0 | -- | 0 | Philipp Markert, Daniel V. Bailey, Maximilian Golla, Markus Dürmuth, Adam J. Aviv. On the Security of Smartphone Unlock PINs |
0 | -- | 0 | Sana Maqsood, Sonia Chiasson. Design, Development, and Evaluation of a Cybersecurity, Privacy, and Digital Literacy Game for Tweens |
0 | -- | 0 | Luca Demetrio, Scott E. Coull, Battista Biggio, Giovanni Lagorio, Alessandro Armando, Fabio Roli. Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection |
0 | -- | 0 | Simon Birnbach, Richard Baker 0008, Simon Eberz, Ivan Martinovic. #PrettyFlyForAWiFi: Real-world Detection of Privacy Invasion Attacks by Drones |
0 | -- | 0 | Abbas Acar, Shoukat Ali, Koray Karabina, Cengiz Kaygusuz, Hidayet Aksu, Kemal Akkaya, Arif Selcuk Uluagac. A Lightweight Privacy-Aware Continuous Authentication Protocol-PACA |
0 | -- | 0 | Mohammed Abuhamad, Tamer AbuHmed, David A. Mohaisen, DaeHun Nyang. Large-scale and Robust Code Authorship Identification with Deep Feature Learning |
0 | -- | 0 | Sarah C. Helble, Ian D. Kretz, Peter A. Loscocco, John D. Ramsdell, Paul D. Rowe, Perry Alexander. Flexible Mechanisms for Remote Attestation |
0 | -- | 0 | Aleieldin Salem, Sebastian Banescu, Alexander Pretschner. Maat: Automatically Analyzing VirusTotal for Accurate Labeling and Effective Malware Detection |
0 | -- | 0 | Long Cheng 0005, Salman Ahmed, Hans Liljestrand, Thomas Nyman, Haipeng Cai, Trent Jaeger, N. Asokan, Danfeng (Daphne) Yao. Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches |