Linked e-resources

Details

Anonymous Short Communications over Social Networks
A Sybil detection method in OSN based on DistilBERT and Double-SN-LSTM for text analysis
ePayment Security 31 An Empirical Study on Mobile Payment Credential Leaks and Their Exploits
System-Wide Security for Offline Payment Terminals
Horus: A Security Assessment Framework for Android Crypto Wallets
Systems Security
Leakuidator: Leaky resource attacks and countermeasures
Jabbic lookups: a backend telemetry-based system for malware triage Octavian
Facilitating Parallel Fuzzing with Mutually-exclusive Task Distribution
Flowrider: Fast On-Demand Key Provisioning for CloudNetworks
Mobile Security & Privacy
Mobile Handset Privacy: Measuring The Data iOS and Android Send to Apple And Google Douglas Leith
Who's Accessing My Data? Application-Level Access Control for Bluetooth Low Energy
HTPD: Secure and Flexible Message-Based Communication for Mobile Apps
Smartphone Location Spoofing Attack in Wireless Networks
IoT Security & Privacy 42 Compromised through Compression
iDDAF: An Intelligent Deceptive Data Acquisition Framework for Secure Cyber-physical Systems.

Browse Subjects

Show more subjects...

Statistics

from
to
Export