicki:
The IM system with a cryptographic feature. 1-4 - Aisha Abubakar, Pooneh Bagheri Zadeh, Helge Janicke
, Richard Howley:
Root cause analysis (RCA) as a preliminary tool into the investigation of identity theft. 1-5 - Catrin Burrows, Pooneh Bagheri Zadeh:
A mobile forensic investigation into steganography. 1-2 - Mary Geddes, Pooneh Bagheri Zadeh:
Forensic analysis of private browsing. 1-2 - Muhammad Aminu Ahmad
, Steve Woodhead, Diane Gan:
A countermeasure mechanism for fast scanning malware. 1-8 - Dylan Smyth, Victor Cionca
, Seán McSweeney
, Donna O'Shea
:
Exploiting pitfalls in software-defined networking implementation. 1-8 - Thomas Mundt, Peter Wickboldt:
Security in building automation systems - a first analysis. 1-8 - Tomas Sochor
, Matej Zuzcak
, Petr Bujok:
Statistical analysis of attacking autonomous systems. 1-6 - Kamile Nur Sevis, Ensar Seker
:
Cyber warfare: terms, issues, laws and controversies. 1-9 - Egon Kidmose
, Matija Stevanovic
, Jens Myrup Pedersen
:
Correlating intrusion detection alerts on bot malware infections using neural network. 1-8 - Louai Maghrabi
, Eckhard Pfluegel
, Senna Fathima Noorji:
Designing utility functions for game-theoretic cloud security assessment: a case for using the common vulnerability scoring system. 1-6 - Fara Yahya
, Robert John Walters, Gary B. Wills:
Goal-based security components for cloud storage security framework: a preliminary study. 1-5 - Reza Montasari
, Pekka Peltola
, Victoria Carpenter
:
Gauging the effectiveness of computer misuse act in dealing with cybercrimes. 1-5
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.