Your selections:
Security challenges when space merges with cyberspace
- Varadharajan, Vijay, Suri, Neeraj
Pattern recognition and machine learning techniques for cyber security
An awareness policy framework for cyber security social engineering threats
Utilizing QR codes to verify the visual fidelity of image datasets for machine learning
- Chow, Yang-Wai, Susilo, Willy, Wang, Jianfeng, Buckland, Richard, Baek, Joonsang, Kim, Jongkil, Li, Nan
A survey on machine learning techniques for cyber security in the last decade
- Shaukat, Kamran, Luo, Suhuai, Varadharajan, Vijay, Hameed, Ibrahim A., Xu, Min
An advanced taxonomy for social engineering attacks
- Aldawood, Hussain, Skinner, Geoffrey
Does awareness of social engineering make employees more secure?
- Aldawood, Hussain, Alashoor, Tawfiq, Skinner, Geoffrey
- Aldawood, Hussain, Skinner, Geoffrey
A framework for cyber-topology attacks: line-switching and new attack scenarios
- Liang, Gaoqi, Weller, Steven R., Zhao, Junhua, Luo, Fengji, Dong, Zhao Y.
A literature review on effects of time pressure on decision making in a cyber security context
- Skinner, Geoff, Parrey, Brandon
A taxonomy for social engineering attacks via personal devices
- Aldawood, Hussain, Skinner, Geoffrey
An academic review of current industrial and commercial cyber security social engineering solutions
- Aldawood, Hussain, Skinner, Geoffrey
Protecting the Visual Fidelity of Machine Learning Datasets Using QR Codes
- Chow, Yang-Wai, Susilo, Willy, Wang, Jianfeng, Buckland, Richard, Baek, Joonsang, Kim, Jongkil, Li, Nan
- Skinner, Geoff, Fasihuddin, Heba Adel
False data injection attacks against modern power systems: modelling and countermeasures
Cyber security for younger demographics: a graphic based authentication and authorisation framework
Quantitative vulnerability assessment of cyber security for distribution automation systems
- Ye, Xiaming, Zhao, Junhua, Zhang, Yan, Wen, Fushan
Are you sure you would like to clear your session, including search history and login status?