Abstract is missing.
- Smart Grid Data Security using Practical CP-ABE with Obfuscated Policy and Outsourcing DecryptionAnkit Pradhan, R. Punith, Kamalakanta Sethi, Padmalochan Bera. 1-8 [doi]
- Pattern Extraction for Behaviours of Multi-Stage Threats via Unsupervised LearningAhmed Abdulrahman Alghamdi, Giles Reger. 1-8 [doi]
- Graphical analysis of captured network packets for detection of suspicious network nodesFelix Larbi Aryeh, Boniface Kayode Alese, Olayemi Olasehinde. 1-5 [doi]
- Towards an Aggregate Signature-based Authentication for Opportunistic NetworksCossi Blaise Avoussoukpo, Chunxiang Xu, Marius Tchenagnon, Nabeil Eltayieb. 1-7 [doi]
- Cyber Insurance Market in Israel - What is the Official Policy?Tal Pavel. 1-6 [doi]
- The Visual Design of Network Data to Enhance Cyber Security Awareness of the Everyday Internet UserFiona Carroll, Phil Legg, Bastian Bønkel. 1-7 [doi]
- Application of the Benford's law to Social bots and Information Operations activitiesLale M. adahali, Margeret Hall. 1-8 [doi]
- High-Performance Monitoring Sensors for Home Computer Users Security ProfilingFarhad Foroughi, Hossein Hadipour, Ahmad M. Shafiee. 1-7 [doi]
- A Data Extraction Method for Anomaly Detection in Naval SystemsClet Boudehenn, Jean-Christophe Cexus, Abdel A. Boudraa. 1-4 [doi]
- Educating multidisciplinary undergraduates on security and privacyKatorah Williams, Mollie Rose Ducoste, Aunshul Rege. 1-8 [doi]
- Application and analysis of record linkage techniques to integrate Brazilian health databasesMaicon Herverton Lino Ferreira da Silva Barros, Morgana Thalita da Silva Leite, Vanderson Sampaio, Theo Lynn, Patricia Takako Endo. 1-2 [doi]
- Beyond the Prisoner's Dilemma: the Social Dilemmas of CybersecurityJordan Richard Schoenherr, Robert Thomson 0001. 1-7 [doi]
- Examining the Cyber Security of a Real World Access Control ImplementationJulian Jørgensen Teule, Marius Frilund Hensel, Victor Büttner, Jonathan Velgaard Sørensen, Magnus Melgaard, Rasmus Løvenstein Olsen. 1-3 [doi]
- st century skills learningJasmina Mairc. 1-7 [doi]
- Big Fish, Little Fish, Critical Infrastructure: An Analysis of Phineas Fisher and the 'Hacktivist' Threat to Critical InfrastructurePeter Maynard, Kieran McLaughlin. 1-7 [doi]
- Analysis of the RPL Version Number Attack with Multiple AttackersAhmet Aris, Sema F. Oktug. 1-8 [doi]
- Smart Security Audit: Reinforcement Learning with a Deep Neural Network ApproximatorKonstantin Pozdniakov, Eduardo Alonso, Vladimir Stankovic 0002, Kimberly Tam, Kevin D. Jones. 1-8 [doi]
- Decentralized Identifier Distribution for Moving Target Defense and BeyondDaniel Krohmer, Hans D. Schotten. 1-8 [doi]
- Explainable AI in HealthcareUrja Pawar, Donna O'Shea, Susan Rea, Ruairi O'Reilly. 1-2 [doi]
- Focusing on the Recovery Aspects of Cyber ResilienceCyril Onwubiko. 1-13 [doi]
- A Design Exploration Framework for Secure IoT-SystemsLukas Gressl, Alexander Rech, Christian Steger, Andreas Daniel Sinnhofer, Ralph Weissnegger. 1-8 [doi]
- Mobile Botnet Detection: A Deep Learning Approach Using Convolutional Neural NetworksSuleiman Y. Yerima, Mohammed K. Alzaylaee. 1-8 [doi]
- Cybersecurity Risk Management in Small and Medium-Sized Enterprises: A Systematic Review of Recent EvidenceAbdulmajeed Alahmari, Bob Duncan. 1-5 [doi]
- Naval cyber-physical anomaly propagation analysis based on a quality assessed graphNicolas Pelissero, Pedro Merino Laso, John Puentes. 1-8 [doi]
- Implementing the NIS Directive, driving cybersecurity improvements for Essential ServicesTania Wallis, Chris Johnson. 1-10 [doi]
- The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims ProcessesJason R. C. Nurse, Louise Axon, Arnau Erola, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese. 1-8 [doi]
- A survey of cyber security in the Swedish manufacturing industryUlrik Franke, Joakim Wernberg. 1-8 [doi]
- Self-Attention for Cyberbullying DetectionAnkit Pradhan, Venu Madhav Yatam, Padmalochan Bera. 1-6 [doi]