![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Cyber Security And Protection Of Digital Services 2018: Glasgow, Scotland, UK
- 2018 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Glasgow, Scotland, United Kingdom, June 11-12, 2018. IEEE 2018, ISBN 978-1-5386-4683-0
- Egon Kidmose
, Matija Stevanovic
, Jens Myrup Pedersen
:
Detection of Malicious domains through lexical analysis. 1-5 - Halldis Sohoel, Martin Gilje Jaatun, Colin Boyd:
OWASP Top 10 - Do Startups Care? 1-8 - Domhnall Carlin
, Philip O'Kane, Sakir Sezer:
Dynamic Opcode Analysis of Ransomware. 1-4 - Martin Gilje Jaatun, Marie Elisabeth Gaup Moe
, Per Erik Nordbo:
Cyber Security Considerations for Self-healing Smart Grid Networks. 1-7 - Yassine Lemmou
, El Mamoun Souidi
:
Infection, Self-reproduction and Overinfection in Ransomware: The Case of TeslaCrypt. 1-8 - Sean McKeown
, Gordon Russell, Petra Leimich
:
Reducing the Impact of Network Bottlenecks on Remote Contraband Detection. 1-7 - Anastasios Balaskas, Virginia N. L. Franqueira
:
Analytical Tools for Blockchain: Review, Taxonomy and Open Challenges. 1-8 - Ensar Seker
, Hasan Huseyin Ozbenli:
The Concept of Cyber Defence Exercises (CDX): Planning, Execution, Evaluation. 1-9 - Santhosh Parampottupadam, Arghir-Nicolae Moldovan:
Cloud-based Real-time Network Intrusion Detection Using Deep Learning. 1-8 - Daniel Fraunholz, Daniel Krohmer, Hans Dieter Schotten, Carolina Nogueira:
Introducing Falcom: A Multifunctional High-Interaction Honeypot Framework for Industrial and Embedded Applications. 1-8 - Mirko Bottarelli, Gregory Epiphaniou
, Dhouha Kbaier Ben Ismail
, Petros Karadimas, Haider M. Al-Khateeb
:
Quantisation feasibility and performance of RSS-based secret key extraction in VANETs. 1-8 - Mahdi Madani, Camel Tanougast
:
Combined and Robust SNOW-ZUC Algorithm Based on Chaotic System. 1-7 - Baskoro Adi Pratomo
, Pete Burnap, George Theodorakopoulos:
Unsupervised Approach for Detecting Low Rate Attacks on Network Traffic with Autoencoder. 1-8 - Vladimir Eliseev
, Olga Eliseeva:
Lightweight Distributed Attack Detection and Prevention for the Safe Internet of Things. 1-6 - Sean McKeown
, Gordon Russell, Petra Leimich
:
Sub-file Hashing Strategies for Fast Contraband Detection. 1-7 - Shuai Fu, Nizar Bouguila:
A Bayesian Intrusion Detection Framework. 1-8 - Martin Trae Span, Logan O. Mailloux, Michael R. Grimaila, William Bill Young:
A Systems Security Approach for Requirements Analysis of Complex Cyber-Physical Systems. 1-8 - Andres Robles-Durazno
, Naghmeh Moradpoor, James McWhinnie, Gordon Russell:
A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system. 1-8 - Bob Duncan:
Attackers Constantly Threaten the Survival of Organisations, but there is a New Shark in the Water: Carcharodon Carcharias Moderator Europa Universalis. 1-5 - Paul A. Wortman, Fatemeh Tehranipoor, John A. Chandy
:
An Adversarial Risk-based Approach for Network Architecture Security Modeling and Design. 1-8 - Farhad Foroughi, Peter Luksch:
Observation Measures to Profile User Security Behaviour. 1-6 - Andre Sorensen, Maxime Jerome Remy, Nicolaj Kjettrup, Rasmi Vlad Mahmoud, Jens Myrup Pedersen
:
An Approach to Detect and Prevent Cybercrime in Large Complex Networks. 1-8 - Omego Obinna
, Eckhard Pfluegel
, Martin J. Tunnicliffe, Charles A. Clarke:
Ensuring Message Freshness in A Multi-Channel SMS Steganographic Banking Protocol. 1-7 - Dimitrios Kavallieros
, Christina Chalanouli, Georgios Kokkinis, Anastasios Panathanasiou, Efthimios Lissaris, Georgios Leventakis, Georgios Giataganas, Georgios Germanos:
Searching for crime on the web: Legal and Ethical perspectives. 1-8 - Kimberly Tam
, Kevin D. Jones
:
Cyber-Risk Assessment for Autonomous Ships. 1-8
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.