Linked e-resources
Details
Table of Contents
SPOT+: Secure and Privacy-Preserving Proximity-Tracing Protocol with Efficient Verification over Multiple Contact Information
Blind side channel on the Elephant LFSR Extended version
Stacked Ensemble Models Evaluation on DL Based SCA
Explaining the Use of Cryptographic API in Android Malware
Explaining the Use of Cryptographic API in Android Malware
Intrinsic Weaknesses of IDSs to Malicious Adversarial Attacks and their Mitigation
Compressing Big OLAP Data Cubes in Big Data Analytics Systems: New Paradigms, a Reference Architecture, and Future Research Perspectives.
Blind side channel on the Elephant LFSR Extended version
Stacked Ensemble Models Evaluation on DL Based SCA
Explaining the Use of Cryptographic API in Android Malware
Explaining the Use of Cryptographic API in Android Malware
Intrinsic Weaknesses of IDSs to Malicious Adversarial Attacks and their Mitigation
Compressing Big OLAP Data Cubes in Big Data Analytics Systems: New Paradigms, a Reference Architecture, and Future Research Perspectives.