Linked e-resources

Details

ICScope: Detecting and Measuring Vulnerable ICS Devices Exposed on the Internet
Zero Update Encryption Adjustment on Encrypted Database Queries
Evaluating Consumer Understanding and Awareness of Connected and Autonomous Vehicle Data Privacy
Improving Data Security and Privacy for Ontology based Data Access
Experimentally Obtained Differential-linear Distinguishers for Permutations of ASCON and DryGASCON
A Game Theoretic Approach to the Design of Mitigation Strategies for Generic Ransomware.

Browse Subjects

Show more subjects...

Statistics

from
to
Export