researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2016
2017
2018
2019
2020
Filter by Tag
Filter by Author
[+]
OR
AND
NOT
1
Arghir-Nicolae Moldovan
Bertrand Venard
Boojoong Kang
Camel Tanougast
Cyril Onwubiko
Daniel Fraunholz
Eckhard Pfluegel
Gordon Russell
Hans Dieter Schotten
Jens Myrup Pedersen
Kamalakanta Sethi
Mark Scanlon
Martin Gilje Jaatun
Padmalochan Bera
Pooneh Bagheri Zadeh
Pranshu Bajpai
Richard J. Enbody
Sakir Sezer
Sean McKeown
Suleiman Y. Yerima
Filter by Top terms
[+]
OR
AND
NOT
1
analysis
approach
assessment
attack
attacks
cloud
cyber
data
detection
digital
framework
implementation
learning
machine
network
protection
security
study
system
using
Cyber Security (cybersecpods)
Editions
Publications
Viewing Publication 1 - 100 from 145
2020
2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020
IEEE,
2020.
[doi]
Towards a Framework for Measuring the Performance of a Security Operations Center Analyst
Enoch Agyepong
,
Yulia Cherdantseva
,
Philipp Reinecke
,
Pete Burnap
.
cybersecpods 2020
:
1-8
[doi]
Slave Clock Responses to Precision Time Protocol Attacks: A Case Study
Waleed Alghamdi
,
Michael Schukat
.
cybersecpods 2020
:
1-4
[doi]
Assessing the Influencing Factors on the Accuracy of Underage Facial Age Estimation
Felix Anda
,
Brett A. Becker
,
David Lillis
,
Nhien-An Le-Khac
,
Mark Scanlon
.
cybersecpods 2020
:
1-8
[doi]
Vulnerability-Based Impact Criticality Estimation for Industrial Control Systems
Uchenna Daniel Ani
,
Hongmei He
,
Ashutosh Tiwari
.
cybersecpods 2020
:
1-8
[doi]
Memory Forensics Against Ransomware
Pranshu Bajpai
,
Richard J. Enbody
.
cybersecpods 2020
:
1-8
[doi]
An Empirical Study of Key Generation in Cryptographic Ransomware
Pranshu Bajpai
,
Richard J. Enbody
.
cybersecpods 2020
:
1-8
[doi]
Towards Identifying Human Actions, Intent, and Severity of APT Attacks Applying Deception Techniques - An Experiment
Joel Chacon
,
Sean McKeown
,
Richard Macfarlane
.
cybersecpods 2020
:
1-8
[doi]
An Overview of Web Robots Detection Techniques
Hanlin Chen
,
Hongmei He
,
Andrew Starr
.
cybersecpods 2020
:
1-6
[doi]
Introducing a forensics data type taxonomy of acquirable artefacts from programmable logic controllers
Marco Cook
,
Ioannis Stavrou
,
Sarah Dimmock
,
Chris Johnson
.
cybersecpods 2020
:
1-8
[doi]
Platform for monitoring and clinical diagnosis of arboviruses using computational models
Sebastião Rogério da Silva Neto
,
Thomás Tabosa de Oliveira
,
Vanderson de Souza Sampaio
,
Theo Lynn
,
Patricia Takako Endo
.
cybersecpods 2020
:
1-3
[doi]
Think Smart, Play Dumb: Analyzing Deception in Hardware Trojan Detection Using Game Theory
Tapadhir Das
,
Abdel Rahman Eldosouky
,
Shamik Sengupta
.
cybersecpods 2020
:
1-8
[doi]
Automated Artefact Relevancy Determination from Artefact Metadata and Associated Timeline Events
Xiaoyu Du
,
Quan Le
,
Mark Scanlon
.
cybersecpods 2020
:
1-8
[doi]
Evaluation of Machine Learning Algorithms for Anomaly Detection
Nebrase Elmrabit
,
Feixiang Zhou
,
Fengyin Li
,
Huiyu Zhou 0001
.
cybersecpods 2020
:
1-8
[doi]
Privacy Policy - "I agree"?! - Do alternatives to text-based policies increase the awareness of the users?
Pascal Faurie
,
Arghir-Nicolae Moldovan
,
Irina Tal
.
cybersecpods 2020
:
1-6
[doi]
Cyber-security research by ISPs: A NetFlow and DNS Anonymization Policy
Martin Fejrskov
,
Jens Myrup Pedersen
,
Emmanouil Vasilomanolakis
.
cybersecpods 2020
:
1-8
[doi]
Towards Security Attack and Risk Assessment during Early System Design
Lukas Gressl
,
Michael Krisper
,
Christian Steger
,
Ulrich Neffe
.
cybersecpods 2020
:
1-8
[doi]
An Empirical Study of CERT Capacity in the North Sea
Martin Gilje Jaatun
,
Lars Bodsberg
,
Tor Olav Grøtan
,
Marie Elisabeth Gaup Moe
.
cybersecpods 2020
:
1-8
[doi]
Adapting STPA-sec for Socio-technical Cyber Security Challenges in Emerging Nations: A Case Study in Risk Management for Rwandan Health Care
Joseph Kaberuka
,
Christopher Johnson
.
cybersecpods 2020
:
1-9
[doi]
Smarter Password Guessing Techniques Leveraging Contextual Information and OSINT
Aikaterini Kanta
,
Iwen Coisel
,
Mark Scanlon
.
cybersecpods 2020
:
1-2
[doi]
Testing And Hardening IoT Devices Against the Mirai Botnet
Christopher Kelly
,
Nikolaos Pitropakis
,
Sean McKeown
,
Costas Lambrinoudakis
.
cybersecpods 2020
:
1-8
[doi]
Using Amazon Alexa APIs as a Source of Digital Evidence
Clemens Krueger
,
Sean McKeown
.
cybersecpods 2020
:
1-8
[doi]
Automated Vulnerability Testing via Executable Attack Graphs
Drew Malzahn
,
Zachary Birnbaum
,
Cimone Wright-Hamor
.
cybersecpods 2020
:
1-10
[doi]
Shouting Through Letterboxes: A study on attack susceptibility of voice assistants
Andrew McCarthy
,
Benedict R. Gaster
,
Phil Legg
.
cybersecpods 2020
:
1-8
[doi]
Forensic Considerations for the High Efficiency Image File Format (HEIF)
Sean McKeown
,
Gordon Russell 0001
.
cybersecpods 2020
:
1-8
[doi]
ethVote: Towards secure voting with distributed ledgers
Johannes Mols
,
Emmanouil Vasilomanolakis
.
cybersecpods 2020
:
1-8
[doi]
Blurring lines between fiction and reality: Perspectives of experts on marketing effectiveness of virtual influencers
Evangelos Moustakas
,
Nishtha Lamba
,
Dina Mahmoud
,
C. Ranganathan
.
cybersecpods 2020
:
1-6
[doi]
Restricting Data Flows to Secure Against Remote Attack
John O'Raw
,
David M. Laverty
.
cybersecpods 2020
:
1-4
[doi]
Moving Targets: Addressing Concept Drift in Supervised Models for Hacker Communication Detection
Andrei Lima Queiroz
,
Brian Keegan
,
Susan McKeever
.
cybersecpods 2020
:
1-7
[doi]
Developing a security behavioural assessment approach for cyber rating UK MSBs
Andrew Rae
,
Asma Patel
.
cybersecpods 2020
:
1-8
[doi]
A DLT-based Trust Framework for IoT Ecosystems
Tharindu Ranathunga
,
Ramona Marfievici
,
Alan McGibney
,
Susan Rea
.
cybersecpods 2020
:
1-8
[doi]
Social big data: A Twitter text mining approach to the communication of universities during the Lebanese protests
Katia Raya
,
Nicole D'Almeida
,
Maroun Chamoun
.
cybersecpods 2020
:
1-8
[doi]
Deep Down the Rabbit Hole: On References in Networks of Decoy Elements
Daniel Reti
,
Daniel Fraunholz
,
Janis Zemitis
,
Daniel Schneider 0007
,
Hans Dieter Schotten
.
cybersecpods 2020
:
1-11
[doi]
Acoustic Emanation of Haptics as a Side-Channel for Gesture-Typing Attacks
Jonathan Francis Roscoe
,
Max Smith-Creasey
.
cybersecpods 2020
:
1-4
[doi]
Insider Threat Detection: A Solution in Search of a Problem
Jordan Richard Schoenherr
,
Robert Thomson 0001
.
cybersecpods 2020
:
1-7
[doi]
AI Crimes: A Classification
Fadi N. Sibai
.
cybersecpods 2020
:
1-8
[doi]
Technical codes'potentialities in cybersecurity. A contextual approach on the ethics of small digital organizations in France
Théo Simon
,
Bertrand Venard
.
cybersecpods 2020
:
1-8
[doi]
Cyber Threat Intelligence and the Cyber Meta-Reality and Cyber Microbiome
Joshua A. Sipper
.
cybersecpods 2020
:
1-5
[doi]
Introducing & Evaluating 'Nutrition Facts' for Online Content
Matthew Spradling
,
Jeremy Straub
,
Jay Strong
.
cybersecpods 2020
:
1-8
[doi]
A Security Perspective on Unikernels
Joshua Talbot
,
Przemek Pikula
,
Craig Sweetmore
,
Samuel Rowe
,
Hanan Hindy
,
Christos Tachtatzis
,
Robert C. Atkinson
,
Xavier J. A. Bellekens
.
cybersecpods 2020
:
1-7
[doi]
What Could Possibly Go Wrong? Smart Grid Misuse Case Scenarios
Inger Anne Tøndel
,
Ravishankar Borgaonkar
,
Martin Gilje Jaatun
,
Christian Frøystad
.
cybersecpods 2020
:
1-8
[doi]
Protection Behaviours: a diversity of individual strategies
Bertrand Venard
.
cybersecpods 2020
:
1-7
[doi]
A Cost-Effective OCR Implementation to Prevent Phishing on Mobile Platforms
Yunjia Wang
,
Yang Liu
,
Tiejun Wu
,
Ishbel Duncan
.
cybersecpods 2020
:
1-8
[doi]
"What did you say?": Extracting unintentional secrets from predictive text learning systems
Gwyn Wilkinson
,
Phil Legg
.
cybersecpods 2020
:
1-8
[doi]
Epistemological Questions for Cybersecurity
Timothy D. Williams
.
cybersecpods 2020
:
1-4
[doi]
A Secure Framework for Anti-Money-Laundering using Machine Learning and Secret Sharing
Arman Zand
,
James Orwell
,
Eckhard Pfluegel
.
cybersecpods 2020
:
1-7
[doi]
A Taxonomy of Approaches for Integrating Attack Awareness in Applications
Tolga Ünlü
,
Lynsay A. Shepherd
,
Natalie Coull
,
Colin McLean
.
cybersecpods 2020
:
1-4
[doi]
2019
A Cost-efficient Protocol for Open Blockchains
Chunlei Li 0001
,
Chunming Rong
,
Martin Gilje Jaatun
.
cybersecpods 2019
:
1-7
[doi]
2019 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Oxford, United Kingdom, June 3-4, 2019
IEEE,
2019.
[doi]
TrapMP: Malicious Process Detection By Utilising Program Phase Detection
Zirak Allaf
,
Mo Adda
,
Alexander E. Gegov
.
cybersecpods 2019
:
1-8
[doi]
Raw Network Traffic Data Preprocessing and Preparation for Automatic Analysis
Basil Alothman
.
cybersecpods 2019
:
1-5
[doi]
Ethereum Blockchain for Securing the Internet of Things: Practical Implementation and Performance Evaluation
Subhi Alrubei
,
Jonathan Rigelsford
,
Callum Willis
,
Edward Ball
.
cybersecpods 2019
:
1-5
[doi]
Classifying Phishing Email Using Machine Learning and Deep Learning
Sikha Bagui
,
Debarghya Nandi
,
Subhash C. Bagui
,
Robert Jamie White
.
cybersecpods 2019
:
1-2
[doi]
BATSense: Anomalous Security Event Detection using TBATS Machine Learning
Pranshu Bajpai
,
Tyler Olsen
,
Seth Edgar
,
Rob McCurdy
,
Richard J. Enbody
.
cybersecpods 2019
:
1-8
[doi]
Threat modelling and agile software development: Identified practice in four Norwegian organisations
Karin Bernsmed
,
Martin Gilje Jaatun
.
cybersecpods 2019
:
1-8
[doi]
Hardware Implementation of Secured Socket Communication based on Chaotic Cryptosystem
Belqassim Bouteghrine
,
Mohammed Rabiai
,
Camel Tanougast
,
Said Sadoudi
.
cybersecpods 2019
:
1-4
[doi]
MANiC: Multi-step Assessment for Crypto-miners
Jonah Burgess
,
Domhnall Carlin
,
Philip O'Kane
,
Sakir Sezer
.
cybersecpods 2019
:
1-8
[doi]
A Combined Attack-Tree and Kill-Chain Approach to Designing Attack-Detection Strategies for Malicious Insiders in Cloud Computing
Adrian J. Duncan
,
Sadie Creese
,
Michael Goldsmith
.
cybersecpods 2019
:
1-9
[doi]
Organizational formalization and employee information security behavioral intentions based on an extended TPB model
Yuxiang Hong
,
Steven Furnell
.
cybersecpods 2019
:
1-4
[doi]
Cybersecurity Culture in Computer Security Incident Response Teams: Investigating difficulties in communication and coordination
Marios Ioannou
,
Eliana Stavrou
,
Maria Bada
.
cybersecpods 2019
:
1-4
[doi]
Destructive Attacks Detection and Response System for Physical Devices in Cyber-Physical Systems
Peyman Kabiri
,
Mahdieh Chavoshi
.
cybersecpods 2019
:
1-6
[doi]
Arithmetic Circuit Homomorphic Encryption and Multiprocessing Enhancements
Ruitao Kee
,
Jovan Sie
,
Rhys Wong
,
Chern Nam Yap
.
cybersecpods 2019
:
1-5
[doi]
Secure Chaotic Maps-based Authentication Scheme for Real-Time Data Access In Internet of Things
Wenting Li
,
Haibo Cheng
,
Ping Wang
.
cybersecpods 2019
:
1-8
[doi]
Security-Related Stress: A Perspective on Information Security Risk Management
Martin Lundgren
,
Erik Bergström
.
cybersecpods 2019
:
1-8
[doi]
Expert Knowledge Elicitation for Skill Level Categorization of Attack Paths
Terézia Mézesová
,
Hayretdin Bahsi
.
cybersecpods 2019
:
1-8
[doi]
Cyber Onboarding is 'Broken'
Cyril Onwubiko
,
Karim Ouazzane
.
cybersecpods 2019
:
1-13
[doi]
Keystroke Dynamics using Auto Encoders
Yogesh Patel
,
Karim Ouazzane
,
Vassil T. Vassilev
,
Ibrahim Faruqi
,
George L. Walker
.
cybersecpods 2019
:
1-8
[doi]
A Social Engineering Course Project for Undergraduate Students Across Multiple Disciplines
Aunshul Rege
,
Katorah Williams
,
Alyssa Mendlein
.
cybersecpods 2019
:
1-8
[doi]
Adaptive and Intelligible Prioritization for Network Security Incidents
Leonard Renners
,
Felix Heine
,
Carsten Kleiner
,
Gabi Dreo Rodosek
.
cybersecpods 2019
:
1-8
[doi]
Security Risk Assessment and Management as Technical Debt
Kalle Rindell
,
Johannes Holvitie
.
cybersecpods 2019
:
1-8
[doi]
Brexit Impact on Cyber Security of United Kingdom
Muntaha Saleem
.
cybersecpods 2019
:
1-6
[doi]
A Scalable Attribute Based Encryption for Secure Data Storage and Access in Cloud
Kamalakanta Sethi
,
Ankit Pradhan
,
R. Punith
,
Padmalochan Bera
.
cybersecpods 2019
:
1-8
[doi]
A Novel Machine Learning Based Malware Detection and Classification Framework
Kamalakanta Sethi
,
Rahul Kumar
,
Lingaraj Sethi
,
Padmalochan Bera
,
Prashanta Kumar Patra
.
cybersecpods 2019
:
1-4
[doi]
Does the NIS implementation strategy effectively address cyber security risks in the UK?
Meha Shukla
,
Shane D. Johnson
,
Peter Jones
.
cybersecpods 2019
:
1-11
[doi]
Design principles for national cyber security sensor networks: Lessons learned from small-scale demonstrators
Florian Skopik
,
Stefan Filip
.
cybersecpods 2019
:
1-8
[doi]
Analysis of Obfuscated Code with Program Slicing
Mahin Talukder
,
Syed Islam
,
Paolo Falcarin
.
cybersecpods 2019
:
1-7
[doi]
An Empirical Study on Culture, Automation, Measurement, and Sharing of DevSecOps
Nora Tomas
,
Jingyue Li
,
Huang Huang
.
cybersecpods 2019
:
1-8
[doi]
A Novel Method to Prevent Phishing by using OCR Technology
Yunjia Wang
,
Ishbel Duncan
.
cybersecpods 2019
:
1-5
[doi]
In wolf's clothing: Complications of threat emulation in contemporary cyber intelligence practice
J. D. Work
.
cybersecpods 2019
:
1-8
[doi]
Attack Surface Identification and Reduction Model Applied in Scrum
George O. M. Yee
.
cybersecpods 2019
:
1-8
[doi]
Longitudinal performance analysis of machine learning based Android malware detectors
Suleiman Y. Yerima
,
Sarmadullah Khan
.
cybersecpods 2019
:
1-8
[doi]
Cyber Security Supervision in the Insurance Sector: Smart Contracts and Chosen Issues
Remy Remigius Zgraggen
.
cybersecpods 2019
:
1-4
[doi]
2018
2018 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Glasgow, Scotland, United Kingdom, June 11-12, 2018
IEEE,
2018.
[doi]
Analytical Tools for Blockchain: Review, Taxonomy and Open Challenges
Anastasios Balaskas
,
Virginia N. L. Franqueira
.
cybersecpods 2018
:
1-8
[doi]
Dynamic Opcode Analysis of Ransomware
Domhnall Carlin
,
Philip O'Kane
,
Sakir Sezer
.
cybersecpods 2018
:
1-4
[doi]
Attackers Constantly Threaten the Survival of Organisations, but there is a New Shark in the Water: Carcharodon Carcharias Moderator Europa Universalis
Bob Duncan
.
cybersecpods 2018
:
1-5
[doi]
Lightweight Distributed Attack Detection and Prevention for the Safe Internet of Things
Vladimir Eliseev
,
Olga Eliseeva
.
cybersecpods 2018
:
1-6
[doi]
Observation Measures to Profile User Security Behaviour
Farhad Foroughi
,
Peter Luksch 0001
.
cybersecpods 2018
:
1-6
[doi]
Introducing Falcom: A Multifunctional High-Interaction Honeypot Framework for Industrial and Embedded Applications
Daniel Fraunholz
,
Daniel Krohmer
,
Hans Dieter Schotten
,
Carolina Nogueira
.
cybersecpods 2018
:
1-8
[doi]
Cyber Security Considerations for Self-healing Smart Grid Networks
Martin Gilje Jaatun
,
Marie Elisabeth Gaup Moe
,
Per Erik Nordbo
.
cybersecpods 2018
:
1-7
[doi]
Searching for crime on the web: Legal and Ethical perspectives
Dimitrios Kavallieros
,
Christina Chalanouli
,
Georgios Kokkinis
,
Anastasios Panathanasiou
,
Efthimios Lissaris
,
Georgios Leventakis
,
Georgios Giataganas
,
Georgios Germanos
.
cybersecpods 2018
:
1-8
[doi]
Detection of Malicious domains through lexical analysis
Egon Kidmose
,
Matija Stevanovic
,
Jens Myrup Pedersen
.
cybersecpods 2018
:
1-5
[doi]
Ensuring Message Freshness in A Multi-Channel SMS Steganographic Banking Protocol
Omego Obinna
,
Eckhard Pfluegel
,
Martin J. Tunnicliffe
,
Charles A. Clarke
.
cybersecpods 2018
:
1-7
[doi]
Cloud-based Real-time Network Intrusion Detection Using Deep Learning
Santhosh Parampottupadam
,
Arghir-Nicolae Moldovan
.
cybersecpods 2018
:
1-8
[doi]
A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system
Andres Robles-Durazno
,
Naghmeh Moradpoor
,
James McWhinnie
,
Gordon Russell
.
cybersecpods 2018
:
1-8
[doi]
The Concept of Cyber Defence Exercises (CDX): Planning, Execution, Evaluation
Ensar Seker
,
Hasan Huseyin Ozbenli
.
cybersecpods 2018
:
1-9
[doi]
OWASP Top 10 - Do Startups Care?
Halldis Sohoel
,
Martin Gilje Jaatun
,
Colin Boyd
.
cybersecpods 2018
:
1-8
[doi]
An Approach to Detect and Prevent Cybercrime in Large Complex Networks
Andre Sorensen
,
Maxime Jerome Remy
,
Nicolaj Kjettrup
,
Rasmi Vlad Mahmoud
,
Jens Myrup Pedersen
.
cybersecpods 2018
:
1-8
[doi]
A Systems Security Approach for Requirements Analysis of Complex Cyber-Physical Systems
Martin Trae Span
,
Logan O. Mailloux
,
Michael R. Grimaila
,
William Bill Young
.
cybersecpods 2018
:
1-8
[doi]
An Adversarial Risk-based Approach for Network Architecture Security Modeling and Design
Paul A. Wortman
,
Fatemeh Tehranipoor
,
John A. Chandy
.
cybersecpods 2018
:
1-8
[doi]
Sign in
or
sign up
to see more results.