Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/cybersa/cybersa2016.bht:"
@inproceedings{DBLP:conf/cybersa/AggarwalGD16, author = {Palvi Aggarwal and Cleotilde Gonzalez and Varun Dutt}, title = {Looking from the hacker's perspective: Role of deceptive strategies in cyber security}, booktitle = {2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment, CyberSA 2016, London, United Kingdom, June 13-14, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CyberSA.2016.7503288}, doi = {10.1109/CYBERSA.2016.7503288}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/AggarwalGD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/AhrendJJ16, author = {Jan M. Ahrend and Marina Jirotka and Kevin Jones}, title = {On the collaborative practices of cyber threat intelligence analysts to develop and utilize tacit Threat and Defence Knowledge}, booktitle = {2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment, CyberSA 2016, London, United Kingdom, June 13-14, 2016}, pages = {1--10}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CyberSA.2016.7503279}, doi = {10.1109/CYBERSA.2016.7503279}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/AhrendJJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/BangS16, author = {Mahesh Bang and Himanshu Saraswat}, title = {Building an effective and efficient continuous web application security program}, booktitle = {2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment, CyberSA 2016, London, United Kingdom, June 13-14, 2016}, pages = {1--4}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CyberSA.2016.7503287}, doi = {10.1109/CYBERSA.2016.7503287}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/BangS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/BaxterW16, author = {Paul D. Baxter and Trevor M. Wood}, title = {Generating insight from data tailoring analytic algorithms and visualization to address user requirements}, booktitle = {2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment, CyberSA 2016, London, United Kingdom, June 13-14, 2016}, pages = {1--4}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CyberSA.2016.7503284}, doi = {10.1109/CYBERSA.2016.7503284}, timestamp = {Thu, 18 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/BaxterW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/BellekensHSNFS16, author = {Xavier J. A. Bellekens and Andrew W. Hamilton and Preetila Seeam and Kamila Nieradzinska and Quentin Franssen and Amar Seeam}, title = {Pervasive eHealth services a security and privacy risk awareness survey}, booktitle = {2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment, CyberSA 2016, London, United Kingdom, June 13-14, 2016}, pages = {1--4}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CyberSA.2016.7503293}, doi = {10.1109/CYBERSA.2016.7503293}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/BellekensHSNFS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/Burton16, author = {Joe Burton}, title = {Cyber attacks and maritime situational awareness evidence from Japan and Taiwan}, booktitle = {2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment, CyberSA 2016, London, United Kingdom, June 13-14, 2016}, pages = {1--4}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CyberSA.2016.7503295}, doi = {10.1109/CYBERSA.2016.7503295}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/Burton16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/ColeKW16, author = {Jennifer Cole and Dorothea Kleine and Chris Watkins}, title = {Internet discussion forums: Maximizing choice in health-seeking behaviour during public health emergencies}, booktitle = {2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment, CyberSA 2016, London, United Kingdom, June 13-14, 2016}, pages = {1--4}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CyberSA.2016.7503283}, doi = {10.1109/CYBERSA.2016.7503283}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/ColeKW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/DaviesP16, author = {Michael Davies and Menisha Patel}, title = {Are we managing the risk of sharing cyber situational awareness? {A} {UK} Public Sector case study}, booktitle = {2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment, CyberSA 2016, London, United Kingdom, June 13-14, 2016}, pages = {1--2}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CyberSA.2016.7503292}, doi = {10.1109/CYBERSA.2016.7503292}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/DaviesP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/GhanemR16, author = {Mohamed Chahine Ghanem and Deepthi N. Ratnayake}, title = {Enhancing {WPA2-PSK} four-way handshaking after re-authentication to deal with de-authentication followed by brute-force attack a novel re-authentication protocol}, booktitle = {2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment, CyberSA 2016, London, United Kingdom, June 13-14, 2016}, pages = {1--7}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CyberSA.2016.7503286}, doi = {10.1109/CYBERSA.2016.7503286}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/GhanemR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/Golandsky16, author = {Yoram Golandsky}, title = {Cyber crisis management, survival or extinction?}, booktitle = {2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment, CyberSA 2016, London, United Kingdom, June 13-14, 2016}, pages = {1--4}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CyberSA.2016.7503291}, doi = {10.1109/CYBERSA.2016.7503291}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/Golandsky16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/GrafSW16, author = {Roman Graf and Florian Skopik and Kenny Whitebloom}, title = {A decision support model for situational awareness in National Cyber Operations Centers}, booktitle = {2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment, CyberSA 2016, London, United Kingdom, June 13-14, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CyberSA.2016.7503281}, doi = {10.1109/CYBERSA.2016.7503281}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/GrafSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/HeartfieldL16, author = {Ryan Heartfield and George Loukas}, title = {Evaluating the reliability of users as human sensors of social media security threats}, booktitle = {2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment, CyberSA 2016, London, United Kingdom, June 13-14, 2016}, pages = {1--7}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CyberSA.2016.7503282}, doi = {10.1109/CYBERSA.2016.7503282}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/HeartfieldL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/Kohli16, author = {Shruti Kohli}, title = {Developing Cyber Security Asset Management framework for {UK} rail}, booktitle = {2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment, CyberSA 2016, London, United Kingdom, June 13-14, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CyberSA.2016.7503296}, doi = {10.1109/CYBERSA.2016.7503296}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/Kohli16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/Legg16, author = {Philip A. Legg}, title = {Enhancing cyber situation awareness for Non-Expert Users using visual analytics}, booktitle = {2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment, CyberSA 2016, London, United Kingdom, June 13-14, 2016}, pages = {1--8}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CyberSA.2016.7503278}, doi = {10.1109/CYBERSA.2016.7503278}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/Legg16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/MaqboolPD16, author = {Zahid Maqbool and V. S. Chandrasekhar Pammi and Varun Dutt}, title = {Cybersecurity: Effect of information availability in security games}, booktitle = {2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment, CyberSA 2016, London, United Kingdom, June 13-14, 2016}, pages = {1--5}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CyberSA.2016.7503290}, doi = {10.1109/CYBERSA.2016.7503290}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/MaqboolPD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/PirscoveanuSP16, author = {Radu{-}Stefan Pirscoveanu and Matija Stevanovic and Jens Myrup Pedersen}, title = {Clustering analysis of malware behavior using Self Organizing Map}, booktitle = {2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment, CyberSA 2016, London, United Kingdom, June 13-14, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CyberSA.2016.7503289}, doi = {10.1109/CYBERSA.2016.7503289}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/PirscoveanuSP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/PuuskaKVV16, author = {Samir Puuska and Matti J. Kortelainen and Viljami Venekoski and Jouko Vankka}, title = {Instant message classification in Finnish cyber security themed free-form discussion}, booktitle = {2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment, CyberSA 2016, London, United Kingdom, June 13-14, 2016}, pages = {1--4}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CyberSA.2016.7503294}, doi = {10.1109/CYBERSA.2016.7503294}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/PuuskaKVV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/Sanfilippo16, author = {Filippo Sanfilippo}, title = {A multi-sensor system for enhancing situational awareness in offshore training}, booktitle = {2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment, CyberSA 2016, London, United Kingdom, June 13-14, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CyberSA.2016.7503280}, doi = {10.1109/CYBERSA.2016.7503280}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/Sanfilippo16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/StavrouP16, author = {Eliana Stavrou and Andreas Pitsillides}, title = {Situation aware intrusion recovery policy in WSNs}, booktitle = {2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment, CyberSA 2016, London, United Kingdom, June 13-14, 2016}, pages = {1--8}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CyberSA.2016.7503285}, doi = {10.1109/CYBERSA.2016.7503285}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/StavrouP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cybersa/2016, title = {2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment, CyberSA 2016, London, United Kingdom, June 13-14, 2016}, publisher = {{IEEE}}, year = {2016}, url = {https://ieeexplore.ieee.org/xpl/conhome/7499673/proceeding}, isbn = {978-1-5090-0703-5}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersa/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.