Linked e-resources

Details

Keynote Talk
New Dimensions of Information Warfare: The Economic Pillar Fintech and Cryptocurrencies
Vulnerabilities, Attacks and Intrusion Detection
Measuring and Modeling Software Vulnerability Security Advisory Platforms
Frequency Hopping Spread Spectrum to Counter Relay Attacks in PKESs
A Deeper Analysis of Adversarial Examples in Intrusion Detection
TLS, Openness and Security Control
Implementation Flaws in TLS Stacks: Lessons Learned and Study of TLS 1.3 Benefits
Security through Transparency and Openness in Computer Design
An ML Behavior-based Security Control for Smart Home Systems
Access Control, Risk Assessment and Security Knowledge
A Posteriori Analysis of Policy Temporal Compliance
Asset-driven Approach for Security Risk Assessment in IoT Systems
Heterogeneous security events prioritization using auto-encoders
Community Knowledge about Security: Identification and Classification of User Contributions
Risk Analysis, Neural Networks and Web Protection
Modelling Security Risk Scenarios using Subjective Attack Trees
Premium Access to Convolutional Neural Networks
An OWASP Top Ten Driven Survey for Web Application Protection Methods
Infrastructure Security and Malware Detection
Autonomous Vehicle Security: Literature Review of Real Attack Experiments
New Dataset for Industry 4.0 to address the change in threat landscape
Toward Semantic-Based Android Malware Detection Using Model Checking and Machine Learning
Short Papers
Augmented Voting Reality
Malicious Http Request Detection using Code-Level Convolutional Neural Network
Enhancement of a business model with a Business Contextual Risk Model
Secure Data Processing for Industrial Remote Diagnosis and Maintenance
Towards Attacker Attribution for Risk Analysis
Modelling and Verification of Safety of Access Control in SCADA Systems
Security Assessment and Hardening of Autonomous Vehicles.

Browse Subjects

Show more subjects...

Statistics

from
to
Export