Filter your results
- 12
- 12
- 12
- 1
- 5
- 4
- 1
- 1
- 12
- 1
- 1
- 1
- 1
- 1
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
A Template-Based Method for the Generation of Attack Trees13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.155-165, ⟨10.1007/978-3-030-41702-4_10⟩
Conference papers
hal-03173899v1
|
||
|
Cybersecurity Readiness of E-tail Organisations: A Technical Perspective19th Conference on e-Business, e-Services and e-Society (I3E), Apr 2020, Skukuza, South Africa. pp.153-160, ⟨10.1007/978-3-030-44999-5_13⟩
Conference papers
hal-03222876v1
|
||
|
Social Engineering and Organisational Dependencies in Phishing Attacks17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.564-584, ⟨10.1007/978-3-030-29381-9_35⟩
Conference papers
hal-02544575v1
|
||
|
Situational Awareness: Detecting Critical Dependencies and Devices in a Network11th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jul 2017, Zurich, Switzerland. pp.173-178, ⟨10.1007/978-3-319-60774-0_17⟩
Conference papers
hal-01806054v1
|
||
|
Identifying Security Risks of Digital Transformation - An Engineering Perspective18th Conference on e-Business, e-Services and e-Society (I3E), Sep 2019, Trondheim, Norway. pp.677-688, ⟨10.1007/978-3-030-29374-1_55⟩
Conference papers
hal-02510104v1
|
||
|
Cybersecurity Behaviour: A Conceptual Taxonomy12th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2018, Brussels, Belgium. pp.147-156, ⟨10.1007/978-3-030-20074-9_11⟩
Conference papers
hal-02294613v1
|
||
|
CompactFlow: A Hybrid Binary Format for Network Flow Data13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.185-201, ⟨10.1007/978-3-030-41702-4_12⟩
Conference papers
hal-03173900v1
|
||
|
Towards a C2I Platform for Combating the Cyber-Threat6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.17-19, ⟨10.1007/978-3-642-30955-7_2⟩
Conference papers
hal-01534309v1
|
||
|
MTLAT: A Multi-Task Learning Framework Based on Adversarial Training for Chinese Cybersecurity NER17th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2020, Zhengzhou, China. pp.43-54, ⟨10.1007/978-3-030-79478-1_4⟩
Conference papers
hal-03768765v1
|
||
|
Enabling Next-Generation Cyber Ranges with Mobile Security Components32th IFIP International Conference on Testing Software and Systems (ICTSS), Dec 2020, Naples, Italy. pp.150-165, ⟨10.1007/978-3-030-64881-7_10⟩
Conference papers
hal-03239813v1
|
||
|
Designing an Intelligent User Interface for Preventing Phishing Attacks17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.97-106, ⟨10.1007/978-3-030-46540-7_10⟩
Conference papers
hal-03188818v1
|
||
|
Mouse Behavior as an Index of Phishing Awareness17th IFIP Conference on Human-Computer Interaction (INTERACT), Sep 2019, Paphos, Cyprus. pp.539-548, ⟨10.1007/978-3-030-29381-9_33⟩
Conference papers
hal-02544578v1
|