MITRE ATT&CK-driven Cyber Risk Assessment
Optimising User Security Recommendations for AI-Powered Smart-Homes
Practical Algorithm Substitution Attack on Extractable Signatures


HoneyCar: A Framework to Configure Honeypot Vulnerabilities on the Internet of Vehicles
Towards Dynamic Threat Modelling in 5G Core Networks Based on MITRE ATT&CK
Multi-Stage Threat Modelling and Security Monitoring in 5GCN
Game-Theoretic Decision Support for Cyber Forensic Investigations
Automated Cyber and Privacy Risk Management Toolkit
Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review
Cyber-Insurance: Past, Present and Future
Data-Driven Decision Support for Optimizing Cyber Forensic Investigations


Self-Configurable Cyber-Physical Intrusion Detection for Smart Homes Using Reinforcement Learning
Multiobjective Optimization Algorithms for Wireless Sensor Networks
ARIES: A Novel Multivariate Intrusion Detection System for Smart Grid
SECONDO: A Platform for Cybersecurity Investments and Cyber Insurance Decisions
Deep Binarized Convolutional Neural Network Inferences over Encrypted Data
Cache-Based Privacy Preserving Solution for Location and Content Protection in Location-Based Services
TT-SVD: an Efficient Sparse Decision Making Model with Two-way Trust Recommendation in the AI Enabled IoT Systems
An Efficient Attribute-based Multi-Keyword Search Scheme in Encrypted Keyword Generation
Dynamic Decision Support for Resource Offloading in Heterogeneous Internet of Things environments
Post quantum proxy signature scheme based on the multivariate public key cryptographic signature
On-the-fly Privacy for Location Histograms
Optimizing Investments in Cyber Hygiene for Protecting Healthcare Users


DT-CP: a Double-TTPs Based Contract-Signing Protocol With Lower Computational Cost
Post-Incident Audits on Cyber Insurance Discounts
A Taxonomy and Survey of Attacks Against Machine Learning
Honeypot Type Selection Games for Smart Grid Networks
Cut-The-Rope: A Game of Stealthy Intrusion
Using Sparse Representation to Detect Anomalies in Complex WSNs
CUREX: seCUre and pRivate hEalth data eXchange
Distributed Key Management in Microgrids
Apparatus: A Framework for Security Analysis in Internet of Things Systems
Attacking IEC-60870-5-104 SCADA Systems
A New Encrypted Data Switching Protocol: Bridging IBE and ABE Without Loss of Data Confidentiality
TAW: Cost-Effective Threshold Authentication with Weights for Internet of Things
A Taxonomy and Survey of Cyber-Physical Intrusion Detection Approaches for Vehicles
Quantum-Resistant Identity-Based Signature with Message Recovery and Proxy Delegation


Towards the Definition of a Security Incident Response Modelling Language
An Enhanced Cyber Attack Attribution Framework
Unsupervised Learning for Trustworthy IoT
Risk Assessment Uncertainties in Cybersecurity Investments


An Options Approach to Cybersecurity Investment
COALA: A Protocol for the Avoidance and Alleviation of Congestion in Wireless Sensor Networks
Selecting Security Mechanisms in Secure Tropos
ASTo: A Tool for Security Analysis of IoT Systems
Apparatus: Reasoning About Security Requirements in the Internet of Things
A Conceptual Model to Support Security Analysis in the Internet of Things
The Applicability of Ambient Sensors as Proximity Evidence for NFC Transactions
Security Requirements Modelling for Virtualized 5G Small Cell Networks
Game Theoretic Path Selection to Support Security in Device-to-Device Communications


Evaluating Case-based Reasoning Knowledge Discovery in Fraud Detection
Decision Support Approaches for Cyber Security Investment


Game-Theoretic Model of Incentivizing Privacy-Aware Users to Consent to Location Tracking
A Game-Theoretic Approach for Minimizing Security Risks in the Internet-of-Things


Secure Message Delivery Games for Device-to-Device Communications
Cybersecurity Games and Investments: A Decision Support Approach
Game Theory Meets Information Security Management


Standardisation Advancements in the Area of Routing for Mobile Ad-Hoc Networks
A Probabilistic Algorithm for Secret Matrix Share Size Reduction


Secure Decentralised Ubiquitous Networking for Emergency Communications
Security Model for Emergency Real-Time Communications in Autonomous Networks
A Case Study of Internet of Things Based on Wireless Sensor Networks and Smart Phones
Recipients' Anonymity in Multihop Ad-Hoc Networks


Performance evaluation of secure video transmission over WIMAX


A Testbed Implementation for Securing OLSR in Mobile Ad-hoc Networks
ChaMeLeon (CML): A hybrid and adaptive routing protocol for Emergency Situations
Secure Routing for Supporting Ad-hoc Extreme Emergency Infrastructures
Adaptive and Secure Routing Protocol for Emergency Mobile Ad Hoc Networks
End-to-End Security Protection


A Framework Supporting Extreme Emergency Services
Maximizing Network Throughput


Optimizing the Channel Load Reporting Process in IEEE 802.11 k-enabled WLANs