default search action
Search dblp for Publications
export results for "toc:db/conf/cybersecpods/cybersecpods2020.bht:"
@inproceedings{DBLP:conf/cybersecpods/AgyepongCRB20, author = {Enoch Agyepong and Yulia Cherdantseva and Philipp Reinecke and Pete Burnap}, title = {Towards a Framework for Measuring the Performance of a Security Operations Center Analyst}, booktitle = {2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020}, pages = {1--8}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CyberSecurity49315.2020.9138872}, doi = {10.1109/CYBERSECURITY49315.2020.9138872}, timestamp = {Fri, 24 Jul 2020 16:51:21 +0200}, biburl = {https://dblp.org/rec/conf/cybersecpods/AgyepongCRB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecpods/AlghamdiS20, author = {Waleed Alghamdi and Michael Schukat}, title = {Slave Clock Responses to Precision Time Protocol Attacks: {A} Case Study}, booktitle = {2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020}, pages = {1--4}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CyberSecurity49315.2020.9138888}, doi = {10.1109/CYBERSECURITY49315.2020.9138888}, timestamp = {Fri, 24 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersecpods/AlghamdiS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecpods/AndaBLLS20, author = {Felix Anda and Brett A. Becker and David Lillis and Nhien{-}An Le{-}Khac and Mark Scanlon}, title = {Assessing the Influencing Factors on the Accuracy of Underage Facial Age Estimation}, booktitle = {2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020}, pages = {1--8}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CyberSecurity49315.2020.9138851}, doi = {10.1109/CYBERSECURITY49315.2020.9138851}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersecpods/AndaBLLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecpods/AniHT20, author = {Uchenna Daniel Ani and Hongmei He and Ashutosh Tiwari}, title = {Vulnerability-Based Impact Criticality Estimation for Industrial Control Systems}, booktitle = {2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020}, pages = {1--8}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CyberSecurity49315.2020.9138886}, doi = {10.1109/CYBERSECURITY49315.2020.9138886}, timestamp = {Thu, 20 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersecpods/AniHT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecpods/BajpaiE20, author = {Pranshu Bajpai and Richard J. Enbody}, title = {Memory Forensics Against Ransomware}, booktitle = {2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020}, pages = {1--8}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CyberSecurity49315.2020.9138853}, doi = {10.1109/CYBERSECURITY49315.2020.9138853}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersecpods/BajpaiE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecpods/BajpaiE20a, author = {Pranshu Bajpai and Richard J. Enbody}, title = {An Empirical Study of Key Generation in Cryptographic Ransomware}, booktitle = {2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020}, pages = {1--8}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CyberSecurity49315.2020.9138878}, doi = {10.1109/CYBERSECURITY49315.2020.9138878}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersecpods/BajpaiE20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecpods/ChaconMM20, author = {Joel Chacon and Sean McKeown and Richard Macfarlane}, title = {Towards Identifying Human Actions, Intent, and Severity of {APT} Attacks Applying Deception Techniques - An Experiment}, booktitle = {2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020}, pages = {1--8}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CyberSecurity49315.2020.9138859}, doi = {10.1109/CYBERSECURITY49315.2020.9138859}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersecpods/ChaconMM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecpods/ChenHS20, author = {Hanlin Chen and Hongmei He and Andrew Starr}, title = {An Overview of Web Robots Detection Techniques}, booktitle = {2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CyberSecurity49315.2020.9138856}, doi = {10.1109/CYBERSECURITY49315.2020.9138856}, timestamp = {Thu, 05 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersecpods/ChenHS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecpods/CookSDJ20, author = {Marco M. Cook and Ioannis Stavrou and Sarah Dimmock and Chris W. Johnson}, title = {Introducing a forensics data type taxonomy of acquirable artefacts from programmable logic controllers}, booktitle = {2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020}, pages = {1--8}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CyberSecurity49315.2020.9138879}, doi = {10.1109/CYBERSECURITY49315.2020.9138879}, timestamp = {Mon, 08 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersecpods/CookSDJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecpods/DasES20, author = {Tapadhir Das and Abdel Rahman Eldosouky and Shamik Sengupta}, title = {Think Smart, Play Dumb: Analyzing Deception in Hardware Trojan Detection Using Game Theory}, booktitle = {2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020}, pages = {1--8}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CyberSecurity49315.2020.9138897}, doi = {10.1109/CYBERSECURITY49315.2020.9138897}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersecpods/DasES20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecpods/DuLS20, author = {Xiaoyu Du and Quan Le and Mark Scanlon}, title = {Automated Artefact Relevancy Determination from Artefact Metadata and Associated Timeline Events}, booktitle = {2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020}, pages = {1--8}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CyberSecurity49315.2020.9138874}, doi = {10.1109/CYBERSECURITY49315.2020.9138874}, timestamp = {Mon, 09 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersecpods/DuLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecpods/ElmrabitZL020, author = {Nebrase Elmrabit and Feixiang Zhou and Fengyin Li and Huiyu Zhou}, title = {Evaluation of Machine Learning Algorithms for Anomaly Detection}, booktitle = {2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020}, pages = {1--8}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CyberSecurity49315.2020.9138871}, doi = {10.1109/CYBERSECURITY49315.2020.9138871}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersecpods/ElmrabitZL020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecpods/FaurieMT20, author = {Pascal Faurie and Arghir{-}Nicolae Moldovan and Irina Tal}, title = {Privacy Policy - "I agree"?! - Do alternatives to text-based policies increase the awareness of the users?}, booktitle = {2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CyberSecurity49315.2020.9138857}, doi = {10.1109/CYBERSECURITY49315.2020.9138857}, timestamp = {Fri, 24 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersecpods/FaurieMT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecpods/FejrskovPV20, author = {Martin Fejrskov and Jens Myrup Pedersen and Emmanouil Vasilomanolakis}, title = {Cyber-security research by ISPs: {A} NetFlow and {DNS} Anonymization Policy}, booktitle = {2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020}, pages = {1--8}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CyberSecurity49315.2020.9138869}, doi = {10.1109/CYBERSECURITY49315.2020.9138869}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersecpods/FejrskovPV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecpods/GresslKSN20, author = {Lukas Gressl and Michael Krisper and Christian Steger and Ulrich Neffe}, title = {Towards Security Attack and Risk Assessment during Early System Design}, booktitle = {2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020}, pages = {1--8}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CyberSecurity49315.2020.9138896}, doi = {10.1109/CYBERSECURITY49315.2020.9138896}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersecpods/GresslKSN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecpods/JaatunBGM20, author = {Martin Gilje Jaatun and Lars Bodsberg and Tor Olav Gr{\o}tan and Marie Elisabeth Gaup Moe}, title = {An Empirical Study of {CERT} Capacity in the North Sea}, booktitle = {2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020}, pages = {1--8}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CyberSecurity49315.2020.9138865}, doi = {10.1109/CYBERSECURITY49315.2020.9138865}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersecpods/JaatunBGM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecpods/KaberukaJ20, author = {Joseph Kaberuka and Christopher W. Johnson}, title = {Adapting STPA-sec for Socio-technical Cyber Security Challenges in Emerging Nations: {A} Case Study in Risk Management for Rwandan Health Care}, booktitle = {2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CyberSecurity49315.2020.9138863}, doi = {10.1109/CYBERSECURITY49315.2020.9138863}, timestamp = {Tue, 28 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersecpods/KaberukaJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecpods/KantaCS20, author = {Aikaterini Kanta and Iwen Coisel and Mark Scanlon}, title = {Smarter Password Guessing Techniques Leveraging Contextual Information and {OSINT}}, booktitle = {2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020}, pages = {1--2}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CyberSecurity49315.2020.9138870}, doi = {10.1109/CYBERSECURITY49315.2020.9138870}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersecpods/KantaCS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecpods/KellyPML20, author = {Christopher Kelly and Nikolaos Pitropakis and Sean McKeown and Costas Lambrinoudakis}, title = {Testing And Hardening IoT Devices Against the Mirai Botnet}, booktitle = {2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020}, pages = {1--8}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CyberSecurity49315.2020.9138887}, doi = {10.1109/CYBERSECURITY49315.2020.9138887}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersecpods/KellyPML20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecpods/KruegerM20, author = {Clemens Krueger and Sean McKeown}, title = {Using Amazon Alexa APIs as a Source of Digital Evidence}, booktitle = {2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020}, pages = {1--8}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CyberSecurity49315.2020.9138849}, doi = {10.1109/CYBERSECURITY49315.2020.9138849}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersecpods/KruegerM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecpods/MalzahnBW20, author = {Drew Malzahn and Zachary Birnbaum and Cimone Wright{-}Hamor}, title = {Automated Vulnerability Testing via Executable Attack Graphs}, booktitle = {2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020}, pages = {1--10}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CyberSecurity49315.2020.9138852}, doi = {10.1109/CYBERSECURITY49315.2020.9138852}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersecpods/MalzahnBW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecpods/McCarthyGL20, author = {Andrew McCarthy and Benedict R. Gaster and Phil Legg}, title = {Shouting Through Letterboxes: {A} study on attack susceptibility of voice assistants}, booktitle = {2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020}, pages = {1--8}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CyberSecurity49315.2020.9138860}, doi = {10.1109/CYBERSECURITY49315.2020.9138860}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersecpods/McCarthyGL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecpods/McKeown020, author = {Sean McKeown and Gordon Russell}, title = {Forensic Considerations for the High Efficiency Image File Format {(HEIF)}}, booktitle = {2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020}, pages = {1--8}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CyberSecurity49315.2020.9138890}, doi = {10.1109/CYBERSECURITY49315.2020.9138890}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersecpods/McKeown020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecpods/MolsV20, author = {Johannes Mols and Emmanouil Vasilomanolakis}, title = {ethVote: Towards secure voting with distributed ledgers}, booktitle = {2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020}, pages = {1--8}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CyberSecurity49315.2020.9138866}, doi = {10.1109/CYBERSECURITY49315.2020.9138866}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersecpods/MolsV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecpods/MoustakasLMR20, author = {Evangelos Moustakas and Nishtha Lamba and Dina Mahmoud and C. Ranganathan}, title = {Blurring lines between fiction and reality: Perspectives of experts on marketing effectiveness of virtual influencers}, booktitle = {2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CyberSecurity49315.2020.9138861}, doi = {10.1109/CYBERSECURITY49315.2020.9138861}, timestamp = {Fri, 24 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersecpods/MoustakasLMR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecpods/NetoOSLE20, author = {Sebasti{\~{a}}o Rog{\'{e}}rio da Silva Neto and Thom{\'{a}}s Tabosa de Oliveira and Vanderson de Souza Sampaio and Theo Lynn and Patricia Takako Endo}, title = {Platform for monitoring and clinical diagnosis of arboviruses using computational models}, booktitle = {2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020}, pages = {1--3}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CyberSecurity49315.2020.9138880}, doi = {10.1109/CYBERSECURITY49315.2020.9138880}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersecpods/NetoOSLE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecpods/ORawL20, author = {John O'Raw and David M. Laverty}, title = {Restricting Data Flows to Secure Against Remote Attack}, booktitle = {2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020}, pages = {1--4}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CyberSecurity49315.2020.9138875}, doi = {10.1109/CYBERSECURITY49315.2020.9138875}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersecpods/ORawL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecpods/QueirozKM20, author = {Andrei Lima Queiroz and Brian Keegan and Susan McKeever}, title = {Moving Targets: Addressing Concept Drift in Supervised Models for Hacker Communication Detection}, booktitle = {2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020}, pages = {1--7}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CyberSecurity49315.2020.9138894}, doi = {10.1109/CYBERSECURITY49315.2020.9138894}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersecpods/QueirozKM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecpods/RaeP20, author = {Andrew Rae and Asma Patel}, title = {Developing a security behavioural assessment approach for cyber rating {UK} MSBs}, booktitle = {2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020}, pages = {1--8}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CyberSecurity49315.2020.9138893}, doi = {10.1109/CYBERSECURITY49315.2020.9138893}, timestamp = {Fri, 24 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersecpods/RaeP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecpods/RanathungaMMR20, author = {Tharindu Ranathunga and Ramona Marfievici and Alan McGibney and Susan Rea}, title = {A DLT-based Trust Framework for IoT Ecosystems}, booktitle = {2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020}, pages = {1--8}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CyberSecurity49315.2020.9138855}, doi = {10.1109/CYBERSECURITY49315.2020.9138855}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersecpods/RanathungaMMR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecpods/RayaDC20, author = {Katia Raya and Nicole D'Almeida and Maroun Chamoun}, title = {Social big data: {A} Twitter text mining approach to the communication of universities during the Lebanese protests}, booktitle = {2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020}, pages = {1--8}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CyberSecurity49315.2020.9138876}, doi = {10.1109/CYBERSECURITY49315.2020.9138876}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersecpods/RayaDC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecpods/RetiFZ0S20, author = {Daniel Reti and Daniel Fraunholz and Janis Zemitis and Daniel Schneider and Hans Dieter Schotten}, title = {Deep Down the Rabbit Hole: On References in Networks of Decoy Elements}, booktitle = {2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020}, pages = {1--11}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CyberSecurity49315.2020.9138850}, doi = {10.1109/CYBERSECURITY49315.2020.9138850}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersecpods/RetiFZ0S20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecpods/RoscoeS20, author = {Jonathan Francis Roscoe and Max Smith{-}Creasey}, title = {Acoustic Emanation of Haptics as a Side-Channel for Gesture-Typing Attacks}, booktitle = {2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020}, pages = {1--4}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CyberSecurity49315.2020.9138864}, doi = {10.1109/CYBERSECURITY49315.2020.9138864}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersecpods/RoscoeS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecpods/Schoenherr020, author = {Jordan Richard Schoenherr and Robert Thomson}, title = {Insider Threat Detection: {A} Solution in Search of a Problem}, booktitle = {2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020}, pages = {1--7}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CyberSecurity49315.2020.9138862}, doi = {10.1109/CYBERSECURITY49315.2020.9138862}, timestamp = {Fri, 24 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersecpods/Schoenherr020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecpods/Sibai20, author = {Fadi N. Sibai}, title = {{AI} Crimes: {A} Classification}, booktitle = {2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020}, pages = {1--8}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CyberSecurity49315.2020.9138891}, doi = {10.1109/CYBERSECURITY49315.2020.9138891}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersecpods/Sibai20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecpods/SimonV20, author = {Th{\'{e}}o Simon and Bertrand Venard}, title = {Technical codes'potentialities in cybersecurity. {A} contextual approach on the ethics of small digital organizations in France}, booktitle = {2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020}, pages = {1--8}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CyberSecurity49315.2020.9138895}, doi = {10.1109/CYBERSECURITY49315.2020.9138895}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersecpods/SimonV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecpods/Sipper20, author = {Joshua A. Sipper}, title = {Cyber Threat Intelligence and the Cyber Meta-Reality and Cyber Microbiome}, booktitle = {2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020}, pages = {1--5}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CyberSecurity49315.2020.9138858}, doi = {10.1109/CYBERSECURITY49315.2020.9138858}, timestamp = {Fri, 24 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersecpods/Sipper20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecpods/SpradlingSS20, author = {Matthew Spradling and Jeremy Straub and Jay Strong}, title = {Introducing {\&} Evaluating 'Nutrition Facts' for Online Content}, booktitle = {2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020}, pages = {1--8}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CyberSecurity49315.2020.9138867}, doi = {10.1109/CYBERSECURITY49315.2020.9138867}, timestamp = {Fri, 24 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersecpods/SpradlingSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecpods/TalbotPSRHTAB20, author = {Joshua Talbot and Przemek Pikula and Craig Sweetmore and Samuel Rowe and Hanan Hindy and Christos Tachtatzis and Robert C. Atkinson and Xavier J. A. Bellekens}, title = {A Security Perspective on Unikernels}, booktitle = {2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020}, pages = {1--7}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CyberSecurity49315.2020.9138883}, doi = {10.1109/CYBERSECURITY49315.2020.9138883}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersecpods/TalbotPSRHTAB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecpods/TondelBJF20, author = {Inger Anne T{\o}ndel and Ravishankar Borgaonkar and Martin Gilje Jaatun and Christian Fr{\o}ystad}, title = {What Could Possibly Go Wrong? Smart Grid Misuse Case Scenarios}, booktitle = {2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020}, pages = {1--8}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CyberSecurity49315.2020.9138892}, doi = {10.1109/CYBERSECURITY49315.2020.9138892}, timestamp = {Fri, 24 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersecpods/TondelBJF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecpods/UnluSCM20, author = {Tolga {\"{U}}nl{\"{u}} and Lynsay A. Shepherd and Natalie Coull and Colin McLean}, title = {A Taxonomy of Approaches for Integrating Attack Awareness in Applications}, booktitle = {2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020}, pages = {1--4}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CyberSecurity49315.2020.9138885}, doi = {10.1109/CYBERSECURITY49315.2020.9138885}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersecpods/UnluSCM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecpods/Venard20, author = {Bertrand Venard}, title = {Protection Behaviours: a diversity of individual strategies}, booktitle = {2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020}, pages = {1--7}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CyberSecurity49315.2020.9138854}, doi = {10.1109/CYBERSECURITY49315.2020.9138854}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersecpods/Venard20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecpods/WangLWD20, author = {Yunjia Wang and Yang Liu and Tiejun Wu and Ishbel Duncan}, title = {A Cost-Effective {OCR} Implementation to Prevent Phishing on Mobile Platforms}, booktitle = {2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020}, pages = {1--8}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CyberSecurity49315.2020.9138873}, doi = {10.1109/CYBERSECURITY49315.2020.9138873}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersecpods/WangLWD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecpods/WilkinsonL20, author = {Gwyn Wilkinson and Phil Legg}, title = {"What did you say?": Extracting unintentional secrets from predictive text learning systems}, booktitle = {2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020}, pages = {1--8}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CyberSecurity49315.2020.9138882}, doi = {10.1109/CYBERSECURITY49315.2020.9138882}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersecpods/WilkinsonL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecpods/Williams20, author = {Timothy D. Williams}, title = {Epistemological Questions for Cybersecurity}, booktitle = {2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020}, pages = {1--4}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CyberSecurity49315.2020.9138884}, doi = {10.1109/CYBERSECURITY49315.2020.9138884}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersecpods/Williams20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecpods/ZandOP20, author = {Arman Zand and James Orwell and Eckhard Pfluegel}, title = {A Secure Framework for Anti-Money-Laundering using Machine Learning and Secret Sharing}, booktitle = {2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020}, pages = {1--7}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CyberSecurity49315.2020.9138889}, doi = {10.1109/CYBERSECURITY49315.2020.9138889}, timestamp = {Fri, 24 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersecpods/ZandOP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cybersecpods/2020, title = {2020 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2020, Dublin, Ireland, June 15-19, 2020}, publisher = {{IEEE}}, year = {2020}, url = {https://ieeexplore.ieee.org/xpl/conhome/9136807/proceeding}, isbn = {978-1-7281-6428-1}, timestamp = {Fri, 24 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersecpods/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.