default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 145 matches
- 2020
- Enoch Agyepong, Yulia Cherdantseva, Philipp Reinecke, Pete Burnap:
Towards a Framework for Measuring the Performance of a Security Operations Center Analyst. Cyber Security 2020: 1-8 - Waleed Alghamdi, Michael Schukat:
Slave Clock Responses to Precision Time Protocol Attacks: A Case Study. Cyber Security 2020: 1-4 - Felix Anda, Brett A. Becker, David Lillis, Nhien-An Le-Khac, Mark Scanlon:
Assessing the Influencing Factors on the Accuracy of Underage Facial Age Estimation. Cyber Security 2020: 1-8 - Uchenna Daniel Ani, Hongmei He, Ashutosh Tiwari:
Vulnerability-Based Impact Criticality Estimation for Industrial Control Systems. Cyber Security 2020: 1-8 - Pranshu Bajpai, Richard J. Enbody:
Memory Forensics Against Ransomware. Cyber Security 2020: 1-8 - Pranshu Bajpai, Richard J. Enbody:
An Empirical Study of Key Generation in Cryptographic Ransomware. Cyber Security 2020: 1-8 - Joel Chacon, Sean McKeown, Richard Macfarlane:
Towards Identifying Human Actions, Intent, and Severity of APT Attacks Applying Deception Techniques - An Experiment. Cyber Security 2020: 1-8 - Hanlin Chen, Hongmei He, Andrew Starr:
An Overview of Web Robots Detection Techniques. Cyber Security 2020: 1-6 - Marco M. Cook, Ioannis Stavrou, Sarah Dimmock, Chris W. Johnson:
Introducing a forensics data type taxonomy of acquirable artefacts from programmable logic controllers. Cyber Security 2020: 1-8 - Tapadhir Das, Abdel Rahman Eldosouky, Shamik Sengupta:
Think Smart, Play Dumb: Analyzing Deception in Hardware Trojan Detection Using Game Theory. Cyber Security 2020: 1-8 - Xiaoyu Du, Quan Le, Mark Scanlon:
Automated Artefact Relevancy Determination from Artefact Metadata and Associated Timeline Events. Cyber Security 2020: 1-8 - Nebrase Elmrabit, Feixiang Zhou, Fengyin Li, Huiyu Zhou:
Evaluation of Machine Learning Algorithms for Anomaly Detection. Cyber Security 2020: 1-8 - Pascal Faurie, Arghir-Nicolae Moldovan, Irina Tal:
Privacy Policy - "I agree"?! - Do alternatives to text-based policies increase the awareness of the users? Cyber Security 2020: 1-6 - Martin Fejrskov, Jens Myrup Pedersen, Emmanouil Vasilomanolakis:
Cyber-security research by ISPs: A NetFlow and DNS Anonymization Policy. Cyber Security 2020: 1-8 - Lukas Gressl, Michael Krisper, Christian Steger, Ulrich Neffe:
Towards Security Attack and Risk Assessment during Early System Design. Cyber Security 2020: 1-8 - Martin Gilje Jaatun, Lars Bodsberg, Tor Olav Grøtan, Marie Elisabeth Gaup Moe:
An Empirical Study of CERT Capacity in the North Sea. Cyber Security 2020: 1-8 - Joseph Kaberuka, Christopher W. Johnson:
Adapting STPA-sec for Socio-technical Cyber Security Challenges in Emerging Nations: A Case Study in Risk Management for Rwandan Health Care. Cyber Security 2020: 1-9 - Aikaterini Kanta, Iwen Coisel, Mark Scanlon:
Smarter Password Guessing Techniques Leveraging Contextual Information and OSINT. Cyber Security 2020: 1-2 - Christopher Kelly, Nikolaos Pitropakis, Sean McKeown, Costas Lambrinoudakis:
Testing And Hardening IoT Devices Against the Mirai Botnet. Cyber Security 2020: 1-8 - Clemens Krueger, Sean McKeown:
Using Amazon Alexa APIs as a Source of Digital Evidence. Cyber Security 2020: 1-8 - Drew Malzahn, Zachary Birnbaum, Cimone Wright-Hamor:
Automated Vulnerability Testing via Executable Attack Graphs. Cyber Security 2020: 1-10 - Andrew McCarthy, Benedict R. Gaster, Phil Legg:
Shouting Through Letterboxes: A study on attack susceptibility of voice assistants. Cyber Security 2020: 1-8 - Sean McKeown, Gordon Russell:
Forensic Considerations for the High Efficiency Image File Format (HEIF). Cyber Security 2020: 1-8 - Johannes Mols, Emmanouil Vasilomanolakis:
ethVote: Towards secure voting with distributed ledgers. Cyber Security 2020: 1-8 - Evangelos Moustakas, Nishtha Lamba, Dina Mahmoud, C. Ranganathan:
Blurring lines between fiction and reality: Perspectives of experts on marketing effectiveness of virtual influencers. Cyber Security 2020: 1-6 - Sebastião Rogério da Silva Neto, Thomás Tabosa de Oliveira, Vanderson de Souza Sampaio, Theo Lynn, Patricia Takako Endo:
Platform for monitoring and clinical diagnosis of arboviruses using computational models. Cyber Security 2020: 1-3 - John O'Raw, David M. Laverty:
Restricting Data Flows to Secure Against Remote Attack. Cyber Security 2020: 1-4 - Andrei Lima Queiroz, Brian Keegan, Susan McKeever:
Moving Targets: Addressing Concept Drift in Supervised Models for Hacker Communication Detection. Cyber Security 2020: 1-7 - Andrew Rae, Asma Patel:
Developing a security behavioural assessment approach for cyber rating UK MSBs. Cyber Security 2020: 1-8 - Tharindu Ranathunga, Ramona Marfievici, Alan McGibney, Susan Rea:
A DLT-based Trust Framework for IoT Ecosystems. Cyber Security 2020: 1-8
skipping 115 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-20 05:55 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint