Linked e-resources
Details
Table of Contents
ICScope: Detecting and Measuring Vulnerable ICS Devices Exposed on the Internet
Zero Update Encryption Adjustment on Encrypted Database Queries
Evaluating Consumer Understanding and Awareness of Connected and Autonomous Vehicle Data Privacy
Improving Data Security and Privacy for Ontology based Data Access
Experimentally Obtained Differential-linear Distinguishers for Permutations of ASCON and DryGASCON
A Game Theoretic Approach to the Design of Mitigation Strategies for Generic Ransomware.
Zero Update Encryption Adjustment on Encrypted Database Queries
Evaluating Consumer Understanding and Awareness of Connected and Autonomous Vehicle Data Privacy
Improving Data Security and Privacy for Ontology based Data Access
Experimentally Obtained Differential-linear Distinguishers for Permutations of ASCON and DryGASCON
A Game Theoretic Approach to the Design of Mitigation Strategies for Generic Ransomware.