Linked e-resources

Details

Privacy Models and Preferences:
A Privacy Calculus Model for Contact Tracing Apps: Analyzing the German Corona-Warn-App
Deriving and Using Synthetic Consequences for Privacy Risk Modeling
Stuart Shapiro Enhanced Privacy in Smart Workplaces: Employees Preferences for Transparency Indicators and Control Interactions in the Case of Data Collection with Smart Watches
Network Security and IDS
DAEMON: Dynamic Auto-Encoders for contextualised anomaly detection applied to security MONitoring
FOCUS: Frequency based detection of Covert Ultrasonic Signals
Passive, Transparent, and Selective TLS Decryption for Network Security Monitoring
Network Security and Privacy
A study on the use of 3rd party DNS resolvers for malware filtering or censorship circumvention
RAAM: A Restricted Adversarial Attack Model with Adding Perturbations to Traffic Features
Evaluation of Circuit Lifetimes in Tor
Forensics
D-Cloud-Collector: Admissible Forensic Evidence from Mobile Cloud Storage
Robust PDF Files Forensics Using Coding Style
Light-Weight File Fragments Classification using Depthwise Separable Convolution
Trust and PETs
Novel Approaches for the Development of Trusted IoT Entities
Requirements and Secure Serialization for Selective Disclosure Verifiable Credentials
Crypto-based solutions
UP-MLE: Effcient and Practical Updatable Block-Level MessageLocked Encryption Scheme Based on Update Properties
CryptKSP: A Kernel Stack Protection Model based on AES-NI Hardware Feature
Usable Security
Usability Insights from Establishing TLS Connections
Usability of Antivirus Tools in a Threat Detection Scenario
Data Minimisation Potential for Timestamps in Git: An Empirical Analysis of User Configurations
Blockchain
Greedy Networking in Cryptocurrency Blockchain
Towards Supporting Attribute-Based Access Control in Hyperledger Fabric Blockchain
Mobile Security and Privacy
AndroClonium: Bytecode-Level Code Clone Detection for Obfuscated Android Apps
One Light, One App: Tackling A Common Misperception Causing Breach of User Privacy
Double-X: Towards Double-Cross-based Unlock Mechanism on Smartphones
PETs and Crypto
Post-Quantum Cheating Detectable Private Information Retrieval
Anonymous Trusted Data Relocation for TEEs
Efficient Volume-Hiding Encrypted Multi-Maps with Support for Conjunctive Queries
Vulnerabilities
Upside Down: Exploring the Ecosystem of Dark Web Data Markets
An Effcient Use-after-Free Mitigation Approach via Static Dangling Pointer Nullification.

Browse Subjects

Show more subjects...

Statistics

from
to
Export