A decentralized honeypot for IoT Protocols based on Android devices | 0 | 0.34 | 2022 |
Utilizing Convolutional Neural Networks and Word Embeddings for Early-Stage Recognition of Persuasion in Chat-Based Social Engineering Attacks | 0 | 0.34 | 2022 |
A Security-Aware Framework for Designing Industrial Engineering Processes | 0 | 0.34 | 2021 |
Negative MWOM and value co-destruction during destination crises | 0 | 0.34 | 2020 |
Leaking supervisory controls and data acquisition commands over unpadded TCP/IP encryption through differential packet size analysis. | 0 | 0.34 | 2020 |
Smart Airport Cybersecurity: Threat Mitigation and Cyber Resilience Controls. | 2 | 0.37 | 2019 |
Analyzing Congestion Interdependencies Of Ports And Container Ship Routes In The Maritime Network Infrastructure | 0 | 0.34 | 2018 |
Profiling online social networks users: an omniopticon tool. | 0 | 0.34 | 2017 |
Protecting the Transportation Sector from the Negative Impacts of Climate Change. | 0 | 0.34 | 2017 |
Human-Centered Specification Exemplars for Critical Infrastructure Environments. | 0 | 0.34 | 2016 |
Critical Infrastructure Protection: A Holistic Methodology for Greece. | 0 | 0.34 | 2016 |
Cyberoperations And International Humanitarian Law A Review Of Obstacles In Applying International Law Rules In Cyber Warfare | 0 | 0.34 | 2016 |
Access Control Issues In Utilizing Fog Computing For Transport Infrastructure | 5 | 0.47 | 2015 |
Security Busters: Web browser security vs. rogue sites | 5 | 0.47 | 2015 |
Hacking and Penetration Testing with Low Power Devices | 0 | 0.34 | 2015 |
Automated exploit detection using path profiling: The disposition should matter, not the position | 1 | 0.35 | 2015 |
"Water, Water, Every Where": Nuances For A Water Industry Critical Infrastructure Specification Exemplar | 0 | 0.34 | 2015 |
Using Logical Error Detection in Software Controlling Remote-Terminal Units to Predict Critical Information Infrastructures Failures | 1 | 0.35 | 2015 |
Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques, Sudhanshu Chauhan, Nutan Kumar Panda, Elsevier Publications, USA (2015). | 0 | 0.34 | 2015 |
Execution Path Classification for Vulnerability Analysis and Detection. | 0 | 0.34 | 2015 |
A Bug Hunter's Diary. | 1 | 0.34 | 2014 |
Insider Threat: Enhancing BPM through Social Media | 5 | 0.43 | 2014 |
A game-theoretic analysis of preventing spam over Internet Telephony via audio CAPTCHA-based authentication | 5 | 0.41 | 2014 |
Browser Blacklists: The Utopia of Phishing Protection. | 3 | 0.41 | 2014 |
Automated Detection of Logical Errors in Programs. | 4 | 0.41 | 2014 |
Cryptology and Network Security - 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings | 0 | 0.34 | 2014 |
Business Process Modeling for Insider Threat Monitoring and Handling. | 3 | 0.40 | 2014 |
The Big Four - What We Did Wrong in Advanced Persistent Threat Detection? | 43 | 1.95 | 2013 |
Assessing N-Order Dependencies Between Critical Infrastructures | 15 | 0.81 | 2013 |
Assessing Privacy Risks In Android: A User-Centric Approach | 14 | 0.77 | 2013 |
Evaluating the Manageability of Web Browsers Controls. | 6 | 0.51 | 2013 |
Delegate the smartphone user? Security awareness in smartphone platforms | 70 | 2.46 | 2013 |
Hacking VoIP | 0 | 0.34 | 2013 |
Proactive insider threat detection through social media: the YouTube case | 9 | 0.48 | 2013 |
On Business Logic Vulnerabilities Hunting: The APP_LogGIC Framework. | 6 | 0.47 | 2013 |
A Practical Steganographic Approach for Matroska Based High Quality Video Files | 0 | 0.34 | 2013 |
Insiders Trapped in the Mirror Reveal Themselves in Social Media. | 10 | 0.61 | 2013 |
Youtube User and Usage Profiling: Stories of Political Horror and Security Success. | 0 | 0.34 | 2013 |
In Cloud We Trust: Risk-Assessment-as-a-Service. | 6 | 0.55 | 2013 |
A Qualitative Metrics Vector for the Awareness of Smartphone Security Users. | 17 | 0.82 | 2013 |
Metasploit the Penetration Tester's Guide | 1 | 0.34 | 2013 |
Trusted Computing vs. Advanced Persistent Threats: Can a Defender Win This Game? | 17 | 0.87 | 2013 |
Privacy Risk, Security, Accountability in the Cloud | 7 | 0.46 | 2013 |
Smartphone sensor data as digital evidence | 22 | 1.23 | 2013 |
Cybercrime in the Digital Economy - Editorial. | 1 | 0.34 | 2013 |
Cascading Effects Of Common-Cause Failures In Critical Infrastructures | 8 | 0.55 | 2013 |
A Risk Assessment Method For Smartphones | 25 | 1.07 | 2012 |
Economic assessment of externalities for interactive audio media anti-SPIT protection of internet services | 0 | 0.34 | 2012 |
Hunting application-level logical errors | 8 | 0.53 | 2012 |
Formal analysis for robust anti-SPIT protection using model checking | 5 | 0.47 | 2012 |