Cs-Cr
Policy based intrusion detection and response system in hierarchical WSN architecture
Predictive Cyber-security Analytics Framework: A non-homogenous Markov model for Security Quantification
Privacy by design in big data: An overview of privacy enhancing technologies in the era of big data analytics
Protecting Online Documents from an Unauthorized External Access (in Bulgarian)
Randomness and Non-determinism
Relations among Security Metrics for Template Protection Algorithms
Secure Cloud Computing through Homomorphic Encryption
Secure Communication Using Electronic Identity Cards for Voice over IP Communication, Home Energy Management, and eMobility
Secure estimation and control for cyber-physical systems under adversarial attacks
Secure FSM- based arithmetic codes
Secure management of logs in internet of things
Secure voice based authentication for mobile devices: Vaulted Voice Verification
Secure Zones: An Attribute-Based Encryption advisory system for safe firearms
Secured Wireless Communication using Fuzzy Logic based High Speed Public-Key Cryptography (FLHSPKC)
Securing Cloud - The Quantum Way
Securing IEEE 802.11G WLAN Using OpenVPN and Its Impact Analysis
Security Metrics in Industrial Control Systems
Security-aware selection of Web Services for Reliable Composition
Selective Watchdog Technique for Intrusion Detection in Mobile Ad-Hoc Network
Spread Spectrum based Robust Image Watermark Authentication
STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System
Stickler: Defending Against Malicious CDNs in an Unmodified Browser