Facet browsing currently unavailable
Page 6 of 128 results
Sort by: relevance publication year
MAAT: Multi-Stage Attack Attribution in Enterprise Systems using Software Defined Networks JOURNAL ARTICLE published 7 December 2017 in ICST Transactions on Security and Safety |
How Stakeholders Perceived Security Risks? A New Predictive Functional Level Model and its Application to E-Learning JOURNAL ARTICLE published 15 October 2018 in ICST Transactions on Security and Safety |
NIS directive: The case of Greece JOURNAL ARTICLE published 15 May 2018 in ICST Transactions on Security and Safety |
Comparing Online Surveys for Cybersecurity: SONA and MTurk JOURNAL ARTICLE published 8 February 2022 in ICST Transactions on Security and Safety |
Mitigating Vulnerabilities in Closed Source Software JOURNAL ARTICLE published 4 August 2022 in ICST Transactions on Security and Safety |
Vulnerability Analysis, Intrusion Detection and Privacy Preservation of Modern Communication Systems JOURNAL ARTICLE published 28 December 2017 in ICST Transactions on Security and Safety |
A novel intrusion detection method based on OCSVM and K-means recursive clustering JOURNAL ARTICLE published 30 January 2015 in ICST Transactions on Security and Safety |
End-to-End Key Exchange through Disjoint Paths in P2P Networks JOURNAL ARTICLE published 30 January 2015 in ICST Transactions on Security and Safety |
Trust in social computing. The case of peer-to-peer file sharing networks JOURNAL ARTICLE published 27 September 2011 in ICST Transactions on Security and Safety |
Preface to special issue on the cognitive science of cyber defence analysis JOURNAL ARTICLE published 3 May 2013 in ICST Transactions on Security and Safety |
Reviewing the book “Principles of Cyber-physical Systems” from a security perspective JOURNAL ARTICLE published 5 October 2015 in ICST Transactions on Security and Safety |
Is E-voting Systems based on Blockchain Technology Efficient in Nigeria General Elections? JOURNAL ARTICLE published 1 June 2021 in ICST Transactions on Security and Safety |
Efficient Public Blockchain Client for Lightweight Users JOURNAL ARTICLE published 4 January 2018 in ICST Transactions on Security and Safety |
Human-Generated and Machine-Generated Ratings of Password Strength: What Do Users Trust More? JOURNAL ARTICLE published 19 August 2019 in ICST Transactions on Security and Safety |
Detection of Botnet Command and Control Traffic by the Multistage Trust Evaluation of Destination Identifiers JOURNAL ARTICLE published 5 October 2015 in ICST Transactions on Security and Safety |
SyntIoT: Privacy and security experimentation in consumer-oriented IoT ecosystems JOURNAL ARTICLE published 12 January 2021 in ICST Transactions on Security and Safety |
Threat Modeling for Cloud Infrastructures JOURNAL ARTICLE published 10 January 2019 in ICST Transactions on Security and Safety |
FedADMP: A Joint Anomaly Detection and Mobility Prediction Framework via Federated Learning JOURNAL ARTICLE published 30 November 2021 in ICST Transactions on Security and Safety |
A human-in-the-loop approach to understanding situation awareness in cyber defence analysis JOURNAL ARTICLE published 3 May 2013 in ICST Transactions on Security and Safety |
A Methodology for the Dynamic Design of Adaptive Log Management Infrastructures JOURNAL ARTICLE published 29 January 2019 in ICST Transactions on Security and Safety |