1 | -- | 22 | Christian DeLozier. How Close Is Existing C/C++ Code to a Safe Subset? |
23 | -- | 40 | Mohamad Saalim Wani, Michael Rademacher, Thorsten Horstmann, Mathias Kretschmer. Security Vulnerabilities in 5G Non-Stand-Alone Networks: A Systematic Analysis and Attack Taxonomy |
41 | -- | 54 | Anthony Overmars, Sitalakshmi Venkatraman. Continued Fractions Applied to the One Line Factoring Algorithm for Breaking RSA |
55 | -- | 75 | Elias Seid, Oliver Popov, Fredrik Blix. Security Attack Behavioural Pattern Analysis for Critical Service Providers |
76 | -- | 104 | Ioannis Paspatis, Aggeliki Tsohou. Experiential Transformation in Privacy Behavior: A New Framework for Privacy Behavior Enhancement |
105 | -- | 125 | Stefan Kutschera, Wolfgang Slany, Patrick Ratschiller, Sarina Gursch, Patrick Deininger, HÃ¥vard D. Johansen. Incidental Data: A Survey towards Awareness on Privacy-Compromising Data Incidentally Shared on Social Media |
126 | -- | 152 | Yousef Alghamdi, Arslan Munir. Image Encryption Algorithms: A Survey of Design and Evaluation Metrics |