default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 37 matches
- 2022
- Antonis Mouhtaropoulos:
Digital Forensic Readiness of Information Systems: A cost-benefit variable analysis. Int. J. Cyber Situational Aware. 6(1): 22-46 (2022) - Cyril Onwubiko, Karim Ouazzane:
Multidimensional Cybersecurity Framework for Strategic Foresight. Int. J. Cyber Situational Aware. 6(1): 46-77 (2022) - Carolyn J. Swinney, John C. Woods:
GPS Jamming Signal Classification with CNN Feature Extraction in low Signal-to-Noise Environments. Int. J. Cyber Situational Aware. 6(1): 1-21 (2022) - 2020
- Max Eiza, Romanus Izuchukwu Okeke, John Dempsey, Vinh-Thong Ta:
Keep Calm and Carry on with Cybersecurity @Home: A Framework for Securing Homeworking IT Environment. Int. J. Cyber Situational Aware. 5(1): 1-25 (2020) - Olasehinde Olayemi Oladimeji, Boniface Kayode Alese, Adebayo Olusola Adetunmbi, Aladesote Olomi Isaiah:
Evaluation of Selected Stacked Ensemble Models for the Optimal Multi-class Cyber-Attacks Detection. Int. J. Cyber Situational Aware. 5(1): 26-48 (2020) - Cyril Onwubiko:
CyberOps: Situational Awareness in Cybersecurity Operations. Int. J. Cyber Situational Aware. 5(1): 82-107 (2020) - Tal Pavel:
The Cyber Insurance Market in Israel. Int. J. Cyber Situational Aware. 5(1): 49-82 (2020) - 2019
- Erik Bergström, Martin Lundgren:
Stress Amongst Novice Information Security Risk Management Practitioners. Int. J. Cyber Situational Aware. 4(1): 128-154 (2019) - Ruth Ikwu, Panos Louvieris:
Monitoring 'Cyber Related' Discussions in Online Social Platforms. Int. J. Cyber Situational Aware. 4(1): 69-98 (2019) - Zahid Maqbool, V. S. Chandrasekhar Pammi, Varun Dutt:
Behavioral Cybersecurity: Investigating the influence of Patching Vulnerabilities in Markov Security Games via Cognitive Modeling. Int. J. Cyber Situational Aware. 4(1): 185-209 (2019) - Cyril Onwubiko, Karim Ouazzane:
Challenges towards Building an effective Cyber Security Operations Centre. Int. J. Cyber Situational Aware. 4(1): 11-39 (2019) - Leonard Renners, Felix Heine, Carsten Kleiner, Gabi Dreo Rodosek:
Concept and Practical Evaluation for Adaptive and Intelligible Prioritization for Network Security Incidents. Int. J. Cyber Situational Aware. 4(1): 99-127 (2019) - Florian Skopik, Stefan Filip:
A blueprint and proof-of-concept for a national cyber security sensor network. Int. J. Cyber Situational Aware. 4(1): 155-184 (2019) - Kimberly Tam, Kevin D. Jones:
Situational Awareness: Examining Factors that Affect Cyber-Risks in the Maritime Sector. Int. J. Cyber Situational Aware. 4(1): 40-68 (2019) - 2018
- Palvi Aggarwal, Frédéric Moisan, Cleotilde Gonzalez, Varun Dutt:
Understanding Cyber Situational Awareness in a Cyber Security Game involving. Int. J. Cyber Situational Aware. 3(1): 11-38 (2018) - Simon Duque Antón, Daniel Fraunholz, Christoph Lipps, Khurshid Alam, Hans Dieter Schotten:
Putting Things in Context: Securing Industrial Authentication with Context Information. Int. J. Cyber Situational Aware. 3(1): 98-120 (2018) - Domhnall Carlin, Philip O'Kane, Sakir Sezer:
Dynamic Analysis of Ran-somware using Opcodes and Opcode Categories. Int. J. Cyber Situational Aware. 3(1): 84-97 (2018) - Egon Kidmose, Erwin Lansing, Søren Brandbyge, Jens Myrup Pedersen:
Heuristic Methods for Efficient Identification of Abusive Domain Names. Int. J. Cyber Situational Aware. 3(1): 121-142 (2018) - Christopher D. McDermott, William Haynes, Andrei V. Petrovksi:
Threat Detection and Analysis in the Internet of Things using Deep Packet Inspection. Int. J. Cyber Situational Aware. 3(1): 61-83 (2018) - Per Håkon Meland, Fredrik Seehusen:
When to Treat Security Risks with Cyber Insurance. Int. J. Cyber Situational Aware. 3(1): 39-60 (2018) - 2017
- Timilehin B. Aderinola, Aderonke F. Thompson, Boniface K. Alese:
Epidemic Response Model for Malware Defense on Computer Networks. Int. J. Cyber Situational Aware. 2(1): 69-84 (2017) - Alberto Bullo, Eliana Stavrou, Stavros Stavrou:
Transparent password policies: A case study of investigating end-user situational awareness. Int. J. Cyber Situational Aware. 2(1): 85-99 (2017) - Geoffrey B. Dobson, Timothy J. Shimeall, Kathleen M. Carley:
Towards Network Science Enhanced Cyber Situational Awareness. Int. J. Cyber Situational Aware. 2(1): 11-30 (2017) - Daniel Fraunholz, Daniel Krohmer, Simon Duque Antón, Hans Dieter Schotten:
YAAS - On the Attribution of Honeypot Data. Int. J. Cyber Situational Aware. 2(1): 31-48 (2017) - Gavin Hales, R. Ian Ferguson, Jacqueline Archibald:
Insight: An Application of Information Visualisation Techniques to Digital Forensics Investigations. Int. J. Cyber Situational Aware. 2(1): 100-118 (2017) - Jasmina Maric:
The Valleys of Death in Refugee Crisis. Int. J. Cyber Situational Aware. 2(1): 49-68 (2017) - 2016
- Abdulrahman Alruban, Nathan L. Clarke, Fudong Li, Steven Furnell:
Leveraging Biometrics for Insider Misuse Identification. Int. J. Cyber Situational Aware. 1(1): 130-151 (2016) - Xavier J. A. Bellekens, Kamila Nieradzinska, Alexandra Bellekens, Preetila Seeam, Andrew W. Hamilton, Amar Seeam:
A Study on Situational Awareness Security and Privacy of Wearable Health Monitoring Devices. Int. J. Cyber Situational Aware. 1(1): 74-96 (2016) - Ryan Heartfield, George Loukas:
Predicting the performance of users as human sensors of security threats in social media. Int. J. Cyber Situational Aware. 1(1): 110-129 (2016) - BooJoong Kang, Suleiman Y. Yerima, Sakir Sezer, Kieran McLaughlin:
N-gram Opcode Analysis for Android Malware Detection. Int. J. Cyber Situational Aware. 1(1): 231-255 (2016)
skipping 7 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-02 19:23 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint