Linked e-resources

Details

New Wrapper Feature Selection Algorithm for Anomaly-based Intrusion Detection Systems
Network Security for Home IoT Devices Must Involve the User: a Position Paper
A quantitative security risk analysis framework for modelling and analyzing advanced persistent threats
An analysis of the use of CVEs by IoT malware
A Priority-based Domain Type Enforcement for Exception Management
Developer-Proof Prevention of SQL Injections
A Survey of Advanced Encryption for Database Security: Primitives, Schemes, and Attacks
Fast Short and Fast Linear Cramer-Shoup
Anonymous proof-of-asset transactions using designated blind signatures
Modeling Attacks and Efficient Countermeasures on Interpose PUF
Error-Free Lattice-Based Key Encapsulation Mechanism Based on Ring-LWE
Pisces: A New Zero-Knowledge Protocol for Blockchain Privacy.

Browse Subjects

Show more subjects...

Statistics

from
to
Export