Leveraging Blockchain Technology to Enhance Security and Privacy in the Internet of Things
|
2020 |
Katsikas, Sokratis K. |
AMNESIA: A Technical Solution towards GDPR-compliant Machine Learning
|
2020 |
Stach, Christoph |
A Formal Approach for the Analysis of the XRP Ledger Consensus Protocol
|
2020 |
Mauri, Lara |
Harmonized Group Mix for ITS
|
2020 |
Nitschke, Mirja |
A Homomorphic Proxy Re-authenticators based Efficient Multi-client Non-interactive Verifiable Computation Scheme
|
2020 |
Xu, Shuaijianni |
External Contextual Factors in Information Security Behaviour
|
2020 |
Snyman, D. P. |
Maturity Modelling to Prepare for Cyber Crisis Escalation and Management
|
2020 |
Ostby, Grethe |
Exploring Vulnerabilities in Solidity Smart Contract
|
2020 |
Tantikul, Phitchayaphong |
Visualizing Syscalls using Self-organizing Maps for System Intrusion Detection
|
2020 |
Landauer, Max |
A Systematic Approach toward Extracting Technically Enforceable Policies from Data Usage Control Requirements
|
2020 |
Hosseinzadeh, Arghavan |
Risk Identification: From Requirements to Threat Models
|
2020 |
Wirtz, Roman |
Revisiting Privacy-aware Blockchain Public Key Infrastructure
|
2020 |
Plessing, Paul |
Computer Viruses: The Abstract Theory Revisited
|
2020 |
Gladychev, Nikolai |
Securing IoT Devices using Geographic and Continuous Login Blocking: A Honeypot Study
|
2020 |
Heiding, Fredrik |
Active Directory Kerberoasting Attack: Monitoring and Detection Techniques
|
2020 |
Kotlaba, Lukáš |
Radical Text Detection based on Stylometry
|
2020 |
Pablo, Álvaro de |
On Analyzing Third-party Tracking via Machine Learning
|
2020 |
Guarino, Alfonso |
Systematization of Threats and Requirements for Private Messaging with Untrusted Servers: The Case of e-Mailing and Instant Messaging
|
2020 |
Symeonidis, Iraklis |
Dual-use Research in Ransomware Attacks: A Discussion on Ransomware Defence Intelligence
|
2020 |
Geng, Ziya Alper |
An Analytical Scanning Technique to Detect and Prevent the Transformed SQL Injection and XSS Attacks
|
2020 |
Alrabaee, Mohammad Qbea’h, Saed |