A Comprehensive Technical Survey of Contemporary Cybersecurity Products and Solutions
|
2020 |
Tselios, Christos |
Deploying Fog-to-Cloud Towards a Security Architecture for Critical Infrastructure Scenarios
|
2020 |
Kahvazadeh, Sarang |
CyberSure: A Framework for Liability Based Trust
|
2020 |
Christou, George |
Web Servers Protection Using Anomaly Detection for HTTP Requests
|
2020 |
Sǎtmǎrean, Paul |
Horizontal Attacks Against ECC: From Simulations to ASIC
|
2020 |
Kabin, levgen |
You Shall Not Register! Detecting Privacy Leaks Across Registration Forms
|
2020 |
Chatzimpyrros, Manolis |
Difficult XSS Code Patterns for Static Code Analysis Tools
|
2020 |
Schuckert, Felix |
A Model Driven Approach for Cyber Security Scenarios Deployment
|
2020 |
Braghin, Chiara |
PROTECT ~ An Easy Configurable Serious Game to Train Employees Against Social Engineering Attacks
|
2020 |
Goeke, Ludger |
The THREAT-ARREST Cyber-Security Training Platform.
|
2020 |
Soultatos, Othonas |
dAPTaset: A Comprehensive Mapping of APT-Related Data
|
2020 |
Laurenza, Giuseppe |
Model-Driven Cyber Range Training: A Cyber Security Assurance Perspective
|
2020 |
Somarakis, lason |
Blockchain Based Sharing of Security Information for Critical Infrastructures of the Finance Sector
|
2020 |
Karagiannis, loannis |
A Language-Based Approach to Prevent DDoS Attacks in Distributed Financial Agent Systems
|
2020 |
Fazeldehkordi, Elahe |
Bunkers: Jail Application Level Firewall for the Mitigation and Identification of Service Takeover Attacks on HardenedBSD
|
2020 |
Anton, Alin |
Event-Based Remote Attacks in HTML5-Based Mobile Apps
|
2020 |
Lau, Phi Tuong |
An Open and Flexible CyberSecurity Training Laboratory in lT/OT Infrastructures
|
2020 |
Nicolodi,, Umberto Morelli, Lorenzo |
Towards the Insurance of Healthcare Systems
|
2020 |
Hatzivasilis, George |