Linked e-resources

Details

Quantifying Paging on Recoverable Data from Windows User-Space Modules
Forensic Investigations of Google Meet and Microsoft Teams Two Popular Conferencing Tools in the Pandemic
On Exploring The Sub-Domain of Artificial Intelligence (AI) Model Forensics
Auto-Parser: Android Auto & Apple CarPlay Forensics
Find my IoT Device An Efficient and Effective Approximate Matching Algorithm to Identify IoT Traffic Flows
Accessing secure data on Android through application analysis
Research On The Method Of Selecting The Optimal Feature Subset In Big Data For Energy Analysis Attack
Cheating sensitive security quantum bit commitment with security distance function
Towards Mitigation of Data Exfiltration Techniques using the MITRE ATT&CK Framework
PCWQ: A Framework for Evaluating Password Cracking Wordlist Quality
No Pie in The Sky: The Digital Currency Fraud Website Detection
Understanding the Brains and Brawn of IllicitStreaming App
Fine-grained Obfuscation Scheme Recognition on Binary Code
Backdoor Investigation and Incident Response: From Zero to Profit
Automated Software Vulnerability Detection via Pre-trained Context Encoder and Self Attention
Lightweight On-demand Honeypot Deployment for Cyber Deception
Parcae: A Blockchain-Based PRF Service for Everyone
A Hybrid Cloud Deployment Architecture For Privacypreserving Collaborative Genome-Wide Association Studies
Understanding the Security of Deepfake Detection.

Browse Subjects

Show more subjects...

Statistics

from
to
Export