Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

12 results
Keywords : Cybersecurity
Image document

A Template-Based Method for the Generation of Attack Trees

Jeremy Bryans , Lin Shen Liew , Hoang Nga Nguyen , Giedre Sabaliauskaite , Siraj Shaikh , et al.
13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.155-165, ⟨10.1007/978-3-030-41702-4_10⟩
Conference papers hal-03173899v1
Image document

Cybersecurity Readiness of E-tail Organisations: A Technical Perspective

Mahmood Hussain Shah , Raza Muhammad , Nisreen Ameen
19th Conference on e-Business, e-Services and e-Society (I3E), Apr 2020, Skukuza, South Africa. pp.153-160, ⟨10.1007/978-3-030-44999-5_13⟩
Conference papers hal-03222876v1
Image document

Social Engineering and Organisational Dependencies in Phishing Attacks

Ronnie Taib , Kun Yu , Shlomo Berkovsky , Mark Wiggins , Piers Bayl-Smith
17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.564-584, ⟨10.1007/978-3-030-29381-9_35⟩
Conference papers hal-02544575v1
Image document

Situational Awareness: Detecting Critical Dependencies and Devices in a Network

Martin Laštovička , Pavel Čeleda
11th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jul 2017, Zurich, Switzerland. pp.173-178, ⟨10.1007/978-3-319-60774-0_17⟩
Conference papers hal-01806054v1
Image document

Identifying Security Risks of Digital Transformation - An Engineering Perspective

Anh Nguyen Duc , Aparna Chirumamilla
18th Conference on e-Business, e-Services and e-Society (I3E), Sep 2019, Trondheim, Norway. pp.677-688, ⟨10.1007/978-3-030-29374-1_55⟩
Conference papers hal-02510104v1
Image document

Cybersecurity Behaviour: A Conceptual Taxonomy

Thulani Mashiane , Elmarie Kritzinger
12th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2018, Brussels, Belgium. pp.147-156, ⟨10.1007/978-3-030-20074-9_11⟩
Conference papers hal-02294613v1
Image document

CompactFlow: A Hybrid Binary Format for Network Flow Data

Michal Piskozub , Riccardo Spolaor , Ivan Martinovic
13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.185-201, ⟨10.1007/978-3-030-41702-4_12⟩
Conference papers hal-03173900v1
Image document

Towards a C2I Platform for Combating the Cyber-Threat

Paul Kearney
6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.17-19, ⟨10.1007/978-3-642-30955-7_2⟩
Conference papers hal-01534309v1
Image document

MTLAT: A Multi-Task Learning Framework Based on Adversarial Training for Chinese Cybersecurity NER

Yaopeng Han , Zhigang Lu , Bo Jiang , Yuling Liu , Chen Zhang , et al.
17th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2020, Zhengzhou, China. pp.43-54, ⟨10.1007/978-3-030-79478-1_4⟩
Conference papers hal-03768765v1
Image document

Enabling Next-Generation Cyber Ranges with Mobile Security Components

Enrico Russo , Luca Verderame , Alessio Merlo
32th IFIP International Conference on Testing Software and Systems (ICTSS), Dec 2020, Naples, Italy. pp.150-165, ⟨10.1007/978-3-030-64881-7_10⟩
Conference papers hal-03239813v1
Image document

Designing an Intelligent User Interface for Preventing Phishing Attacks

Joseph Aneke , Carmelo Ardito , Giuseppe Desolda
17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.97-106, ⟨10.1007/978-3-030-46540-7_10⟩
Conference papers hal-03188818v1
Image document

Mouse Behavior as an Index of Phishing Awareness

Kun Yu , Ronnie Taib , Marcus A. Butavicius , Kathryn Parsons , Fang Chen
17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.539-548, ⟨10.1007/978-3-030-29381-9_33⟩
Conference papers hal-02544578v1