Evaluation of Statistical Tests for Detecting Storage-Based Covert Channels
|
2020 |
Sattolo, Thomas A. V. |
Assisting Users to Create Stronger Passwords Using ContextBased MicroTraining
|
2020 |
Kävrestad, Joakim |
Privacy CURE: Consent Comprehension Made Easy
|
2020 |
Drozd, Olha |
Revisiting Security Vulnerabilities in Commercial Password Managers
|
2020 |
Carr, Michael |
Actively Probing Routes for Tor AS-Level Adversaries with RIPE Atlas
|
2020 |
Mayer, Wilfried |
Improvements of the Balance Discovery Attack on Lightning Network Payment Channels
|
2020 |
Dam, Gijs van |
Fuzzy Vault for Behavioral Authentication System
|
2020 |
Islam, Morshedul |
Establishing a Strong Baseline for Privacy Policy Classification
|
2020 |
Nejad, Najmeh Mousavi |
Cross-Platform File System Activity Monitoring and Forensics — A Semantic Approach
|
2020 |
Kurniawan, Kabul |
Improving Big Data Clustering for Jamming Detection in Smart Mobility
|
2020 |
Bangui, Hind |
Facilitating Privacy Attitudes and Behaviors with Affective Visual Design
|
2020 |
Kitkowska, Agnieszka |
RouAlign: Cross-Version Function Alignment and Routine Recovery with Graphlet Edge Embedding
|
2020 |
Yang, Can |
Security and Performance Implications of BGP Rerouting-Resistant Guard Selection Algorithms for Tor
|
2020 |
Mitseva, Asya |
Secure Attestation of Virtualized Environments
|
2020 |
Eckel, Michael |
IMShell-Dec: Pay More Attention to External Links in PowerShell
|
2020 |
Han, RuiDong |
Evaluation of Risk-Based Re-Authentication Methods
|
2020 |
Wiefling, Stephan |
A Matter of Life and Death: Analyzing the Security of Healthcare Networks
|
2020 |
Dupont, Guillaume |
A Correlation-Preserving Fingerprinting Technique for Categorical Data in Relational Databases
|
2020 |
Sarcevic, Tanja |
Escaping Backdoor Attack Detection of Deep Learning
|
2020 |
Xiong, Yayuan |
FDFtNet: Facing Off Fake Images Using Fake Detection Fine-Tuning Network
|
2020 |
Jeon, Hyeonseong |