researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2017
2018
2019
2021
2022
2023
2024
Filter by Tag
Filter by Author
[+]
OR
AND
NOT
1
Albert Guan
C. Edward Chow
Chia-Wei Hsu
Chin-Tser Huang
Ching-Hao Mao
Chun-I Fan
Chung-Horng Lung
Chung-Kuan Chen
Daejin Park
Hiroaki Kikuchi
J. Morris Chang
Kouichi Sakurai
Muhammad Naveed Aman
Nathaniel D. Bastian
Robert H. Deng
Shiuhpyng Winston Shieh
Ximeng Liu
Yi-Fan Tseng
Yingjiu Li
Yu-Sung Wu
Filter by Top terms
[+]
OR
AND
NOT
1
analysis
attack
attacks
blockchain
computing
data
detection
encryption
iot
learning
malware
network
networks
preserving
privacy
secure
security
system
systems
using
DSC (desec)
Editions
Publications
Viewing Publication 1 - 100 from 339
2024
IEEE Conference on Dependable and Secure Computing, DSC 2024, Tokyo, Japan, November 6-8, 2024
IEEE,
2024.
[doi]
Enhancing Cybersecurity with Transformers: Preventing Phishing Emails and Social Media Scams
Essam Al-Daoud
,
Laith Al Daoud
,
Mahmoud Asassfeh
,
Ala'a Al-Shaikh
,
Ala'a Saeb Al-Sherideh
,
Suha Afaneh
.
desec 2024
:
31-36
[doi]
Sockpuppets Detection Using Markov-Driven Graph Convolutional Networks with Ensemble Learning
Chun-I Fan
,
Ming-Feng Tsai
,
Chun-Pin Hu
,
Ming-Hung Wang
.
desec 2024
:
37-44
[doi]
Traceability Measurement Analysis of Sustained Internet-Wide Scanners via Darknet
Chansu Han
,
Akira Tanaka
,
Takeshi Takahashi 0001
,
Sajjad Dadkhah
,
Ali A. Ghorbani 0001
,
Tsung-Nan Lin
.
desec 2024
:
17-22
[doi]
A Case Study of URL Blocklist Maintenance
Mizuho Hasegawa
,
Yamato Kawaguchi
,
Hiroaki Takayama
,
Yasuhiro Kunimine
,
Hidekazu Tanaka
,
Shintaro Kawamura
,
Akira Fujita
,
Shingo Yasuda
,
Daisuke Inoue
,
Nobuyo Fujiwara
,
Kazuki Takada
,
Rui Tanabe
,
Katsunari Yoshioka
.
desec 2024
:
100-101
[doi]
Systematic Construction of Adaptively Decodable Visual Secret Sharing Scheme on Background Color
Masanori Hirotomo
,
Atsushi Marui
,
Yoshiaki Shiraishi
.
desec 2024
:
82-87
[doi]
InstaMAuth: Instant Mobile Authentication Service Based on 5G Authenticated Call Sessions
Yi-Chen Hsieh
,
Tzu-Chi Yu
,
Chi-Yu Li 0001
,
Guan-Hua Tu
.
desec 2024
:
131-138
[doi]
Exploring the Impact of LLM Assisted Malware Variants on Anti-Virus Detection
Zhewei Huang
,
Yin Minn Pa Pa
,
Katsunari Yoshioka
.
desec 2024
:
76-77
[doi]
Efficient and Secure Multi-Point Communication Framework Supporting Resource Constraints Environment
Jheng-Jia Huang
,
Wei-Hsueh Wang
,
Wen-Yan Dai
,
Guan-Yu Chen
,
Yi-Fan Tseng
.
desec 2024
:
80-81
[doi]
Information Flow Tracking for Hardware Trojan Detection: a Feasibility Study
Ryoichi Isawa
,
Nobuyuki Kanaya
,
Daisuke Inoue
.
desec 2024
:
51-57
[doi]
Enhanced Analysis of Cryptographic Library Usage Patterns and Trends in Android Applications
Akira Kanaoka
,
Mamoru Abe
.
desec 2024
:
88-93
[doi]
Investigating Black-Market Jobs on Social Networking Service
Yamato Kawaguchi
,
Kazuki Takada
,
Yin Minn Pa Pa
,
Rui Tanabe
,
Katsunari Yoshioka
,
Tsutomu Matsumoto
.
desec 2024
:
106-107
[doi]
Quantum Guard: Pioneering Quantum-Based Malware Defense for IoT Devices
Mansoor Ali Khan
,
Muhammad Naveed Aman
,
Biplab Sikdar 0001
.
desec 2024
:
94-99
[doi]
Enhancing Microcontroller Security Through Volatile Memory-Resident Encrypted Code
Minjung Kim
,
Daejin Park
.
desec 2024
:
78-79
[doi]
One Pixel Adversarial Attack for Fooling Deep Learning-Based Facial Expression Recognition Systems
Pramod Kumar
,
Ayan Seal
,
Sraban Kumar Mohanty
,
Haibo Zhang 0008
,
Kouichi Sakurai
.
desec 2024
:
23-30
[doi]
kdMonitor: Kernel Data Monitor for Detecting Kernel Memory Corruption
Hiroki Kuzuno
,
Toshihiro Yamauchi
.
desec 2024
:
66-73
[doi]
Fine-Tuning Large Language Models for Network Traffic Analysis in Cyber Security
Ortal Lavi
,
Ofir Manor
,
Tomer Schwartz
,
Andrés F. Murillo
,
Ayoub Messous
,
Motoyoshi Sekiya
,
Junichi Suga
,
Kenji Hikichi
,
Yuki Unno
.
desec 2024
:
45-50
[doi]
Enhancing Decision-Making of Network Intrusion Analysis Assisted by Explainable AI for Real-Time Security Monitoring
HyunWoo Lee
,
Taewoong Kwon
,
Jun Lee
,
Jungsuk Song
.
desec 2024
:
147-154
[doi]
A Multi-Package Trust Model for Improving the Trustworthiness of Traceability Data in Blockchain-Based Beef Supply Chain
Oratile Leteane
,
Yirsaw Ayalew
,
Tshiamo Motshegwa
.
desec 2024
:
155-162
[doi]
An Approach to Multi-Class Intrusion Detection Based on Feature Subspaces and Weighted Fusion
Rui Liu
,
Yaokai Feng
,
Kouichi Sakurai
.
desec 2024
:
139-146
[doi]
Can We Determine Whether a Set of Ethereum Transaction Data Contains Fraudulent Transactions?
Shunsuke Nakatani
,
Hiroki Kuzuno
,
Makoto Takita
,
Masami Mohri
,
Yoshiaki Shiraishi
.
desec 2024
:
108-114
[doi]
Chronohunt: Determining Optimal Pace for Automated Alert Analysis in Threat Hunting Using Reinforcement Learning
Boubakr Nour
,
Makan Pourzandi
,
Jesus Alatorre
,
Jan Willekens
,
Mourad Debbabi
.
desec 2024
:
1-8
[doi]
Control Displaying of Web Push Notifications Inducing Users to Phishing Websites
Masaya Sato
,
Ryuki Mandai
.
desec 2024
:
102-103
[doi]
Inherited Threat Reproduction on Open Source 5G Testbed
Toshiro Sawamoto
,
Mio Suzuki
,
Yutaro Osako
,
Takahiro Kasama
,
Daisuke Inoue
,
Koji Nakao
.
desec 2024
:
9-16
[doi]
An Analysis of the Relationship Between Black-Hat SEO Malware Families Leveraging Information from Redirected Fake E-Commerce Scam Sites
Makoto Shimamura
,
Shingo Matsugaya
,
Keisuke Sakai
,
Kosuke Takeshige
,
Masaki Hashimoto
.
desec 2024
:
123-130
[doi]
Blockchain-Enabled IoV: Secure Communication and Trustworthy Decision-Making
Jingyi Sun
,
Qi Shi
,
Guodong Jin
,
Hao Xu 0013
,
Weichao Chen
.
desec 2024
:
104-105
[doi]
Detection Evasion Using eBPF for Linux Fileless Malware
Yuta Takabayashi
,
Masahiro Mambo
.
desec 2024
:
74-75
[doi]
Threat of Technical Support Scams in Japan
Ayumu Yamada
,
Hiroyuki Ito
,
Kosuke Kajimoto
,
Tetsuya Kageyama
,
Taichi Aoki
,
Takahiro Kasama
.
desec 2024
:
115-122
[doi]
Vulnerabilities and Challenges in the Development of PUF-Based Authentication Protocols on FPGAs: A Brief Review
Sinan Yavuz
,
Edwin Naroska
,
Kai Daniel
.
desec 2024
:
58-65
[doi]
2023
IEEE Conference on Dependable and Secure Computing, DSC 2023, Tampa, FL, USA, November 7-9, 2023
IEEE,
2023.
[doi]
Highly Optimized Curve448 and Ed448 design in wolfSSL and Side-Channel Evaluation on Cortex-M4
Mila Anastasova
,
Rabih El Khatib
,
Aimee Laclaustra
,
Reza Azarderakhsh
,
Mehran Mozaffari Kermani
.
desec 2023
:
1-8
[doi]
Exploiting Hardware Imperfections for GPS Spoofing Detection using Clock Variations
Mirza Athar Baig
,
Muhammad Naveed Aman
.
desec 2023
:
1-7
[doi]
An Observer-Based Control for a Networked Control of Permanent Magnet Linear Motors under a False-Data-Injection Attack
Parisa Ansari Bonab
,
James Holland
,
Arman Sargolzaei
.
desec 2023
:
1-8
[doi]
The Substitution-Boxes Incompatibility in JPEG Image Encryption
Manuel Alejandro Cardona-López
,
Juan Carlos Chimal-Eguía
,
Víctor Manuel Silva García
,
Rolando Flores-Carapia
.
desec 2023
:
1-7
[doi]
RIDE: Real-time Intrusion Detection via Explainable Machine Learning Implemented in a Memristor Hardware Architecture
Jingdi Chen
,
Lei Zhang
,
Joseph Riem
,
Gina C. Adam
,
Nathaniel D. Bastian
,
Tian Lan
.
desec 2023
:
1-8
[doi]
Cyber Security in Blockchain
Eric Cooper
,
Eric Weese
,
Alex Fortson
,
Dan Lo 0001
,
Yong Shi 0002
.
desec 2023
:
1-11
[doi]
Designing and Testing A Secure Cooperative Adaptive Cruise Control under False Data Injection Attack
Jonas Cunningham-Rush
,
James Holland
,
Shirin Noei
,
Arman Sargolzaei
.
desec 2023
:
1-8
[doi]
Automatic Conversion of ABAC Policies for RBAC Systems
Maryam Davari
,
Mohammad Zulkernine
.
desec 2023
:
1-7
[doi]
Semantic Video Transformer for Robust Action Recognition
Keval Doshi
,
Yasin Yilmaz
.
desec 2023
:
1-5
[doi]
Privacy-Preserving Video Understanding via Transformer-based Federated Learning
Keval Doshi
,
Yasin Yilmaz
.
desec 2023
:
1-8
[doi]
Cyber Risk Evaluation for Android-based Devices
Ocheme Anthony Ekle
,
Denis A. Ulybyshev
.
desec 2023
:
1-8
[doi]
Secure Outsourcing of Boolean Formulas Truth Assignment Problem
Albert Guan
.
desec 2023
:
1-5
[doi]
Impact of Topology Noise on Power Systems State Estimation Using a Temporal GCN Framework
Seyed Hamed Haghshenas
,
Mia Naeini
.
desec 2023
:
1-5
[doi]
Empirical Evaluation of Autoencoder Models for Anomaly Detection in Packet-based NIDS
Soumyadeep Hore
,
Quoc H. Nguyen
,
Yulun Xu
,
Ankit Shah 0002
,
Nathaniel D. Bastian
,
Trung Le
.
desec 2023
:
1-8
[doi]
FLID: Intrusion Attack and Defense Mechanism for Federated Learning Empowered Connected Autonomous Vehicles (CAVs) Application
Md. Zarif Hossain
,
Ahmed Imteaj
,
Saika Zaman
,
Abdur R. Shahid
,
Sajedul Talukder
,
M. Hadi Amini
.
desec 2023
:
1-8
[doi]
Detection of Ransomware Attack Using Deep Learning
Muna Jemal
,
Dan Chia-Tien Lo
.
desec 2023
:
1-9
[doi]
AI Techniques for Software Vulnerability Detection and Mitigation
Heba M. Khater
,
Mohamad Khayat
,
Saed Alrabaee
,
Mohamed Adel Serhani
,
Ezedin Barka
,
Farag Sallabi
.
desec 2023
:
1-10
[doi]
SRAM and Generative Network-based Physical Fingerprinting for Trust Management in the Internet of Things
Varun Kohli
,
Muhammad Naveed Aman
,
Biplab Sikdar 0001
.
desec 2023
:
1-8
[doi]
CoDex: Cross-Tactic Correlation System for Data Exfiltration Detection
Shanhsin Lee
,
Yung-Shiu Chen
,
Shiuhpyng Winston Shieh
.
desec 2023
:
1-8
[doi]
Enriching the Semantics of Information Flow Tracking with Source-Level Memory Allocation Event Logging
Sanoop Mallissery
,
Yu-Sung Wu
.
desec 2023
:
1-10
[doi]
A Study on the Forensic Analysis of Airlines Applications on Android Operating System
Urva Maryam
,
Mehdi Hussain
.
desec 2023
:
1-9
[doi]
Towards Robust Learning using Diametrical Risk Minimization for Network Intrusion Detection
Kelson J. McCollum
,
Nathaniel D. Bastian
,
Johannes O. Royset
.
desec 2023
:
1-8
[doi]
Preprocessing Network Traffic using Topological Data Analysis for Data Poisoning Detection
Galamo Monkam
,
Michael J. De Lucia
,
Nathaniel D. Bastian
.
desec 2023
:
1-8
[doi]
Malicious Cyber Activity Detection using Zigzag Persistence
Audun Myers
,
Alyson Bittner
,
Sinan Aksoy
,
Daniel M. Best
,
Gregory Henselman-Petrusek
,
Helen Jenne
,
Cliff A. Joslyn
,
Bill Kay
,
Garret Seppala
,
Stephen J. Young
,
Emilie Purvine
.
desec 2023
:
1-8
[doi]
Lightweight Digital Signatures for Internet of Things: Current and Post-Quantum Trends and Visions
Saif E. Nouma
,
Attila A. Yavuz
.
desec 2023
:
1-2
[doi]
ML based Detection and Mitigation Scheme for DoS attacks on SDN Controllers
Tamer Omar
,
Barret Griffin
,
Jose Garcia
.
desec 2023
:
1-6
[doi]
Privacy-Preserving and Fault-Tolerant Data Aggregation Protocol for Internet of Drones
Cong Pu
.
desec 2023
:
1-8
[doi]
APTer: Towards the Investigation of APT Attribution
Vinay Sachidananda
,
Rajendra Patil
,
Akshay Sachdeva
,
Kwok-Yan Lam
,
Yang Liu 0003
.
desec 2023
:
1-10
[doi]
Detecting Web Application DAST Attacks with Machine Learning
Pojan Shahrivar
,
Stuart Millar
,
Ezzeldin Shereen
.
desec 2023
:
1-8
[doi]
SepMM: A General Matrix Multiplication Optimization Approach for Privacy-Preserving Machine Learning
Tung-Lin Tsai
,
Pei Yuan Wu
.
desec 2023
:
1-10
[doi]
Compiler-Supported Selective Software Fault Tolerance
Tuncer Turhan
,
Hakan Tekgul
,
Ozcan Ozturk 0001
.
desec 2023
:
1-6
[doi]
Decentralized and Incentivized Voting System with Web3 Technology Ensuring Anonymity and Preventing Double Voting
Lo-Yao Yeh
,
Jun-Qian Jian
,
Jen-Wei Hu
.
desec 2023
:
1-8
[doi]
2022
Defending OC-SVM based IDS from poisoning attacks
Lu Zhang 0046
,
Reginald Cushing
,
Paola Grosso
.
desec 2022
:
1-8
[doi]
IEEE Conference on Dependable and Secure Computing, DSC 2022, Edinburgh, UK, June 22-24, 2022
IEEE,
2022.
[doi]
ELSA: Edge Lightweight Searchable Attribute-based encryption Multi-keyword Scalability
Jawhara Aljabri
,
Anna Lito Michala
,
Jeremy Singer
.
desec 2022
:
1-4
[doi]
Security Orchestration, Automation, and Response Engine for Deployment of Behavioural Honeypots
Upendra Bartwal
,
Subhasis Mukhopadhyay
,
Rohit Negi
,
Sandeep K. Shukla
.
desec 2022
:
1-8
[doi]
High Speed Encrypted Computing: Stochastic Confusion and Lies in a Secret Computer
Peter T. Breuer
.
desec 2022
:
1-8
[doi]
Shodan Indicators Used to Detect Standard Conpot Implementations and Their Improvement Through Sophisticated Customization
Warren Z. Cabral
,
Leslie F. Sikos
,
Craig Valli
.
desec 2022
:
1-7
[doi]
Linux Kernel Module Development with Rust
Shao-Fu Chen
,
Yu-Sung Wu
.
desec 2022
:
1-2
[doi]
Capturing Malware Behaviour with Ontology-based Knowledge Graphs
Ipshita Roy Chowdhury
,
Deepayan Bhowmik
.
desec 2022
:
1-7
[doi]
Discovering Exfiltration Paths Using Reinforcement Learning with Attack Graphs
Tyler Cody
,
Abdul-Rahman
,
Christopher Redino
,
Lanxiao Huang
,
Ryan Clark
,
Akshay Kakkar
,
Deepak Kushwaha
,
Paul Park
,
Peter A. Beling
,
Edward Bowen
.
desec 2022
:
1-8
[doi]
Cache Locking and Encryption to Prevent Memory Snooping in Embedded Systems
Jason DeJesus
,
John A. Chandy
.
desec 2022
:
1-8
[doi]
Clustering-Based Network Intrusion Detection System
Chun-I Fan
,
Yen-Lin Lai
,
Cheng-Han Shie
.
desec 2022
:
1-8
[doi]
IoT Botnet Detection Based on the Behaviors of DNS Queries
Chun-I Fan
,
Cheng-Han Shie
,
Che-Ming Hsu
,
Tao Ban
,
Tomohiro Morikawa
,
Takeshi Takahashi 0001
.
desec 2022
:
1-7
[doi]
Show Me Your Attach Request and I'll Tell You Who You Are: Practical Fingerprinting Attacks in 4G and 5G Mobile Networks
Daniel Fraunholz
,
Richard Schörghofer-Vrinssen
,
Hartmut König
,
Richard M. Zahoransky
.
desec 2022
:
1-8
[doi]
An Engineering Process Framework for Cybersecurity Incident Response Assessment
Robert L. Freas
,
Heather F. Adair
,
Eman M. Hammad
.
desec 2022
:
1-8
[doi]
How National CSIRTs Operate: Personal Observations and Opinions from MyCERT
Sharifah Roziah Binti Mohd Kassim
,
Solahuddin bin Shamsuddin
,
Shujun Li
,
Budi Arief
.
desec 2022
:
1-2
[doi]
Design and Analysis of Novel Bit-flip Attacks and Defense Strategies for DNNs
Yash Khare
,
Kumud Lakara
,
Maruthi S. Inukonda
,
Sparsh Mittal
,
Mahesh Chandra
,
Arvind Kaushik
.
desec 2022
:
1-8
[doi]
A Novel Approach for Providing Client-Verifiable and Efficient Access to Private Smart Contracts
Alexander Köberl
,
Holger Bock
,
Christian Steger
.
desec 2022
:
1-8
[doi]
Symbolon: Enabling Flexible Multi-device-based User Authentication
Thalia Laing
,
Eduard Marin
,
Mark D. Ryan
,
Joshua Schiffman
,
Gaëtan Wattiau
.
desec 2022
:
1-12
[doi]
Device-to-Device Task Offloading in a Stochastic Invalid-Device Scenario with Social Awareness
MingChu Li
,
Linlin Yang
,
Kun Lu 0003
,
Syed Bilal Hussain Shah
,
Xiao Zheng
.
desec 2022
:
1-7
[doi]
Graph Neural Network-based Android Malware Classification with Jumping Knowledge
Wai Weng Lo
,
Siamak Layeghy
,
Mohanad Sarhan
,
Marcus Gallagher
,
Marius Portmann
.
desec 2022
:
1-9
[doi]
LAEG: Leak-based AEG using Dynamic Binary Analysis to Defeat ASLR
Wei-Loon Mow
,
Shih-Kun Huang
,
Hsu-Chun Hsiao
.
desec 2022
:
1-8
[doi]
Network Intrusion Detection in Encrypted Traffic
Eva Papadogiannaki
,
Giorgos Tsirantonakis
,
Sotiris Ioannidis
.
desec 2022
:
1-8
[doi]
A Hybrid Graph Neural Network Approach for Detecting PHP Vulnerabilities
Rishi Rabheru
,
Hazim Hanif
,
Sergio Maffeis
.
desec 2022
:
1-9
[doi]
A Node-Embedding Features Based Machine Learning Technique for Dynamic Malware Detection
Sudhir Kumar Rai
,
Ashish Mittal
,
Sparsh Mittal
.
desec 2022
:
1-8
[doi]
Enabling Device Trustworthiness for SDN-Enabled Internet -of- Battlefield Things
Abel O. Gomez Rivera
,
Evan M. White
,
Jaime C. Acosta
,
Deepak K. Tosh
.
desec 2022
:
1-7
[doi]
A Digital Forensics Live Suspicious Activity Toolkit To Assist Investigators With Sexual Harm Prevention Order Monitoring
Andrew Scholey
,
Pooneh Bagheri Zadeh
.
desec 2022
:
1-6
[doi]
Optimising user security recommendations for AI-powered smart-homes
Emma Scott
,
Sakshyam Panda
,
George Loukas
,
Emmanouil Panaousis
.
desec 2022
:
1-8
[doi]
A Novel Chaos-based Light-weight Image Encryption Scheme for Multi-modal Hearing Aids
Awais Aziz Shah
,
Ahsan Adeel
,
Jawad Ahmad 0001
,
Ahmed Yassin Al-Dubai
,
Mandar Gogate
,
Abhijeet Bishnu
,
Muhammad Diyan 0002
,
Tassadaq Hussain
,
Kia Dashtipour
,
Tharm Ratnarajah
,
Amir Hussain 0001
.
desec 2022
:
1-6
[doi]
A Call for a New Privacy & Security Regime for IoT Smart Toys
Joshua Streiff
,
Naheem Noah
,
Sanchari Das
.
desec 2022
:
1-8
[doi]
A Low Cost Blockchain-Based Framework for Preserving Critical Data in Health-Care IoT Systems Using Classification
Heba Takruri Tamemi
,
Manar Rabayah
,
Kareem Abu Raad
,
Mai Kanaan
,
Ahmed Awad
.
desec 2022
:
1-8
[doi]
A Generative Neural Network for Enhancing Android Metamorphic Malware Detection based on Behaviour Profiling
Leigh Turnbull
,
Zhiyuan Tan 0001
,
Kehinde O. Babaagba
.
desec 2022
:
1-9
[doi]
Automated Anomaly Detection Tool for Industrial Control System
Mariam Varkey
,
Jacob John
,
Umadevi K. S.
.
desec 2022
:
1-6
[doi]
Malicious and Benign URL Dataset Generation Using Character-Level LSTM Models
Spencer Vecile
,
Kyle Lacroix
,
Katarina Grolinger
,
Jagath Samarabandu
.
desec 2022
:
1-8
[doi]
A Co-evolutionary Algorithm-Based Malware Adversarial Sample Generation Method
Fangwei Wang
,
Yuanyuan Lu
,
Qingru Li
,
Changguang Wang
,
Yonglei Bai
.
desec 2022
:
1-8
[doi]
Reliability Models and Analysis for Triple-model with Triple-input Machine Learning Systems
Qiang Wen
,
Fumio Machida
.
desec 2022
:
1-8
[doi]
Multi-task Learning Model based on Multiple Characteristics and Multiple Interests for CTR prediction
Yufeng Xie
,
MingChu Li
,
Kun Lu 0003
,
Syed Bilal Hussain Shah
,
Xiao Zheng
.
desec 2022
:
1-7
[doi]
Cyber Security Risks of Net Zero Technologies
Haiyue Yuan
,
Shujun Li
.
desec 2022
:
1-11
[doi]
Towards Secure Multi-Agent Deep Reinforcement Learning: Adversarial Attacks and Countermeasures
Changgang Zheng
,
Chen Zhen
,
Haiyong Xie
,
Shufan Yang
.
desec 2022
:
1-8
[doi]
Sign in
or
sign up
to see more results.