Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 6 of 128 results
Sort by: relevance publication year

MAAT: Multi-Stage Attack Attribution in Enterprise Systems using Software Defined Networks

JOURNAL ARTICLE published 7 December 2017 in ICST Transactions on Security and Safety

Authors: Subramaniyam Kannan | Paul Wood | Somali Chaterji | Saurabh Bakchi | Larry Deatrick | Patricia Beane

How Stakeholders Perceived Security Risks? A New Predictive Functional Level Model and its Application to E-Learning

JOURNAL ARTICLE published 15 October 2018 in ICST Transactions on Security and Safety

Authors: N. Rjaibi | L.B.A Rabai

NIS directive: The case of Greece

JOURNAL ARTICLE published 15 May 2018 in ICST Transactions on Security and Safety

Authors: Leandros Maglaras | George Drivas | Kleanthis Noou | Stylianos Rallis

Comparing Online Surveys for Cybersecurity: SONA and MTurk

JOURNAL ARTICLE published 8 February 2022 in ICST Transactions on Security and Safety

Authors: Anne Wagner | Anna Bakas | Shelia Kennison | Eric Chan-Tin

Mitigating Vulnerabilities in Closed Source Software

JOURNAL ARTICLE published 4 August 2022 in ICST Transactions on Security and Safety

Authors: Zhen Huang | Gang Tan | Xiaowei Yu

Vulnerability Analysis, Intrusion Detection and Privacy Preservation of Modern Communication Systems

JOURNAL ARTICLE published 28 December 2017 in ICST Transactions on Security and Safety

Authors: Dr. Sencun Zhu | Dr. Kevin Jones | Dr. Leandros Maglaras

A novel intrusion detection method based on OCSVM and K-means recursive clustering

JOURNAL ARTICLE published 30 January 2015 in ICST Transactions on Security and Safety

Authors: Leandros A. Maglaras | Jianmin Jiang

End-to-End Key Exchange through Disjoint Paths in P2P Networks

JOURNAL ARTICLE published 30 January 2015 in ICST Transactions on Security and Safety

Authors: Daouda Ahmat | Damien Magoni | Tegawendé F. Bissyandé

Trust in social computing. The case of peer-to-peer file sharing networks

JOURNAL ARTICLE published 27 September 2011 in ICST Transactions on Security and Safety

Authors: Heng Xu | Tamara Dinev | Han Li

Preface to special issue on the cognitive science of cyber defence analysis

JOURNAL ARTICLE published 3 May 2013 in ICST Transactions on Security and Safety

Authors: Nancy. J. Cooke | Michael. D. McNeese

Reviewing the book “Principles of Cyber-physical Systems” from a security perspective

JOURNAL ARTICLE published 5 October 2015 in ICST Transactions on Security and Safety

Authors: Minghui Zhu | Peng Liu

Is E-voting Systems based on Blockchain Technology Efficient in Nigeria General Elections?

JOURNAL ARTICLE published 1 June 2021 in ICST Transactions on Security and Safety

Authors: Friday Ikuero | Vasileios Germanos | Laurence Brooks | Wen Zeng

Efficient Public Blockchain Client for Lightweight Users

JOURNAL ARTICLE published 4 January 2018 in ICST Transactions on Security and Safety

Authors: Lei Xu | Lin Chen | Zhimin Gao | Shouhuai Xu | Weidong Shi

Human-Generated and Machine-Generated Ratings of Password Strength: What Do Users Trust More?

JOURNAL ARTICLE published 19 August 2019 in ICST Transactions on Security and Safety

Authors: Saeed Alqahtani | Shujun Li | Haiyue Yuan | Patrice Rusconi

Detection of Botnet Command and Control Traffic by the Multistage Trust Evaluation of Destination Identifiers

JOURNAL ARTICLE published 5 October 2015 in ICST Transactions on Security and Safety

Authors: Pieter Burghouwt | Marcel E.M. Spruit | Henk J. Sips

SyntIoT: Privacy and security experimentation in consumer-oriented IoT ecosystems

JOURNAL ARTICLE published 12 January 2021 in ICST Transactions on Security and Safety

Authors: Tomasz Kosiński | Riccardo Scandariato | Morten Fjeld

Threat Modeling for Cloud Infrastructures

JOURNAL ARTICLE published 10 January 2019 in ICST Transactions on Security and Safety

Authors: Nawaf Alhebaishi | Lingyu Wang | Anoop Singhal

FedADMP: A Joint Anomaly Detection and Mobility Prediction Framework via Federated Learning

JOURNAL ARTICLE published 30 November 2021 in ICST Transactions on Security and Safety

Authors: Zezhang Yang | Jian Li | Ping Yang

A human-in-the-loop approach to understanding situation awareness in cyber defence analysis

JOURNAL ARTICLE published 3 May 2013 in ICST Transactions on Security and Safety

Authors: Michael Tyworth | Nicklaus A. Giacobe | Vincent F. Mancuso | Michael D. McNeese | David L. Hall

A Methodology for the Dynamic Design of Adaptive Log Management Infrastructures

JOURNAL ARTICLE published 29 January 2019 in ICST Transactions on Security and Safety

Authors: V. Anastopoulos | S. Katsikas