Abstract is missing.
- Forensic Considerations for the High Efficiency Image File Format (HEIF)Sean McKeown, Gordon Russell 0001. 1-8 [doi]
- A DLT-based Trust Framework for IoT EcosystemsTharindu Ranathunga, Ramona Marfievici, Alan McGibney, Susan Rea. 1-8 [doi]
- Developing a security behavioural assessment approach for cyber rating UK MSBsAndrew Rae, Asma Patel. 1-8 [doi]
- Introducing & Evaluating 'Nutrition Facts' for Online ContentMatthew Spradling, Jeremy Straub, Jay Strong. 1-8 [doi]
- Automated Artefact Relevancy Determination from Artefact Metadata and Associated Timeline EventsXiaoyu Du, Quan Le, Mark Scanlon. 1-8 [doi]
- Restricting Data Flows to Secure Against Remote AttackJohn O'Raw, David M. Laverty. 1-4 [doi]
- Insider Threat Detection: A Solution in Search of a ProblemJordan Richard Schoenherr, Robert Thomson 0001. 1-7 [doi]
- Deep Down the Rabbit Hole: On References in Networks of Decoy ElementsDaniel Reti, Daniel Fraunholz, Janis Zemitis, Daniel Schneider 0007, Hans Dieter Schotten. 1-11 [doi]
- Cyber-security research by ISPs: A NetFlow and DNS Anonymization PolicyMartin Fejrskov, Jens Myrup Pedersen, Emmanouil Vasilomanolakis. 1-8 [doi]
- Using Amazon Alexa APIs as a Source of Digital EvidenceClemens Krueger, Sean McKeown. 1-8 [doi]
- What Could Possibly Go Wrong? Smart Grid Misuse Case ScenariosInger Anne Tøndel, Ravishankar Borgaonkar, Martin Gilje Jaatun, Christian Frøystad. 1-8 [doi]
- Testing And Hardening IoT Devices Against the Mirai BotnetChristopher Kelly, Nikolaos Pitropakis, Sean McKeown, Costas Lambrinoudakis. 1-8 [doi]
- An Overview of Web Robots Detection TechniquesHanlin Chen, Hongmei He, Andrew Starr. 1-6 [doi]
- A Cost-Effective OCR Implementation to Prevent Phishing on Mobile PlatformsYunjia Wang, Yang Liu, Tiejun Wu, Ishbel Duncan. 1-8 [doi]
- An Empirical Study of Key Generation in Cryptographic RansomwarePranshu Bajpai, Richard J. Enbody. 1-8 [doi]
- Platform for monitoring and clinical diagnosis of arboviruses using computational modelsSebastião Rogério da Silva Neto, Thomás Tabosa de Oliveira, Vanderson de Souza Sampaio, Theo Lynn, Patricia Takako Endo. 1-3 [doi]
- Smarter Password Guessing Techniques Leveraging Contextual Information and OSINTAikaterini Kanta, Iwen Coisel, Mark Scanlon. 1-2 [doi]
- Moving Targets: Addressing Concept Drift in Supervised Models for Hacker Communication DetectionAndrei Lima Queiroz, Brian Keegan, Susan McKeever. 1-7 [doi]
- A Security Perspective on UnikernelsJoshua Talbot, Przemek Pikula, Craig Sweetmore, Samuel Rowe, Hanan Hindy, Christos Tachtatzis, Robert C. Atkinson, Xavier J. A. Bellekens. 1-7 [doi]
- Blurring lines between fiction and reality: Perspectives of experts on marketing effectiveness of virtual influencersEvangelos Moustakas, Nishtha Lamba, Dina Mahmoud, C. Ranganathan. 1-6 [doi]
- Privacy Policy - "I agree"?! - Do alternatives to text-based policies increase the awareness of the users?Pascal Faurie, Arghir-Nicolae Moldovan, Irina Tal. 1-6 [doi]
- Social big data: A Twitter text mining approach to the communication of universities during the Lebanese protestsKatia Raya, Nicole D'Almeida, Maroun Chamoun. 1-8 [doi]
- A Taxonomy of Approaches for Integrating Attack Awareness in ApplicationsTolga Ünlü, Lynsay A. Shepherd, Natalie Coull, Colin McLean. 1-4 [doi]
- Protection Behaviours: a diversity of individual strategiesBertrand Venard. 1-7 [doi]
- Evaluation of Machine Learning Algorithms for Anomaly DetectionNebrase Elmrabit, Feixiang Zhou, Fengyin Li, Huiyu Zhou 0001. 1-8 [doi]
- Towards Identifying Human Actions, Intent, and Severity of APT Attacks Applying Deception Techniques - An ExperimentJoel Chacon, Sean McKeown, Richard Macfarlane. 1-8 [doi]
- Slave Clock Responses to Precision Time Protocol Attacks: A Case StudyWaleed Alghamdi, Michael Schukat. 1-4 [doi]
- Epistemological Questions for CybersecurityTimothy D. Williams. 1-4 [doi]
- Assessing the Influencing Factors on the Accuracy of Underage Facial Age EstimationFelix Anda, Brett A. Becker, David Lillis, Nhien-An Le-Khac, Mark Scanlon. 1-8 [doi]
- "What did you say?": Extracting unintentional secrets from predictive text learning systemsGwyn Wilkinson, Phil Legg. 1-8 [doi]
- ethVote: Towards secure voting with distributed ledgersJohannes Mols, Emmanouil Vasilomanolakis. 1-8 [doi]
- Towards Security Attack and Risk Assessment during Early System DesignLukas Gressl, Michael Krisper, Christian Steger, Ulrich Neffe. 1-8 [doi]
- Memory Forensics Against RansomwarePranshu Bajpai, Richard J. Enbody. 1-8 [doi]
- An Empirical Study of CERT Capacity in the North SeaMartin Gilje Jaatun, Lars Bodsberg, Tor Olav Grøtan, Marie Elisabeth Gaup Moe. 1-8 [doi]
- Automated Vulnerability Testing via Executable Attack GraphsDrew Malzahn, Zachary Birnbaum, Cimone Wright-Hamor. 1-10 [doi]
- Vulnerability-Based Impact Criticality Estimation for Industrial Control SystemsUchenna Daniel Ani, Hongmei He, Ashutosh Tiwari. 1-8 [doi]
- Acoustic Emanation of Haptics as a Side-Channel for Gesture-Typing AttacksJonathan Francis Roscoe, Max Smith-Creasey. 1-4 [doi]
- Technical codes'potentialities in cybersecurity. A contextual approach on the ethics of small digital organizations in FranceThéo Simon, Bertrand Venard. 1-8 [doi]
- Shouting Through Letterboxes: A study on attack susceptibility of voice assistantsAndrew McCarthy, Benedict R. Gaster, Phil Legg. 1-8 [doi]
- Think Smart, Play Dumb: Analyzing Deception in Hardware Trojan Detection Using Game TheoryTapadhir Das, Abdel Rahman Eldosouky, Shamik Sengupta. 1-8 [doi]
- Towards a Framework for Measuring the Performance of a Security Operations Center AnalystEnoch Agyepong, Yulia Cherdantseva, Philipp Reinecke, Pete Burnap. 1-8 [doi]
- Introducing a forensics data type taxonomy of acquirable artefacts from programmable logic controllersMarco Cook, Ioannis Stavrou, Sarah Dimmock, Chris Johnson. 1-8 [doi]
- AI Crimes: A ClassificationFadi N. Sibai. 1-8 [doi]
- Adapting STPA-sec for Socio-technical Cyber Security Challenges in Emerging Nations: A Case Study in Risk Management for Rwandan Health CareJoseph Kaberuka, Christopher Johnson. 1-9 [doi]
- A Secure Framework for Anti-Money-Laundering using Machine Learning and Secret SharingArman Zand, James Orwell, Eckhard Pfluegel. 1-7 [doi]
- Cyber Threat Intelligence and the Cyber Meta-Reality and Cyber MicrobiomeJoshua A. Sipper. 1-5 [doi]