444 | -- | 465 | Abdullah F. Al-Aboosi, Matan Broner, Fadhil Y. Al-Aboosi. Bingo: A Semi-Centralized Password Storage System |
466 | -- | 489 | Rosemary Cosmas Tlatlaa Panga, Janeth Marwa, Jema David Ndibwile. A Game or Notes? The Use of a Customized Mobile Game to Improve Teenagers' Phishing Knowledge, Case of Tanzania |
490 | -- | 515 | Tibor Pósa, Jens Grossklags. Work Experience as a Factor in Cyber-Security Risk Awareness: A Survey Study with University Students |
516 | -- | 526 | Daniel Spiekermann, Jörg Keller 0001. Requirements for Crafting Virtual Network Packet Captures |
527 | -- | 555 | Mostofa Ahsan, Kendall E. Nygard, Rahul Gomes, Md Minhaz Chowdhury, Nafiz Rifat, Jayden F. Connolly. Cybersecurity Threats and Their Mitigation Approaches Using Machine Learning - A Review |
556 | -- | 572 | Hannah Nyholm, Kristine Monteith, Seth Lyles, Micaela Gallegos, Mark Desantis, John Donaldson, Claire Taylor. The Evolution of Volatile Memory Forensics |
573 | -- | 586 | William Triplett. Addressing Human Factors in Cybersecurity Leadership |
587 | -- | 605 | Shao-Fang Wen, Ankur Shukla, Basel Katt. Developing Security Assurance Metrics to Support Quantitative Security Assurance Evaluation |
606 | -- | 628 | Christoph Stach, Michael Behringer, Julia Bräcker, Clémentine Gritti, Bernhard Mitschang. SMARTEN - A Sample-Based Approach towards Privacy-Friendly Data Refinement |
629 | -- | 639 | Jessil Fuhr, Feng Wang 0017, Yongning Tang. MOCA: A Network Intrusion Monitoring and Classification System |
640 | -- | 661 | Rachida Hireche, Houssem Mansouri, Al-Sakib Khan Pathan. Security and Privacy Management in Internet of Medical Things (IoMT): A Synthesis |
662 | -- | 699 | Christina L. Phibbs, Shawon S. M. Rahman. A Synopsis of "The Impact of Motivation, Price, and Habit on Intention to Use IoT-Enabled Technology: A Correlational Study" |
700 | -- | 713 | Pedro Sousa, António Pinto, Pedro Pinto 0001. Exploiting Online Services to Enable Anonymous and Confidential Messaging |
714 | -- | 730 | A. M. Mahmud Chowdhury, Masudul Haider Imtiaz. Contactless Fingerprint Recognition Using Deep Learning - A Systematic Review |
731 | -- | 749 | Andreas Puder, Marcel Rumez, Daniel Grimm, Eric Sax. Generic Patterns for Intrusion Detection Systems in Service-Oriented Automotive and Medical Architectures |
750 | -- | 763 | Milos Stankovic, Umit Karabiyik. Exploratory Study on Kali NetHunter Lite: A Digital Forensics Approach |