Foundations and Practice of Security - 13th International Symposium, FPS 2020, Montreal, QC, Canada, December 1-3, 2020, Revised Selected Papers | 0 | 0.34 | 2021 |
Risk Assessment Of Cyber-Attacks On Telemetry-Enabled Cardiac Implantable Electronic Devices (Cied) | 0 | 0.34 | 2021 |
Reinforcement Learning Based Penetration Testing of a Microgrid Control Algorithm | 0 | 0.34 | 2021 |
Spartan Networks: Self-Feature-Squeezing Neural Networks for increased robustness in adversarial settings | 0 | 0.34 | 2020 |
Analyzing the Resiliency of Microgrid Control Algorithms Against Malicious Input | 0 | 0.34 | 2020 |
Risk Assessment of Cyber Attacks on Telemetry Enabled Cardiac Implantable Electronic Devices (CIED). | 0 | 0.34 | 2019 |
Spartan Networks: Self-Feature-Squeezing Neural Networks for increased robustness in adversarial settings. | 0 | 0.34 | 2018 |
A Cyber-Physical Testbed for Measuring the Impacts of Cyber Attacks on Urban Road Networks. | 0 | 0.34 | 2018 |
Fast selection of the sea clutter preferential distribution with neural networks. | 0 | 0.34 | 2018 |
Survey of publicly available reports on advanced persistent threat actors. | 7 | 0.55 | 2018 |
Spartan Networks: Self-Feature-Squeezing Networks for Increased Robustness in Adversarial Settings | 1 | 0.34 | 2018 |
Technological and Human Factors of Malware Attacks: A Computer Security Clinical Trial Approach. | 1 | 0.36 | 2018 |
POISED: Spotting Twitter Spam Off the Beaten Paths. | 7 | 0.45 | 2017 |
An Empirical Analysis Of Risk Aversion In Malware Infections | 0 | 0.34 | 2017 |
Age and gender as independent risk factors for malware victimisation. | 1 | 0.36 | 2017 |
A Modbus Command And Control Channel | 4 | 0.51 | 2016 |
A Practical flow white list approach for SCADA systems. | 0 | 0.34 | 2016 |
Improved Shape Parameter Estimation In Pareto Distributed Clutter With Neural Networks | 0 | 0.34 | 2016 |
Providing SCADA Network Data Sets for Intrusion Detection Research. | 5 | 0.44 | 2016 |
Improved Shape Parameter Estimation In K Clutter With Neural Networks And Deep Learning | 0 | 0.34 | 2016 |
Follow the traffic: Stopping click fraud by disrupting the value chain. | 0 | 0.34 | 2016 |
CoDisasm: Medium Scale Concatic Disassembly of Self-Modifying Binaries with Overlapping Instructions | 17 | 0.62 | 2015 |
Measuring the health of antivirus ecosystems. | 0 | 0.34 | 2015 |
Modelling physical impact of cyber attacks | 0 | 0.34 | 2014 |
Computer security clinical trials: lessons learned from a 4-month pilot study | 1 | 0.38 | 2014 |
Risk prediction of malware victimization based on user behavior | 0 | 0.34 | 2014 |
Scalable Security Verification of Software at Compile Time | 0 | 0.34 | 2014 |
Not all SCADA is Equal: Impact of Control Models on ICS Threat Landscape | 1 | 0.75 | 2014 |
A comprehensive study of queue management as a DoS counter-measure | 4 | 0.44 | 2013 |
Confidentiality-Preserving query execution of fragmented outsourced data | 3 | 0.39 | 2013 |
A clinical study of risk factors related to malware infections | 26 | 1.33 | 2013 |
An isolated virtual cluster for SCADA network security research | 7 | 0.79 | 2013 |
Next-Generation DoS at the Higher Layers: A Study of SMTP Flooding. | 0 | 0.34 | 2013 |
Semantic-Based Context-Aware Alert Fusion For Distributed Intrusion Detection Systems | 5 | 0.44 | 2013 |
ONTIDS: A Highly Flexible Context-Aware and Ontology-Based Alert Correlation Framework | 10 | 0.48 | 2013 |
Preserving Multi-relational Outsourced Databases Confidentiality using Fragmentation and Encryption. | 0 | 0.34 | 2013 |
Ethical and secure data sharing across borders | 1 | 0.38 | 2012 |
Aligot: cryptographic function identification in obfuscated binary programs | 25 | 1.17 | 2012 |
Methodology for a field study of anti-malware software | 3 | 0.48 | 2012 |
Finite element method based design and optimisation methodology for piezoelectric ultrasonic motors | 0 | 0.34 | 2010 |
Isolated virtualised clusters: testbeds for high-risk security experimentation and training | 7 | 0.60 | 2010 |
The case for in-the-lab botnet experimentation: creating and taking down a 3000-node botnet | 9 | 0.72 | 2010 |
Evaluating security products with clinical trials | 5 | 0.90 | 2009 |
Optimising sybil attacks against P2P-based botnets | 6 | 0.48 | 2009 |
Alambic: a privacy-preserving recommender system for electronic commerce | 16 | 0.75 | 2008 |
Sybil attacks as a mitigation strategy against the Storm botnet | 24 | 1.18 | 2008 |
Structured Peer-to-Peer Overlay Networks: Ideal Botnets Command and Control Infrastructures? | 16 | 1.64 | 2008 |
Optimising Networks Against Malware | 2 | 0.43 | 2007 |
Queue management as a DoS counter-measure? | 7 | 0.57 | 2007 |
Optimising malware | 1 | 0.41 | 2006 |