Abstract is missing.
- Performance evaluation of a fragmented secret share systemElochukwu Ukwandu, William J. Buchanan, Gordon Russell. 1-6 [doi]
- Security awareness and affective feedback: Categorical behaviour vs. reported behaviourLynsay A. Shepherd, Jacqueline Archibald. 1-6 [doi]
- RicherPicture: Semi-automated cyber defence using context-aware data analyticsArnau Erola, Ioannis Agrafiotis, Jassim Happa, Michael Goldsmith, Sadie Creese, Philip A. Legg. 1-8 [doi]
- Development and validation of technique to measure cyber situation awarenessPatrik Lif, Magdalena Granåsen, Teodor Sommestad. 1-8 [doi]
- A temporal assessment of cyber intrusion chains using multidisciplinary frameworks and methodologiesAunshul Rege, Zoran Obradovic, Nima Asadi, Brian Singer, Nicholas Masceri. 1-7 [doi]
- Measuring cloud-based anti-malware protection for office 365 user accountsFerenc Leitold, Anthony Arrott, William Kam. 1-7 [doi]
- Modeling the effects of amount and timing of deception in simulated network scenariosPalvi Aggarwal, Cleotilde Gonzalez, Varun Dutt. 1-7 [doi]
- Cybersecurity situational awareness taxonomyAntti Evesti, Teemu Kanstrén, Tapio Frantti. 1-8 [doi]
- A graphic-based cryptographic model for authenticationBoniface Kayode Alese, Abimbola Akindele, Folasade Mojisola Dahunsi, Aderonke F. Thompson, Tosin Adesuyi. 1-10 [doi]
- Visualisation of device datasets to assist digital forensic investigationGavin Hales. 1-4 [doi]
- Socio-economic factors in cybercrime: Statistical study of the relation between socio-economic factors and cybercrimePablo Casais Solano, Antonio Jose Reinoso Peinado. 1-4 [doi]
- Multi-dimensional structural data integration for proactive cyber-defenceIkwu Ruth. 1-9 [doi]
- Towards the normalization of cybercrime victimization: A routine activities analysis of cybercrime in europeMarianne Junger, Lorena Montoya, Pieter H. Hartel, Maliheh Heydari. 1-8 [doi]
- A preliminary radicalisation framework based on social engineering techniquesSumaia Sabouni, Andrea J. Cullen, Lorna Armitage. 1-5 [doi]
- Visualizing network events in a muggle friendly wayOuti-Marja Latvala, Tommi Keränen, Sami Noponen, Niko Lehto, Mirko Sailio, Mikko Valta, Pia Olli. 1-4 [doi]
- A location privacy system in mobile network using game theoryBoniface Kayode Alese, Aderonke F. Thompson, Patricia Yetunde Oni. 1-5 [doi]
- A methodology for testing virtualisation securityScott Donaldson, Natalie Coull, David McLuskie. 1-8 [doi]
- A situation-aware user interface to assess users' ability to construct strong passwords: A conceptual architectureEliana Stavrou. 1-6 [doi]
- Security operations centre: Situation awareness, threat intelligence and cybercrimeCyril Onwubiko. 1-6 [doi]
- For cloud services on a user's multiple devices, how do we measure the trusted zone defended by anti-malware?Anthony Arrott, Ivan Macalintal, Ian McMillan. 1-5 [doi]
- Cr@ck3n: A cyber alerts visualization objectDavid Brosset, Camille Cavelier, Benjamin Coste, Yvon Kermarrec, Joffrey Lartigaud, Pedro Merino Laso. 1-2 [doi]
- Automated computer network defence using ARMOUR: Mission-oriented decision support and vulnerability mitigationNatalie Nakhla, Kathryn Perrett, Christopher McKenzie. 1-8 [doi]
- Stock market reaction to data breaches: The moderating role of corporate social responsibilityShuili Du, Jing Wang, Kholekile L. Gwebu. 1-2 [doi]
- Random forest explorations for URL classificationMartyn Weedon, Dimitris Tsaptsinos, James Denholm-Price. 1-4 [doi]