


default search action
CyberSA 2017: London, UK
- 2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), London, United Kingdom, June 19-20, 2017. IEEE 2017, ISBN 978-1-5090-5060-4

- David Brosset, Camille Cavelier, Benjamin Coste

, Yvon Kermarrec, Joffrey Lartigaud, Pedro Merino Laso
:
Cr@ck3n: A cyber alerts visualization object. 1-2 - Gavin Hales:

Visualisation of device datasets to assist digital forensic investigation. 1-4 - Sumaia Sabouni

, Andrea J. Cullen, Lorna Armitage:
A preliminary radicalisation framework based on social engineering techniques. 1-5 - Boniface Kayode Alese

, Aderonke F. Thompson, Patricia Yetunde Oni:
A location privacy system in mobile network using game theory. 1-5 - Anthony Arrott, Ivan Macalintal, Ian McMillan:

For cloud services on a user's multiple devices, how do we measure the trusted zone defended by anti-malware? 1-5 - Antti Evesti, Teemu Kanstrén, Tapio Frantti:

Cybersecurity situational awareness taxonomy. 1-8 - Ruth Ikwu:

Multi-dimensional structural data integration for proactive cyber-defence. 1-9 - Outi-Marja Latvala

, Tommi Keränen, Sami Noponen
, Niko Lehto, Mirko Sailio
, Mikko Valta, Pia Olli:
Visualizing network events in a muggle friendly way. 1-4 - Patrik Lif, Magdalena Granåsen, Teodor Sommestad:

Development and validation of technique to measure cyber situation awareness. 1-8 - Boniface Kayode Alese

, Abimbola Akindele, Folasade Mojisola Dahunsi, Aderonke F. Thompson, Tosin Adesuyi:
A graphic-based cryptographic model for authentication. 1-10 - Pablo Casais Solano, Antonio Jose Reinoso Peinado:

Socio-economic factors in cybercrime: Statistical study of the relation between socio-economic factors and cybercrime. 1-4 - Elochukwu Ukwandu

, William J. Buchanan
, Gordon Russell:
Performance evaluation of a fragmented secret share system. 1-6 - Eliana Stavrou:

A situation-aware user interface to assess users' ability to construct strong passwords: A conceptual architecture. 1-6 - Palvi Aggarwal

, Cleotilde Gonzalez, Varun Dutt
:
Modeling the effects of amount and timing of deception in simulated network scenarios. 1-7 - Martyn Weedon, Dimitris Tsaptsinos, James Denholm-Price:

Random forest explorations for URL classification. 1-4 - Marianne Junger, Lorena Montoya

, Pieter H. Hartel, Maliheh Heydari:
Towards the normalization of cybercrime victimization: A routine activities analysis of cybercrime in europe. 1-8 - Scott Donaldson, Natalie Coull

, David McLuskie
:
A methodology for testing virtualisation security. 1-8 - Natalie Nakhla, Kathryn Perrett, Christopher McKenzie:

Automated computer network defence using ARMOUR: Mission-oriented decision support and vulnerability mitigation. 1-8 - Arnau Erola, Ioannis Agrafiotis, Jassim Happa, Michael Goldsmith, Sadie Creese, Philip A. Legg

:
RicherPicture: Semi-automated cyber defence using context-aware data analytics. 1-8 - Shuili Du, Jing Wang

, Kholekile L. Gwebu
:
Stock market reaction to data breaches: The moderating role of corporate social responsibility. 1-2 - Lynsay A. Shepherd

, Jacqueline Archibald:
Security awareness and affective feedback: Categorical behaviour vs. reported behaviour. 1-6 - Ferenc Leitold, Anthony Arrott, William Kam:

Measuring cloud-based anti-malware protection for office 365 user accounts. 1-7 - Cyril Onwubiko

:
Security operations centre: Situation awareness, threat intelligence and cybercrime. 1-6 - Aunshul Rege, Zoran Obradovic, Nima Asadi, Brian Singer, Nicholas Masceri:

A temporal assessment of cyber intrusion chains using multidisciplinary frameworks and methodologies. 1-7

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














