Search dblp for Publications

export results for "toc:db/journals/ijcysa/ijcysa3.bht:"

 download as .bib file

@article{DBLP:journals/ijcysa/AggarwalMGD18,
  author       = {Palvi Aggarwal and
                  Fr{\'{e}}d{\'{e}}ric Moisan and
                  Cleotilde Gonzalez and
                  Varun Dutt},
  title        = {Understanding Cyber Situational Awareness in a Cyber Security Game
                  involving},
  journal      = {Int. J. Cyber Situational Aware.},
  volume       = {3},
  number       = {1},
  pages        = {11--38},
  year         = {2018},
  url          = {https://doi.org/10.22619/ijcsa.2018.100118},
  doi          = {10.22619/IJCSA.2018.100118},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcysa/AggarwalMGD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcysa/AntonFLAS18,
  author       = {Simon Duque Ant{\'{o}}n and
                  Daniel Fraunholz and
                  Christoph Lipps and
                  Khurshid Alam and
                  Hans Dieter Schotten},
  title        = {Putting Things in Context: Securing Industrial Authentication with
                  Context Information},
  journal      = {Int. J. Cyber Situational Aware.},
  volume       = {3},
  number       = {1},
  pages        = {98--120},
  year         = {2018},
  url          = {https://doi.org/10.22619/ijcsa.2018.100122},
  doi          = {10.22619/IJCSA.2018.100122},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcysa/AntonFLAS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcysa/CarlinOS18,
  author       = {Domhnall Carlin and
                  Philip O'Kane and
                  Sakir Sezer},
  title        = {Dynamic Analysis of Ran-somware using Opcodes and Opcode Categories},
  journal      = {Int. J. Cyber Situational Aware.},
  volume       = {3},
  number       = {1},
  pages        = {84--97},
  year         = {2018},
  url          = {https://doi.org/10.22619/ijcsa.2018.100121},
  doi          = {10.22619/IJCSA.2018.100121},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcysa/CarlinOS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcysa/KidmoseLBP18,
  author       = {Egon Kidmose and
                  Erwin Lansing and
                  S{\o}ren Brandbyge and
                  Jens Myrup Pedersen},
  title        = {Heuristic Methods for Efficient Identification of Abusive Domain Names},
  journal      = {Int. J. Cyber Situational Aware.},
  volume       = {3},
  number       = {1},
  pages        = {121--142},
  year         = {2018},
  url          = {https://doi.org/10.22619/ijcsa.2018.100123},
  doi          = {10.22619/IJCSA.2018.100123},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcysa/KidmoseLBP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcysa/McDermottHP18,
  author       = {Christopher D. McDermott and
                  William Haynes and
                  Andrei V. Petrovksi},
  title        = {Threat Detection and Analysis in the Internet of Things using Deep
                  Packet Inspection},
  journal      = {Int. J. Cyber Situational Aware.},
  volume       = {3},
  number       = {1},
  pages        = {61--83},
  year         = {2018},
  url          = {https://doi.org/10.22619/ijcsa.2018.100120},
  doi          = {10.22619/IJCSA.2018.100120},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcysa/McDermottHP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcysa/MelandS18,
  author       = {Per H{\aa}kon Meland and
                  Fredrik Seehusen},
  title        = {When to Treat Security Risks with Cyber Insurance},
  journal      = {Int. J. Cyber Situational Aware.},
  volume       = {3},
  number       = {1},
  pages        = {39--60},
  year         = {2018},
  url          = {https://doi.org/10.22619/ijcsa.2018.100119},
  doi          = {10.22619/IJCSA.2018.100119},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcysa/MelandS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics