Robust PDF Files Forensics Using Coding Style
|
2022 |
Adhatarao, Supriya |
FOCUS: Frequency Based Detection of Covert Ultrasonic Signals
|
2022 |
Hellemans, Wouter |
Novel Approaches for the Development of Trusted IoT Entities
|
2022 |
Ferraris, Davide |
Towards Supporting Attribute-Based Access Control in Hyperledger Fabric Blockchain
|
2022 |
Pericherla, Amshumaan |
D-Cloud-Collector: Admissible Forensic Evidence from Mobile Cloud Storage
|
2022 |
Vella, Mark |
DAEMON: Dynamic Auto-encoders for Contextualised Anomaly Detection Applied to Security MONitoring
|
2022 |
Dey, Alexandre |
A Privacy Calculus Model for Contact Tracing Apps: Analyzing the German Corona-Warn-App
|
2022 |
Harborth, David |
Passive, Transparent, and Selective TLS Decryption for Network Security Monitoring
|
2022 |
Wilkens, Florian |
AndroClonium: Bytecode-Level Code Clone Detection for Obfuscated Android Apps
|
2022 |
Foroughipour, Ardalan |
One Light, One App: Tackling a Common Misperception Causing Breach of User Privacy
|
2022 |
Siapiti, Efi |
Usability Insights from Establishing TLS Connections
|
2022 |
Kraus, Lydia |
Double-X: Towards Double-Cross-Based Unlock Mechanism on Smartphones
|
2022 |
Li, Wenjuan |
CryptKSP: A Kernel Stack Protection Model Based on AES-NI Hardware Feature
|
2022 |
Zhong, Bingnan |
Anonymous Trusted Data Relocation for TEEs
|
2022 |
Guita, Vasco |
Deriving and Using Synthetic Consequences for Privacy Risk Modeling
|
2022 |
Shapiro, Stuart S. |
RAAM: A Restricted Adversarial Attack Model with Adding Perturbations to Traffic Features
|
2022 |
Sun, Peishuai |
Enhanced Privacy in Smart Workplaces: Employees’ Preferences for Transparency Indicators and Control Interactions in the Case of Data Collection with Smart Watches
|
2022 |
Richter, Alexander |
Post-Quantum Cheating Detectable Private Information Retrieval
|
2022 |
Zhu, Lin |
Greedy Networking in Cryptocurrency Blockchain
|
2022 |
Wuthier, Simeon |
Usability of Antivirus Tools in a Threat Detection Scenario
|
2022 |
Körber, Michael |