Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijcysa/ijcysa3.bht:"
@article{DBLP:journals/ijcysa/AggarwalMGD18, author = {Palvi Aggarwal and Fr{\'{e}}d{\'{e}}ric Moisan and Cleotilde Gonzalez and Varun Dutt}, title = {Understanding Cyber Situational Awareness in a Cyber Security Game involving}, journal = {Int. J. Cyber Situational Aware.}, volume = {3}, number = {1}, pages = {11--38}, year = {2018}, url = {https://doi.org/10.22619/ijcsa.2018.100118}, doi = {10.22619/IJCSA.2018.100118}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcysa/AggarwalMGD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcysa/AntonFLAS18, author = {Simon Duque Ant{\'{o}}n and Daniel Fraunholz and Christoph Lipps and Khurshid Alam and Hans Dieter Schotten}, title = {Putting Things in Context: Securing Industrial Authentication with Context Information}, journal = {Int. J. Cyber Situational Aware.}, volume = {3}, number = {1}, pages = {98--120}, year = {2018}, url = {https://doi.org/10.22619/ijcsa.2018.100122}, doi = {10.22619/IJCSA.2018.100122}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcysa/AntonFLAS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcysa/CarlinOS18, author = {Domhnall Carlin and Philip O'Kane and Sakir Sezer}, title = {Dynamic Analysis of Ran-somware using Opcodes and Opcode Categories}, journal = {Int. J. Cyber Situational Aware.}, volume = {3}, number = {1}, pages = {84--97}, year = {2018}, url = {https://doi.org/10.22619/ijcsa.2018.100121}, doi = {10.22619/IJCSA.2018.100121}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcysa/CarlinOS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcysa/KidmoseLBP18, author = {Egon Kidmose and Erwin Lansing and S{\o}ren Brandbyge and Jens Myrup Pedersen}, title = {Heuristic Methods for Efficient Identification of Abusive Domain Names}, journal = {Int. J. Cyber Situational Aware.}, volume = {3}, number = {1}, pages = {121--142}, year = {2018}, url = {https://doi.org/10.22619/ijcsa.2018.100123}, doi = {10.22619/IJCSA.2018.100123}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcysa/KidmoseLBP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcysa/McDermottHP18, author = {Christopher D. McDermott and William Haynes and Andrei V. Petrovksi}, title = {Threat Detection and Analysis in the Internet of Things using Deep Packet Inspection}, journal = {Int. J. Cyber Situational Aware.}, volume = {3}, number = {1}, pages = {61--83}, year = {2018}, url = {https://doi.org/10.22619/ijcsa.2018.100120}, doi = {10.22619/IJCSA.2018.100120}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcysa/McDermottHP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcysa/MelandS18, author = {Per H{\aa}kon Meland and Fredrik Seehusen}, title = {When to Treat Security Risks with Cyber Insurance}, journal = {Int. J. Cyber Situational Aware.}, volume = {3}, number = {1}, pages = {39--60}, year = {2018}, url = {https://doi.org/10.22619/ijcsa.2018.100119}, doi = {10.22619/IJCSA.2018.100119}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcysa/MelandS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.