New Dimensions of Information Warfare: The Economic Pillar—Fintech and Cryptocurrencies
|
2021 |
Caprolu, Maurantonio |
Measuring and Modeling Software Vulnerability Security Advisory Platforms
|
2021 |
Miranda, Lucas |
Implementation Flaws in TLS Stacks: Lessons Learned and Study of TLS 1.3 Benefits
|
2021 |
Levillain, Olivier |
Asset-Driven Approach for Security Risk Assessment in IoT Systems
|
2021 |
Chehida, Salim |
An OWASP Top Ten Driven Survey on Web Application Protection Methods
|
2021 |
Fredj, Quissem Ben |
Secure Data Processing for Industrial Remote Diagnosis and Maintenance
|
2021 |
Arabi, Walid |
Security Assessment and Hardening of Autonomous Vehicles
|
2021 |
Ouchani, Samir |
Malicious Http Request Detection Using Code-Level Convolutional Neural Network
|
2021 |
Jemal, Ines |
Enhancement of a Business Model with a Business Contextual Risk Model
|
2021 |
Kamagate, Zakariya |
Frequency Hopping Spread Spectrum to Counter Relay Attacks in PKESs Zulkernine
|
2021 |
Lounis, Karim |
Security Through Transparency and Openness in Computer Design
|
2021 |
Emanuilov, lvo |
A Posteriori Analysis of Policy Temporal Compliance
|
2021 |
Dernaika, Farah |
Autonomous Vehicle Security: Literature Review of Real Attack Experiments
|
2021 |
Bouchelaghem, Siham |
Augmented Voting Reality
|
2021 |
Chabanne, Hervé |
Towards Attacker Attribution for Risk Analysis
|
2021 |
Doynikova, Elena |
A Deeper Analysis of Adversarial Examples in Intrusion Detection
|
2021 |
Merzouk, Mohamed Amine |
An ML Behavior-Based Security Control for Smart Home Systems
|
2021 |
Amraoui, Noureddine |
Community Knowledge About Security: Identification and Classification of User Contributions
|
2021 |
Viertel, Fabien Patrick |
Heterogeneous Security Events Prioritization Using Auto-encoders
|
2021 |
Dey, Alexandre |
Modelling Security Risk Scenarios Using Subjective Attack Trees
|
2021 |
Al-Hadhrami, Nasser |