Your selections:
Security challenges when space merges with cyberspace
- Varadharajan, Vijay, Suri, Neeraj
An awareness policy framework for cyber security social engineering threats
Utilizing QR codes to verify the visual fidelity of image datasets for machine learning
- Chow, Yang-Wai, Susilo, Willy, Wang, Jianfeng, Buckland, Richard, Baek, Joonsang, Kim, Jongkil, Li, Nan
A survey on machine learning techniques for cyber security in the last decade
- Shaukat, Kamran, Luo, Suhuai, Varadharajan, Vijay, Hameed, Ibrahim A., Xu, Min
An advanced taxonomy for social engineering attacks
- Aldawood, Hussain, Skinner, Geoffrey
Does awareness of social engineering make employees more secure?
- Aldawood, Hussain, Alashoor, Tawfiq, Skinner, Geoffrey
- Aldawood, Hussain, Skinner, Geoffrey
A framework for cyber-topology attacks: line-switching and new attack scenarios
- Liang, Gaoqi, Weller, Steven R., Zhao, Junhua, Luo, Fengji, Dong, Zhao Y.
A literature review on effects of time pressure on decision making in a cyber security context
- Skinner, Geoff, Parrey, Brandon
A taxonomy for social engineering attacks via personal devices
- Aldawood, Hussain, Skinner, Geoffrey
An academic review of current industrial and commercial cyber security social engineering solutions
- Aldawood, Hussain, Skinner, Geoffrey
Protecting the Visual Fidelity of Machine Learning Datasets Using QR Codes
- Chow, Yang-Wai, Susilo, Willy, Wang, Jianfeng, Buckland, Richard, Baek, Joonsang, Kim, Jongkil, Li, Nan
- Skinner, Geoff, Fasihuddin, Heba Adel
False data injection attacks against modern power systems: modelling and countermeasures
Cyber security for younger demographics: a graphic based authentication and authorisation framework
Quantitative vulnerability assessment of cyber security for distribution automation systems
- Ye, Xiaming, Zhao, Junhua, Zhang, Yan, Wen, Fushan
Are you sure you would like to clear your session, including search history and login status?