Accessible Cyber Security: The Next Frontier?
|
2021 |
Renaud, Karen |
A Permissioned Blockchain-based System for Collaborative Drug Discovery
|
2021 |
Olsson, Christoffer |
Optimizing Leak Detection in Open-source Platforms with Machine Learning Techniques
|
2021 |
Lounici, Sofiane |
Automatic Detection and Decryption of AES by Monitoring S-Box Access
|
2021 |
Kokeš, Josef |
CyExec*: Automatic Generation of Randomized Cyber Range Scenarios
|
2021 |
Nakata, Ryotaro |
From Exposed to Exploited: Drawing the Picture of Industrial Control Systems Security Status in the Internet Age
|
2021 |
Wu, Yixiong |
A Protection against the Extraction of Neural Network Models
|
2021 |
Chabanne, Hervé |
Admonita: A Recommendation-based Trust Model for Dynamic Data Integrity
|
2021 |
Al-Mawee, Wassnaa |
Model-based Threat and Risk Assessment for Systems Design
|
2021 |
Shaked, Avi |
Towards Collaborative Cyber Threat Intelligence for Security Management
|
2021 |
Osliak, Oleksii |
Field Studies on the Impact of Cryptographic Signatures and Encryption on Phishing Emails
|
2021 |
Pham, Stefanie |
Continuous Authentication based on Hand Micro-movement during Smartphone Form Filling by Seated Human Subjects
|
2021 |
Ray, Aratrika |
Two Stage Anomaly Detection for Network Intrusion Detection
|
2021 |
Neuschmied, Helmut |
Study of Intra- and Inter-user Variance in Password Keystroke Dynamics
|
2021 |
Ayotte, Blaine |
Implementation of Secondary Available Digital Content Protection Schemes using Identity-based Signatures
|
2021 |
Nagashima, Nozomi |
Profiling and Discriminating of Containerized ML Applications in Digital Data Marketplaces (DDM)
|
2021 |
Zhang, Lu |
Towards an Ontology for Enterprise Level Information Security Policy Analysis
|
2021 |
Mandal, Debashis |
A Lemon by Any Other Label
|
2021 |
Garg, Vaibhav |
HyperPass: Secure Password Input Platform
|
2021 |
Kiperberg, Michael |
Stopping DNS Rebinding Attacks in the Browser
|
2021 |
Hazhirpasand, Mohammadreza |