default search action
Cyber Security And Protection Of Digital Services 2017: London, UK
- 2017 International Conference on Cyber Security And Protection Of Digital Services, Cyber Security 2017, London, United Kingdom, June 19-20, 2017. IEEE 2017, ISBN 978-1-5090-5063-5
- Cyril Onwubiko:
Security operations centre: Situation awareness, threat intelligence and cybercrime. 1-6 - Mohammed K. Alzaylaee, Suleiman Y. Yerima, Sakir Sezer:
Improving dynamic analysis of android apps using hybrid test input generation. 1-8 - Feng Yao, Suleiman Y. Yerima, BooJoong Kang, Sakir Sezer:
Continuous implicit authentication for mobile devices based on adaptive neuro-fuzzy inference system. 1-7 - Taniya Bhatia, Rishabh Kaushal:
Malware detection in android based on dynamic analysis. 1-6 - Yuanyuan Grace Zeng:
Identifying email threats using predictive analysis. 1-2 - Vahid Moula, Salman Niksefat:
ROPK++: An enhanced ROP attack detection framework for Linux operating system. 1-6 - Tianhui Meng, Zhihao Shang, Katinka Wolter:
An empirical performance and security evaluation of android container solutions. 1-8 - Kamalakanta Sethi, Amartya Majumdar, Padmalochan Bera:
A novel implementation of parallel homomorphic encryption for secure data storage in cloud. 1-7 - Stephen Singam:
Securing an US$ 2.8B digital asset: The movie - Avatar. 1-3 - Clement Guitton:
Foiling cyber attacks. 1-7 - Yassine Lemmou, El Mamoun Souidi:
PrincessLocker analysis. 1-10 - Daniel Fraunholz, Daniel Krohmer, Simon Duque Antón, Hans Dieter Schotten:
Investigation of cyber crime conducted by abusing weak or default passwords with a medium interaction honeypot. 1-7 - Louai Maghrabi, Eckhard Pfluegel, Luluwah Al-Fagih, Roman Graf, Giuseppe Settanni, Florian Skopik:
Improved software vulnerability patching techniques using CVSS and game theory. 1-6 - Michelle Omoogun, Preetila Seeam, Visham Ramsurrun, Xavier J. A. Bellekens, Amar Seeam:
When eHealth meets the internet of things: Pervasive security and privacy challenges. 1-7 - Amala V. Rajan, Rejitha Ravikumar, Mariam Al Shaer:
UAE cybercrime law and cybercrimes - An analysis. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.