Abstract is missing.
- Correlating intrusion detection alerts on bot malware infections using neural networkEgon Kidmose, Matija Stevanovic, Jens Myrup Pedersen. 1-8 [doi]
- A countermeasure mechanism for fast scanning malwareMuhammad Aminu Ahmad, Steve Woodhead, Diane Gan. 1-8 [doi]
- Security in building automation systems - a first analysisThomas Mundt, Peter Wickboldt. 1-8 [doi]
- Root cause analysis (RCA) as a preliminary tool into the investigation of identity theftAisha Abubakar, Pooneh Bagheri Zadeh, Helge Janicke, Richard Howley. 1-5 [doi]
- Gauging the effectiveness of computer misuse act in dealing with cybercrimesReza Montasari, Pekka Peltola, Victoria Carpenter. 1-5 [doi]
- Statistical analysis of attacking autonomous systemsTomas Sochor, Matej Zuzcak, Petr Bujok. 1-6 [doi]
- Designing utility functions for game-theoretic cloud security assessment: a case for using the common vulnerability scoring systemLouai Maghrabi, Eckhard Pfluegel, Senna Fathima Noorji. 1-6 [doi]
- Exploring web analytics to enhance cyber situational awareness for the protection of online web servicesCyril Onwubiko. 1-8 [doi]
- The social engineering attack spiral (SEAS)Andrea J. Cullen, Lorna Armitage. 1-6 [doi]
- A mobile forensic investigation into steganographyCatrin Burrows, Pooneh Bagheri Zadeh. 1-2 [doi]
- Goal-based security components for cloud storage security framework: a preliminary studyFara Yahya, Robert John Walters, Gary B. Wills. 1-5 [doi]
- Cyber warfare: terms, issues, laws and controversiesKamile Nur Sevis, Ensar Seker. 1-9 [doi]
- N-opcode analysis for android malware classification and categorizationBoojoong Kang, Suleiman Y. Yerima, Kieran McLaughlin, Sakir Sezer. 1-7 [doi]
- Attack simulation based software protection assessment methodGaofeng Zhang, Paolo Falcarin, Elena Gómez-Martínez, Shareeful Islam, Christophe Tartary, Bjorn De Sutter, Jerome D'Annoville. 1-8 [doi]
- Proactive biometric-enabled forensic imprintingAbdulrahman Alruban, Nathan L. Clarke, Fudong Li, Steven Furnell. 1-15 [doi]
- Model based analysis of insider threatsTaolue Chen, Tingting Han 0001, Florian Kammueller, Ibrahim Nemli, Christian W. Probst. 1-3 [doi]
- Exploiting pitfalls in software-defined networking implementationDylan Smyth, Victor Cionca, Seán McSweeney, Donna O'Shea. 1-8 [doi]
- Forensic analysis of private browsingMary Geddes, Pooneh Bagheri Zadeh. 1-2 [doi]
- Knowledge management of cyber security expertise: an ontological approach to talent discoveryMarcelo Paiva Fontenele, Lily Sun. 1-13 [doi]
- The IM system with a cryptographic featureZbigniew Hulicki. 1-4 [doi]