Secure Ownership Transfer for the Internet of Things
|
2020 |
Gunnarsson, Martin |
CoRA: A Scalable Collective Remote Attestation Protocol for Sensor Networks
|
2020 |
Diop, Aída |
Secrecy and Authenticity Properties of the Lightning Network Protocol
|
2020 |
Hüttel, Hans |
Privacy with Health Information Technologies: What Story Do Data Breaches in US Tell Us?
|
2020 |
Uwizeyemungu, Sylvestre |
A Quantitative Study of Vulnerabilities in the Internet of Medical Things
|
2020 |
Debar, Hervé |
Translating Data Protection into Software Requirements
|
2020 |
Kneuper, Ralf |
Integration of Data Envelopment Analysis in Business Process Models: A Novel Approach to Measure Information Security
|
2020 |
Akerlund, Agnes |
Modeling Cyber Threat Intelligence
|
2020 |
Bromander, Siri |
Phishing URL Detection Through Top-level Domain Analysis: A Descriptive Approach
|
2020 |
Christou, Orestis |
An Approach to Secure Legacy Software Systems
|
2020 |
Jasser, Stefanie |
A Domain-specific Modeling Framework for Attack Surface Modeling
|
2020 |
Sun, Tithnara Nicolas |
CoProtect: Collaborative Management of Cryptographic Keys for Data Security in Cloud Systems
|
2020 |
Bracciale, Lorenzo |
Threat Modeling and Attack Simulations of Smart Cities: A Literature Review and Explorative Study
|
2020 |
Lagerstróm, Robert |
Using Eyetracker to Find Ways to Mitigate Ransomware
|
2020 |
Arief, Budi |
Evaluation to Classify Ransomware Variants based on Correlations between APIs
|
2020 |
Zhou, Jiaxing |
Achieving Privacy, Security, and Interoperability among Biometric Networks using Symmetric Encryption
|
2020 |
Filho, Eduardo M. Lacerda |
Building Competitive Advantage from Ubuntu: An African Information Security Awareness Model
|
2020 |
Gundu, Tapiwa |
Patients to Mobilize Their Data: Secure and Flexible mHealth Delegation
|
2020 |
Almeida, Rafael |
A Curious Exploration of Malicious PDF Documents
|
2020 |
Lindenhofer, Julian |
Neural Network Security: Hiding CNN Parameters with Guided Grad-CAM
|
2020 |
Guiga, Linda |