![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Cyber Security And Protection Of Digital Services 2019: Oxford, UK
- 2019 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Oxford, United Kingdom, June 3-4, 2019. IEEE 2019, ISBN 978-1-7281-0229-0
- Martin Lundgren, Erik Bergström
:
Security-Related Stress: A Perspective on Information Security Risk Management. 1-8 - Belqassim Bouteghrine, Mohammed Rabiai, Camel Tanougast
, Said Sadoudi:
Hardware Implementation of Secured Socket Communication based on Chaotic Cryptosystem. 1-4 - Nora Tomas, Jingyue Li, Huang Huang
:
An Empirical Study on Culture, Automation, Measurement, and Sharing of DevSecOps. 1-8 - George O. M. Yee:
Attack Surface Identification and Reduction Model Applied in Scrum. 1-8 - Meha Shukla, Shane D. Johnson, Peter Jones:
Does the NIS implementation strategy effectively address cyber security risks in the UK? 1-11 - Kamalakanta Sethi, Ankit Pradhan
, R. Punith, Padmalochan Bera:
A Scalable Attribute Based Encryption for Secure Data Storage and Access in Cloud. 1-8 - Peyman Kabiri
, Mahdieh Chavoshi:
Destructive Attacks Detection and Response System for Physical Devices in Cyber-Physical Systems. 1-6 - Jonah Burgess
, Domhnall Carlin
, Philip O'Kane, Sakir Sezer:
MANiC: Multi-step Assessment for Crypto-miners. 1-8 - Subhi Alrubei, Jonathan Michael Rigelsford, Callum Willis, Edward Ball
:
Ethereum Blockchain for Securing the Internet of Things: Practical Implementation and Performance Evaluation. 1-5 - Chunlei Li, Chunming Rong
, Martin Gilje Jaatun:
A Cost-efficient Protocol for Open Blockchains. 1-7 - Pranshu Bajpai
, Tyler Olsen, Seth Edgar, Rob McCurdy, Richard J. Enbody:
BATSense: Anomalous Security Event Detection using TBATS Machine Learning. 1-8 - Aunshul Rege, Katorah Williams, Alyssa Mendlein:
A Social Engineering Course Project for Undergraduate Students Across Multiple Disciplines. 1-8 - Mahin Talukder, Syed Islam, Paolo Falcarin
:
Analysis of Obfuscated Code with Program Slicing. 1-7 - Kalle Rindell, Johannes Holvitie:
Security Risk Assessment and Management as Technical Debt. 1-8 - Yunjia Wang, Ishbel Duncan
:
A Novel Method to Prevent Phishing by using OCR Technology. 1-5 - Florian Skopik, Stefan Filip:
Design principles for national cyber security sensor networks: Lessons learned from small-scale demonstrators. 1-8 - Sikha Bagui, Debarghya Nandi, Subhash C. Bagui, Robert Jamie White:
Classifying Phishing Email Using Machine Learning and Deep Learning. 1-2 - Karin Bernsmed, Martin Gilje Jaatun:
Threat modelling and agile software development: Identified practice in four Norwegian organisations. 1-8 - Terézia Mézesová, Hayretdin Bahsi
:
Expert Knowledge Elicitation for Skill Level Categorization of Attack Paths. 1-8 - Kamalakanta Sethi, Rahul Kumar, Lingaraj Sethi
, Padmalochan Bera, Prashanta Kumar Patra:
A Novel Machine Learning Based Malware Detection and Classification Framework. 1-4 - Yogesh Patel, Karim Ouazzane, Vassil T. Vassilev
, Ibrahim Faruqi, George L. Walker:
Keystroke Dynamics using Auto Encoders. 1-8 - Leonard Renners, Felix Heine
, Carsten Kleiner
, Gabi Dreo Rodosek:
Adaptive and Intelligible Prioritization for Network Security Incidents. 1-8 - Cyril Onwubiko
, Karim Ouazzane:
Cyber Onboarding is 'Broken'. 1-13 - Marios Ioannou, Eliana Stavrou, Maria Bada:
Cybersecurity Culture in Computer Security Incident Response Teams: Investigating difficulties in communication and coordination. 1-4 - J. D. Work:
In wolf's clothing: Complications of threat emulation in contemporary cyber intelligence practice. 1-8 - Muntaha Saleem:
Brexit Impact on Cyber Security of United Kingdom. 1-6 - Ruitao Kee, Jovan Sie, Rhys Wong, Chern Nam Yap:
Arithmetic Circuit Homomorphic Encryption and Multiprocessing Enhancements. 1-5 - Basil Alothman
:
Raw Network Traffic Data Preprocessing and Preparation for Automatic Analysis. 1-5 - Wenting Li, Haibo Cheng, Ping Wang:
Secure Chaotic Maps-based Authentication Scheme for Real-Time Data Access In Internet of Things. 1-8 - Suleiman Y. Yerima, Sarmadullah Khan:
Longitudinal performance analysis of machine learning based Android malware detectors. 1-8 - Adrian J. Duncan, Sadie Creese, Michael Goldsmith:
A Combined Attack-Tree and Kill-Chain Approach to Designing Attack-Detection Strategies for Malicious Insiders in Cloud Computing. 1-9 - Zirak Allaf, Mo Adda, Alexander E. Gegov:
TrapMP: Malicious Process Detection By Utilising Program Phase Detection. 1-8 - Remy Remigius Zgraggen:
Cyber Security Supervision in the Insurance Sector: Smart Contracts and Chosen Issues. 1-4 - Yuxiang Hong, Steven Furnell:
Organizational formalization and employee information security behavioral intentions based on an extended TPB model. 1-4
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.