Linked e-resources
Details
Table of Contents
Security Properties and Attacks
Modelling and Analysis of 802.11 4-Way Handshake Attacks and Security Properties
Reducing the Forensic Footprint with Android Accessibility Attacks
A Novel Machine Learning Methodology for Detecting Phishing Attacks in Real Time
Confidentiality Schema
Revocable access to encrypted message boards
Establishing Secure Communication Channels Using Remote Attestation With TPM 2.0
Security Processes
Improved Feature Engineering for Free-Text Keystroke Dynamics
Subversion-Resistant Commitment Schemes: Definitions and Constructions
Challenges in IT Security Processes and Solution Approaches with Process Mining.
Modelling and Analysis of 802.11 4-Way Handshake Attacks and Security Properties
Reducing the Forensic Footprint with Android Accessibility Attacks
A Novel Machine Learning Methodology for Detecting Phishing Attacks in Real Time
Confidentiality Schema
Revocable access to encrypted message boards
Establishing Secure Communication Channels Using Remote Attestation With TPM 2.0
Security Processes
Improved Feature Engineering for Free-Text Keystroke Dynamics
Subversion-Resistant Commitment Schemes: Definitions and Constructions
Challenges in IT Security Processes and Solution Approaches with Process Mining.