Abstract is missing.
- The Concept of Cyber Defence Exercises (CDX): Planning, Execution, EvaluationEnsar Seker, Hasan Huseyin Ozbenli. 1-9 [doi]
- A Systems Security Approach for Requirements Analysis of Complex Cyber-Physical SystemsMartin Trae Span, Logan O. Mailloux, Michael R. Grimaila, William Bill Young. 1-8 [doi]
- Introducing Falcom: A Multifunctional High-Interaction Honeypot Framework for Industrial and Embedded ApplicationsDaniel Fraunholz, Daniel Krohmer, Hans Dieter Schotten, Carolina Nogueira. 1-8 [doi]
- Cyber-Risk Assessment for Autonomous ShipsKimberly Tam, Kevin Jones. 1-8 [doi]
- Observation Measures to Profile User Security BehaviourFarhad Foroughi, Peter Luksch 0001. 1-6 [doi]
- Attackers Constantly Threaten the Survival of Organisations, but there is a New Shark in the Water: Carcharodon Carcharias Moderator Europa UniversalisBob Duncan. 1-5 [doi]
- Detection of Malicious domains through lexical analysisEgon Kidmose, Matija Stevanovic, Jens Myrup Pedersen. 1-5 [doi]
- An Approach to Detect and Prevent Cybercrime in Large Complex NetworksAndre Sorensen, Maxime Jerome Remy, Nicolaj Kjettrup, Rasmi Vlad Mahmoud, Jens Myrup Pedersen. 1-8 [doi]
- Cloud-based Real-time Network Intrusion Detection Using Deep LearningSanthosh Parampottupadam, Arghir-Nicolae Moldovan. 1-8 [doi]
- Lightweight Distributed Attack Detection and Prevention for the Safe Internet of ThingsVladimir Eliseev, Olga Eliseeva. 1-6 [doi]
- Ensuring Message Freshness in A Multi-Channel SMS Steganographic Banking ProtocolOmego Obinna, Eckhard Pfluegel, Martin J. Tunnicliffe, Charles A. Clarke. 1-7 [doi]
- A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply systemAndres Robles-Durazno, Naghmeh Moradpoor, James McWhinnie, Gordon Russell. 1-8 [doi]
- A Bayesian Intrusion Detection FrameworkShuai Fu, Nizar Bouguila. 1-8 [doi]
- Unsupervised Approach for Detecting Low Rate Attacks on Network Traffic with AutoencoderBaskoro Adi Pratomo, Pete Burnap, George Theodorakopoulos. 1-8 [doi]
- An Adversarial Risk-based Approach for Network Architecture Security Modeling and DesignPaul A. Wortman, Fatemeh Tehranipoor, John A. Chandy. 1-8 [doi]
- Sub-file Hashing Strategies for Fast Contraband DetectionSean McKeown, Gordon Russell, Petra Leimich. 1-7 [doi]
- Searching for crime on the web: Legal and Ethical perspectivesDimitrios Kavallieros, Christina Chalanouli, Georgios Kokkinis, Anastasios Panathanasiou, Efthimios Lissaris, Georgios Leventakis, Georgios Giataganas, Georgios Germanos. 1-8 [doi]
- Reducing the Impact of Network Bottlenecks on Remote Contraband DetectionSean McKeown, Gordon Russell, Petra Leimich. 1-7 [doi]
- Cyber Security Considerations for Self-healing Smart Grid NetworksMartin Gilje Jaatun, Marie Elisabeth Gaup Moe, Per Erik Nordbo. 1-7 [doi]
- Analytical Tools for Blockchain: Review, Taxonomy and Open ChallengesAnastasios Balaskas, Virginia N. L. Franqueira. 1-8 [doi]
- OWASP Top 10 - Do Startups Care?Halldis Sohoel, Martin Gilje Jaatun, Colin Boyd. 1-8 [doi]
- Quantisation feasibility and performance of RSS-based secret key extraction in VANETsMirko Bottarelli, Gregory Epiphaniou, Dhouha Kbaier Ben Ismail, Petros Karadimas, Haider M. Al-Khateeb. 1-8 [doi]
- Infection, Self-reproduction and Overinfection in Ransomware: The Case of TeslaCryptYassine Lemmou, El Mamoun Souidi. 1-8 [doi]
- Dynamic Opcode Analysis of RansomwareDomhnall Carlin, Philip O'Kane, Sakir Sezer. 1-4 [doi]
- Combined and Robust SNOW-ZUC Algorithm Based on Chaotic SystemMahdi Madani, Camel Tanougast. 1-7 [doi]