Abstract is missing.
- A Taxonomy of Malicious Traffic for Intrusion Detection SystemsHanan Hindy, Elike Hodo, Ethan Bayne, Amar Seeam, Robert C. Atkinson, Xavier J. A. Bellekens. 1-4 [doi]
- Malware Economics and its Implication to Anti-Malware Situational AwarenessArun Lakhotia, Vivek Notani, Charles LeDoux. 1-8 [doi]
- Cluster analysis for deobfuscation of malware variants during ransomware attacksAnthony Arrott, Arun Lakhotia, Ferenc Leitold, Charles LeDoux. 1-9 [doi]
- Development and evaluation of information elements for simplified cyber-incident reportsPatrik Lif, Teodor Sommestad, Dennis Granåsen. 1-10 [doi]
- CoCoa: An Ontology for Cybersecurity Operations Centre Analysis ProcessCyril Onwubiko. 1-8 [doi]
- Can We Evaluate the Impact of Cyber Security Information Sharing?Adam Zibak, Andrew Simpson. 1-2 [doi]
- Enhancing Cyber Situational Awareness: A New Perspective of Password Auditing ToolsEliana Stavrou. 1-4 [doi]
- How to Make Privacy Policies both GDPR-Compliant and UsableKaren Renaud, Lynsay A. Shepherd. 1-8 [doi]
- Cyber security: Influence of patching vulnerabilities on the decision-making of hackers and analystsZahid Maqbool, V. S. Chandrasekhar Pammi, Varun Dutt. 1-8 [doi]
- Analysis of Adversarial Movement Through Characteristics of Graph Topological OrderingNima Asadi, Aunshul Rege, Zoran Obradovic. 1-6 [doi]
- Cyber Risk Economics Capability Gaps Research StrategyErin Kenneally, Lucien Randazzese, David Balenson. 1-6 [doi]
- Multilayer Perceptron Neural Network for Detection of Encrypted VPN Network TrafficShane Miller, Kevin Curran, Tom Lunney. 1-8 [doi]
- Towards Situational Awareness of Botnet Activity in the Internet of ThingsChristopher D. McDermott, Andrei V. Petrovski, Farzan Majdani. 1-8 [doi]
- Towards Integrating Insurance Data into Information Security Investment Decision MakingDaniel W. Woods, Andrew C. Simpson. 1-6 [doi]
- Cyber Kill Chain based Threat Taxonomy and its Application on Cyber Common Operational PictureSungyoung Clio, Insung Han, Hyunsook Jeong, Jinsoo Kim, Sungmo Koo, Haengrok Oh, Moosung Park. 1-8 [doi]
- A Netnographic Study on the Dark Net Ecosystem for RansomwareYara Fareed Fahmy Bayoumy, Per Håkon Meland, Guttorm Sindre. 1-8 [doi]
- When to Treat Security Risks with Cyber InsurancePer Håkon Meland, Fredrik Seehusen. 1-8 [doi]
- Compound Password System for MobileZachary Hills, David F. Arppe, Amin Ibrahim, Khalil El-Khatib. 1-4 [doi]
- The Landscape of Industrial Control Systems (ICS) Devices on the InternetWei Xu, Yaodong Tao, Xin Guan. 1-8 [doi]
- Cyber Insurance and Security Interdependence: Friends or Foes?Ganbayar Uuganbayar, Artsiom Yautsiukhin, Fabio Martinelli. 1-4 [doi]
- Redesign of Gaussian Mixture Model for Efficient and Privacy-preserving Speaker RecognitionS. Rahulamathavan, X. Yao, R. Yogachandran, K. Cumanan, Muttukrishnan Rajarajan. 1-8 [doi]
- A Human Vulnerability Assessment MethodologyAndrea J. Cullen, Lorna Armitage. 1-2 [doi]
- Towards An Adaptable System-based Classification Design for Cyber IdentityMary C. Kay Michel, Michael C. King. 1-2 [doi]