Double-Extortion Ransomware: A Technical Analysis of Maze Ransomware
|
2022 |
Kerns, Quintin |
Patterns in Malware Attacks Leveraging COVID-19 Pandemic Fears
|
2022 |
Norris, Jason H. |
Advancement on Security Applications of Private Intersection Sum Protocol
|
2022 |
Raghuvir, Y. Athur |
Efficient Secret Sharing-Based Partial Matching Search Using Error Correction Code
|
2022 |
Iwamura, Keiichi |
A CRYSTALS-Dilithium Response-Based Cryptography Engine Using GPGPU
|
2022 |
Wright, Jordan |
Quantum Computing and Its Application in Cryptography
|
2022 |
Yung, Choi Tim Antony |
Gray Matters and Complex Systems: Mind, Consciousness, and Attention
|
2022 |
Semwal, Sudhanshu Kumar |
A Novel Artificial Intelligence Technique for Cloud Computing Using a New Heuristic Initialisation and PSO-Parallel Execution
|
2022 |
Chraibi, Amine |
Enabling Extreme High-Throughput Multi-precision Computing on General-Purpose Microprocessor
|
2022 |
Xu, Lei |
Content Agnostic Game Engineering: Impact of Stealth Assessment and Content Order on Player Engagement
|
2022 |
Verma, Vipin |
Towards an Agile Quality Management Model for Microservice Architecture in FinTech
|
2022 |
Nguyen, Vu H. A. |
Viktoria: A New Architecture for Hash Functions
|
2022 |
da Silva, Edimar Veríssimo |
An ICT-Based Teaching Strategy to Promote Communicative Interactions: An Online Learning Approach During the COVID-19 Pandemic
|
2022 |
Arango-Vásquez, Sandra Isabel |
Recent Trends in Software Development: Low-Code Solutions
|
2022 |
Benac, Ryan |
Is BIM Too Detailed for Conceptual Designing? A Case Study
|
2022 |
Abdelhameed, Wael |
Method for Web: GIS System Applicable to Assimilation Model Database Constructions
|
2022 |
Arai, Kohei |
Virtual Reality and Motion Capture Training
|
2022 |
Omowonuola, Victor |
Hybrid Firefly and Swarm Algorithms for Breast Cancer Mammograms Classification Based on Rough Set Theory Features Selection
|
2022 |
Farouk, R. M. |
Information Sharing in the Presence of Adversarial Nodes Using Raft
|
2022 |
Zamir, Linir |
How Can Organizations Prevent Cyber Attacks Using Proper Cloud Computing Security?
|
2022 |
Bahkali, Ismail Mohammed |