Linked e-resources
Details
Table of Contents
CPS and Hardware Security Threat Modeling of Cyber-Physical Systems in Practice
AVSDA: Autonomous Vehicle Security Decay Assessment
A TSX-Based KASLR Break: Bypassing UMIP and Descriptor-Table Exiting
Responses, and Security Management A Stakeholder-Centric Approach for Defining Metrics for Information Security Management Systems
A Novel Approach for Attack Tree to Attack Graph Transformation
Intelligent Decision Support for Cybersecurity Incident Response Teams: Autonomic Architecture and Mitigation Search
Using Garbled Circuit for Secure Brokering
Network and Data Security Path-preserving Anonymization for Inter-domain Routing Policiescal Systems in Practice
Designing a Service for Compliant Sharing of Sensitive Research Data
Authenticated Multi-Proxy Accumulation Schemes for Delegated Membership Proofs
Extending the Exposure Score of Web Browsers By Incorporating CVSS.
AVSDA: Autonomous Vehicle Security Decay Assessment
A TSX-Based KASLR Break: Bypassing UMIP and Descriptor-Table Exiting
Responses, and Security Management A Stakeholder-Centric Approach for Defining Metrics for Information Security Management Systems
A Novel Approach for Attack Tree to Attack Graph Transformation
Intelligent Decision Support for Cybersecurity Incident Response Teams: Autonomic Architecture and Mitigation Search
Using Garbled Circuit for Secure Brokering
Network and Data Security Path-preserving Anonymization for Inter-domain Routing Policiescal Systems in Practice
Designing a Service for Compliant Sharing of Sensitive Research Data
Authenticated Multi-Proxy Accumulation Schemes for Delegated Membership Proofs
Extending the Exposure Score of Web Browsers By Incorporating CVSS.