A Study of Anti-Phising Methodologies and Phishing Detection Algorithms
|
2019 |
Cerda, Beatrice M. |
Semantic Knowledge Architecture for Cyber Security
|
2019 |
Sayan, Carla |
Cross-Platform Malware: Study of the Forthcoming Hazard Adaptation and Behavior
|
2019 |
Zahran, Bassam |
Toward a Quantum Resistant SecretMatch Privacy Enhanced Technology - A Case Study
|
2019 |
Horne, Dwight |
Mobile App-Browser Extension Based Authentication
|
2019 |
Desai, Ritwik |
Formalization of Security Requirements and Attack Models for Cryptographic Hash Functions in ProVerif
|
2019 |
Yoshimura, Togo |
Towards a Method for Examining the Effects of Cognitive Load on the Performance of Cyber First Responders
|
2019 |
Speelman, Craig |
Security Lessons from Building a Back-End Service for Data Collection
|
2019 |
Lui, Halmon |
That's how I feel: A Study of User's Security Mental Model
|
2019 |
Albalawi, Tahani |
Impact of Cyber Security Mechanisms on Employees' Behavior
|
2019 |
Hausawi, Yasser |
Out-of-Band Authentication Using 2-Factor Image Matching
|
2019 |
Lu, H. Karen |
Component Selection Process in Assembling Cyberattack Simulation Models
|
2019 |
Mayfield, Katia |
A Survey of Layered Approach to Threats and Countermeasures
|
2019 |
Bujud, Dina S. |
Attribute Stream-Based Access Control (ASBAC) - Functional Architecture and Patterns
|
2019 |
Heutelbeck, Dominic |
Chaining JSON Blocks for Secure Transmission of Mobile Data Sequences
|
2019 |
Yoon, John |
Blockchain based IoT node Authentication in WSNs
|
2019 |
Hong, Sunghyuck |
An Efficient Private Matching and Set Intersection Protocol: Implementation PM-Malicious Server
|
2019 |
Saldamli, Gokay |
Smart Voting Keys to e-Democracy
|
2019 |
Wolfe, Andrew |
Survey on Shilling Attacks and their Detection Algorithms in Recommender Systems
|
2019 |
Badran, Miriam El Khoury |
Feature-level Data Fusion for Bio-metric Mobile Applications. A case study
|
2019 |
Soviany, Sorin |