Robust PDF Files Forensics Using Coding Style
|
2022 |
Adhatarao, Supriya |
FOCUS: Frequency Based Detection of Covert Ultrasonic Signals
|
2022 |
Hellemans, Wouter |
Novel Approaches for the Development of Trusted IoT Entities
|
2022 |
Ferraris, Davide |
Towards Supporting Attribute-Based Access Control in Hyperledger Fabric Blockchain
|
2022 |
Pericherla, Amshumaan |
Light-Weight File Fragments Classification Using Depthwise Separable Convolutions
|
2022 |
Saaim, Kunwar Muhammed |
Evaluation of Circuit Lifetimes in Tor
|
2022 |
Köster, Kevin |
Requirements and Secure Serialization for Selective Disclosure Verifiable Credentials
|
2022 |
Kalos, Vasilis |
A Study on the Use of 3rd Party DNS Resolvers for Malware Filtering or Censorship Circumvention
|
2022 |
Fejrskov, Martin |
Data Minimisation Potential for Timestamps in Git: An Empirical Analysis of User Configurations
|
2022 |
Burkert, Christian |
Upside Down: Exploring the Ecosystem of Dark Web Data Markets
|
2022 |
Covrig, Bogdan |
Efficient Volume-Hiding Encrypted Multi-Maps with Support for Conjunctive Queries
|
2022 |
Li, Tianci |
An Efficient Use-after-Free Mitigation Approach via Static Dangling Pointer Nullification
|
2022 |
Yu, Yue |
D-Cloud-Collector: Admissible Forensic Evidence from Mobile Cloud Storage
|
2022 |
Vella, Mark |
DAEMON: Dynamic Auto-encoders for Contextualised Anomaly Detection Applied to Security MONitoring
|
2022 |
Dey, Alexandre |
A Privacy Calculus Model for Contact Tracing Apps: Analyzing the German Corona-Warn-App
|
2022 |
Harborth, David |
Passive, Transparent, and Selective TLS Decryption for Network Security Monitoring
|
2022 |
Wilkens, Florian |
AndroClonium: Bytecode-Level Code Clone Detection for Obfuscated Android Apps
|
2022 |
Foroughipour, Ardalan |
One Light, One App: Tackling a Common Misperception Causing Breach of User Privacy
|
2022 |
Siapiti, Efi |
Usability Insights from Establishing TLS Connections
|
2022 |
Kraus, Lydia |
Double-X: Towards Double-Cross-Based Unlock Mechanism on Smartphones
|
2022 |
Li, Wenjuan |