Abstract is missing.
- Securing IoT-Blockchain Applications Through Honesty-Based Distributed Proof of Authority Consensus AlgorithmSubhi Alrubei, Edward A. Ball, Jonathan Rigelsford. 1-7 [doi]
- Zero trust: Never trust, always verifyAllison Wylde. 1-4 [doi]
- Evaluating Threat Modeling Tools: Microsoft TMT versus OWASP Threat DragonErlend Bygdås, Lars Andreassen Jaatun, Stian Brekken Antonsen, Anders Ringen, Erlend Eiring. 1-7 [doi]
- Determining the Impacts of Social Media on Students' Mood, Time Management and Academic Activities: The Nigerian PerspectiveComfort Olebara, Obianuju Ezugwu, Adaora Obayi, Elochukwu Ukwandu. 1-7 [doi]
- ModCGAN: A Multimodal Approach to Detect New MalwareShobhit, Padmalochan Bera. 1-2 [doi]
- DefAtt - Architecture of Virtual Cyber Labs for Research and EducationRasmi Vlad Mahmoud, Egon Kidmose, Ahmet Türkmen, Olga Pilawka, Jens Myrup Pedersen. 1-7 [doi]
- Secure (S)Hell: Introducing an SSH Deception Proxy FrameworkDaniel Reti, David Klaaßen, Simon Duque Antón, Hans Dieter Schotten. 1-6 [doi]
- Care and Feeding of Your Security ChampionMartin Gilje Jaatun, Daniela Soares Cruzes. 1-7 [doi]
- HSE and Cyber Security in Remote WorkLars Bodsberg, Tor Olav Grøtan, Martin Gilje Jaatun, Irene Wærø. 1-8 [doi]
- Quantitative metrics characterizing malicious samplesFerenc Leitold, Krisztina Gyorffyné Holló, Zoltán Király. 1-2 [doi]
- Profiling the Cybercriminal: A Systematic Review of ResearchMaria Bada, Jason R. C. Nurse. 1-8 [doi]
- Modelling Malicious Potential: A Prototype of a Preemptive Strategy for Mitigating Attacks on London's Bus NetworkToby Staton-Bevan, Charles Clarke. 1-6 [doi]
- Intelligent Intrusion Detection System for Smart Grid ApplicationsDinesh Mohanty, Kamalakanta Sethi, Sai Prasath, Rashmi Ranjan Rout, Padmalochan Bera. 1-8 [doi]
- Fishing out the Phishing WebsitesPeya Mowar, Mini Jain. 1-6 [doi]
- Real-Time Intelligent Vishing Prediction and Awareness Model (RIVPAM)Sumitra Biswal. 1-2 [doi]
- Understanding cybercriminals through analysis of penetration testing group dynamicsRachel Bleiman, Mollie Rose Ducoste, Aunshul Rege. 1-8 [doi]
- Hold My Beer: A Case Study of how Ransomware Affected an Australian Beverage CompanySamir Jarjoui, Robert Murimi, Renita Murimi. 1-6 [doi]
- Cybersecurity behavior under covid-19 influenceBertrand Venard. 1-9 [doi]
- GNSS Jamming Classification via CNN, Transfer Learning & the Novel Concatenation of Signal RepresentationsCarolyn J. Swinney, John C. Woods. 1-9 [doi]
- Feature Vulnerability and Robustness Assessment against Adversarial Machine Learning AttacksAndrew McCarthy, Panagiotis Andriotis, Essam Ghadafi, Phil Legg. 1-8 [doi]
- Revolution and stability in the study of the human factor in the security of information systems field : A systematic literature review over 30 years of publicationThéo Simon. 1-8 [doi]
- Feature Selection for Machine Learning-based Phishing Websites DetectionSmriti Dangwal, Arghir-Nicolae Moldovan. 1-6 [doi]
- Unsupervised One-Class Learning for Anomaly Detection on Home IoT Network DevicesJonathan White, Phil Legg. 1-8 [doi]
- Energy Efficiency in Low power and Lossy NetworksAbubakar Gidado Halilu, Martin Hope. 1-8 [doi]
- File Slack Handling ToolMohamed Alji, Khalid Chougdali. 1-3 [doi]
- Navigation anomaly detection: An added value for Maritime Cyber Situational AwarenessClet Boudehenn, Olivier Jacq, Maxence Lannuzel, Jean-Christophe Cexus, Abdel A. Boudraa. 1-4 [doi]
- The Cybersecurity (CSEC) Questionnaire: Individual Differences in Unintentional Insider Threat BehavioursJordan Richard Schoenherr, Robert Thomson 0001. 1-8 [doi]
- "Hacking an IoT Home": New opportunities for cyber security education combining remote learning with cyber-physical systemsPhil Legg, Thomas Higgs, Pennie Spruhan, Jonathan White, Ian Johnson. 1-4 [doi]
- An Empirical Study: Automated Subdomain Takeover Threat DetectionYunjia Wang, Ziling Li, Tiejun Wu, Ishbel Duncan, Qixin Lyu. 1-10 [doi]
- An Anomaly Free Distributed Firewall System for SDNMitali Sinha, Padmalochan Bera, Manoranjan Satpathy. 1-8 [doi]
- Rethinking Security Operations Centre OnboardingCyril Onwubiko. 1-9 [doi]
- A Census of Swedish Public Sector Employee Communication on Cybersecurity during the COVID-19 PandemicAnnika Andreasson, Henrik Artman, Joel Brynielsson, Ulrik Franke. 1-8 [doi]
- Towards a Healthcare Cybersecurity Certification SchemeKristine Hovhannisyan, Piotr Bogacki, Consuelo Assunta Colabuono, Domenico Lofú, Maria Vittoria Marabello, Brady Eugene Maxwell. 1-9 [doi]
- Tool-assisted Threat Modeling for Smart Grid Cyber SecurityLars Halvdan Flå, Ravishankar Borgaonkar, Inger Anne Tøndel, Martin Gilje Jaatun. 1-8 [doi]