Abstract is missing.
- Does the NIS implementation strategy effectively address cyber security risks in the UK?Meha Shukla, Shane D. Johnson, Peter Jones. 1-11 [doi]
- Adaptive and Intelligible Prioritization for Network Security IncidentsLeonard Renners, Felix Heine, Carsten Kleiner, Gabi Dreo Rodosek. 1-8 [doi]
- Cyber Security Supervision in the Insurance Sector: Smart Contracts and Chosen IssuesRemy Remigius Zgraggen. 1-4 [doi]
- MANiC: Multi-step Assessment for Crypto-minersJonah Burgess, Domhnall Carlin, Philip O'Kane, Sakir Sezer. 1-8 [doi]
- BATSense: Anomalous Security Event Detection using TBATS Machine LearningPranshu Bajpai, Tyler Olsen, Seth Edgar, Rob McCurdy, Richard J. Enbody. 1-8 [doi]
- Destructive Attacks Detection and Response System for Physical Devices in Cyber-Physical SystemsPeyman Kabiri, Mahdieh Chavoshi. 1-6 [doi]
- A Novel Method to Prevent Phishing by using OCR TechnologyYunjia Wang, Ishbel Duncan. 1-5 [doi]
- Brexit Impact on Cyber Security of United KingdomMuntaha Saleem. 1-6 [doi]
- A Novel Machine Learning Based Malware Detection and Classification FrameworkKamalakanta Sethi, Rahul Kumar, Lingaraj Sethi, Padmalochan Bera, Prashanta Kumar Patra. 1-4 [doi]
- Secure Chaotic Maps-based Authentication Scheme for Real-Time Data Access In Internet of ThingsWenting Li, Haibo Cheng, Ping Wang. 1-8 [doi]
- Organizational formalization and employee information security behavioral intentions based on an extended TPB modelYuxiang Hong, Steven Furnell. 1-4 [doi]
- Classifying Phishing Email Using Machine Learning and Deep LearningSikha Bagui, Debarghya Nandi, Subhash C. Bagui, Robert Jamie White. 1-2 [doi]
- Threat modelling and agile software development: Identified practice in four Norwegian organisationsKarin Bernsmed, Martin Gilje Jaatun. 1-8 [doi]
- Analysis of Obfuscated Code with Program SlicingMahin Talukder, Syed Islam, Paolo Falcarin. 1-7 [doi]
- Expert Knowledge Elicitation for Skill Level Categorization of Attack PathsTerézia Mézesová, Hayretdin Bahsi. 1-8 [doi]
- A Cost-efficient Protocol for Open BlockchainsChunlei Li 0001, Chunming Rong, Martin Gilje Jaatun. 1-7 [doi]
- In wolf's clothing: Complications of threat emulation in contemporary cyber intelligence practiceJ. D. Work. 1-8 [doi]
- An Empirical Study on Culture, Automation, Measurement, and Sharing of DevSecOpsNora Tomas, Jingyue Li, Huang Huang. 1-8 [doi]
- Hardware Implementation of Secured Socket Communication based on Chaotic CryptosystemBelqassim Bouteghrine, Mohammed Rabiai, Camel Tanougast, Said Sadoudi. 1-4 [doi]
- Cybersecurity Culture in Computer Security Incident Response Teams: Investigating difficulties in communication and coordinationMarios Ioannou, Eliana Stavrou, Maria Bada. 1-4 [doi]
- Keystroke Dynamics using Auto EncodersYogesh Patel, Karim Ouazzane, Vassil T. Vassilev, Ibrahim Faruqi, George L. Walker. 1-8 [doi]
- Security Risk Assessment and Management as Technical DebtKalle Rindell, Johannes Holvitie. 1-8 [doi]
- Longitudinal performance analysis of machine learning based Android malware detectorsSuleiman Y. Yerima, Sarmadullah Khan. 1-8 [doi]
- A Social Engineering Course Project for Undergraduate Students Across Multiple DisciplinesAunshul Rege, Katorah Williams, Alyssa Mendlein. 1-8 [doi]
- Design principles for national cyber security sensor networks: Lessons learned from small-scale demonstratorsFlorian Skopik, Stefan Filip. 1-8 [doi]
- Arithmetic Circuit Homomorphic Encryption and Multiprocessing EnhancementsRuitao Kee, Jovan Sie, Rhys Wong, Chern Nam Yap. 1-5 [doi]
- A Combined Attack-Tree and Kill-Chain Approach to Designing Attack-Detection Strategies for Malicious Insiders in Cloud ComputingAdrian J. Duncan, Sadie Creese, Michael Goldsmith. 1-9 [doi]
- Raw Network Traffic Data Preprocessing and Preparation for Automatic AnalysisBasil Alothman. 1-5 [doi]
- Security-Related Stress: A Perspective on Information Security Risk ManagementMartin Lundgren, Erik Bergström. 1-8 [doi]
- Ethereum Blockchain for Securing the Internet of Things: Practical Implementation and Performance EvaluationSubhi Alrubei, Jonathan Rigelsford, Callum Willis, Edward Ball. 1-5 [doi]
- Cyber Onboarding is 'Broken'Cyril Onwubiko, Karim Ouazzane. 1-13 [doi]
- A Scalable Attribute Based Encryption for Secure Data Storage and Access in CloudKamalakanta Sethi, Ankit Pradhan, R. Punith, Padmalochan Bera. 1-8 [doi]
- Attack Surface Identification and Reduction Model Applied in ScrumGeorge O. M. Yee. 1-8 [doi]
- TrapMP: Malicious Process Detection By Utilising Program Phase DetectionZirak Allaf, Mo Adda, Alexander E. Gegov. 1-8 [doi]