Cs-Cr
Primary User Emulation Attacks: A Detection Technique Based on Kalman Filter
Mind the Gap: Trade-Offs between Distributed Ledger Technology Characteristics
A Bleeding Digital Heart: Identifying Residual Data Generation from Smartphone Applications Interacting with Medical Devices
Towards Models for Availability and Security Evaluation of Cloud Computing with Moving Target Defense
User Acceptance of Usable Blockchain-Based Research Data Sharing System: An Extended TAM Based Study
MFA is a Waste of Time! Understanding Negative Connotation Towards MFA Applications via User Generated Content
Compliance of POLYAS with the Common Criteria Protection Profile
Ubuntu One Investigation: Detecting Evidences on Client Machines
Physical Access Control Management System Based on Permissioned Blockchain
BARS: a Blockchain-based Anonymous Reputation System for Trust Management in VANETs
Analysis of the User Acceptance for Implementing ISO/IEC 27001:2005 in Turkish Public Organizations
EPA-RIMM: A Framework for Dynamic SMM-based Runtime Integrity Measurement
Truxen: A Trusted Computing Enhanced Blockchain
Measuring the Correlation of Personal Identity Documents in Structured Format
A Blockchain-Based Architecture for Traffic Signal Control Systems
The Social and Psychological Impact of Cyber-Attacks
QKD in Standard Optical Telecommunications Networks
Hiding Information in Big Data based on Deep Learning
Probabilistic Smart Contracts: Secure Randomness on the Blockchain
Evaluating User Perception of Multi-Factor Authentication: A Systematic Review
Fooling a Real Car with Adversarial Traffic Signs
A Secure Aggregation Protocol for Wireless Sensor Networks