Search dblp for Publications

export results for "toc:db/conf/cybersecpods/cybersecpods2020.bht:"

 download as .bib file

@inproceedings{DBLP:conf/cybersecpods/AgyepongCRB20,
  author       = {Enoch Agyepong and
                  Yulia Cherdantseva and
                  Philipp Reinecke and
                  Pete Burnap},
  title        = {Towards a Framework for Measuring the Performance of a Security Operations
                  Center Analyst},
  booktitle    = {2020 International Conference on Cyber Security and Protection of
                  Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19,
                  2020},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CyberSecurity49315.2020.9138872},
  doi          = {10.1109/CYBERSECURITY49315.2020.9138872},
  timestamp    = {Fri, 24 Jul 2020 16:51:21 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/AgyepongCRB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/AlghamdiS20,
  author       = {Waleed Alghamdi and
                  Michael Schukat},
  title        = {Slave Clock Responses to Precision Time Protocol Attacks: {A} Case
                  Study},
  booktitle    = {2020 International Conference on Cyber Security and Protection of
                  Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19,
                  2020},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CyberSecurity49315.2020.9138888},
  doi          = {10.1109/CYBERSECURITY49315.2020.9138888},
  timestamp    = {Fri, 24 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/AlghamdiS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/AndaBLLS20,
  author       = {Felix Anda and
                  Brett A. Becker and
                  David Lillis and
                  Nhien{-}An Le{-}Khac and
                  Mark Scanlon},
  title        = {Assessing the Influencing Factors on the Accuracy of Underage Facial
                  Age Estimation},
  booktitle    = {2020 International Conference on Cyber Security and Protection of
                  Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19,
                  2020},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CyberSecurity49315.2020.9138851},
  doi          = {10.1109/CYBERSECURITY49315.2020.9138851},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/AndaBLLS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/AniHT20,
  author       = {Uchenna Daniel Ani and
                  Hongmei He and
                  Ashutosh Tiwari},
  title        = {Vulnerability-Based Impact Criticality Estimation for Industrial Control
                  Systems},
  booktitle    = {2020 International Conference on Cyber Security and Protection of
                  Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19,
                  2020},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CyberSecurity49315.2020.9138886},
  doi          = {10.1109/CYBERSECURITY49315.2020.9138886},
  timestamp    = {Thu, 20 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/AniHT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/BajpaiE20,
  author       = {Pranshu Bajpai and
                  Richard J. Enbody},
  title        = {Memory Forensics Against Ransomware},
  booktitle    = {2020 International Conference on Cyber Security and Protection of
                  Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19,
                  2020},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CyberSecurity49315.2020.9138853},
  doi          = {10.1109/CYBERSECURITY49315.2020.9138853},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/BajpaiE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/BajpaiE20a,
  author       = {Pranshu Bajpai and
                  Richard J. Enbody},
  title        = {An Empirical Study of Key Generation in Cryptographic Ransomware},
  booktitle    = {2020 International Conference on Cyber Security and Protection of
                  Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19,
                  2020},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CyberSecurity49315.2020.9138878},
  doi          = {10.1109/CYBERSECURITY49315.2020.9138878},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/BajpaiE20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/ChaconMM20,
  author       = {Joel Chacon and
                  Sean McKeown and
                  Richard Macfarlane},
  title        = {Towards Identifying Human Actions, Intent, and Severity of {APT} Attacks
                  Applying Deception Techniques - An Experiment},
  booktitle    = {2020 International Conference on Cyber Security and Protection of
                  Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19,
                  2020},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CyberSecurity49315.2020.9138859},
  doi          = {10.1109/CYBERSECURITY49315.2020.9138859},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/ChaconMM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/ChenHS20,
  author       = {Hanlin Chen and
                  Hongmei He and
                  Andrew Starr},
  title        = {An Overview of Web Robots Detection Techniques},
  booktitle    = {2020 International Conference on Cyber Security and Protection of
                  Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19,
                  2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CyberSecurity49315.2020.9138856},
  doi          = {10.1109/CYBERSECURITY49315.2020.9138856},
  timestamp    = {Thu, 05 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/ChenHS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/CookSDJ20,
  author       = {Marco M. Cook and
                  Ioannis Stavrou and
                  Sarah Dimmock and
                  Chris W. Johnson},
  title        = {Introducing a forensics data type taxonomy of acquirable artefacts
                  from programmable logic controllers},
  booktitle    = {2020 International Conference on Cyber Security and Protection of
                  Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19,
                  2020},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CyberSecurity49315.2020.9138879},
  doi          = {10.1109/CYBERSECURITY49315.2020.9138879},
  timestamp    = {Mon, 08 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/CookSDJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/DasES20,
  author       = {Tapadhir Das and
                  Abdel Rahman Eldosouky and
                  Shamik Sengupta},
  title        = {Think Smart, Play Dumb: Analyzing Deception in Hardware Trojan Detection
                  Using Game Theory},
  booktitle    = {2020 International Conference on Cyber Security and Protection of
                  Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19,
                  2020},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CyberSecurity49315.2020.9138897},
  doi          = {10.1109/CYBERSECURITY49315.2020.9138897},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/DasES20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/DuLS20,
  author       = {Xiaoyu Du and
                  Quan Le and
                  Mark Scanlon},
  title        = {Automated Artefact Relevancy Determination from Artefact Metadata
                  and Associated Timeline Events},
  booktitle    = {2020 International Conference on Cyber Security and Protection of
                  Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19,
                  2020},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CyberSecurity49315.2020.9138874},
  doi          = {10.1109/CYBERSECURITY49315.2020.9138874},
  timestamp    = {Fri, 24 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/DuLS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/ElmrabitZL020,
  author       = {Nebrase Elmrabit and
                  Feixiang Zhou and
                  Fengyin Li and
                  Huiyu Zhou},
  title        = {Evaluation of Machine Learning Algorithms for Anomaly Detection},
  booktitle    = {2020 International Conference on Cyber Security and Protection of
                  Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19,
                  2020},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CyberSecurity49315.2020.9138871},
  doi          = {10.1109/CYBERSECURITY49315.2020.9138871},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/ElmrabitZL020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/FaurieMT20,
  author       = {Pascal Faurie and
                  Arghir{-}Nicolae Moldovan and
                  Irina Tal},
  title        = {Privacy Policy - "I agree"?! - Do alternatives to text-based policies
                  increase the awareness of the users?},
  booktitle    = {2020 International Conference on Cyber Security and Protection of
                  Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19,
                  2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CyberSecurity49315.2020.9138857},
  doi          = {10.1109/CYBERSECURITY49315.2020.9138857},
  timestamp    = {Fri, 24 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/FaurieMT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/FejrskovPV20,
  author       = {Martin Fejrskov and
                  Jens Myrup Pedersen and
                  Emmanouil Vasilomanolakis},
  title        = {Cyber-security research by ISPs: {A} NetFlow and {DNS} Anonymization
                  Policy},
  booktitle    = {2020 International Conference on Cyber Security and Protection of
                  Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19,
                  2020},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CyberSecurity49315.2020.9138869},
  doi          = {10.1109/CYBERSECURITY49315.2020.9138869},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/FejrskovPV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/GresslKSN20,
  author       = {Lukas Gressl and
                  Michael Krisper and
                  Christian Steger and
                  Ulrich Neffe},
  title        = {Towards Security Attack and Risk Assessment during Early System Design},
  booktitle    = {2020 International Conference on Cyber Security and Protection of
                  Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19,
                  2020},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CyberSecurity49315.2020.9138896},
  doi          = {10.1109/CYBERSECURITY49315.2020.9138896},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/GresslKSN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/JaatunBGM20,
  author       = {Martin Gilje Jaatun and
                  Lars Bodsberg and
                  Tor Olav Gr{\o}tan and
                  Marie Elisabeth Gaup Moe},
  title        = {An Empirical Study of {CERT} Capacity in the North Sea},
  booktitle    = {2020 International Conference on Cyber Security and Protection of
                  Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19,
                  2020},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CyberSecurity49315.2020.9138865},
  doi          = {10.1109/CYBERSECURITY49315.2020.9138865},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/JaatunBGM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/KaberukaJ20,
  author       = {Joseph Kaberuka and
                  Christopher W. Johnson},
  title        = {Adapting STPA-sec for Socio-technical Cyber Security Challenges in
                  Emerging Nations: {A} Case Study in Risk Management for Rwandan Health
                  Care},
  booktitle    = {2020 International Conference on Cyber Security and Protection of
                  Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19,
                  2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CyberSecurity49315.2020.9138863},
  doi          = {10.1109/CYBERSECURITY49315.2020.9138863},
  timestamp    = {Tue, 28 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/KaberukaJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/KantaCS20,
  author       = {Aikaterini Kanta and
                  Iwen Coisel and
                  Mark Scanlon},
  title        = {Smarter Password Guessing Techniques Leveraging Contextual Information
                  and {OSINT}},
  booktitle    = {2020 International Conference on Cyber Security and Protection of
                  Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19,
                  2020},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CyberSecurity49315.2020.9138870},
  doi          = {10.1109/CYBERSECURITY49315.2020.9138870},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/KantaCS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/KellyPML20,
  author       = {Christopher Kelly and
                  Nikolaos Pitropakis and
                  Sean McKeown and
                  Costas Lambrinoudakis},
  title        = {Testing And Hardening IoT Devices Against the Mirai Botnet},
  booktitle    = {2020 International Conference on Cyber Security and Protection of
                  Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19,
                  2020},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CyberSecurity49315.2020.9138887},
  doi          = {10.1109/CYBERSECURITY49315.2020.9138887},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/KellyPML20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/KruegerM20,
  author       = {Clemens Krueger and
                  Sean McKeown},
  title        = {Using Amazon Alexa APIs as a Source of Digital Evidence},
  booktitle    = {2020 International Conference on Cyber Security and Protection of
                  Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19,
                  2020},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CyberSecurity49315.2020.9138849},
  doi          = {10.1109/CYBERSECURITY49315.2020.9138849},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/KruegerM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/MalzahnBW20,
  author       = {Drew Malzahn and
                  Zachary Birnbaum and
                  Cimone Wright{-}Hamor},
  title        = {Automated Vulnerability Testing via Executable Attack Graphs},
  booktitle    = {2020 International Conference on Cyber Security and Protection of
                  Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19,
                  2020},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CyberSecurity49315.2020.9138852},
  doi          = {10.1109/CYBERSECURITY49315.2020.9138852},
  timestamp    = {Fri, 24 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/MalzahnBW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/McCarthyGL20,
  author       = {Andrew McCarthy and
                  Benedict R. Gaster and
                  Phil Legg},
  title        = {Shouting Through Letterboxes: {A} study on attack susceptibility of
                  voice assistants},
  booktitle    = {2020 International Conference on Cyber Security and Protection of
                  Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19,
                  2020},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CyberSecurity49315.2020.9138860},
  doi          = {10.1109/CYBERSECURITY49315.2020.9138860},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/McCarthyGL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/McKeown020,
  author       = {Sean McKeown and
                  Gordon Russell},
  title        = {Forensic Considerations for the High Efficiency Image File Format
                  {(HEIF)}},
  booktitle    = {2020 International Conference on Cyber Security and Protection of
                  Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19,
                  2020},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CyberSecurity49315.2020.9138890},
  doi          = {10.1109/CYBERSECURITY49315.2020.9138890},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/McKeown020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/MolsV20,
  author       = {Johannes Mols and
                  Emmanouil Vasilomanolakis},
  title        = {ethVote: Towards secure voting with distributed ledgers},
  booktitle    = {2020 International Conference on Cyber Security and Protection of
                  Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19,
                  2020},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CyberSecurity49315.2020.9138866},
  doi          = {10.1109/CYBERSECURITY49315.2020.9138866},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/MolsV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/MoustakasLMR20,
  author       = {Evangelos Moustakas and
                  Nishtha Lamba and
                  Dina Mahmoud and
                  C. Ranganathan},
  title        = {Blurring lines between fiction and reality: Perspectives of experts
                  on marketing effectiveness of virtual influencers},
  booktitle    = {2020 International Conference on Cyber Security and Protection of
                  Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19,
                  2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CyberSecurity49315.2020.9138861},
  doi          = {10.1109/CYBERSECURITY49315.2020.9138861},
  timestamp    = {Fri, 24 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/MoustakasLMR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/NetoOSLE20,
  author       = {Sebasti{\~{a}}o Rog{\'{e}}rio da Silva Neto and
                  Thom{\'{a}}s Tabosa de Oliveira and
                  Vanderson de Souza Sampaio and
                  Theo Lynn and
                  Patricia Takako Endo},
  title        = {Platform for monitoring and clinical diagnosis of arboviruses using
                  computational models},
  booktitle    = {2020 International Conference on Cyber Security and Protection of
                  Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19,
                  2020},
  pages        = {1--3},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CyberSecurity49315.2020.9138880},
  doi          = {10.1109/CYBERSECURITY49315.2020.9138880},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/NetoOSLE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/ORawL20,
  author       = {John O'Raw and
                  David M. Laverty},
  title        = {Restricting Data Flows to Secure Against Remote Attack},
  booktitle    = {2020 International Conference on Cyber Security and Protection of
                  Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19,
                  2020},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CyberSecurity49315.2020.9138875},
  doi          = {10.1109/CYBERSECURITY49315.2020.9138875},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/ORawL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/QueirozKM20,
  author       = {Andrei Lima Queiroz and
                  Brian Keegan and
                  Susan McKeever},
  title        = {Moving Targets: Addressing Concept Drift in Supervised Models for
                  Hacker Communication Detection},
  booktitle    = {2020 International Conference on Cyber Security and Protection of
                  Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19,
                  2020},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CyberSecurity49315.2020.9138894},
  doi          = {10.1109/CYBERSECURITY49315.2020.9138894},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/QueirozKM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/RaeP20,
  author       = {Andrew Rae and
                  Asma Patel},
  title        = {Developing a security behavioural assessment approach for cyber rating
                  {UK} MSBs},
  booktitle    = {2020 International Conference on Cyber Security and Protection of
                  Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19,
                  2020},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CyberSecurity49315.2020.9138893},
  doi          = {10.1109/CYBERSECURITY49315.2020.9138893},
  timestamp    = {Fri, 24 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/RaeP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/RanathungaMMR20,
  author       = {Tharindu Ranathunga and
                  Ramona Marfievici and
                  Alan McGibney and
                  Susan Rea},
  title        = {A DLT-based Trust Framework for IoT Ecosystems},
  booktitle    = {2020 International Conference on Cyber Security and Protection of
                  Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19,
                  2020},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CyberSecurity49315.2020.9138855},
  doi          = {10.1109/CYBERSECURITY49315.2020.9138855},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/RanathungaMMR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/RayaDC20,
  author       = {Katia Raya and
                  Nicole D'Almeida and
                  Maroun Chamoun},
  title        = {Social big data: {A} Twitter text mining approach to the communication
                  of universities during the Lebanese protests},
  booktitle    = {2020 International Conference on Cyber Security and Protection of
                  Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19,
                  2020},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CyberSecurity49315.2020.9138876},
  doi          = {10.1109/CYBERSECURITY49315.2020.9138876},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/RayaDC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/RetiFZ0S20,
  author       = {Daniel Reti and
                  Daniel Fraunholz and
                  Janis Zemitis and
                  Daniel Schneider and
                  Hans Dieter Schotten},
  title        = {Deep Down the Rabbit Hole: On References in Networks of Decoy Elements},
  booktitle    = {2020 International Conference on Cyber Security and Protection of
                  Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19,
                  2020},
  pages        = {1--11},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CyberSecurity49315.2020.9138850},
  doi          = {10.1109/CYBERSECURITY49315.2020.9138850},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/RetiFZ0S20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/RoscoeS20,
  author       = {Jonathan Francis Roscoe and
                  Max Smith{-}Creasey},
  title        = {Acoustic Emanation of Haptics as a Side-Channel for Gesture-Typing
                  Attacks},
  booktitle    = {2020 International Conference on Cyber Security and Protection of
                  Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19,
                  2020},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CyberSecurity49315.2020.9138864},
  doi          = {10.1109/CYBERSECURITY49315.2020.9138864},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/RoscoeS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/Schoenherr020,
  author       = {Jordan Richard Schoenherr and
                  Robert Thomson},
  title        = {Insider Threat Detection: {A} Solution in Search of a Problem},
  booktitle    = {2020 International Conference on Cyber Security and Protection of
                  Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19,
                  2020},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CyberSecurity49315.2020.9138862},
  doi          = {10.1109/CYBERSECURITY49315.2020.9138862},
  timestamp    = {Fri, 24 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/Schoenherr020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/Sibai20,
  author       = {Fadi N. Sibai},
  title        = {{AI} Crimes: {A} Classification},
  booktitle    = {2020 International Conference on Cyber Security and Protection of
                  Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19,
                  2020},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CyberSecurity49315.2020.9138891},
  doi          = {10.1109/CYBERSECURITY49315.2020.9138891},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/Sibai20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/SimonV20,
  author       = {Th{\'{e}}o Simon and
                  Bertrand Venard},
  title        = {Technical codes'potentialities in cybersecurity. {A} contextual approach
                  on the ethics of small digital organizations in France},
  booktitle    = {2020 International Conference on Cyber Security and Protection of
                  Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19,
                  2020},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CyberSecurity49315.2020.9138895},
  doi          = {10.1109/CYBERSECURITY49315.2020.9138895},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/SimonV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/Sipper20,
  author       = {Joshua A. Sipper},
  title        = {Cyber Threat Intelligence and the Cyber Meta-Reality and Cyber Microbiome},
  booktitle    = {2020 International Conference on Cyber Security and Protection of
                  Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19,
                  2020},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CyberSecurity49315.2020.9138858},
  doi          = {10.1109/CYBERSECURITY49315.2020.9138858},
  timestamp    = {Fri, 24 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/Sipper20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/SpradlingSS20,
  author       = {Matthew Spradling and
                  Jeremy Straub and
                  Jay Strong},
  title        = {Introducing {\&} Evaluating 'Nutrition Facts' for Online Content},
  booktitle    = {2020 International Conference on Cyber Security and Protection of
                  Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19,
                  2020},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CyberSecurity49315.2020.9138867},
  doi          = {10.1109/CYBERSECURITY49315.2020.9138867},
  timestamp    = {Fri, 24 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/SpradlingSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/TalbotPSRHTAB20,
  author       = {Joshua Talbot and
                  Przemek Pikula and
                  Craig Sweetmore and
                  Samuel Rowe and
                  Hanan Hindy and
                  Christos Tachtatzis and
                  Robert C. Atkinson and
                  Xavier J. A. Bellekens},
  title        = {A Security Perspective on Unikernels},
  booktitle    = {2020 International Conference on Cyber Security and Protection of
                  Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19,
                  2020},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CyberSecurity49315.2020.9138883},
  doi          = {10.1109/CYBERSECURITY49315.2020.9138883},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/TalbotPSRHTAB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/TondelBJF20,
  author       = {Inger Anne T{\o}ndel and
                  Ravishankar Borgaonkar and
                  Martin Gilje Jaatun and
                  Christian Fr{\o}ystad},
  title        = {What Could Possibly Go Wrong? Smart Grid Misuse Case Scenarios},
  booktitle    = {2020 International Conference on Cyber Security and Protection of
                  Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19,
                  2020},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CyberSecurity49315.2020.9138892},
  doi          = {10.1109/CYBERSECURITY49315.2020.9138892},
  timestamp    = {Fri, 24 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/TondelBJF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/UnluSCM20,
  author       = {Tolga {\"{U}}nl{\"{u}} and
                  Lynsay A. Shepherd and
                  Natalie Coull and
                  Colin McLean},
  title        = {A Taxonomy of Approaches for Integrating Attack Awareness in Applications},
  booktitle    = {2020 International Conference on Cyber Security and Protection of
                  Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19,
                  2020},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CyberSecurity49315.2020.9138885},
  doi          = {10.1109/CYBERSECURITY49315.2020.9138885},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/UnluSCM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/Venard20,
  author       = {Bertrand Venard},
  title        = {Protection Behaviours: a diversity of individual strategies},
  booktitle    = {2020 International Conference on Cyber Security and Protection of
                  Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19,
                  2020},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CyberSecurity49315.2020.9138854},
  doi          = {10.1109/CYBERSECURITY49315.2020.9138854},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/Venard20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/WangLWD20,
  author       = {Yunjia Wang and
                  Yang Liu and
                  Tiejun Wu and
                  Ishbel Duncan},
  title        = {A Cost-Effective {OCR} Implementation to Prevent Phishing on Mobile
                  Platforms},
  booktitle    = {2020 International Conference on Cyber Security and Protection of
                  Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19,
                  2020},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CyberSecurity49315.2020.9138873},
  doi          = {10.1109/CYBERSECURITY49315.2020.9138873},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/WangLWD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/WilkinsonL20,
  author       = {Gwyn Wilkinson and
                  Phil Legg},
  title        = {"What did you say?": Extracting unintentional secrets from predictive
                  text learning systems},
  booktitle    = {2020 International Conference on Cyber Security and Protection of
                  Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19,
                  2020},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CyberSecurity49315.2020.9138882},
  doi          = {10.1109/CYBERSECURITY49315.2020.9138882},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/WilkinsonL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/Williams20,
  author       = {Timothy D. Williams},
  title        = {Epistemological Questions for Cybersecurity},
  booktitle    = {2020 International Conference on Cyber Security and Protection of
                  Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19,
                  2020},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CyberSecurity49315.2020.9138884},
  doi          = {10.1109/CYBERSECURITY49315.2020.9138884},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/Williams20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/ZandOP20,
  author       = {Arman Zand and
                  James Orwell and
                  Eckhard Pfluegel},
  title        = {A Secure Framework for Anti-Money-Laundering using Machine Learning
                  and Secret Sharing},
  booktitle    = {2020 International Conference on Cyber Security and Protection of
                  Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19,
                  2020},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CyberSecurity49315.2020.9138889},
  doi          = {10.1109/CYBERSECURITY49315.2020.9138889},
  timestamp    = {Fri, 24 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/ZandOP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cybersecpods/2020,
  title        = {2020 International Conference on Cyber Security and Protection of
                  Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19,
                  2020},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/9136807/proceeding},
  isbn         = {978-1-7281-6428-1},
  timestamp    = {Fri, 24 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics