13925537
1
vancouver
50
date
desc
year
67
https://cybersecurity.bournemouth.ac.uk/wp-content/plugins/zotpress/
%7B%22status%22%3A%22success%22%2C%22updateneeded%22%3Afalse%2C%22instance%22%3Afalse%2C%22meta%22%3A%7B%22request_last%22%3A300%2C%22request_next%22%3A50%2C%22used_cache%22%3Atrue%7D%2C%22data%22%3A%5B%7B%22key%22%3A%22HI8VJQIP%22%2C%22library%22%3A%7B%22id%22%3A13925537%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Henriksen-Bulmer%20et%20al.%22%2C%22parsedDate%22%3A%222023-11-30%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%201.35%3B%20%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%20style%3D%5C%22clear%3A%20left%3B%20%5C%22%3E%5Cn%20%20%20%20%3Cdiv%20class%3D%5C%22csl-left-margin%5C%22%20style%3D%5C%22float%3A%20left%3B%20padding-right%3A%200.5em%3B%20text-align%3A%20right%3B%20width%3A%201em%3B%5C%22%3E1.%3C%5C%2Fdiv%3E%3Cdiv%20class%3D%5C%22csl-right-inline%5C%22%20style%3D%5C%22margin%3A%200%20.4em%200%201.5em%3B%5C%22%3EHenriksen-Bulmer%20J%2C%20Rosenorn-Lanng%20E%2C%20Corbin-Clarke%20S%2C%20Ware%20S%2C%20Melacca%20D%2C%20Fenge%20LA.%20Using%20game-based%20learning%20to%20teach%20young%20people%20about%20privacy%20and%20online%20safety.%20Interactive%20Learning%20Environments.%202023%20Nov%2030%3B1%26%23x2013%3B21.%3C%5C%2Fdiv%3E%5Cn%20%20%20%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Using%20game-based%20learning%20to%20teach%20young%20people%20about%20privacy%20and%20online%20safety%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Jane%22%2C%22lastName%22%3A%22Henriksen-Bulmer%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Emily%22%2C%22lastName%22%3A%22Rosenorn-Lanng%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Stevie%22%2C%22lastName%22%3A%22Corbin-Clarke%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Samuel%22%2C%22lastName%22%3A%22Ware%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Davide%22%2C%22lastName%22%3A%22Melacca%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Lee-Ann%22%2C%22lastName%22%3A%22Fenge%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222023-11-30%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%221049-4820%2C%201744-5191%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%5D%2C%22dateModified%22%3A%222024-03-23T01%3A21%3A21Z%22%7D%7D%2C%7B%22key%22%3A%229PUQGTWX%22%2C%22library%22%3A%7B%22id%22%3A13925537%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Lockett%20et%20al.%22%2C%22parsedDate%22%3A%222023-09-28%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%201.35%3B%20%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%20style%3D%5C%22clear%3A%20left%3B%20%5C%22%3E%5Cn%20%20%20%20%3Cdiv%20class%3D%5C%22csl-left-margin%5C%22%20style%3D%5C%22float%3A%20left%3B%20padding-right%3A%200.5em%3B%20text-align%3A%20right%3B%20width%3A%201em%3B%5C%22%3E1.%3C%5C%2Fdiv%3E%3Cdiv%20class%3D%5C%22csl-right-inline%5C%22%20style%3D%5C%22margin%3A%200%20.4em%200%201.5em%3B%5C%22%3ELockett%20A%2C%20Chalkias%20I%2C%20Yucel%20C%2C%20Henriksen-Bulmer%20J%2C%20Katos%20V.%20Investigating%20IPTV%20Malware%20in%20the%20Wild.%20Future%20Internet.%202023%20Sep%2028%3B15%2810%29%3A325.%3C%5C%2Fdiv%3E%5Cn%20%20%20%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Investigating%20IPTV%20Malware%20in%20the%20Wild%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Adam%22%2C%22lastName%22%3A%22Lockett%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Ioannis%22%2C%22lastName%22%3A%22Chalkias%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Cagatay%22%2C%22lastName%22%3A%22Yucel%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Jane%22%2C%22lastName%22%3A%22Henriksen-Bulmer%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Vasilis%22%2C%22lastName%22%3A%22Katos%22%7D%5D%2C%22abstractNote%22%3A%22Technologies%20providing%20copyright-infringing%20IPTV%20content%20are%20commonly%20used%20as%20an%20illegal%20alternative%20to%20legal%20IPTV%20subscriptions%20and%20services%2C%20as%20they%20usually%20have%20lower%20monetary%20costs%20and%20can%20be%20more%20convenient%20for%20users%20who%20follow%20content%20from%20different%20sources.%20These%20infringing%20IPTV%20technologies%20may%20include%20websites%2C%20software%2C%20software%20add-ons%2C%20and%20physical%20set-top%20boxes.%20Due%20to%20the%20free%20or%20low%20cost%20of%20illegal%20IPTV%20technologies%2C%20illicit%20IPTV%20content%20providers%20will%20often%20resort%20to%20intrusive%20advertising%2C%20scams%2C%20and%20the%20distribution%20of%20malware%20to%20increase%20their%20revenue.%20We%20developed%20an%20automated%20solution%20for%20collecting%20and%20analysing%20malware%20from%20illegal%20IPTV%20technologies%20and%20used%20it%20to%20analyse%20a%20sample%20of%20illicit%20IPTV%20websites%2C%20application%20%28app%29%20stores%2C%20and%20software.%20Our%20results%20show%20that%20our%20IPTV%20Technologies%20Malware%20Analysis%20Framework%20%28IITMAF%29%20classified%2032%20of%20the%2060%20sample%20URLs%20tested%20as%20malicious%20compared%20to%20running%20the%20same%20test%20using%20publicly%20available%20online%20antivirus%20solutions%2C%20which%20only%20detected%2023%20of%20the%2060%20sample%20URLs%20as%20malicious.%20Moreover%2C%20the%20IITMAF%20also%20detected%20malicious%20URLs%20and%20files%20from%2031%20of%20the%20sample%5Cu2019s%20websites%2C%20one%20of%20which%20had%20reported%20ransomware%20behaviour.%22%2C%22date%22%3A%222023-09-28%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.3390%5C%2Ffi15100325%22%2C%22ISSN%22%3A%221999-5903%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%5D%2C%22dateModified%22%3A%222024-03-23T01%3A04%3A24Z%22%7D%7D%2C%7B%22key%22%3A%22VQGNNAHA%22%2C%22library%22%3A%7B%22id%22%3A13925537%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Adams%20et%20al.%22%2C%22parsedDate%22%3A%222023%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%201.35%3B%20%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%20style%3D%5C%22clear%3A%20left%3B%20%5C%22%3E%5Cn%20%20%20%20%3Cdiv%20class%3D%5C%22csl-left-margin%5C%22%20style%3D%5C%22float%3A%20left%3B%20padding-right%3A%200.5em%3B%20text-align%3A%20right%3B%20width%3A%201em%3B%5C%22%3E1.%3C%5C%2Fdiv%3E%3Cdiv%20class%3D%5C%22csl-right-inline%5C%22%20style%3D%5C%22margin%3A%200%20.4em%200%201.5em%3B%5C%22%3EAdams%20C%2C%20Eslamnejad%20M%2C%20Khadka%20A%2C%20M%26%23x2019%3Bmanga%20A%2C%20Shaw%20H%2C%20Zhao%20Y.%20Auditing%20AI%20Systems%3A%20A%20Metadata%20Approach.%20In%3A%20Bramer%20M%2C%20Stahl%20F%2C%20editors.%20Artificial%20Intelligence%20XL.%20Cham%3A%20Springer%20Nature%20Switzerland%3B%202023.%20p.%20241%26%23x2013%3B6.%3C%5C%2Fdiv%3E%5Cn%20%20%20%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22bookSection%22%2C%22title%22%3A%22Auditing%20AI%20Systems%3A%20A%20Metadata%20Approach%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Max%22%2C%22lastName%22%3A%22Bramer%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Frederic%22%2C%22lastName%22%3A%22Stahl%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Carl%22%2C%22lastName%22%3A%22Adams%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Mohsen%22%2C%22lastName%22%3A%22Eslamnejad%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Anita%22%2C%22lastName%22%3A%22Khadka%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Andrew%22%2C%22lastName%22%3A%22M%5Cu2019manga%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Heather%22%2C%22lastName%22%3A%22Shaw%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Yuchen%22%2C%22lastName%22%3A%22Zhao%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22bookTitle%22%3A%22Artificial%20Intelligence%20XL%22%2C%22date%22%3A%222023%22%2C%22language%22%3A%22en%22%2C%22ISBN%22%3A%229783031479939%209783031479946%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%5D%2C%22dateModified%22%3A%222024-03-23T23%3A42%3A49Z%22%7D%7D%2C%7B%22key%22%3A%22XUDL7HCG%22%2C%22library%22%3A%7B%22id%22%3A13925537%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Brady%20and%20M%27manga%22%2C%22parsedDate%22%3A%222022-10%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%201.35%3B%20%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%20style%3D%5C%22clear%3A%20left%3B%20%5C%22%3E%5Cn%20%20%20%20%3Cdiv%20class%3D%5C%22csl-left-margin%5C%22%20style%3D%5C%22float%3A%20left%3B%20padding-right%3A%200.5em%3B%20text-align%3A%20right%3B%20width%3A%201em%3B%5C%22%3E1.%3C%5C%2Fdiv%3E%3Cdiv%20class%3D%5C%22csl-right-inline%5C%22%20style%3D%5C%22margin%3A%200%20.4em%200%201.5em%3B%5C%22%3EBrady%20C%2C%20M%26%23x2019%3Bmanga%20A.%20Gamification%20of%20Cyber%20Security%20Training%20-%20EnsureSecure.%20In%3A%202022%20IEEE%20International%20Conference%20on%20e-Business%20Engineering%20%28ICEBE%29.%20Bournemouth%2C%20United%20Kingdom%3A%20IEEE%3B%202022.%20p.%207%26%23x2013%3B12.%3C%5C%2Fdiv%3E%5Cn%20%20%20%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22conferencePaper%22%2C%22title%22%3A%22Gamification%20of%20Cyber%20Security%20Training%20-%20EnsureSecure%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Callum%22%2C%22lastName%22%3A%22Brady%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Andrew%22%2C%22lastName%22%3A%22M%27manga%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222022-10%22%2C%22proceedingsTitle%22%3A%222022%20IEEE%20International%20Conference%20on%20e-Business%20Engineering%20%28ICEBE%29%22%2C%22conferenceName%22%3A%22%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%2210.1109%5C%2FICEBE55470.2022.00010%22%2C%22ISBN%22%3A%22978-1-66549-244-7%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YD8A68X5%22%5D%2C%22dateModified%22%3A%222024-03-23T01%3A03%3A35Z%22%7D%7D%2C%7B%22key%22%3A%229ZA6P957%22%2C%22library%22%3A%7B%22id%22%3A13925537%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Henriksen-Bulmer%20et%20al.%22%2C%22parsedDate%22%3A%222022-10%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%201.35%3B%20%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%20style%3D%5C%22clear%3A%20left%3B%20%5C%22%3E%5Cn%20%20%20%20%3Cdiv%20class%3D%5C%22csl-left-margin%5C%22%20style%3D%5C%22float%3A%20left%3B%20padding-right%3A%200.5em%3B%20text-align%3A%20right%3B%20width%3A%201em%3B%5C%22%3E1.%3C%5C%2Fdiv%3E%3Cdiv%20class%3D%5C%22csl-right-inline%5C%22%20style%3D%5C%22margin%3A%200%20.4em%200%201.5em%3B%5C%22%3EHenriksen-Bulmer%20J%2C%20Yucel%20C%2C%20Faily%20S%2C%20Chalkias%20I.%20Privacy%20Goals%20for%20the%20Data%20Lifecycle.%20Future%20Internet.%202022%20Oct%3B14%2811%29%3A315.%3C%5C%2Fdiv%3E%5Cn%20%20%20%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Privacy%20Goals%20for%20the%20Data%20Lifecycle%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Jane%22%2C%22lastName%22%3A%22Henriksen-Bulmer%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Cagatay%22%2C%22lastName%22%3A%22Yucel%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Shamal%22%2C%22lastName%22%3A%22Faily%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Ioannis%22%2C%22lastName%22%3A%22Chalkias%22%7D%5D%2C%22abstractNote%22%3A%22The%20introduction%20of%20Data%20Protection%20by%20Default%20and%20Design%20%28DPbDD%29%20brought%20in%20as%20part%20of%20the%20General%20Data%20Protection%20Regulation%20%28GDPR%29%20in%202018%2C%20has%20necessitated%20that%20businesses%20review%20how%20best%20to%20incorporate%20privacy%20into%20their%20processes%20in%20a%20transparent%20manner%2C%20so%20as%20to%20build%20trust%20and%20improve%20decisions%20around%20privacy%20best%20practice.%20To%20address%20this%20issue%2C%20this%20paper%20presents%20a%207-stage%20data%20lifecycle%2C%20supported%20by%20nine%20privacy%20goals%20that%20together%2C%20will%20help%20practitioners%20manage%20data%20holdings%20throughout%20data%20lifecycle.%20The%20resulting%20data%20lifecycle%20%287-DL%29%20was%20created%20as%20part%20of%20the%20Ideal-Cities%20project%2C%20a%20Horizon-2020%20Smart-city%20initiative%2C%20that%20seeks%20to%20facilitate%20data%20re-use%20and%5C%2For%20repurposed.%20We%20evaluate%207-DL%20through%20peer%20review%20and%20an%20exemplar%20worked%20example%20that%20applies%20the%20data%20lifecycle%20to%20a%20real-time%20life%20logging%20fire%20incident%20scenario%2C%20one%20of%20the%20Ideal-Cities%20use%20cases%20to%20demonstrate%20the%20applicability%20of%20the%20framework.%22%2C%22date%22%3A%222022-10%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.3390%5C%2Ffi14110315%22%2C%22ISSN%22%3A%221999-5903%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YD8A68X5%22%5D%2C%22dateModified%22%3A%222024-03-23T01%3A03%3A13Z%22%7D%7D%2C%7B%22key%22%3A%22Z95DHX32%22%2C%22library%22%3A%7B%22id%22%3A13925537%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Sallal%20et%20al.%22%2C%22parsedDate%22%3A%222022-09%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%201.35%3B%20%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%20style%3D%5C%22clear%3A%20left%3B%20%5C%22%3E%5Cn%20%20%20%20%3Cdiv%20class%3D%5C%22csl-left-margin%5C%22%20style%3D%5C%22float%3A%20left%3B%20padding-right%3A%200.5em%3B%20text-align%3A%20right%3B%20width%3A%201em%3B%5C%22%3E1.%3C%5C%2Fdiv%3E%3Cdiv%20class%3D%5C%22csl-right-inline%5C%22%20style%3D%5C%22margin%3A%200%20.4em%200%201.5em%3B%5C%22%3ESallal%20M%2C%20de%20Fr%26%23xE9%3Bin%20R%2C%20Malik%20A%2C%20Aziz%20B.%20An%20empirical%20comparison%20of%20the%20security%20and%20performance%20characteristics%20of%20topology%20formation%20algorithms%20for%20Bitcoin%20networks.%20Array.%202022%20Sep%3B15%3A100221.%3C%5C%2Fdiv%3E%5Cn%20%20%20%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22An%20empirical%20comparison%20of%20the%20security%20and%20performance%20characteristics%20of%20topology%20formation%20algorithms%20for%20Bitcoin%20networks%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Muntadher%22%2C%22lastName%22%3A%22Sallal%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Ruair%5Cu00ed%22%2C%22lastName%22%3A%22de%20Fr%5Cu00e9in%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Ali%22%2C%22lastName%22%3A%22Malik%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Benjamin%22%2C%22lastName%22%3A%22Aziz%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222022-09%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%2225900056%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YD8A68X5%22%5D%2C%22dateModified%22%3A%222024-03-23T23%3A50%3A35Z%22%7D%7D%2C%7B%22key%22%3A%22CJW2CYJS%22%2C%22library%22%3A%7B%22id%22%3A13925537%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Sallal%20et%20al.%22%2C%22parsedDate%22%3A%222022%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%201.35%3B%20%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%20style%3D%5C%22clear%3A%20left%3B%20%5C%22%3E%5Cn%20%20%20%20%3Cdiv%20class%3D%5C%22csl-left-margin%5C%22%20style%3D%5C%22float%3A%20left%3B%20padding-right%3A%200.5em%3B%20text-align%3A%20right%3B%20width%3A%201em%3B%5C%22%3E1.%3C%5C%2Fdiv%3E%3Cdiv%20class%3D%5C%22csl-right-inline%5C%22%20style%3D%5C%22margin%3A%200%20.4em%200%201.5em%3B%5C%22%3ESallal%20M%2C%20Owenson%20G%2C%20Salman%20D%2C%20Adda%20M.%20Security%20and%20performance%20evaluation%20of%20master%20node%20protocol%20based%20reputation%20blockchain%20in%20the%20bitcoin%20network.%20Blockchain%3A%20Research%20and%20Applications.%202022%3B3%281%29%3A100048.%3C%5C%2Fdiv%3E%5Cn%20%20%20%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Security%20and%20performance%20evaluation%20of%20master%20node%20protocol%20based%20reputation%20blockchain%20in%20the%20bitcoin%20network%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Muntadher%22%2C%22lastName%22%3A%22Sallal%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Gareth%22%2C%22lastName%22%3A%22Owenson%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Dawood%22%2C%22lastName%22%3A%22Salman%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Mo%22%2C%22lastName%22%3A%22Adda%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222022%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%2220967209%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YD8A68X5%22%5D%2C%22dateModified%22%3A%222024-03-23T23%3A49%3A18Z%22%7D%7D%2C%7B%22key%22%3A%22QQAAXBVL%22%2C%22library%22%3A%7B%22id%22%3A13925537%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Katos%20et%20al.%22%2C%22parsedDate%22%3A%222022%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%201.35%3B%20%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%20style%3D%5C%22clear%3A%20left%3B%20%5C%22%3E%5Cn%20%20%20%20%3Cdiv%20class%3D%5C%22csl-left-margin%5C%22%20style%3D%5C%22float%3A%20left%3B%20padding-right%3A%200.5em%3B%20text-align%3A%20right%3B%20width%3A%201em%3B%5C%22%3E1.%3C%5C%2Fdiv%3E%3Cdiv%20class%3D%5C%22csl-right-inline%5C%22%20style%3D%5C%22margin%3A%200%20.4em%200%201.5em%3B%5C%22%3EKatos%20V%2C%20Ki-Aries%20D%2C%20Faily%20S%2C%20Genchev%20A%2C%20Bozhilova%20M%2C%20Stoianov%20N.%20Cybersecurity%20User%20Requirements%20Analysis%3A%20The%20ECHO%20Approach.%20In%3A%20Shkarlet%20S%2C%20Morozov%20A%2C%20Palagin%20A%2C%20Vinnikov%20D%2C%20Stoianov%20N%2C%20Zhelezniak%20M%2C%20et%20al.%2C%20editors.%20Mathematical%20Modeling%20and%20Simulation%20of%20Systems.%20Cham%3A%20Springer%20International%20Publishing%3B%202022.%20p.%20405%26%23x2013%3B21.%3C%5C%2Fdiv%3E%5Cn%20%20%20%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22bookSection%22%2C%22title%22%3A%22Cybersecurity%20User%20Requirements%20Analysis%3A%20The%20ECHO%20Approach%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Vasilis%22%2C%22lastName%22%3A%22Katos%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Duncan%22%2C%22lastName%22%3A%22Ki-Aries%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Shamal%22%2C%22lastName%22%3A%22Faily%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Angel%22%2C%22lastName%22%3A%22Genchev%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Maya%22%2C%22lastName%22%3A%22Bozhilova%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Nikolai%22%2C%22lastName%22%3A%22Stoianov%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Serhiy%22%2C%22lastName%22%3A%22Shkarlet%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Anatoliy%22%2C%22lastName%22%3A%22Morozov%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Alexander%22%2C%22lastName%22%3A%22Palagin%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Dmitri%22%2C%22lastName%22%3A%22Vinnikov%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Nikolai%22%2C%22lastName%22%3A%22Stoianov%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Mark%22%2C%22lastName%22%3A%22Zhelezniak%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Volodymyr%22%2C%22lastName%22%3A%22Kazymyr%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22bookTitle%22%3A%22Mathematical%20Modeling%20and%20Simulation%20of%20Systems%22%2C%22date%22%3A%222022%22%2C%22language%22%3A%22en%22%2C%22ISBN%22%3A%22978-3-030-89901-1%20978-3-030-89902-8%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YD8A68X5%22%5D%2C%22dateModified%22%3A%222024-03-23T23%3A44%3A35Z%22%7D%7D%2C%7B%22key%22%3A%22THJJVBR2%22%2C%22library%22%3A%7B%22id%22%3A13925537%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Zheng%20et%20al.%22%2C%22parsedDate%22%3A%222022%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%201.35%3B%20%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%20style%3D%5C%22clear%3A%20left%3B%20%5C%22%3E%5Cn%20%20%20%20%3Cdiv%20class%3D%5C%22csl-left-margin%5C%22%20style%3D%5C%22float%3A%20left%3B%20padding-right%3A%200.5em%3B%20text-align%3A%20right%3B%20width%3A%201em%3B%5C%22%3E1.%3C%5C%2Fdiv%3E%3Cdiv%20class%3D%5C%22csl-right-inline%5C%22%20style%3D%5C%22margin%3A%200%20.4em%200%201.5em%3B%5C%22%3EZheng%20G%2C%20Chai%20WK%2C%20Katos%20V.%20A%20dynamic%20spatial%26%23x2013%3Btemporal%20deep%20learning%20framework%20for%20traffic%20speed%20prediction%20on%20large-scale%20road%20networks.%20Expert%20Systems%20with%20Applications.%202022%3B195%3A116585.%3C%5C%2Fdiv%3E%5Cn%20%20%20%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22A%20dynamic%20spatial%5Cu2013temporal%20deep%20learning%20framework%20for%20traffic%20speed%20prediction%20on%20large-scale%20road%20networks%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Ge%22%2C%22lastName%22%3A%22Zheng%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Wei%20Koong%22%2C%22lastName%22%3A%22Chai%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Vasilis%22%2C%22lastName%22%3A%22Katos%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222022%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.1016%5C%2Fj.eswa.2022.116585%22%2C%22ISSN%22%3A%2209574174%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YD8A68X5%22%5D%2C%22dateModified%22%3A%222024-03-23T01%3A02%3A07Z%22%7D%7D%2C%7B%22key%22%3A%22KVW98ZXX%22%2C%22library%22%3A%7B%22id%22%3A13925537%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22McAlaney%22%2C%22parsedDate%22%3A%222022%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%201.35%3B%20%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%20style%3D%5C%22clear%3A%20left%3B%20%5C%22%3E%5Cn%20%20%20%20%3Cdiv%20class%3D%5C%22csl-left-margin%5C%22%20style%3D%5C%22float%3A%20left%3B%20padding-right%3A%200.5em%3B%20text-align%3A%20right%3B%20width%3A%201em%3B%5C%22%3E1.%3C%5C%2Fdiv%3E%3Cdiv%20class%3D%5C%22csl-right-inline%5C%22%20style%3D%5C%22margin%3A%200%20.4em%200%201.5em%3B%5C%22%3EMcAlaney%20J.%20Are%20you%20anonymous%3F%20Social-psychological%20processes%20of%20hacking%20groups.%20Cybersecurity%20and%20Cognitive%20Science.%20In%3A%20Cybersecurity%20and%20Cognitive%20Science.%20Academic%20Press%3B%202022.%3C%5C%2Fdiv%3E%5Cn%20%20%20%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22bookSection%22%2C%22title%22%3A%22Are%20you%20anonymous%3F%20Social-psychological%20processes%20of%20hacking%20groups.%20Cybersecurity%20and%20Cognitive%20Science%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22John%22%2C%22lastName%22%3A%22McAlaney%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22bookTitle%22%3A%22Cybersecurity%20and%20Cognitive%20Science%22%2C%22date%22%3A%222022%22%2C%22language%22%3A%22%22%2C%22ISBN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YD8A68X5%22%5D%2C%22dateModified%22%3A%222024-03-22T20%3A51%3A30Z%22%7D%7D%2C%7B%22key%22%3A%22YNIAHZ69%22%2C%22library%22%3A%7B%22id%22%3A13925537%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Deutrom%20et%20al.%22%2C%22parsedDate%22%3A%222022%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%201.35%3B%20%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%20style%3D%5C%22clear%3A%20left%3B%20%5C%22%3E%5Cn%20%20%20%20%3Cdiv%20class%3D%5C%22csl-left-margin%5C%22%20style%3D%5C%22float%3A%20left%3B%20padding-right%3A%200.5em%3B%20text-align%3A%20right%3B%20width%3A%201em%3B%5C%22%3E1.%3C%5C%2Fdiv%3E%3Cdiv%20class%3D%5C%22csl-right-inline%5C%22%20style%3D%5C%22margin%3A%200%20.4em%200%201.5em%3B%5C%22%3EDeutrom%20J%2C%20Katos%20V%2C%20Al-Mourad%20M%2C%20Ali%20R.%20The%20relationships%20between%20gender%2C%20life%20satisfaction%2C%20loneliness%20and%20problematic%20internet%20use%20during%20CoViD-19%3A%20does%20the%20lockdown%20matter%3F%20International%20journal%20of%20environmental%20research%20and%20public%20health.%202022%3B19%283%29%3A1325.%3C%5C%2Fdiv%3E%5Cn%20%20%20%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22The%20relationships%20between%20gender%2C%20life%20satisfaction%2C%20loneliness%20and%20problematic%20internet%20use%20during%20CoViD-19%3A%20does%20the%20lockdown%20matter%3F%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22J%22%2C%22lastName%22%3A%22Deutrom%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22V%22%2C%22lastName%22%3A%22Katos%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22M%22%2C%22lastName%22%3A%22Al-Mourad%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22R%22%2C%22lastName%22%3A%22Ali%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222022%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YD8A68X5%22%5D%2C%22dateModified%22%3A%222024-03-22T20%3A51%3A28Z%22%7D%7D%2C%7B%22key%22%3A%22BARE6BC8%22%2C%22library%22%3A%7B%22id%22%3A13925537%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Simou%20et%20al.%22%2C%22parsedDate%22%3A%222022%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%201.35%3B%20%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%20style%3D%5C%22clear%3A%20left%3B%20%5C%22%3E%5Cn%20%20%20%20%3Cdiv%20class%3D%5C%22csl-left-margin%5C%22%20style%3D%5C%22float%3A%20left%3B%20padding-right%3A%200.5em%3B%20text-align%3A%20right%3B%20width%3A%201em%3B%5C%22%3E1.%3C%5C%2Fdiv%3E%3Cdiv%20class%3D%5C%22csl-right-inline%5C%22%20style%3D%5C%22margin%3A%200%20.4em%200%201.5em%3B%5C%22%3ESimou%20S%2C%20Kalloniatis%20C%2C%20Gritzalis%20S%2C%20Katos%20V.%20Revised%20forensic%20framework%20validation%20and%20cloud%20forensic%20readiness.%20International%20Journal%20of%20Electronic%20Governance.%202022%3B14%281%26%23x2013%3B2%29%3A236%26%23x2013%3B63.%3C%5C%2Fdiv%3E%5Cn%20%20%20%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Revised%20forensic%20framework%20validation%20and%20cloud%20forensic%20readiness%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22S%22%2C%22lastName%22%3A%22Simou%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22C%22%2C%22lastName%22%3A%22Kalloniatis%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22S%22%2C%22lastName%22%3A%22Gritzalis%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22V%22%2C%22lastName%22%3A%22Katos%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222022%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YD8A68X5%22%5D%2C%22dateModified%22%3A%222024-03-22T20%3A51%3A30Z%22%7D%7D%2C%7B%22key%22%3A%22E2NBHTQ6%22%2C%22library%22%3A%7B%22id%22%3A13925537%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Turner%20and%20M%27manga%22%2C%22parsedDate%22%3A%222022%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%201.35%3B%20%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%20style%3D%5C%22clear%3A%20left%3B%20%5C%22%3E%5Cn%20%20%20%20%3Cdiv%20class%3D%5C%22csl-left-margin%5C%22%20style%3D%5C%22float%3A%20left%3B%20padding-right%3A%200.5em%3B%20text-align%3A%20right%3B%20width%3A%201em%3B%5C%22%3E1.%3C%5C%2Fdiv%3E%3Cdiv%20class%3D%5C%22csl-right-inline%5C%22%20style%3D%5C%22margin%3A%200%20.4em%200%201.5em%3B%5C%22%3ETurner%20R%2C%20M%26%23x2019%3Bmanga%20A.%20Requirements%20for%20a%20Platform%20that%20Improves%20the%20Number%20of%20Young%20Women%20Entering%20Cybersecurity.%20In%3A%2035th%20International%20BCS%20Human-Computer%20Interaction%20Conference.%202022.%3C%5C%2Fdiv%3E%5Cn%20%20%20%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22conferencePaper%22%2C%22title%22%3A%22Requirements%20for%20a%20Platform%20that%20Improves%20the%20Number%20of%20Young%20Women%20Entering%20Cybersecurity%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Rebecca%22%2C%22lastName%22%3A%22Turner%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Andrew%22%2C%22lastName%22%3A%22M%27manga%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222022%22%2C%22proceedingsTitle%22%3A%2235th%20International%20BCS%20Human-Computer%20Interaction%20Conference%22%2C%22conferenceName%22%3A%22%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISBN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YD8A68X5%22%5D%2C%22dateModified%22%3A%222024-03-22T20%3A51%3A28Z%22%7D%7D%2C%7B%22key%22%3A%22SNAVFACN%22%2C%22library%22%3A%7B%22id%22%3A13925537%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Jarvis%20et%20al.%22%2C%22parsedDate%22%3A%222021-09%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%201.35%3B%20%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%20style%3D%5C%22clear%3A%20left%3B%20%5C%22%3E%5Cn%20%20%20%20%3Cdiv%20class%3D%5C%22csl-left-margin%5C%22%20style%3D%5C%22float%3A%20left%3B%20padding-right%3A%200.5em%3B%20text-align%3A%20right%3B%20width%3A%201em%3B%5C%22%3E1.%3C%5C%2Fdiv%3E%3Cdiv%20class%3D%5C%22csl-right-inline%5C%22%20style%3D%5C%22margin%3A%200%20.4em%200%201.5em%3B%5C%22%3EJarvis%20PD%2C%20Damianou%20A%2C%20Ciobanu%20C%2C%20Katos%20V.%20Vulnerability%20Exposure%20Driven%20Intelligence%20in%20Smart%2C%20Circular%20Cities.%20Digital%20Threats%3A%20Research%20and%20Practice.%202021%20Sep%3B3487059.%3C%5C%2Fdiv%3E%5Cn%20%20%20%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Vulnerability%20Exposure%20Driven%20Intelligence%20in%20Smart%2C%20Circular%20Cities%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Paul-David%22%2C%22lastName%22%3A%22Jarvis%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Amalia%22%2C%22lastName%22%3A%22Damianou%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Cosmin%22%2C%22lastName%22%3A%22Ciobanu%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Vasilis%22%2C%22lastName%22%3A%22Katos%22%7D%5D%2C%22abstractNote%22%3A%22In%20this%20paper%20we%20study%20the%20vulnerability%20management%20dimension%20in%20smart%20city%20initiatives.%20As%20many%20cities%20across%20the%20globe%20invest%20a%20considerable%20amount%20of%20effort%2C%20resources%20and%20budget%20to%20modernise%20their%20infrastructure%20by%20deploying%20a%20series%20of%20technologies%20such%20as%205G%2C%20Software%20Defined%20Networks%20and%20IoT%2C%20we%20conduct%20an%20empirical%20analysis%20of%20their%20current%20exposure%20to%20existing%20vulnerabilities.%20We%20use%20an%20updated%20vulnerability%20dataset%20which%20is%20further%20enriched%20by%20quantitative%20research%20data%20from%20independent%20studies%20evaluating%20the%20maturity%20and%20accomplishments%20of%20cities%20in%20their%20journey%20to%20become%20smart.%20We%20particularly%20focus%20on%20cities%20that%20aspire%20to%20implement%20a%20%28data-driven%29%20Circular%20Economy%20agenda%20which%20we%20consider%20to%20potentially%20yield%20the%20highest%20risk%20from%20a%20vulnerabilities%20exposure%20perspective.%20Findings%20show%20that%20although%20a%20smarter%20city%20is%20attributed%20with%20a%20higher%20vulnerability%20exposure%2C%20investments%20on%20technology%20and%20human%20capital%20moderate%20this%20exposure%20in%20a%20way%20that%20it%20can%20be%20reduced.%22%2C%22date%22%3A%222021-09%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.1145%5C%2F3487059%22%2C%22ISSN%22%3A%222692-1626%2C%202576-5337%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YD8A68X5%22%5D%2C%22dateModified%22%3A%222024-03-23T01%3A01%3A06Z%22%7D%7D%2C%7B%22key%22%3A%224F3W28NA%22%2C%22library%22%3A%7B%22id%22%3A13925537%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Tsimperidis%20et%20al.%22%2C%22parsedDate%22%3A%222021%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%201.35%3B%20%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%20style%3D%5C%22clear%3A%20left%3B%20%5C%22%3E%5Cn%20%20%20%20%3Cdiv%20class%3D%5C%22csl-left-margin%5C%22%20style%3D%5C%22float%3A%20left%3B%20padding-right%3A%200.5em%3B%20text-align%3A%20right%3B%20width%3A%201em%3B%5C%22%3E1.%3C%5C%2Fdiv%3E%3Cdiv%20class%3D%5C%22csl-right-inline%5C%22%20style%3D%5C%22margin%3A%200%20.4em%200%201.5em%3B%5C%22%3ETsimperidis%20I%2C%20Yucel%20C%2C%20Katos%20V.%20Age%20and%20Gender%20as%20Cyber%20Attribution%20Features%20in%20Keystroke%20Dynamic-Based%20User%20Classification%20Processes.%20Electronics.%202021%3B10%287%29.%3C%5C%2Fdiv%3E%5Cn%20%20%20%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Age%20and%20Gender%20as%20Cyber%20Attribution%20Features%20in%20Keystroke%20Dynamic-Based%20User%20Classification%20Processes%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Ioannis%22%2C%22lastName%22%3A%22Tsimperidis%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Cagatay%22%2C%22lastName%22%3A%22Yucel%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Vasilios%22%2C%22lastName%22%3A%22Katos%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222021%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YD8A68X5%22%5D%2C%22dateModified%22%3A%222024-03-22T20%3A49%3A51Z%22%7D%7D%2C%7B%22key%22%3A%22CZ8Z4IQT%22%2C%22library%22%3A%7B%22id%22%3A13925537%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Tsimperidis%20et%20al.%22%2C%22parsedDate%22%3A%222021%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%201.35%3B%20%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%20style%3D%5C%22clear%3A%20left%3B%20%5C%22%3E%5Cn%20%20%20%20%3Cdiv%20class%3D%5C%22csl-left-margin%5C%22%20style%3D%5C%22float%3A%20left%3B%20padding-right%3A%200.5em%3B%20text-align%3A%20right%3B%20width%3A%201em%3B%5C%22%3E1.%3C%5C%2Fdiv%3E%3Cdiv%20class%3D%5C%22csl-right-inline%5C%22%20style%3D%5C%22margin%3A%200%20.4em%200%201.5em%3B%5C%22%3ETsimperidis%20I%2C%20Rostami%20S%2C%20Wilson%20K%2C%20Katos%20V.%20User%20Attribution%20Through%20Keystroke%20Dynamics-Based%20Author%20Age%20Estimation.%20In%3A%20Ghita%20B%2C%20Shiaeles%20S%2C%20editors.%20Selected%20Papers%20from%20the%2012th%20International%20Networking%20Conference.%20Springer%3B%202021.%20p.%2047%26%23x2013%3B61.%3C%5C%2Fdiv%3E%5Cn%20%20%20%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22conferencePaper%22%2C%22title%22%3A%22User%20Attribution%20Through%20Keystroke%20Dynamics-Based%20Author%20Age%20Estimation%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Ioannis%22%2C%22lastName%22%3A%22Tsimperidis%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Shahin%22%2C%22lastName%22%3A%22Rostami%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Kevin%22%2C%22lastName%22%3A%22Wilson%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Vasilios%22%2C%22lastName%22%3A%22Katos%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Bogdan%22%2C%22lastName%22%3A%22Ghita%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Stavros%22%2C%22lastName%22%3A%22Shiaeles%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222021%22%2C%22proceedingsTitle%22%3A%22Selected%20Papers%20from%20the%2012th%20International%20Networking%20Conference%22%2C%22conferenceName%22%3A%22%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISBN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YD8A68X5%22%5D%2C%22dateModified%22%3A%222024-03-22T20%3A49%3A50Z%22%7D%7D%2C%7B%22key%22%3A%22NTN4YUC7%22%2C%22library%22%3A%7B%22id%22%3A13925537%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Apostolopoulos%20et%20al.%22%2C%22parsedDate%22%3A%222021%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%201.35%3B%20%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%20style%3D%5C%22clear%3A%20left%3B%20%5C%22%3E%5Cn%20%20%20%20%3Cdiv%20class%3D%5C%22csl-left-margin%5C%22%20style%3D%5C%22float%3A%20left%3B%20padding-right%3A%200.5em%3B%20text-align%3A%20right%3B%20width%3A%201em%3B%5C%22%3E1.%3C%5C%2Fdiv%3E%3Cdiv%20class%3D%5C%22csl-right-inline%5C%22%20style%3D%5C%22margin%3A%200%20.4em%200%201.5em%3B%5C%22%3EApostolopoulos%20T%2C%20Katos%20V%2C%20Choo%20KKR%2C%20Patsakis%20C.%20Resurrecting%20anti-virtualization%20and%20anti-debugging%3A%20Unhooking%20your%20hooks.%20Future%20Generation%20Computer%20Systems.%202021%3B116%3A393%26%23x2013%3B405.%3C%5C%2Fdiv%3E%5Cn%20%20%20%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Resurrecting%20anti-virtualization%20and%20anti-debugging%3A%20Unhooking%20your%20hooks%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Theodoros%22%2C%22lastName%22%3A%22Apostolopoulos%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Vasilios%22%2C%22lastName%22%3A%22Katos%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Kim-Kwang%20Raymond%22%2C%22lastName%22%3A%22Choo%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Constantinos%22%2C%22lastName%22%3A%22Patsakis%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222021%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YD8A68X5%22%5D%2C%22dateModified%22%3A%222024-03-22T20%3A49%3A49Z%22%7D%7D%2C%7B%22key%22%3A%22JLXFMQQY%22%2C%22library%22%3A%7B%22id%22%3A13925537%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Katos%20and%20Efraimidis%22%2C%22parsedDate%22%3A%222021%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%201.35%3B%20%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%20style%3D%5C%22clear%3A%20left%3B%20%5C%22%3E%5Cn%20%20%20%20%3Cdiv%20class%3D%5C%22csl-left-margin%5C%22%20style%3D%5C%22float%3A%20left%3B%20padding-right%3A%200.5em%3B%20text-align%3A%20right%3B%20width%3A%201em%3B%5C%22%3E1.%3C%5C%2Fdiv%3E%3Cdiv%20class%3D%5C%22csl-right-inline%5C%22%20style%3D%5C%22margin%3A%200%20.4em%200%201.5em%3B%5C%22%3EKatos%20V%2C%20Efraimidis%20P.%20Privacy%20in%20Data-Driven%20Circular%20Economy.%20In%3A%20Jajodia%20S%2C%20Samarati%20P%2C%20Yung%20M%2C%20editors.%20Encyclopedia%20of%20Cryptography%2C%20Security%20and%20Privacy.%20Springer%3B%202021.%20p.%201%26%23x2013%3B3.%3C%5C%2Fdiv%3E%5Cn%20%20%20%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22bookSection%22%2C%22title%22%3A%22Privacy%20in%20Data-Driven%20Circular%20Economy%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Vasilios%22%2C%22lastName%22%3A%22Katos%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Pavlos%22%2C%22lastName%22%3A%22Efraimidis%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Sushil%22%2C%22lastName%22%3A%22Jajodia%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Pierangela%22%2C%22lastName%22%3A%22Samarati%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Moti%22%2C%22lastName%22%3A%22Yung%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22bookTitle%22%3A%22Encyclopedia%20of%20Cryptography%2C%20Security%20and%20Privacy%22%2C%22date%22%3A%222021%22%2C%22language%22%3A%22%22%2C%22ISBN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YD8A68X5%22%5D%2C%22dateModified%22%3A%222024-03-22T20%3A49%3A49Z%22%7D%7D%2C%7B%22key%22%3A%22W7ZSLS6C%22%2C%22library%22%3A%7B%22id%22%3A13925537%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Katos%20and%20Ciobanu%22%2C%22parsedDate%22%3A%222021%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%201.35%3B%20%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%20style%3D%5C%22clear%3A%20left%3B%20%5C%22%3E%5Cn%20%20%20%20%3Cdiv%20class%3D%5C%22csl-left-margin%5C%22%20style%3D%5C%22float%3A%20left%3B%20padding-right%3A%200.5em%3B%20text-align%3A%20right%3B%20width%3A%201em%3B%5C%22%3E1.%3C%5C%2Fdiv%3E%3Cdiv%20class%3D%5C%22csl-right-inline%5C%22%20style%3D%5C%22margin%3A%200%20.4em%200%201.5em%3B%5C%22%3EKatos%20V%2C%20Ciobanu%20C.%20Economics%20of%20Software%20Vulnerability%20Markets.%20In%3A%20Jajodia%20S%2C%20Samarati%20P%2C%20Yung%20M%2C%20editors.%20Encyclopedia%20of%20Cryptography%2C%20Security%20and%20Privacy.%20Springer%3B%202021.%20p.%201%26%23x2013%3B5.%3C%5C%2Fdiv%3E%5Cn%20%20%20%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22bookSection%22%2C%22title%22%3A%22Economics%20of%20Software%20Vulnerability%20Markets%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Vasilios%22%2C%22lastName%22%3A%22Katos%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Cosmin%22%2C%22lastName%22%3A%22Ciobanu%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Sushil%22%2C%22lastName%22%3A%22Jajodia%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Pierangela%22%2C%22lastName%22%3A%22Samarati%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Moti%22%2C%22lastName%22%3A%22Yung%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22bookTitle%22%3A%22Encyclopedia%20of%20Cryptography%2C%20Security%20and%20Privacy%22%2C%22date%22%3A%222021%22%2C%22language%22%3A%22%22%2C%22ISBN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YD8A68X5%22%5D%2C%22dateModified%22%3A%222024-03-22T20%3A49%3A51Z%22%7D%7D%2C%7B%22key%22%3A%228EPRWBRF%22%2C%22library%22%3A%7B%22id%22%3A13925537%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Pilton%20et%20al.%22%2C%22parsedDate%22%3A%222021%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%201.35%3B%20%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%20style%3D%5C%22clear%3A%20left%3B%20%5C%22%3E%5Cn%20%20%20%20%3Cdiv%20class%3D%5C%22csl-left-margin%5C%22%20style%3D%5C%22float%3A%20left%3B%20padding-right%3A%200.5em%3B%20text-align%3A%20right%3B%20width%3A%201em%3B%5C%22%3E1.%3C%5C%2Fdiv%3E%3Cdiv%20class%3D%5C%22csl-right-inline%5C%22%20style%3D%5C%22margin%3A%200%20.4em%200%201.5em%3B%5C%22%3EPilton%20C%2C%20Faily%20S%2C%20Henriksen-Bulmer%20J.%20Evaluating%20Privacy%20-%20Determining%20User%20Privacy%20Expectations%20on%20the%20Web.%20Computers%20%26amp%3B%20Security.%202021%3B105%3A102241.%3C%5C%2Fdiv%3E%5Cn%20%20%20%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Evaluating%20Privacy%20-%20Determining%20User%20Privacy%20Expectations%20on%20the%20Web%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Callum%22%2C%22lastName%22%3A%22Pilton%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Shamal%22%2C%22lastName%22%3A%22Faily%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Jane%22%2C%22lastName%22%3A%22Henriksen-Bulmer%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222021%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YD8A68X5%22%5D%2C%22dateModified%22%3A%222024-03-22T20%3A49%3A50Z%22%7D%7D%2C%7B%22key%22%3A%22SNRCIM2L%22%2C%22library%22%3A%7B%22id%22%3A13925537%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Faily%20et%20al.%22%2C%22parsedDate%22%3A%222021%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%201.35%3B%20%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%20style%3D%5C%22clear%3A%20left%3B%20%5C%22%3E%5Cn%20%20%20%20%3Cdiv%20class%3D%5C%22csl-left-margin%5C%22%20style%3D%5C%22float%3A%20left%3B%20padding-right%3A%200.5em%3B%20text-align%3A%20right%3B%20width%3A%201em%3B%5C%22%3E1.%3C%5C%2Fdiv%3E%3Cdiv%20class%3D%5C%22csl-right-inline%5C%22%20style%3D%5C%22margin%3A%200%20.4em%200%201.5em%3B%5C%22%3EFaily%20S%2C%20Iacob%20C%2C%20Ali%20R%2C%20Ki-Aries%20D.%20Visualising%20Personas%20as%20Goal%20Models%20to%20Find%20Security%20Tensions.%20Information%20and%20Computer%20Security.%202021%3B%3C%5C%2Fdiv%3E%5Cn%20%20%20%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Visualising%20Personas%20as%20Goal%20Models%20to%20Find%20Security%20Tensions%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Shamal%22%2C%22lastName%22%3A%22Faily%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Claudia%22%2C%22lastName%22%3A%22Iacob%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Raian%22%2C%22lastName%22%3A%22Ali%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Duncan%22%2C%22lastName%22%3A%22Ki-Aries%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222021%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YD8A68X5%22%5D%2C%22dateModified%22%3A%222024-03-22T20%3A49%3A49Z%22%7D%7D%2C%7B%22key%22%3A%2264JCAH73%22%2C%22library%22%3A%7B%22id%22%3A13925537%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Hatzivasilis%20et%20al.%22%2C%22parsedDate%22%3A%222021%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%201.35%3B%20%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%20style%3D%5C%22clear%3A%20left%3B%20%5C%22%3E%5Cn%20%20%20%20%3Cdiv%20class%3D%5C%22csl-left-margin%5C%22%20style%3D%5C%22float%3A%20left%3B%20padding-right%3A%200.5em%3B%20text-align%3A%20right%3B%20width%3A%201em%3B%5C%22%3E1.%3C%5C%2Fdiv%3E%3Cdiv%20class%3D%5C%22csl-right-inline%5C%22%20style%3D%5C%22margin%3A%200%20.4em%200%201.5em%3B%5C%22%3EHatzivasilis%20G%2C%20Soultatos%20O%2C%20Chatziadam%20P%2C%20Fysarakis%20K%2C%20Askoxylakis%20I%2C%20Ioannidis%20S%2C%20et%20al.%20WARDOG%3A%20Awareness%20detection%20watchbog%20for%20Botnet%20infection%20on%20the%20host%20device.%20IEEE%20Transactions%20on%20Sustainable%20Computing.%202021%3B6%281%29%3A4%26%23x2013%3B18.%3C%5C%2Fdiv%3E%5Cn%20%20%20%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22WARDOG%3A%20Awareness%20detection%20watchbog%20for%20Botnet%20infection%20on%20the%20host%20device%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22G.%22%2C%22lastName%22%3A%22Hatzivasilis%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22O.%22%2C%22lastName%22%3A%22Soultatos%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22P.%22%2C%22lastName%22%3A%22Chatziadam%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22K.%22%2C%22lastName%22%3A%22Fysarakis%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22I.%22%2C%22lastName%22%3A%22Askoxylakis%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22S.%22%2C%22lastName%22%3A%22Ioannidis%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22G.%22%2C%22lastName%22%3A%22Alaxandris%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22V.%22%2C%22lastName%22%3A%22Katos%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22G.%22%2C%22lastName%22%3A%22Spanoudakis%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222021%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YD8A68X5%22%5D%2C%22dateModified%22%3A%222024-03-22T20%3A49%3A32Z%22%7D%7D%2C%7B%22key%22%3A%22PBBDHAT5%22%2C%22library%22%3A%7B%22id%22%3A13925537%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Danilatou%20et%20al.%22%2C%22parsedDate%22%3A%222020-10%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%201.35%3B%20%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%20style%3D%5C%22clear%3A%20left%3B%20%5C%22%3E%5Cn%20%20%20%20%3Cdiv%20class%3D%5C%22csl-left-margin%5C%22%20style%3D%5C%22float%3A%20left%3B%20padding-right%3A%200.5em%3B%20text-align%3A%20right%3B%20width%3A%201em%3B%5C%22%3E1.%3C%5C%2Fdiv%3E%3Cdiv%20class%3D%5C%22csl-right-inline%5C%22%20style%3D%5C%22margin%3A%200%20.4em%200%201.5em%3B%5C%22%3EDanilatou%20V%2C%20Antonakaki%20D%2C%20Tzagkarakis%20C%2C%20Kanterakis%20A%2C%20Katos%20V%2C%20Kostoulas%20T.%20Automated%20Mortality%20Prediction%20in%20Critically-ill%20Patients%20with%20Thrombosis%20using%20Machine%20Learning.%20In%3A%202020%20IEEE%2020th%20International%20Conference%20on%20Bioinformatics%20and%20Bioengineering%20%28BIBE%29.%20IEEE%3B%202020.%20p.%20247%26%23x2013%3B54.%3C%5C%2Fdiv%3E%5Cn%20%20%20%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22conferencePaper%22%2C%22title%22%3A%22Automated%20Mortality%20Prediction%20in%20Critically-ill%20Patients%20with%20Thrombosis%20using%20Machine%20Learning%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22V.%22%2C%22lastName%22%3A%22Danilatou%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22D.%22%2C%22lastName%22%3A%22Antonakaki%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22C.%22%2C%22lastName%22%3A%22Tzagkarakis%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22A.%22%2C%22lastName%22%3A%22Kanterakis%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22V.%22%2C%22lastName%22%3A%22Katos%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22T.%22%2C%22lastName%22%3A%22Kostoulas%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222020-10%22%2C%22proceedingsTitle%22%3A%222020%20IEEE%2020th%20International%20Conference%20on%20Bioinformatics%20and%20Bioengineering%20%28BIBE%29%22%2C%22conferenceName%22%3A%22%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISBN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YD8A68X5%22%5D%2C%22dateModified%22%3A%222024-03-22T20%3A49%3A48Z%22%7D%7D%2C%7B%22key%22%3A%22TBKYAFK4%22%2C%22library%22%3A%7B%22id%22%3A13925537%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Taylor-Jackson%20and%20Matthews%22%2C%22parsedDate%22%3A%222020%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%201.35%3B%20%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%20style%3D%5C%22clear%3A%20left%3B%20%5C%22%3E%5Cn%20%20%20%20%3Cdiv%20class%3D%5C%22csl-left-margin%5C%22%20style%3D%5C%22float%3A%20left%3B%20padding-right%3A%200.5em%3B%20text-align%3A%20right%3B%20width%3A%201em%3B%5C%22%3E1.%3C%5C%2Fdiv%3E%3Cdiv%20class%3D%5C%22csl-right-inline%5C%22%20style%3D%5C%22margin%3A%200%20.4em%200%201.5em%3B%5C%22%3ETaylor-Jackson%20J%2C%20Matthews%20S.%20The%20Influence%20of%20Traits%20Associated%20with%20Autism%20Spectrum%20Disorder%20%28ASD%29%20on%20the%20Detection%20of%20Fake%20News.%20In%3A%20Stephanidis%20C%2C%20Salvendy%20G%2C%20Wei%20J%2C%20Yamamoto%20S%2C%20Mori%20H%2C%20Meiselwitz%20G%2C%20et%20al.%2C%20editors.%20HCI%20International%202020%20%26%23x2013%3B%20Late%20Breaking%20Papers%3A%20Interaction%2C%20Knowledge%20and%20Social%20Media.%20Cham%3A%20Springer%3B%202020.%20p.%20464%26%23x2013%3B72.%3C%5C%2Fdiv%3E%5Cn%20%20%20%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22conferencePaper%22%2C%22title%22%3A%22The%20Influence%20of%20Traits%20Associated%20with%20Autism%20Spectrum%20Disorder%20%28ASD%29%20on%20the%20Detection%20of%20Fake%20News%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Jacqui%22%2C%22lastName%22%3A%22Taylor-Jackson%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Sophie%22%2C%22lastName%22%3A%22Matthews%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Constantine%22%2C%22lastName%22%3A%22Stephanidis%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Gavriel%22%2C%22lastName%22%3A%22Salvendy%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22June%22%2C%22lastName%22%3A%22Wei%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Sakae%22%2C%22lastName%22%3A%22Yamamoto%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Hirohiko%22%2C%22lastName%22%3A%22Mori%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Gabriele%22%2C%22lastName%22%3A%22Meiselwitz%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Fiona%20Fui-Hoon%22%2C%22lastName%22%3A%22Nah%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Keng%22%2C%22lastName%22%3A%22Siau%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222020%22%2C%22proceedingsTitle%22%3A%22HCI%20International%202020%20%5Cu2013%20Late%20Breaking%20Papers%3A%20Interaction%2C%20Knowledge%20and%20Social%20Media%22%2C%22conferenceName%22%3A%22%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISBN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YD8A68X5%22%5D%2C%22dateModified%22%3A%222024-03-22T20%3A49%3A48Z%22%7D%7D%2C%7B%22key%22%3A%222II7ZB38%22%2C%22library%22%3A%7B%22id%22%3A13925537%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Taylor-Jackson%20et%20al.%22%2C%22parsedDate%22%3A%222020%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%201.35%3B%20%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%20style%3D%5C%22clear%3A%20left%3B%20%5C%22%3E%5Cn%20%20%20%20%3Cdiv%20class%3D%5C%22csl-left-margin%5C%22%20style%3D%5C%22float%3A%20left%3B%20padding-right%3A%200.5em%3B%20text-align%3A%20right%3B%20width%3A%201em%3B%5C%22%3E1.%3C%5C%2Fdiv%3E%3Cdiv%20class%3D%5C%22csl-right-inline%5C%22%20style%3D%5C%22margin%3A%200%20.4em%200%201.5em%3B%5C%22%3ETaylor-Jackson%20J%2C%20McAlaney%20J%2C%20Foster%20JL%2C%20Bello%20A%2C%20Maurushat%20A%2C%20Dale%20J.%20Incorporating%20Psychology%20into%20Cyber%20Security%20Education%3A%20A%20Pedagogical%20Approach.%20In%3A%20Bernhard%20M%2C%20Bracciali%20A%2C%20Camp%20LJ%2C%20Matsuo%20S%2C%20Maurushat%20A%2C%20R%26%23xF8%3Bnne%20PB%2C%20et%20al.%2C%20editors.%20Financial%20Cryptography%20and%20Data%20Security.%20Springer%3B%202020.%20p.%20207%26%23x2013%3B17.%3C%5C%2Fdiv%3E%5Cn%20%20%20%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22conferencePaper%22%2C%22title%22%3A%22Incorporating%20Psychology%20into%20Cyber%20Security%20Education%3A%20A%20Pedagogical%20Approach%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Jacqui%22%2C%22lastName%22%3A%22Taylor-Jackson%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22John%22%2C%22lastName%22%3A%22McAlaney%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Jeffrey%20L.%22%2C%22lastName%22%3A%22Foster%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Abubakar%22%2C%22lastName%22%3A%22Bello%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Alana%22%2C%22lastName%22%3A%22Maurushat%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22John%22%2C%22lastName%22%3A%22Dale%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Matthew%22%2C%22lastName%22%3A%22Bernhard%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Andrea%22%2C%22lastName%22%3A%22Bracciali%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22L.%20Jean%22%2C%22lastName%22%3A%22Camp%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Shin%27ichiro%22%2C%22lastName%22%3A%22Matsuo%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Alana%22%2C%22lastName%22%3A%22Maurushat%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Peter%20B.%22%2C%22lastName%22%3A%22R%5Cu00f8nne%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Massimiliano%22%2C%22lastName%22%3A%22Sala%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222020%22%2C%22proceedingsTitle%22%3A%22Financial%20Cryptography%20and%20Data%20Security%22%2C%22conferenceName%22%3A%22%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISBN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YD8A68X5%22%5D%2C%22dateModified%22%3A%222024-03-22T20%3A49%3A48Z%22%7D%7D%2C%7B%22key%22%3A%22NJKIXCDN%22%2C%22library%22%3A%7B%22id%22%3A13925537%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22McAlaney%20and%20Hills%22%2C%22parsedDate%22%3A%222020%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%201.35%3B%20%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%20style%3D%5C%22clear%3A%20left%3B%20%5C%22%3E%5Cn%20%20%20%20%3Cdiv%20class%3D%5C%22csl-left-margin%5C%22%20style%3D%5C%22float%3A%20left%3B%20padding-right%3A%200.5em%3B%20text-align%3A%20right%3B%20width%3A%201em%3B%5C%22%3E1.%3C%5C%2Fdiv%3E%3Cdiv%20class%3D%5C%22csl-right-inline%5C%22%20style%3D%5C%22margin%3A%200%20.4em%200%201.5em%3B%5C%22%3EMcAlaney%20J%2C%20Hills%20PJ.%20Understanding%20Phishing%20Email%20Processing%20and%20Perceived%20Trustworthiness%20Through%20Eye%20Tracking.%20Frontiers%20in%20Psychology.%202020%3B11%3A1756.%3C%5C%2Fdiv%3E%5Cn%20%20%20%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Understanding%20Phishing%20Email%20Processing%20and%20Perceived%20Trustworthiness%20Through%20Eye%20Tracking%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22John%22%2C%22lastName%22%3A%22McAlaney%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Peter%20J.%22%2C%22lastName%22%3A%22Hills%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222020%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YD8A68X5%22%5D%2C%22dateModified%22%3A%222024-03-22T20%3A49%3A47Z%22%7D%7D%2C%7B%22key%22%3A%22DWDTJBRP%22%2C%22library%22%3A%7B%22id%22%3A13925537%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Faily%20et%20al.%22%2C%22parsedDate%22%3A%222020%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%201.35%3B%20%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%20style%3D%5C%22clear%3A%20left%3B%20%5C%22%3E%5Cn%20%20%20%20%3Cdiv%20class%3D%5C%22csl-left-margin%5C%22%20style%3D%5C%22float%3A%20left%3B%20padding-right%3A%200.5em%3B%20text-align%3A%20right%3B%20width%3A%201em%3B%5C%22%3E1.%3C%5C%2Fdiv%3E%3Cdiv%20class%3D%5C%22csl-right-inline%5C%22%20style%3D%5C%22margin%3A%200%20.4em%200%201.5em%3B%5C%22%3EFaily%20S%2C%20Scandariato%20R%2C%20Shostack%20A%2C%20Sion%20L%2C%20Ki-Aries%20D.%20Contextualisation%20of%20Data%20Flow%20Diagrams%20for%20Security%20Analysis.%20In%3A%20Eades%20III%20H%2C%20Gadyatskaya%20O%2C%20editors.%20Graphical%20Models%20for%20Security.%20Springer%20International%20Publishing%3B%202020.%20p.%20186%26%23x2013%3B97.%3C%5C%2Fdiv%3E%5Cn%20%20%20%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22conferencePaper%22%2C%22title%22%3A%22Contextualisation%20of%20Data%20Flow%20Diagrams%20for%20Security%20Analysis%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Shamal%22%2C%22lastName%22%3A%22Faily%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Riccardo%22%2C%22lastName%22%3A%22Scandariato%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Adam%22%2C%22lastName%22%3A%22Shostack%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Laurens%22%2C%22lastName%22%3A%22Sion%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Duncan%22%2C%22lastName%22%3A%22Ki-Aries%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Harley%22%2C%22lastName%22%3A%22Eades%20III%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Olga%22%2C%22lastName%22%3A%22Gadyatskaya%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222020%22%2C%22proceedingsTitle%22%3A%22Graphical%20Models%20for%20Security%22%2C%22conferenceName%22%3A%22%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISBN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YD8A68X5%22%5D%2C%22dateModified%22%3A%222024-03-22T20%3A49%3A42Z%22%7D%7D%2C%7B%22key%22%3A%22X5L3AKMQ%22%2C%22library%22%3A%7B%22id%22%3A13925537%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Sample%20et%20al.%22%2C%22parsedDate%22%3A%222020%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%201.35%3B%20%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%20style%3D%5C%22clear%3A%20left%3B%20%5C%22%3E%5Cn%20%20%20%20%3Cdiv%20class%3D%5C%22csl-left-margin%5C%22%20style%3D%5C%22float%3A%20left%3B%20padding-right%3A%200.5em%3B%20text-align%3A%20right%3B%20width%3A%201em%3B%5C%22%3E1.%3C%5C%2Fdiv%3E%3Cdiv%20class%3D%5C%22csl-right-inline%5C%22%20style%3D%5C%22margin%3A%200%20.4em%200%201.5em%3B%5C%22%3ESample%20C%2C%20Jensen%20M%2C%20Scott%20K%2C%20McAlaney%20J%2C%20Brockinton%20A%2C%20Fitchpatrick%20S%2C%20et%20al.%20Interdisciplinary%20lessons%20learned%20while%20researching%20fake%20news.%20Frontiers%20in%20Psychology.%202020%3B%3C%5C%2Fdiv%3E%5Cn%20%20%20%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Interdisciplinary%20lessons%20learned%20while%20researching%20fake%20news%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Char%22%2C%22lastName%22%3A%22Sample%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Michael%22%2C%22lastName%22%3A%22Jensen%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Keith%22%2C%22lastName%22%3A%22Scott%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22John%22%2C%22lastName%22%3A%22McAlaney%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Amanda%22%2C%22lastName%22%3A%22Brockinton%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Steven%22%2C%22lastName%22%3A%22Fitchpatrick%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22David%22%2C%22lastName%22%3A%22Ormrodd%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Amy%22%2C%22lastName%22%3A%22Ormrodd%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222020%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YD8A68X5%22%5D%2C%22dateModified%22%3A%222024-03-22T20%3A49%3A42Z%22%7D%7D%2C%7B%22key%22%3A%22BPLRTE3I%22%2C%22library%22%3A%7B%22id%22%3A13925537%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Faily%20et%20al.%22%2C%22parsedDate%22%3A%222020%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%201.35%3B%20%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%20style%3D%5C%22clear%3A%20left%3B%20%5C%22%3E%5Cn%20%20%20%20%3Cdiv%20class%3D%5C%22csl-left-margin%5C%22%20style%3D%5C%22float%3A%20left%3B%20padding-right%3A%200.5em%3B%20text-align%3A%20right%3B%20width%3A%201em%3B%5C%22%3E1.%3C%5C%2Fdiv%3E%3Cdiv%20class%3D%5C%22csl-right-inline%5C%22%20style%3D%5C%22margin%3A%200%20.4em%200%201.5em%3B%5C%22%3EFaily%20S%2C%20Iacob%20C%2C%20Ali%20R%2C%20Ki-Aries%20D.%20Identifying%20Implicit%20Vulnerabilities%20through%20Personas%20as%20Goal%20Models.%20In%3A%20Proceedings%20of%20the%204th%20International%20Workshop%20on%20SECurity%20and%20Privacy%20Requirements%20Engineering%20%28SECPRE%202020%29.%20Springer%3B%202020.%3C%5C%2Fdiv%3E%5Cn%20%20%20%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22conferencePaper%22%2C%22title%22%3A%22Identifying%20Implicit%20Vulnerabilities%20through%20Personas%20as%20Goal%20Models%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Shamal%22%2C%22lastName%22%3A%22Faily%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Claudia%22%2C%22lastName%22%3A%22Iacob%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Raian%22%2C%22lastName%22%3A%22Ali%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Duncan%22%2C%22lastName%22%3A%22Ki-Aries%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222020%22%2C%22proceedingsTitle%22%3A%22Proceedings%20of%20the%204th%20International%20Workshop%20on%20SECurity%20and%20Privacy%20Requirements%20Engineering%20%28SECPRE%202020%29%22%2C%22conferenceName%22%3A%22%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISBN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YD8A68X5%22%5D%2C%22dateModified%22%3A%222024-03-22T20%3A49%3A41Z%22%7D%7D%2C%7B%22key%22%3A%22CLAMRJQH%22%2C%22library%22%3A%7B%22id%22%3A13925537%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Benson%20and%20McAlaney%22%2C%22parsedDate%22%3A%222020%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%201.35%3B%20%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%20style%3D%5C%22clear%3A%20left%3B%20%5C%22%3E%5Cn%20%20%20%20%3Cdiv%20class%3D%5C%22csl-left-margin%5C%22%20style%3D%5C%22float%3A%20left%3B%20padding-right%3A%200.5em%3B%20text-align%3A%20right%3B%20width%3A%201em%3B%5C%22%3E1.%3C%5C%2Fdiv%3E%3Cdiv%20class%3D%5C%22csl-right-inline%5C%22%20style%3D%5C%22margin%3A%200%20.4em%200%201.5em%3B%5C%22%3EBenson%20V%2C%20McAlaney%20J.%20Cyber%20Influence%20and%20Cognitive%20Threats.%20Academic%20Press%3B%202020.%3C%5C%2Fdiv%3E%5Cn%20%20%20%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22book%22%2C%22title%22%3A%22Cyber%20Influence%20and%20Cognitive%20Threats%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Vladlena%22%2C%22lastName%22%3A%22Benson%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22John%22%2C%22lastName%22%3A%22McAlaney%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222020%22%2C%22language%22%3A%22%22%2C%22ISBN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YD8A68X5%22%5D%2C%22dateModified%22%3A%222024-03-22T20%3A49%3A41Z%22%7D%7D%2C%7B%22key%22%3A%22DIEH4BX7%22%2C%22library%22%3A%7B%22id%22%3A13925537%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Ben%20Naseir%20et%20al.%22%2C%22parsedDate%22%3A%222020%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%201.35%3B%20%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%20style%3D%5C%22clear%3A%20left%3B%20%5C%22%3E%5Cn%20%20%20%20%3Cdiv%20class%3D%5C%22csl-left-margin%5C%22%20style%3D%5C%22float%3A%20left%3B%20padding-right%3A%200.5em%3B%20text-align%3A%20right%3B%20width%3A%201em%3B%5C%22%3E1.%3C%5C%2Fdiv%3E%3Cdiv%20class%3D%5C%22csl-right-inline%5C%22%20style%3D%5C%22margin%3A%200%20.4em%200%201.5em%3B%5C%22%3EBen%20Naseir%20M%2C%20Dogan%20H%2C%20Apeh%20E%2C%20Ali%20R.%20National%20Cybersecurity%20Capacity%20Building%20Framework%20for%20Countries%20in%20a%20Transitional%20Phase.%20In%3A%20Proceedings%20of%20the%2022nd%20International%20Conference%20on%20Enterprise%20Information%20Systems%20-%20Volume%202%3A%20ICEIS%2C.%20SciTePress%3B%202020.%20p.%20841%26%23x2013%3B9.%3C%5C%2Fdiv%3E%5Cn%20%20%20%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22conferencePaper%22%2C%22title%22%3A%22National%20Cybersecurity%20Capacity%20Building%20Framework%20for%20Countries%20in%20a%20Transitional%20Phase%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22M.%22%2C%22lastName%22%3A%22Ben%20Naseir%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Huseyin%22%2C%22lastName%22%3A%22Dogan%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Edward%22%2C%22lastName%22%3A%22Apeh%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Raian%22%2C%22lastName%22%3A%22Ali%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222020%22%2C%22proceedingsTitle%22%3A%22Proceedings%20of%20the%2022nd%20International%20Conference%20on%20Enterprise%20Information%20Systems%20-%20Volume%202%3A%20ICEIS%2C%22%2C%22conferenceName%22%3A%22%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISBN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YD8A68X5%22%5D%2C%22dateModified%22%3A%222024-03-22T20%3A49%3A40Z%22%7D%7D%2C%7B%22key%22%3A%22QW2469CN%22%2C%22library%22%3A%7B%22id%22%3A13925537%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22McAlaney%20and%20Benson%22%2C%22parsedDate%22%3A%222020%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%201.35%3B%20%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%20style%3D%5C%22clear%3A%20left%3B%20%5C%22%3E%5Cn%20%20%20%20%3Cdiv%20class%3D%5C%22csl-left-margin%5C%22%20style%3D%5C%22float%3A%20left%3B%20padding-right%3A%200.5em%3B%20text-align%3A%20right%3B%20width%3A%201em%3B%5C%22%3E1.%3C%5C%2Fdiv%3E%3Cdiv%20class%3D%5C%22csl-right-inline%5C%22%20style%3D%5C%22margin%3A%200%20.4em%200%201.5em%3B%5C%22%3EMcAlaney%20J%2C%20Benson%20V.%20Chapter%201%20-%20Cybersecurity%20as%20a%20social%20phenomenon.%20In%3A%20Benson%20V%2C%20Mcalaney%20J%2C%20editors.%20Cyber%20Influence%20and%20Cognitive%20Threats.%20Academic%20Press%3B%202020.%20p.%201%26%23x2013%3B8.%3C%5C%2Fdiv%3E%5Cn%20%20%20%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22bookSection%22%2C%22title%22%3A%22Chapter%201%20-%20Cybersecurity%20as%20a%20social%20phenomenon%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22John%22%2C%22lastName%22%3A%22McAlaney%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Vladlena%22%2C%22lastName%22%3A%22Benson%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Vladlena%22%2C%22lastName%22%3A%22Benson%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22John%22%2C%22lastName%22%3A%22Mcalaney%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22bookTitle%22%3A%22Cyber%20Influence%20and%20Cognitive%20Threats%22%2C%22date%22%3A%222020%22%2C%22language%22%3A%22%22%2C%22ISBN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YD8A68X5%22%5D%2C%22dateModified%22%3A%222024-03-22T20%3A49%3A38Z%22%7D%7D%2C%7B%22key%22%3A%228VI52Y8J%22%2C%22library%22%3A%7B%22id%22%3A13925537%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Szedlak%20and%20M%27manga%22%2C%22parsedDate%22%3A%222020%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%201.35%3B%20%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%20style%3D%5C%22clear%3A%20left%3B%20%5C%22%3E%5Cn%20%20%20%20%3Cdiv%20class%3D%5C%22csl-left-margin%5C%22%20style%3D%5C%22float%3A%20left%3B%20padding-right%3A%200.5em%3B%20text-align%3A%20right%3B%20width%3A%201em%3B%5C%22%3E1.%3C%5C%2Fdiv%3E%3Cdiv%20class%3D%5C%22csl-right-inline%5C%22%20style%3D%5C%22margin%3A%200%20.4em%200%201.5em%3B%5C%22%3ESzedlak%20D%2C%20M%26%23x2019%3Bmanga%20A.%20Eliciting%20Requirements%20for%20a%20Student-focussed%20Capture%20The%20Flag.%20In%3A%20Proceedings%20of%20the%207th%20International%20Conference%20on%20Behavioural%20and%20Social%20Computing.%20IEEE%3B%202020.%3C%5C%2Fdiv%3E%5Cn%20%20%20%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22conferencePaper%22%2C%22title%22%3A%22Eliciting%20Requirements%20for%20a%20Student-focussed%20Capture%20The%20Flag%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22David%22%2C%22lastName%22%3A%22Szedlak%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Andrew%22%2C%22lastName%22%3A%22M%27manga%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222020%22%2C%22proceedingsTitle%22%3A%22Proceedings%20of%20the%207th%20International%20Conference%20on%20Behavioural%20and%20Social%20Computing%22%2C%22conferenceName%22%3A%22%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISBN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YD8A68X5%22%5D%2C%22dateModified%22%3A%222024-03-22T20%3A49%3A41Z%22%7D%7D%2C%7B%22key%22%3A%227PZ9KEAF%22%2C%22library%22%3A%7B%22id%22%3A13925537%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Patsakis%20et%20al.%22%2C%22parsedDate%22%3A%222020%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%201.35%3B%20%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%20style%3D%5C%22clear%3A%20left%3B%20%5C%22%3E%5Cn%20%20%20%20%3Cdiv%20class%3D%5C%22csl-left-margin%5C%22%20style%3D%5C%22float%3A%20left%3B%20padding-right%3A%200.5em%3B%20text-align%3A%20right%3B%20width%3A%201em%3B%5C%22%3E1.%3C%5C%2Fdiv%3E%3Cdiv%20class%3D%5C%22csl-right-inline%5C%22%20style%3D%5C%22margin%3A%200%20.4em%200%201.5em%3B%5C%22%3EPatsakis%20C%2C%20Casino%20F%2C%20Lykousas%20N%2C%20Katos%20V.%20Unravelling%20Ariadne%26%23x2019%3Bs%20Thread%3A%20Exploring%20the%20Threats%20of%20Decentralised%20DNS.%20IEEE%20Access.%202020%3B8%3A118559%26%23x2013%3B71.%3C%5C%2Fdiv%3E%5Cn%20%20%20%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Unravelling%20Ariadne%5Cu2019s%20Thread%3A%20Exploring%20the%20Threats%20of%20Decentralised%20DNS%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22C.%22%2C%22lastName%22%3A%22Patsakis%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22F.%22%2C%22lastName%22%3A%22Casino%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22N.%22%2C%22lastName%22%3A%22Lykousas%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22V.%22%2C%22lastName%22%3A%22Katos%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222020%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YD8A68X5%22%5D%2C%22dateModified%22%3A%222024-03-22T20%3A49%3A40Z%22%7D%7D%2C%7B%22key%22%3A%22VM2LK5DR%22%2C%22library%22%3A%7B%22id%22%3A13925537%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Henriksen-Bulmer%20et%20al.%22%2C%22parsedDate%22%3A%222020%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%201.35%3B%20%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%20style%3D%5C%22clear%3A%20left%3B%20%5C%22%3E%5Cn%20%20%20%20%3Cdiv%20class%3D%5C%22csl-left-margin%5C%22%20style%3D%5C%22float%3A%20left%3B%20padding-right%3A%200.5em%3B%20text-align%3A%20right%3B%20width%3A%201em%3B%5C%22%3E1.%3C%5C%2Fdiv%3E%3Cdiv%20class%3D%5C%22csl-right-inline%5C%22%20style%3D%5C%22margin%3A%200%20.4em%200%201.5em%3B%5C%22%3EHenriksen-Bulmer%20J%2C%20Faily%20S%2C%20Jeary%20S.%20DPIA%20in%20Context%3A%20Applying%20DPIA%20to%20Assess%20Privacy%20Risks%20of%20Cyber%20Physical%20Systems.%20Future%20Internet.%202020%3B12%285%29%3A93.%3C%5C%2Fdiv%3E%5Cn%20%20%20%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22DPIA%20in%20Context%3A%20Applying%20DPIA%20to%20Assess%20Privacy%20Risks%20of%20Cyber%20Physical%20Systems%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Jane%22%2C%22lastName%22%3A%22Henriksen-Bulmer%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Shamal%22%2C%22lastName%22%3A%22Faily%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Sheridan%22%2C%22lastName%22%3A%22Jeary%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222020%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YD8A68X5%22%5D%2C%22dateModified%22%3A%222024-03-22T20%3A49%3A40Z%22%7D%7D%2C%7B%22key%22%3A%22TIYYTG9B%22%2C%22library%22%3A%7B%22id%22%3A13925537%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Simou%20et%20al.%22%2C%22parsedDate%22%3A%222020%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%201.35%3B%20%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%20style%3D%5C%22clear%3A%20left%3B%20%5C%22%3E%5Cn%20%20%20%20%3Cdiv%20class%3D%5C%22csl-left-margin%5C%22%20style%3D%5C%22float%3A%20left%3B%20padding-right%3A%200.5em%3B%20text-align%3A%20right%3B%20width%3A%201em%3B%5C%22%3E1.%3C%5C%2Fdiv%3E%3Cdiv%20class%3D%5C%22csl-right-inline%5C%22%20style%3D%5C%22margin%3A%200%20.4em%200%201.5em%3B%5C%22%3ESimou%20S%2C%20Kalloniatis%20C%2C%20Gritzalis%20S%2C%20Katos%20V.%20A%20Revised%20Forensic%20Process%20for%20Aligning%20the%20Investigation%20Process%20with%20the%20Design%20of%20Forensic-Enabled%20Cloud%20Services.%20In%3A%20Katsikas%20S%2C%20Zorkadis%20V%2C%20editors.%20E-Democracy%20%26%23x2013%3B%20Safeguarding%20Democracy%20and%20Human%20Rights%20in%20the%20Digital%20Age.%20Springer%20International%20Publishing%3B%202020.%20p.%20161%26%23x2013%3B77.%3C%5C%2Fdiv%3E%5Cn%20%20%20%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22conferencePaper%22%2C%22title%22%3A%22A%20Revised%20Forensic%20Process%20for%20Aligning%20the%20Investigation%20Process%20with%20the%20Design%20of%20Forensic-Enabled%20Cloud%20Services%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Stavros%22%2C%22lastName%22%3A%22Simou%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Christos%22%2C%22lastName%22%3A%22Kalloniatis%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Stefanos%22%2C%22lastName%22%3A%22Gritzalis%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Vasilis%22%2C%22lastName%22%3A%22Katos%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Sokratis%22%2C%22lastName%22%3A%22Katsikas%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Vasilios%22%2C%22lastName%22%3A%22Zorkadis%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222020%22%2C%22proceedingsTitle%22%3A%22E-Democracy%20%5Cu2013%20Safeguarding%20Democracy%20and%20Human%20Rights%20in%20the%20Digital%20Age%22%2C%22conferenceName%22%3A%22%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISBN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YD8A68X5%22%5D%2C%22dateModified%22%3A%222024-03-22T20%3A49%3A38Z%22%7D%7D%2C%7B%22key%22%3A%22C2YHFVBC%22%2C%22library%22%3A%7B%22id%22%3A13925537%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Heydari%20et%20al.%22%2C%22parsedDate%22%3A%222020%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%201.35%3B%20%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%20style%3D%5C%22clear%3A%20left%3B%20%5C%22%3E%5Cn%20%20%20%20%3Cdiv%20class%3D%5C%22csl-left-margin%5C%22%20style%3D%5C%22float%3A%20left%3B%20padding-right%3A%200.5em%3B%20text-align%3A%20right%3B%20width%3A%201em%3B%5C%22%3E1.%3C%5C%2Fdiv%3E%3Cdiv%20class%3D%5C%22csl-right-inline%5C%22%20style%3D%5C%22margin%3A%200%20.4em%200%201.5em%3B%5C%22%3EHeydari%20M%2C%20Mylonas%20A%2C%20Tafreshi%20VHF%2C%20Benkhelifa%20E%2C%20Singh%20S.%20Known%20unknowns%3A%20Indeterminacy%20in%20authentication%20in%20IoT.%20Future%20Generation%20Computer%20Systems.%202020%3B%3C%5C%2Fdiv%3E%5Cn%20%20%20%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Known%20unknowns%3A%20Indeterminacy%20in%20authentication%20in%20IoT%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Mohammad%22%2C%22lastName%22%3A%22Heydari%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Alexios%22%2C%22lastName%22%3A%22Mylonas%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Vahid%20Heydari%20Fami%22%2C%22lastName%22%3A%22Tafreshi%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Elhadj%22%2C%22lastName%22%3A%22Benkhelifa%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Surjit%22%2C%22lastName%22%3A%22Singh%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222020%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YD8A68X5%22%5D%2C%22dateModified%22%3A%222024-03-22T20%3A49%3A37Z%22%7D%7D%2C%7B%22key%22%3A%22Z3AKAB8T%22%2C%22library%22%3A%7B%22id%22%3A13925537%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Rantos%20et%20al.%22%2C%22parsedDate%22%3A%222020%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%201.35%3B%20%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%20style%3D%5C%22clear%3A%20left%3B%20%5C%22%3E%5Cn%20%20%20%20%3Cdiv%20class%3D%5C%22csl-left-margin%5C%22%20style%3D%5C%22float%3A%20left%3B%20padding-right%3A%200.5em%3B%20text-align%3A%20right%3B%20width%3A%201em%3B%5C%22%3E1.%3C%5C%2Fdiv%3E%3Cdiv%20class%3D%5C%22csl-right-inline%5C%22%20style%3D%5C%22margin%3A%200%20.4em%200%201.5em%3B%5C%22%3ERantos%20K%2C%20Spyros%20A%2C%20Papanikolaou%20A%2C%20Kritsas%20A%2C%20Ilioudis%20C%2C%20Katos%20V.%20Interoperability%20Challenges%20in%20the%20Cybersecurity%20Information%20Sharing%20Ecosystem.%20Computers.%202020%3B9%281%29.%3C%5C%2Fdiv%3E%5Cn%20%20%20%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Interoperability%20Challenges%20in%20the%20Cybersecurity%20Information%20Sharing%20Ecosystem%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Konstantinos%22%2C%22lastName%22%3A%22Rantos%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Arnolnt%22%2C%22lastName%22%3A%22Spyros%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Alexandros%22%2C%22lastName%22%3A%22Papanikolaou%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Antonios%22%2C%22lastName%22%3A%22Kritsas%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Christos%22%2C%22lastName%22%3A%22Ilioudis%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Vasilios%22%2C%22lastName%22%3A%22Katos%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222020%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YD8A68X5%22%5D%2C%22dateModified%22%3A%222024-03-22T20%3A49%3A36Z%22%7D%7D%2C%7B%22key%22%3A%22T9QC52ET%22%2C%22library%22%3A%7B%22id%22%3A13925537%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Qurashi%20et%20al.%22%2C%22parsedDate%22%3A%222020%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%201.35%3B%20%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%20style%3D%5C%22clear%3A%20left%3B%20%5C%22%3E%5Cn%20%20%20%20%3Cdiv%20class%3D%5C%22csl-left-margin%5C%22%20style%3D%5C%22float%3A%20left%3B%20padding-right%3A%200.5em%3B%20text-align%3A%20right%3B%20width%3A%201em%3B%5C%22%3E1.%3C%5C%2Fdiv%3E%3Cdiv%20class%3D%5C%22csl-right-inline%5C%22%20style%3D%5C%22margin%3A%200%20.4em%200%201.5em%3B%5C%22%3EQurashi%20MA%2C%20Angelopoulos%20CM%2C%20Katos%20V.%20An%20architecture%20for%20resilient%20intrusion%20detection%20in%20ad-hoc%20networks.%20Journal%20of%20Information%20Security%20and%20Applications.%202020%3B53%3A102530.%3C%5C%2Fdiv%3E%5Cn%20%20%20%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22An%20architecture%20for%20resilient%20intrusion%20detection%20in%20ad-hoc%20networks%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Mohammed%20Al%22%2C%22lastName%22%3A%22Qurashi%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Constantinos%20Marios%22%2C%22lastName%22%3A%22Angelopoulos%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Vasilios%22%2C%22lastName%22%3A%22Katos%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222020%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YD8A68X5%22%5D%2C%22dateModified%22%3A%222024-03-22T20%3A49%3A37Z%22%7D%7D%2C%7B%22key%22%3A%22D4RIUMIN%22%2C%22library%22%3A%7B%22id%22%3A13925537%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Patsakis%20et%20al.%22%2C%22parsedDate%22%3A%222020%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%201.35%3B%20%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%20style%3D%5C%22clear%3A%20left%3B%20%5C%22%3E%5Cn%20%20%20%20%3Cdiv%20class%3D%5C%22csl-left-margin%5C%22%20style%3D%5C%22float%3A%20left%3B%20padding-right%3A%200.5em%3B%20text-align%3A%20right%3B%20width%3A%201em%3B%5C%22%3E1.%3C%5C%2Fdiv%3E%3Cdiv%20class%3D%5C%22csl-right-inline%5C%22%20style%3D%5C%22margin%3A%200%20.4em%200%201.5em%3B%5C%22%3EPatsakis%20C%2C%20Casino%20F%2C%20Katos%20V.%20Encrypted%20and%20covert%20DNS%20queries%20for%20botnets%3A%20Challenges%20and%20countermeasures.%20Computers%20%26amp%3B%20Security.%202020%3B88%3A101614.%3C%5C%2Fdiv%3E%5Cn%20%20%20%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Encrypted%20and%20covert%20DNS%20queries%20for%20botnets%3A%20Challenges%20and%20countermeasures%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Constantinos%22%2C%22lastName%22%3A%22Patsakis%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Fran%22%2C%22lastName%22%3A%22Casino%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Vasilios%22%2C%22lastName%22%3A%22Katos%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222020%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YD8A68X5%22%5D%2C%22dateModified%22%3A%222024-03-22T20%3A49%3A36Z%22%7D%7D%2C%7B%22key%22%3A%22XH5NBAB3%22%2C%22library%22%3A%7B%22id%22%3A13925537%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Altaf%20et%20al.%22%2C%22parsedDate%22%3A%222020%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%201.35%3B%20%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%20style%3D%5C%22clear%3A%20left%3B%20%5C%22%3E%5Cn%20%20%20%20%3Cdiv%20class%3D%5C%22csl-left-margin%5C%22%20style%3D%5C%22float%3A%20left%3B%20padding-right%3A%200.5em%3B%20text-align%3A%20right%3B%20width%3A%201em%3B%5C%22%3E1.%3C%5C%2Fdiv%3E%3Cdiv%20class%3D%5C%22csl-right-inline%5C%22%20style%3D%5C%22margin%3A%200%20.4em%200%201.5em%3B%5C%22%3EAltaf%20A%2C%20Faily%20S%2C%20Dogan%20H%2C%20Mylonas%20A%2C%20Thron%20E.%20Identifying%20Safety%20and%20Human%20Factors%20Issues%20in%20Rail%20Using%20IRIS%20and%20CAIRIS.%20In%3A%20Katsikas%20S%2C%20Cuppens%20F%2C%20Cuppens%20N%2C%20Lambrinoudakis%20C%2C%20Kalloniatis%20C%2C%20Mylopoulos%20J%2C%20et%20al.%2C%20editors.%20Computer%20Security.%20Springer%3B%202020.%20p.%2098%26%23x2013%3B107.%3C%5C%2Fdiv%3E%5Cn%20%20%20%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22conferencePaper%22%2C%22title%22%3A%22Identifying%20Safety%20and%20Human%20Factors%20Issues%20in%20Rail%20Using%20IRIS%20and%20CAIRIS%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Amna%22%2C%22lastName%22%3A%22Altaf%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Shamal%22%2C%22lastName%22%3A%22Faily%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Huseyin%22%2C%22lastName%22%3A%22Dogan%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Alexios%22%2C%22lastName%22%3A%22Mylonas%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Eylem%22%2C%22lastName%22%3A%22Thron%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Sokratis%22%2C%22lastName%22%3A%22Katsikas%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Fr%5Cu00e9d%5Cu00e9ric%22%2C%22lastName%22%3A%22Cuppens%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Nora%22%2C%22lastName%22%3A%22Cuppens%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Costas%22%2C%22lastName%22%3A%22Lambrinoudakis%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Christos%22%2C%22lastName%22%3A%22Kalloniatis%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22John%22%2C%22lastName%22%3A%22Mylopoulos%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Annie%22%2C%22lastName%22%3A%22Ant%5Cu00f3n%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Stefanos%22%2C%22lastName%22%3A%22Gritzalis%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Frank%22%2C%22lastName%22%3A%22Pallas%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22J%5Cu00f6rg%22%2C%22lastName%22%3A%22Pohle%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Angela%22%2C%22lastName%22%3A%22Sasse%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Weizhi%22%2C%22lastName%22%3A%22Meng%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Steven%22%2C%22lastName%22%3A%22Furnell%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Joaquin%22%2C%22lastName%22%3A%22Garcia-Alfaro%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222020%22%2C%22proceedingsTitle%22%3A%22Computer%20Security%22%2C%22conferenceName%22%3A%22%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISBN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YD8A68X5%22%5D%2C%22dateModified%22%3A%222024-03-22T20%3A49%3A34Z%22%7D%7D%2C%7B%22key%22%3A%22NT7UH4WS%22%2C%22library%22%3A%7B%22id%22%3A13925537%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Taylor%20et%20al.%22%2C%22parsedDate%22%3A%222019-01%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%201.35%3B%20%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%20style%3D%5C%22clear%3A%20left%3B%20%5C%22%3E%5Cn%20%20%20%20%3Cdiv%20class%3D%5C%22csl-left-margin%5C%22%20style%3D%5C%22float%3A%20left%3B%20padding-right%3A%200.5em%3B%20text-align%3A%20right%3B%20width%3A%201em%3B%5C%22%3E1.%3C%5C%2Fdiv%3E%3Cdiv%20class%3D%5C%22csl-right-inline%5C%22%20style%3D%5C%22margin%3A%200%20.4em%200%201.5em%3B%5C%22%3ETaylor%20J%2C%20McDougall%20S%2C%20Ollis%20G%2C%20Alford%20P.%20Assessing%20User%20Perceptions%20of%20Trust%20and%20Security%20in%20Manipulated%20Versions%20of%20Low%20Trust%20and%20High%20Trust%20Tourism%20Websites.%20e-Review%20of%20Tourism%20Research.%202019%20Jan%3B16%282%5C%2F3%29.%3C%5C%2Fdiv%3E%5Cn%20%20%20%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Assessing%20User%20Perceptions%20of%20Trust%20and%20Security%20in%20Manipulated%20Versions%20of%20Low%20Trust%20and%20High%20Trust%20Tourism%20Websites%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Jacqui%22%2C%22lastName%22%3A%22Taylor%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Sine%22%2C%22lastName%22%3A%22McDougall%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Gail%22%2C%22lastName%22%3A%22Ollis%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Philip%22%2C%22lastName%22%3A%22Alford%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222019-01%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YD8A68X5%22%5D%2C%22dateModified%22%3A%222024-03-23T00%3A54%3A45Z%22%7D%7D%2C%7B%22key%22%3A%229TNJHUP8%22%2C%22library%22%3A%7B%22id%22%3A13925537%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Flanagan%20et%20al.%22%2C%22parsedDate%22%3A%222019-01%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%201.35%3B%20%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%20style%3D%5C%22clear%3A%20left%3B%20%5C%22%3E%5Cn%20%20%20%20%3Cdiv%20class%3D%5C%22csl-left-margin%5C%22%20style%3D%5C%22float%3A%20left%3B%20padding-right%3A%200.5em%3B%20text-align%3A%20right%3B%20width%3A%201em%3B%5C%22%3E1.%3C%5C%2Fdiv%3E%3Cdiv%20class%3D%5C%22csl-right-inline%5C%22%20style%3D%5C%22margin%3A%200%20.4em%200%201.5em%3B%5C%22%3EFlanagan%20K%2C%20Fallon%20E%2C%20Jacob%20P%2C%20Awad%20A%2C%20Connolly%20P.%202D2N%3A%20A%20Dynamic%20Degenerative%20Neural%20Network%20for%20Classification%20of%20Images%20of%20Live%20Network%20Data.%20In%3A%202019%2016th%20IEEE%20Annual%20Consumer%20Communications%20Networking%20Conference%20%28CCNC%29.%202019.%20p.%201%26%23x2013%3B7.%3C%5C%2Fdiv%3E%5Cn%20%20%20%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22conferencePaper%22%2C%22title%22%3A%222D2N%3A%20A%20Dynamic%20Degenerative%20Neural%20Network%20for%20Classification%20of%20Images%20of%20Live%20Network%20Data%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22K.%22%2C%22lastName%22%3A%22Flanagan%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22E.%22%2C%22lastName%22%3A%22Fallon%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22P.%22%2C%22lastName%22%3A%22Jacob%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22A.%22%2C%22lastName%22%3A%22Awad%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22P.%22%2C%22lastName%22%3A%22Connolly%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222019-01%22%2C%22proceedingsTitle%22%3A%222019%2016th%20IEEE%20Annual%20Consumer%20Communications%20Networking%20Conference%20%28CCNC%29%22%2C%22conferenceName%22%3A%22%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISBN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YD8A68X5%22%5D%2C%22dateModified%22%3A%222024-03-22T20%3A49%3A33Z%22%7D%7D%2C%7B%22key%22%3A%22H9MZSWMD%22%2C%22library%22%3A%7B%22id%22%3A13925537%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Benson%20and%20McAlaney%22%2C%22parsedDate%22%3A%222019%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%201.35%3B%20%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%20style%3D%5C%22clear%3A%20left%3B%20%5C%22%3E%5Cn%20%20%20%20%3Cdiv%20class%3D%5C%22csl-left-margin%5C%22%20style%3D%5C%22float%3A%20left%3B%20padding-right%3A%200.5em%3B%20text-align%3A%20right%3B%20width%3A%201em%3B%5C%22%3E1.%3C%5C%2Fdiv%3E%3Cdiv%20class%3D%5C%22csl-right-inline%5C%22%20style%3D%5C%22margin%3A%200%20.4em%200%201.5em%3B%5C%22%3EBenson%20V%2C%20McAlaney%20J.%20Emerging%20Cyber%20Threats%20and%20Cognitive%20Vulnerabilities.%20Academic%20Press%3B%202019.%3C%5C%2Fdiv%3E%5Cn%20%20%20%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22book%22%2C%22title%22%3A%22Emerging%20Cyber%20Threats%20and%20Cognitive%20Vulnerabilities%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22V%22%2C%22lastName%22%3A%22Benson%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22John%22%2C%22lastName%22%3A%22McAlaney%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222019%22%2C%22language%22%3A%22%22%2C%22ISBN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YD8A68X5%22%5D%2C%22dateModified%22%3A%222024-03-22T20%3A50%3A29Z%22%7D%7D%2C%7B%22key%22%3A%22D9UCKMQE%22%2C%22library%22%3A%7B%22id%22%3A13925537%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Heydari%20et%20al.%22%2C%22parsedDate%22%3A%222019%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%201.35%3B%20%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%20style%3D%5C%22clear%3A%20left%3B%20%5C%22%3E%5Cn%20%20%20%20%3Cdiv%20class%3D%5C%22csl-left-margin%5C%22%20style%3D%5C%22float%3A%20left%3B%20padding-right%3A%200.5em%3B%20text-align%3A%20right%3B%20width%3A%201em%3B%5C%22%3E1.%3C%5C%2Fdiv%3E%3Cdiv%20class%3D%5C%22csl-right-inline%5C%22%20style%3D%5C%22margin%3A%200%20.4em%200%201.5em%3B%5C%22%3EHeydari%20M%2C%20Mylonas%20A%2C%20Katos%20V%2C%20Balaguer-Ballester%20E%2C%20Tafreshi%20VHF%2C%20Benkhelifa%20E.%20A%20Location-Aware%20Authentication%20Model%20to%20Handle%20Uncertainty%20in%20IoT.%20In%3A%202019%20Sixth%20International%20Conference%20on%20Internet%20of%20Things%3A%20Systems%2C%20Management%20and%20Security%20%28IOTSMS%29.%202019.%20p.%2043%26%23x2013%3B50.%3C%5C%2Fdiv%3E%5Cn%20%20%20%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22conferencePaper%22%2C%22title%22%3A%22A%20Location-Aware%20Authentication%20Model%20to%20Handle%20Uncertainty%20in%20IoT%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22M.%22%2C%22lastName%22%3A%22Heydari%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22A.%22%2C%22lastName%22%3A%22Mylonas%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22V.%22%2C%22lastName%22%3A%22Katos%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22E.%22%2C%22lastName%22%3A%22Balaguer-Ballester%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22V.%20H.%20F.%22%2C%22lastName%22%3A%22Tafreshi%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22E.%22%2C%22lastName%22%3A%22Benkhelifa%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222019%22%2C%22proceedingsTitle%22%3A%222019%20Sixth%20International%20Conference%20on%20Internet%20of%20Things%3A%20Systems%2C%20Management%20and%20Security%20%28IOTSMS%29%22%2C%22conferenceName%22%3A%22%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISBN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YD8A68X5%22%5D%2C%22dateModified%22%3A%222024-03-22T20%3A49%3A37Z%22%7D%7D%2C%7B%22key%22%3A%22HXMLQTN8%22%2C%22library%22%3A%7B%22id%22%3A13925537%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Zheng%20et%20al.%22%2C%22parsedDate%22%3A%222019%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%201.35%3B%20%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%20style%3D%5C%22clear%3A%20left%3B%20%5C%22%3E%5Cn%20%20%20%20%3Cdiv%20class%3D%5C%22csl-left-margin%5C%22%20style%3D%5C%22float%3A%20left%3B%20padding-right%3A%200.5em%3B%20text-align%3A%20right%3B%20width%3A%201em%3B%5C%22%3E1.%3C%5C%2Fdiv%3E%3Cdiv%20class%3D%5C%22csl-right-inline%5C%22%20style%3D%5C%22margin%3A%200%20.4em%200%201.5em%3B%5C%22%3EZheng%20G%2C%20Chai%20WK%2C%20Katos%20V.%20An%20Ensemble%20Model%20for%20Short-Term%20Traffic%20Prediction%20in%20Smart%20City%20Transportation%20System.%20In%3A%20Proceedings%20of%20the%202019%20IEEE%20Global%20Communications%20Conference.%20IEEE%3B%202019.%3C%5C%2Fdiv%3E%5Cn%20%20%20%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22conferencePaper%22%2C%22title%22%3A%22An%20Ensemble%20Model%20for%20Short-Term%20Traffic%20Prediction%20in%20Smart%20City%20Transportation%20System%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22G.%22%2C%22lastName%22%3A%22Zheng%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22W.%20K.%22%2C%22lastName%22%3A%22Chai%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22V.%22%2C%22lastName%22%3A%22Katos%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222019%22%2C%22proceedingsTitle%22%3A%22Proceedings%20of%20the%202019%20IEEE%20Global%20Communications%20Conference%22%2C%22conferenceName%22%3A%22%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISBN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YD8A68X5%22%5D%2C%22dateModified%22%3A%222024-03-22T20%3A49%3A36Z%22%7D%7D%2C%7B%22key%22%3A%22AM6HMUFF%22%2C%22library%22%3A%7B%22id%22%3A13925537%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Iliou%20et%20al.%22%2C%22parsedDate%22%3A%222019%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%201.35%3B%20%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%20style%3D%5C%22clear%3A%20left%3B%20%5C%22%3E%5Cn%20%20%20%20%3Cdiv%20class%3D%5C%22csl-left-margin%5C%22%20style%3D%5C%22float%3A%20left%3B%20padding-right%3A%200.5em%3B%20text-align%3A%20right%3B%20width%3A%201em%3B%5C%22%3E1.%3C%5C%2Fdiv%3E%3Cdiv%20class%3D%5C%22csl-right-inline%5C%22%20style%3D%5C%22margin%3A%200%20.4em%200%201.5em%3B%5C%22%3EIliou%20C%2C%20Kostoulas%20T%2C%20Tsikrika%20T%2C%20Katos%20V%2C%20Vrochidis%20S%2C%20Kompatsiaris%20Y.%20Towards%20a%20framework%20for%20detecting%20advanced%20Web%20bots.%20In%3A%20Proceedings%20of%20the%2014th%20International%20Conference%20on%20Availability%2C%20Reliability%20and%20Security.%20IEEE%3B%202019.%3C%5C%2Fdiv%3E%5Cn%20%20%20%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22conferencePaper%22%2C%22title%22%3A%22Towards%20a%20framework%20for%20detecting%20advanced%20Web%20bots%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Christos%22%2C%22lastName%22%3A%22Iliou%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Theodoros%22%2C%22lastName%22%3A%22Kostoulas%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Theodora%22%2C%22lastName%22%3A%22Tsikrika%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Vasilis%22%2C%22lastName%22%3A%22Katos%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Stefanos%22%2C%22lastName%22%3A%22Vrochidis%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Yiannis%22%2C%22lastName%22%3A%22Kompatsiaris%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222019%22%2C%22proceedingsTitle%22%3A%22Proceedings%20of%20the%2014th%20International%20Conference%20on%20Availability%2C%20Reliability%20and%20Security%22%2C%22conferenceName%22%3A%22%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISBN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YD8A68X5%22%5D%2C%22dateModified%22%3A%222024-03-22T20%3A49%3A36Z%22%7D%7D%2C%7B%22key%22%3A%22Z4MT8RAJ%22%2C%22library%22%3A%7B%22id%22%3A13925537%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Qurashi%20et%20al.%22%2C%22parsedDate%22%3A%222019%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%201.35%3B%20%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%20style%3D%5C%22clear%3A%20left%3B%20%5C%22%3E%5Cn%20%20%20%20%3Cdiv%20class%3D%5C%22csl-left-margin%5C%22%20style%3D%5C%22float%3A%20left%3B%20padding-right%3A%200.5em%3B%20text-align%3A%20right%3B%20width%3A%201em%3B%5C%22%3E1.%3C%5C%2Fdiv%3E%3Cdiv%20class%3D%5C%22csl-right-inline%5C%22%20style%3D%5C%22margin%3A%200%20.4em%200%201.5em%3B%5C%22%3EQurashi%20MA%2C%20Angelopoulos%20CM%2C%20Katos%20V.%20Efficient%20Intrusion%20Detection%20in%20P2P%20IoT%20Networks.%20In%3A%20Proceedings%20of%20the%206th%20International%20Symposium%20for%20ICS%20%26amp%3B%20SCADA%20Cyber%20Security.%20British%20Computer%20Society%3B%202019.%3C%5C%2Fdiv%3E%5Cn%20%20%20%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22conferencePaper%22%2C%22title%22%3A%22Efficient%20Intrusion%20Detection%20in%20P2P%20IoT%20Networks%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Mohammed%20Al%22%2C%22lastName%22%3A%22Qurashi%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Constantinos%20Marios%22%2C%22lastName%22%3A%22Angelopoulos%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Vasilos%22%2C%22lastName%22%3A%22Katos%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222019%22%2C%22proceedingsTitle%22%3A%22Proceedings%20of%20the%206th%20International%20Symposium%20for%20ICS%20%26%20SCADA%20Cyber%20Security%22%2C%22conferenceName%22%3A%22%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISBN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YD8A68X5%22%5D%2C%22dateModified%22%3A%222024-03-22T20%3A49%3A35Z%22%7D%7D%2C%7B%22key%22%3A%224Q5MZKG4%22%2C%22library%22%3A%7B%22id%22%3A13925537%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Damianou%20et%20al.%22%2C%22parsedDate%22%3A%222019%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%201.35%3B%20%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%20style%3D%5C%22clear%3A%20left%3B%20%5C%22%3E%5Cn%20%20%20%20%3Cdiv%20class%3D%5C%22csl-left-margin%5C%22%20style%3D%5C%22float%3A%20left%3B%20padding-right%3A%200.5em%3B%20text-align%3A%20right%3B%20width%3A%201em%3B%5C%22%3E1.%3C%5C%2Fdiv%3E%3Cdiv%20class%3D%5C%22csl-right-inline%5C%22%20style%3D%5C%22margin%3A%200%20.4em%200%201.5em%3B%5C%22%3EDamianou%20A%2C%20Angelopoulos%20CM%2C%20Katos%20V.%20Architecture%20for%20Blockchain%20over%20Edge-enabled%20IoT%20for%20Smart%20Circular%20Cities.%20In%3A%20Proceedings%20of%20the%201st%20International%20Workshop%20on%20Smart%20Circular%20Economy.%20IEEE%3B%202019.%3C%5C%2Fdiv%3E%5Cn%20%20%20%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22conferencePaper%22%2C%22title%22%3A%22Architecture%20for%20Blockchain%20over%20Edge-enabled%20IoT%20for%20Smart%20Circular%20Cities%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Amalia%22%2C%22lastName%22%3A%22Damianou%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Constantinos%20Marios%22%2C%22lastName%22%3A%22Angelopoulos%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Vasilis%22%2C%22lastName%22%3A%22Katos%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222019%22%2C%22proceedingsTitle%22%3A%22Proceedings%20of%20the%201st%20International%20Workshop%20on%20Smart%20Circular%20Economy%22%2C%22conferenceName%22%3A%22%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISBN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YD8A68X5%22%5D%2C%22dateModified%22%3A%222024-03-22T20%3A49%3A35Z%22%7D%7D%2C%7B%22key%22%3A%2267EGHPSB%22%2C%22library%22%3A%7B%22id%22%3A13925537%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Angelopoulos%20et%20al.%22%2C%22parsedDate%22%3A%222019%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%201.35%3B%20%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%20style%3D%5C%22clear%3A%20left%3B%20%5C%22%3E%5Cn%20%20%20%20%3Cdiv%20class%3D%5C%22csl-left-margin%5C%22%20style%3D%5C%22float%3A%20left%3B%20padding-right%3A%200.5em%3B%20text-align%3A%20right%3B%20width%3A%201em%3B%5C%22%3E1.%3C%5C%2Fdiv%3E%3Cdiv%20class%3D%5C%22csl-right-inline%5C%22%20style%3D%5C%22margin%3A%200%20.4em%200%201.5em%3B%5C%22%3EAngelopoulos%20CM%2C%20Katos%20V%2C%20Kostoulas%20T%2C%20Miaoudakis%20A%2C%20Petroulakis%20N%2C%20Alexandris%20G%2C%20et%20al.%20IDEAL%20CITIES%20-%20A%20Trustworthy%20and%20Sustainable%20Framework%20for%20Circular%20Smart%20Cities.%20In%3A%20Proceedings%20of%20the%201st%20International%20Workshop%20on%20Smart%20Circular%20Economy.%20IEEE%3B%202019.%3C%5C%2Fdiv%3E%5Cn%20%20%20%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22conferencePaper%22%2C%22title%22%3A%22IDEAL%20CITIES%20-%20A%20Trustworthy%20and%20Sustainable%20Framework%20for%20Circular%20Smart%20Cities%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Constantinos%20Marios%22%2C%22lastName%22%3A%22Angelopoulos%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Vasilis%22%2C%22lastName%22%3A%22Katos%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Theodoros%22%2C%22lastName%22%3A%22Kostoulas%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Andreas%22%2C%22lastName%22%3A%22Miaoudakis%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Nikolaos%22%2C%22lastName%22%3A%22Petroulakis%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22George%22%2C%22lastName%22%3A%22Alexandris%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Giorgos%22%2C%22lastName%22%3A%22Demetriou%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Giuditta%22%2C%22lastName%22%3A%22Morandi%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Karolina%22%2C%22lastName%22%3A%22Waledzik%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Urszula%22%2C%22lastName%22%3A%22Rak%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Marios%22%2C%22lastName%22%3A%22Panayiotou%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Christos%20Iraklis%22%2C%22lastName%22%3A%22Tsatsoulis%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222019%22%2C%22proceedingsTitle%22%3A%22Proceedings%20of%20the%201st%20International%20Workshop%20on%20Smart%20Circular%20Economy%22%2C%22conferenceName%22%3A%22%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISBN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22YD8A68X5%22%5D%2C%22dateModified%22%3A%222024-03-22T20%3A49%3A35Z%22%7D%7D%5D%7D
1.
Henriksen-Bulmer J, Rosenorn-Lanng E, Corbin-Clarke S, Ware S, Melacca D, Fenge LA. Using game-based learning to teach young people about privacy and online safety. Interactive Learning Environments. 2023 Nov 30;1–21.
1.
Lockett A, Chalkias I, Yucel C, Henriksen-Bulmer J, Katos V. Investigating IPTV Malware in the Wild. Future Internet. 2023 Sep 28;15(10):325.
1.
Adams C, Eslamnejad M, Khadka A, M’manga A, Shaw H, Zhao Y. Auditing AI Systems: A Metadata Approach. In: Bramer M, Stahl F, editors. Artificial Intelligence XL. Cham: Springer Nature Switzerland; 2023. p. 241–6.
1.
Brady C, M’manga A. Gamification of Cyber Security Training - EnsureSecure. In: 2022 IEEE International Conference on e-Business Engineering (ICEBE). Bournemouth, United Kingdom: IEEE; 2022. p. 7–12.
1.
Henriksen-Bulmer J, Yucel C, Faily S, Chalkias I. Privacy Goals for the Data Lifecycle. Future Internet. 2022 Oct;14(11):315.
1.
Sallal M, de Fréin R, Malik A, Aziz B. An empirical comparison of the security and performance characteristics of topology formation algorithms for Bitcoin networks. Array. 2022 Sep;15:100221.
1.
Sallal M, Owenson G, Salman D, Adda M. Security and performance evaluation of master node protocol based reputation blockchain in the bitcoin network. Blockchain: Research and Applications. 2022;3(1):100048.
1.
Katos V, Ki-Aries D, Faily S, Genchev A, Bozhilova M, Stoianov N. Cybersecurity User Requirements Analysis: The ECHO Approach. In: Shkarlet S, Morozov A, Palagin A, Vinnikov D, Stoianov N, Zhelezniak M, et al., editors. Mathematical Modeling and Simulation of Systems. Cham: Springer International Publishing; 2022. p. 405–21.
1.
Zheng G, Chai WK, Katos V. A dynamic spatial–temporal deep learning framework for traffic speed prediction on large-scale road networks. Expert Systems with Applications. 2022;195:116585.
1.
McAlaney J. Are you anonymous? Social-psychological processes of hacking groups. Cybersecurity and Cognitive Science. In: Cybersecurity and Cognitive Science. Academic Press; 2022.
1.
Deutrom J, Katos V, Al-Mourad M, Ali R. The relationships between gender, life satisfaction, loneliness and problematic internet use during CoViD-19: does the lockdown matter? International journal of environmental research and public health. 2022;19(3):1325.
1.
Simou S, Kalloniatis C, Gritzalis S, Katos V. Revised forensic framework validation and cloud forensic readiness. International Journal of Electronic Governance. 2022;14(1–2):236–63.
1.
Turner R, M’manga A. Requirements for a Platform that Improves the Number of Young Women Entering Cybersecurity. In: 35th International BCS Human-Computer Interaction Conference. 2022.
1.
Jarvis PD, Damianou A, Ciobanu C, Katos V. Vulnerability Exposure Driven Intelligence in Smart, Circular Cities. Digital Threats: Research and Practice. 2021 Sep;3487059.
1.
Tsimperidis I, Yucel C, Katos V. Age and Gender as Cyber Attribution Features in Keystroke Dynamic-Based User Classification Processes. Electronics. 2021;10(7).
1.
Tsimperidis I, Rostami S, Wilson K, Katos V. User Attribution Through Keystroke Dynamics-Based Author Age Estimation. In: Ghita B, Shiaeles S, editors. Selected Papers from the 12th International Networking Conference. Springer; 2021. p. 47–61.
1.
Apostolopoulos T, Katos V, Choo KKR, Patsakis C. Resurrecting anti-virtualization and anti-debugging: Unhooking your hooks. Future Generation Computer Systems. 2021;116:393–405.
1.
Katos V, Efraimidis P. Privacy in Data-Driven Circular Economy. In: Jajodia S, Samarati P, Yung M, editors. Encyclopedia of Cryptography, Security and Privacy. Springer; 2021. p. 1–3.
1.
Katos V, Ciobanu C. Economics of Software Vulnerability Markets. In: Jajodia S, Samarati P, Yung M, editors. Encyclopedia of Cryptography, Security and Privacy. Springer; 2021. p. 1–5.
1.
Pilton C, Faily S, Henriksen-Bulmer J. Evaluating Privacy - Determining User Privacy Expectations on the Web. Computers & Security. 2021;105:102241.
1.
Faily S, Iacob C, Ali R, Ki-Aries D. Visualising Personas as Goal Models to Find Security Tensions. Information and Computer Security. 2021;
1.
Hatzivasilis G, Soultatos O, Chatziadam P, Fysarakis K, Askoxylakis I, Ioannidis S, et al. WARDOG: Awareness detection watchbog for Botnet infection on the host device. IEEE Transactions on Sustainable Computing. 2021;6(1):4–18.
1.
Danilatou V, Antonakaki D, Tzagkarakis C, Kanterakis A, Katos V, Kostoulas T. Automated Mortality Prediction in Critically-ill Patients with Thrombosis using Machine Learning. In: 2020 IEEE 20th International Conference on Bioinformatics and Bioengineering (BIBE). IEEE; 2020. p. 247–54.
1.
Taylor-Jackson J, Matthews S. The Influence of Traits Associated with Autism Spectrum Disorder (ASD) on the Detection of Fake News. In: Stephanidis C, Salvendy G, Wei J, Yamamoto S, Mori H, Meiselwitz G, et al., editors. HCI International 2020 – Late Breaking Papers: Interaction, Knowledge and Social Media. Cham: Springer; 2020. p. 464–72.
1.
Taylor-Jackson J, McAlaney J, Foster JL, Bello A, Maurushat A, Dale J. Incorporating Psychology into Cyber Security Education: A Pedagogical Approach. In: Bernhard M, Bracciali A, Camp LJ, Matsuo S, Maurushat A, Rønne PB, et al., editors. Financial Cryptography and Data Security. Springer; 2020. p. 207–17.
1.
McAlaney J, Hills PJ. Understanding Phishing Email Processing and Perceived Trustworthiness Through Eye Tracking. Frontiers in Psychology. 2020;11:1756.
1.
Faily S, Scandariato R, Shostack A, Sion L, Ki-Aries D. Contextualisation of Data Flow Diagrams for Security Analysis. In: Eades III H, Gadyatskaya O, editors. Graphical Models for Security. Springer International Publishing; 2020. p. 186–97.
1.
Sample C, Jensen M, Scott K, McAlaney J, Brockinton A, Fitchpatrick S, et al. Interdisciplinary lessons learned while researching fake news. Frontiers in Psychology. 2020;
1.
Faily S, Iacob C, Ali R, Ki-Aries D. Identifying Implicit Vulnerabilities through Personas as Goal Models. In: Proceedings of the 4th International Workshop on SECurity and Privacy Requirements Engineering (SECPRE 2020). Springer; 2020.
1.
Benson V, McAlaney J. Cyber Influence and Cognitive Threats. Academic Press; 2020.
1.
Ben Naseir M, Dogan H, Apeh E, Ali R. National Cybersecurity Capacity Building Framework for Countries in a Transitional Phase. In: Proceedings of the 22nd International Conference on Enterprise Information Systems - Volume 2: ICEIS,. SciTePress; 2020. p. 841–9.
1.
McAlaney J, Benson V. Chapter 1 - Cybersecurity as a social phenomenon. In: Benson V, Mcalaney J, editors. Cyber Influence and Cognitive Threats. Academic Press; 2020. p. 1–8.
1.
Szedlak D, M’manga A. Eliciting Requirements for a Student-focussed Capture The Flag. In: Proceedings of the 7th International Conference on Behavioural and Social Computing. IEEE; 2020.
1.
Patsakis C, Casino F, Lykousas N, Katos V. Unravelling Ariadne’s Thread: Exploring the Threats of Decentralised DNS. IEEE Access. 2020;8:118559–71.
1.
Henriksen-Bulmer J, Faily S, Jeary S. DPIA in Context: Applying DPIA to Assess Privacy Risks of Cyber Physical Systems. Future Internet. 2020;12(5):93.
1.
Simou S, Kalloniatis C, Gritzalis S, Katos V. A Revised Forensic Process for Aligning the Investigation Process with the Design of Forensic-Enabled Cloud Services. In: Katsikas S, Zorkadis V, editors. E-Democracy – Safeguarding Democracy and Human Rights in the Digital Age. Springer International Publishing; 2020. p. 161–77.
1.
Heydari M, Mylonas A, Tafreshi VHF, Benkhelifa E, Singh S. Known unknowns: Indeterminacy in authentication in IoT. Future Generation Computer Systems. 2020;
1.
Rantos K, Spyros A, Papanikolaou A, Kritsas A, Ilioudis C, Katos V. Interoperability Challenges in the Cybersecurity Information Sharing Ecosystem. Computers. 2020;9(1).
1.
Qurashi MA, Angelopoulos CM, Katos V. An architecture for resilient intrusion detection in ad-hoc networks. Journal of Information Security and Applications. 2020;53:102530.
1.
Patsakis C, Casino F, Katos V. Encrypted and covert DNS queries for botnets: Challenges and countermeasures. Computers & Security. 2020;88:101614.
1.
Altaf A, Faily S, Dogan H, Mylonas A, Thron E. Identifying Safety and Human Factors Issues in Rail Using IRIS and CAIRIS. In: Katsikas S, Cuppens F, Cuppens N, Lambrinoudakis C, Kalloniatis C, Mylopoulos J, et al., editors. Computer Security. Springer; 2020. p. 98–107.
1.
Taylor J, McDougall S, Ollis G, Alford P. Assessing User Perceptions of Trust and Security in Manipulated Versions of Low Trust and High Trust Tourism Websites. e-Review of Tourism Research. 2019 Jan;16(2/3).
1.
Flanagan K, Fallon E, Jacob P, Awad A, Connolly P. 2D2N: A Dynamic Degenerative Neural Network for Classification of Images of Live Network Data. In: 2019 16th IEEE Annual Consumer Communications Networking Conference (CCNC). 2019. p. 1–7.
1.
Benson V, McAlaney J. Emerging Cyber Threats and Cognitive Vulnerabilities. Academic Press; 2019.
1.
Heydari M, Mylonas A, Katos V, Balaguer-Ballester E, Tafreshi VHF, Benkhelifa E. A Location-Aware Authentication Model to Handle Uncertainty in IoT. In: 2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS). 2019. p. 43–50.
1.
Zheng G, Chai WK, Katos V. An Ensemble Model for Short-Term Traffic Prediction in Smart City Transportation System. In: Proceedings of the 2019 IEEE Global Communications Conference. IEEE; 2019.
1.
Iliou C, Kostoulas T, Tsikrika T, Katos V, Vrochidis S, Kompatsiaris Y. Towards a framework for detecting advanced Web bots. In: Proceedings of the 14th International Conference on Availability, Reliability and Security. IEEE; 2019.
1.
Qurashi MA, Angelopoulos CM, Katos V. Efficient Intrusion Detection in P2P IoT Networks. In: Proceedings of the 6th International Symposium for ICS & SCADA Cyber Security. British Computer Society; 2019.
1.
Damianou A, Angelopoulos CM, Katos V. Architecture for Blockchain over Edge-enabled IoT for Smart Circular Cities. In: Proceedings of the 1st International Workshop on Smart Circular Economy. IEEE; 2019.
1.
Angelopoulos CM, Katos V, Kostoulas T, Miaoudakis A, Petroulakis N, Alexandris G, et al. IDEAL CITIES - A Trustworthy and Sustainable Framework for Circular Smart Cities. In: Proceedings of the 1st International Workshop on Smart Circular Economy. IEEE; 2019.