387 | -- | 421 | George Karantzas, Constantinos Patsakis. An Empirical Assessment of Endpoint Detection and Response Systems against Advanced Persistent Threats Attack Vectors |
422 | -- | 452 | Romain Laborde, Sravani Teja Bulusu, Ahmad Samer Wazan, Arnaud Oglaza, Abdelmalek Benzekri. A Methodological Approach to Evaluate Security Requirements Engineering Methodologies: Application to the IREHDO2 Project Context |
453 | -- | 469 | Pooria Madani, Natalija Vlajic. RSSI-Based MAC-Layer Spoofing Detection: Deep Learning Approach |
470 | -- | 495 | Md. Shopon, Sanjida Nasreen Tumpa, Yajurv Bhatia, K. N. Pavan Kumar, Marina L. Gavrilova. Biometric Systems De-Identification: Current Advancements and Future Directions |
496 | -- | 518 | Diana L. Huete Trujillo, Antonio Ruiz-Martínez. Tor Hidden Services: A Systematic Literature Review |
519 | -- | 538 | Fabian Böhm, Marietheres Dietz, Tobias Preindl, Günther Pernul. Augmented Reality and the Digital Twin: State-of-the-Art and Perspectives for Cybersecurity |