Linked e-resources

Details

Fine-grained privacy control for fitness and health applications using the privacy management platform / Christoph Stach
Touch and move : incoming call user authentication / Aleksandr Eremin, Konstantin Kogos, and Yana Valatskayte
Elicitation of privacy requirements for the Internet of Things using ACCESSORS / Christoph Stach and Bernhard Mitschang
A simple attack on CaptchaStar / Thomas Gougeon and Patrick Lacharme
Notify this : exploiting Android notifications for fun and profit / Efthimios Alepis
The current state of the holistic privacy and security modelling approach in business process and software architecture modelling / Sascha Alpers, Roman Pilipchuk, Andreas Oberweis, and Ralf Reussner
A critical security analysis of the password-based authentication Honeywords system using code-corruption attack / Ziya Alper Genç, Gabriele Lenzini, Peter Y. A. Ryan, and Itzel Vazquez Sandoval
GenVote : blockchain-based customizable and secure voting platform / Praneeth Babu Marella, Matea Milojkovic, Jordan Mohler, and Gaby G. Dagher
A detailed analysis of the CICIDS2017 data set / Iman Sharafaldin, Arash Habibi Lashkari, and Ali A. Ghorbani
Personalising security education : factors influencing individual awareness and compliance / Ismini Vasileiou and Steven Furnell

Managing cybersecurity break-ins using Bluetooth low energy devices to verify attackers : a practical study / Kenneth C. K. Wong and Aaron Hunter
On building a visualisation tool for access control policies / Charles Morisset and David Sanchez
Survey and guidelines for the design and deployment of a cyber security label for SMEs / Christophe Ponsard and Jeremy Grandclaudon
Privacy preserving collaborative agglomerative hierarchical clustering construction / Mina Sheikhalishahi, Mona Hamidi, and Fabio Martinelli
Insights into unsupervised holiday detection from low-resolution smart metering data / Günther Eibl, Sebastian Burkhart, and Dominik Engel.

Browse Subjects

Show more subjects...

Statistics

from
to
Export