How Do Users Chain Email Accounts Together?

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:SEC (36. : 2021 : Online) ICT systems security and privacy protection
1. Verfasser: Kraus, Lydia (VerfasserIn)
Weitere Verfasser: Syvidronovda, Mária (VerfasserIn), Stobert, Elizabeth (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2021
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
RootAsRole: Towards a Secure Alternative to sudo/su Commands for Home Users and SME Administrators 2021 Wazan, Ahmad Samer
Compiling Personal Data and Subject Categories from App Data Models 2021 Burkert, Christian
Enriching DNS Flows with Host-Based Events to Bypass Future Protocol Encryption 2021 Špaček, Stanislav
Less is Often More: Header Whitelisting as Semantic Gap Mitigation in HTTP-Based Software Systems 2021 Büttner, Andre
Anomaly Detection for Insider Threats: An Objective Comparison of Machine Learning Models and Ensembles 2021 Bartoszewski, Filip Wieslaw
How Do Users Chain Email Accounts Together? 2021 Kraus, Lydia
Tensions that Hinder the Implementation of Digital Security Governance 2021 Schinagl, Stef
A Performance Assessment of Free-to-Use Vulnerability Scanners - Revisited 2021 Araújo, Ricardo
Lattice-Based Weak Curve Fault Attack on ECDSA 2021 Cao, Weiqiong
Accept All: The Landscape of Cookie Banners in Greece and the UK 2021 Kampanos, Georgios
The AppChk Crowd-Sourcing Platform: Which Third Parties are iOS Apps Talking To? 2021 Geier, Oleg
Perceived Privacy Problems Within Digital Contact Tracing: A Study Among Swedish Citizens 2021 Padyab, Ali
TAR: Generalized Forensic Framework to Detect Deepfakes Using Weakly Supervised Leaming 2021 Lee, 9 Kr Sangyup
Revitalizing Self-Organizing Map: Anomaly Detection Using Forecasting Error Patterns 2021 Kim, Young Geun
SIUV: A Smart Car Identity Management and Usage Control System Based on Verifiable Credentials 2021 Hariri, Ali
Trust Me If You Can: Trusted Transformation Between (JSON) Schemas to Support Global Authentication of Education Credentials 2021 More, Stefan
QuickBCC: Quick and Scalable Binary Vulnerable Code Clone Detection 2021 Jang, Hajin
Automatic Inference of Taint Sources to Discover Vulnerabilities in SOHO Router Firmware 2021 Cheng, Kai
Minecraft Altered Skin Channel (MASC) 2021 Abrams, Sam
100 Popular Open-Source Infosec Tools 2021 Kaksonen, Rauli
Alle Artikel auflisten