Cs-Cr
A Model for Android and iOS Applications Risk Calculation: CVSS Analysis and Enhancement Using Case-Control Studies
Governing autonomous vehicles: emerging responses for safety, liability, privacy, cybersecurity, and industry risks
Adversarial Attacks, Regression, and Numerical Stability Regularization
Machine Learning for Anomaly Detection and Categorization in Multi-cloud Environments
Redundancy Coefficient Gradual Up-weighting-based Mutual Information Feature Selection Technique for Crypto-ransomware Early Detection
Advanced Software Protection Now
Cyberattack Detection using Deep Generative Models with Variational Inference
Forensics Analysis of Xbox One Game Console
A Security Analysis of IoT Encryption: Side-channel Cube Attack on Simeck32/64
DroidMark: A Tool for Android Malware Detection using Taint Analysis and Bayesian Network
Approaches to Enhancing Cyber Resilience: Report of the North Atlantic Treaty Organization (NATO) Workshop IST-153
Enabling Privacy-Preserving, Compute- and Data-Intensive Computing using Heterogeneous Trusted Execution Environment
The Trusted Server: A secure computational environment for privacy compliant evaluations on plain personal data
Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study
Security Through Amnesia: A Software-Based Solution to the Cold Boot Attack on Disk Encryption
Performance of the Fuzzy Vault for Multiple Fingerprints (Extended Version)
Security Patterns: A Systematic Mapping Study
In-field Remote Fingerprint Authentication using Human Body Communication and On-Hub Analytics
Secure Communication in Stochastic Wireless Networks
The future of statistical disclosure control
Genie: A Secure, Transparent Sharing and Services Platform for Genetic and Health Data
On the cryptanalysis of the generalized simultaneous conjugacy search problem and the security of the Algebraic Eraser