Combining unit and specification-based testing for meta-model validation and verification Fulltext Access 32 Pages 2016
Modality specific assessment of video game player’s experience using the Emotiv Fulltext Access 6 Pages 2015
Identifying management factors for digital incident responses on Machine-to-Machine services Fulltext Access 7 Pages 2015
Critical infrastructure dependencies: A holistic, dynamic and quantitative approach Fulltext Access 8 Pages 2015
Investigating evidence of mobile phone usage by drivers in road traffic accidents Fulltext Access 8 Pages 2015
Covert communication by means of email spam: A challenge for digital investigation Fulltext Access 8 Pages 2015
Leveraging CybOX™ to standardize representation and exchange of digital forensic information Fulltext Access 9 Pages 2015
“The app market has been candy crushed”: Observed and rationalized processes for selecting smartphone games Fulltext Access 9 Pages 2015
An annotation tool for automatically triangulating individuals’ psychophysiological emotional reactions to digital media stimuli Fulltext Access 9 Pages 2015
A typology of hackers: Classifying cyber malfeasance using a weighted arc circumplex model Fulltext Access 10 Pages 2015
Differences in computer use for entertainment between boys and girls: Evidence from a global survey Fulltext Access 10 Pages 2015
Designing robustness and resilience in digital investigation laboratories Fulltext Access 10 Pages 2015
Hviz: HTTP(S) traffic aggregation and visualization for network forensics Fulltext Access 11 Pages 2015
Adaptive photo-response non-uniformity noise removal against image source attribution Fulltext Access 11 Pages 2015
Descrambling data on solid-state disks by reverse-engineering the firmware Fulltext Access 11 Pages 2015
Detecting anomalous programmable logic controller behavior using RF-based Hilbert transform features and a correlation-based verification process Fulltext Access 11 Pages 2015
Multidisciplinary coordination of on-scene command teams in virtual emergency exercises Fulltext Access 11 Pages 2015
Acquisition and analysis of compromised firmware using memory forensics Fulltext Access 11 Pages 2015
SIGMA: A Semantic Integrated Graph Matching Approach for identifying reused functions in binary code Fulltext Access 11 Pages 2015
DFBotKiller: Domain-flux botnet detection based on the history of group activities and failures in DNS traffic Fulltext Access 12 Pages 2015
Characterization of the windows kernel version variability for accurate memory analysis Fulltext Access 12 Pages 2015
Automated event and social network extraction from digital evidence sources with ontological mapping Fulltext Access 13 Pages 2015
Forensic implications of System Resource Usage Monitor (SRUM) data in Windows 8 Fulltext Access 13 Pages 2015
Wireless infrastructure protection using low-cost radio frequency fingerprinting receivers Fulltext Access 13 Pages 2015
A quantitative approach for assessing the critical nodal and linear elements of a railway infrastructure Fulltext Access 13 Pages 2015
BrowStEx: A tool to aggregate browser storage artifacts for forensic analysis Fulltext Access 13 Pages 2015
An investigation of anonymous and spoof SMS resources used for the purposes of cyberstalking Fulltext Access 14 Pages 2015
Critical infrastructure protection: Requirements and challenges for the 21st century Fulltext Access 14 Pages 2015
A study on JPEG steganalytic features: Co-occurrence matrix vs. Markov transition probability matrix Fulltext Access 14 Pages 2015
Andro-AutoPsy: Anti-malware system based on similarity matching of malware and malware creator-centric information Fulltext Access 19 Pages 2015
Data-Driven Retrospective Interviewing (DDRI): A proposed methodology for formative evaluation of pervasive games Fulltext Access 19 Pages 2015
Cloud forensics: Technical challenges, solutions and comparative analysis Fulltext Access 20 Pages 2015
Metrics for desired structural features for narrative renderings of game logs Fulltext Access 6 Pages 2014
Geometrical vs topological measures for the evolution of aesthetic maps in a RTS game Fulltext Access 8 Pages 2014
Comparing interaction techniques for serious games through brain–computer interfaces: A user perception evaluation study Fulltext Access 9 Pages 2014
Development of a mechanical maintenance training simulator in OpenSimulator for F-16 aircraft engines Fulltext Access 9 Pages 2014
A methodological approach to identifying and quantifying video game difficulty factors Fulltext Access 9 Pages 2014
Schoolchildren’s user experiences on a physical exercise game utilizing lighting and audio Fulltext Access 10 Pages 2014
Haptic robotization of the human body by data-driven vibrotactile feedback Fulltext Access 10 Pages 2014
Serious games and the development of an entrepreneurial mindset in higher education engineering students Fulltext Access 10 Pages 2014
Exposing vulnerabilities in electric power grids: An experimental approach Fulltext Access 10 Pages 2014
Evaluation of the ability of the Shodan search engine to identify Internet-facing industrial control devices Fulltext Access 10 Pages 2014
Phasor measurement unit selection for unobservable electric power data integrity attack detection Fulltext Access 10 Pages 2014
Planar character animation using genetic algorithms and GPU parallel computing Fulltext Access 10 Pages 2014
Gamifying requirement elicitation: Practical implications and outcomes in improving stakeholders collaboration Fulltext Access 11 Pages 2014
A computational asset vulnerability model for the strategic protection of the critical infrastructure Fulltext Access 11 Pages 2014
Improving level design through game user research: A comparison of methodologies Fulltext Access 11 Pages 2014
A framework for studying mortality arising from critical infrastructure loss Fulltext Access 12 Pages 2014
Design guidelines for developing customised serious games for Parkinson’s Disease rehabilitation using bespoke game sensors Fulltext Access 12 Pages 2014
A dynamic flexible and interactive display method of digital photographs Fulltext Access 12 Pages 2014
Temporal multimodal data synchronisation for the analysis of a game driving task using EEG Fulltext Access 12 Pages 2014
Validation of a social media quiz game as a measurement instrument for climate change knowledge Fulltext Access 13 Pages 2014
Going out of business: Auction house behavior in the Massively Multi-player Online Game Glitch Fulltext Access 14 Pages 2014
Exploiting VoIP softphone vulnerabilities to disable host computers: Attacks and mitigation Fulltext Access 14 Pages 2014
Identifying critical infrastructure sectors and their dependencies: An Indian scenario Fulltext Access 15 Pages 2014
Trust building and the European Reference Network for Critical Infrastructure Protection community Fulltext Access 18 Pages 2014
Effect of air travel on the spread of an avian influenza pandemic to the United States Fulltext Access 21 Pages 2014