539 | -- | 552 | Tirthankar Ghosh, Guillermo A. Francia III. Assessing Competencies Using Scenario-Based Learning in Cybersecurity |
553 | -- | 579 | Jean Rosemond Dora, Karol Nemoga. Clone Node Detection Attacks and Mitigation Mechanisms in Static Wireless Sensor Networks |
580 | -- | 596 | Cecelia Horan, Hossein Saiedian. Cyber Crime Investigation: Landscape, Challenges, and Future Research Directions |
597 | -- | 614 | Leah Krehling, Aleksander Essex. A Security and Privacy Scoring System for Contact Tracing Apps |
615 | -- | 637 | Kimia Ameri, Michael Hempel, Hamid Sharif, Juan Lopez Jr., Kalyan Perumalla. CyBERT: Cybersecurity Claim Classification by Fine-Tuning the BERT Language Model |
638 | -- | 659 | Faisal Quader, Vandana P. Janeja. Insights into Organizational Security Readiness: Lessons Learned from Cyber-Attack Case Studies |
660 | -- | 674 | Anthony Overmars, Sitalakshmi Venkatraman. New Semi-Prime Factorization and Application in Large RSA Key Attacks |
675 | -- | 704 | Tim Smit, Max van Haastrecht, Marco Spruit. The Effect of Countermeasure Readability on Security Intentions |
704 | -- | 743 | Moses Ashawa, Sarah Morris. Modeling Correlation between Android Permissions Based on Threat and Protection Level Using Exploratory Factor Plane Analysis |
743 | -- | 766 | Andreas Skalkos, Ioannis Stylios, Maria Karyda 0001, Spyros Kokolakis. Users' Privacy Attitudes towards the Use of Behavioral Biometrics Continuous Authentication (BBCA) Technologies: A Protection Motivation Theory Approach |
767 | -- | 792 | Ravi Chauhan, Ulya Sabeel, Alireza Izaddoost, Shahram Shah-Heydari. Polymorphic Adversarial Cyberattacks Using WGAN |
793 | -- | 803 | Paul M. Simon, Scott R. Graham. Extending the Quality of Secure Service Model to Multi-Hop Networks |
804 | -- | 832 | shadi sadeghpour, Natalija Vlajic. Ads and Fraud: A Comprehensive Survey of Fraud in Online Advertising |