Abstract is missing.
- Forensic Readiness within the Maritime SectorKimberly Tam, Kevin Jones. 1-4 [doi]
- A Preliminary Exploration of Uber Data as an Indicator of Urban LiveabilityAguinaldo Bezerra, Gisliany Alves, Ivanovitch Silva, Pierangelo Rosati, Patricia Takako Endo, Theo Lynn. 1-8 [doi]
- Towards a Conversational Agent for Threat Detection in the Internet of ThingsChristopher D. McDermott, Bastien Jeannelle, John P. Isaacs. 1-8 [doi]
- Analysing cyber-insurance claims to design harm-propagation treesLouise Axon, Arnau Erola, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese. 1-4 [doi]
- What Makes for Effective Visualisation in Cyber Situational Awareness for Non-Expert Users?Fiona Carroll, Adam Chakof, Phil Legg. 1-8 [doi]
- Security awareness escape room - a possible new method in improving security awareness of usersEszter Diána Oroszi. 1-4 [doi]
- Examining the Roles of Muhajirahs in the Islamic State via TwitterAunshul Rege, Scott VanZant. 1-8 [doi]
- Empowering Citizen Data Scientists - Cyber Science Social Media trackLakshmi Prayaga. 1-2 [doi]
- Facebook Data: Sharing, Caring, and SellingRenate Schubert, Ioana Marinica. 1-3 [doi]
- Efficient and Interpretable Real-Time Malware Detection Using Random-ForestAlan Mills, Theodoros Spyridopoulos, Phil Legg. 1-8 [doi]
- Towards Better Understanding of Cyber Security Information SharingAdam Zibak, Andrew Simpson. 1-8 [doi]
- The Future of Cyber Analytics: Identity Classification for Systematic and Predictive InsightMary C. Kay Michel, Michael C. King. 1-4 [doi]
- Two simple models of business interruption accumulation risk in cyber insuranceUlrik Franke, Joachim Draeger. 1-7 [doi]
- Collaborative Training and Response Communities - An Alternative to Traditional Cyber Defense EscalationErik L. Moore, Steven P. Fulton, Roberta A. Mancuso, Tristen K. Amador, Daniel M. Likarish. 1-8 [doi]
- Factors Affecting Cyber Risk in MaritimeKimberly Tam, Kevin Jones. 1-8 [doi]
- Quantile based risk measures in cyber securityMaria Francesca Carfora, Albina Orlando. 1-4 [doi]
- Cyber KPI for Return on Security InvestmentCyril Onwubiko, Austine Onwubiko. 1-8 [doi]
- Practical approach for measuring the level of user behaviourFerenc Leitold. 1-2 [doi]
- Online Anomaly Detection of Time Series at ScaleAndrew Mason, Yifan Zhao, Hongmei He, Raymon Gompelman, Srikanth Mandava. 1-8 [doi]
- Resiliency under Strategic Foresight: The effects of Cybersecurity Management and Enterprise Risk Management AlignmentAbraham Althonayan, Alina Andronache. 1-9 [doi]
- Tools and Techniques for Improving Cyber Situational Awareness of Targeted Phishing AttacksPhil Legg, Tim Blackman. 1-4 [doi]
- Domain Identification for Commercial Intention-holding Posts on TwitterYuanyuan Zhu, Mee Chi So, Paul Harrigan. 1-10 [doi]
- Cyber attacks real time detection: towards a Cyber Situational Awareness for naval systemsOlivier Jacq, David Brosset, Yvon Kermarrec, Jacques Simonin. 1-2 [doi]
- A Comparison of Machine Learning Approaches for Detecting Misogynistic Speech in Urban DictionaryTheo Lynn, Patricia Takako Endo, Pierangelo Rosati, Ivanovitch Silva, Guto Leoni Santos, Debbie Ging. 1-8 [doi]
- Cyber Threat Intelligence for "Things"Thomas D. Wagner. 1-2 [doi]
- Demand side expectations of cyber insuranceUlrik Franke, Per Håkon Meland. 1-8 [doi]
- Threat Modeling of Connected Vehicles: A privacy analysis and extension of vehicleLangWenjun Xiong, Robert Lagerström. 1-7 [doi]
- Big Social Data - Predicting Users' Interests from their Social Networking ActivitiesAlexiei Dingli, Bernhardt Engerer. 1-8 [doi]
- The determinants of individual cyber security behaviours: Qualitative research among French studentsBertrand Venard. 1-4 [doi]
- Cyber Insurance and Time-to-Compromise: An Integrated ApproachGanbayar Uuganbayar, Fabio Massacci, Artsiom Yautsiukhin, Fabio Martinelli. 1-8 [doi]
- Pattern discovery in intrusion chains and adversarial movementNima Asadi, Aunshul Rege, Zoran Obradovic. 1-4 [doi]