Abstract is missing.
- A Study of User Concerns about Smartphone PrivacyCarol J. Fung, Vivian Motti 0001, Katie Zhang, Yanjun Qian. 1-8 [doi]
- GRAFFITO-IDS: A Graph-based Algorithm for Feature Enrichment on Online Intrusion Detection SystemsIgor Jochem Sanz, Gabriel Antonio Fontes Rebello, Otto Carlos Muniz Bandeira Duarte. 1-7 [doi]
- A Secure Cloud-based Architecture for monitoring Cyber-Physical Critical InfrastructuresPaulo Assumpção, Carlos Oliveira, Pablo Ortiz, Wilson S. Melo, Luiz Carmo. 1-7 [doi]
- Security and Performance Analysis of Quorum-based Blockchain Consensus ProtocolsGabriel Antonio F. Rebello, Gustavo Franco Camilo, Lucas C. B. Guimarães, Lucas Airam C. de Souza, Otto Carlos M. B. Duarte. 1-7 [doi]
- Security of NFC Banking Transactions: Overview on Attacks and SolutionsSamir Chabbi, Nour El Madhoun, Lazhar Khamer. 1-5 [doi]
- ZT&T: Secure blockchain-based tokens for service session management in Zero Trust NetworksJavier Jose Diaz Rivera, Talha Ahmed Khan, Waleed Akbar, Muhammad Afaq, Wang-Cheol Song. 1-7 [doi]
- A Web User Interface Tool for Metaheuristics-Based Feature Selection Assessment for IDSsHumberto Mendes, Silvio E. Quincozes, Vagner E. Quincozes. 1-5 [doi]
- A Stream Learning Intrusion Detection System for Concept Drifting Network TrafficPedro Horchulhack, Eduardo K. Viegas, Martin Andreoni Lopez. 1-7 [doi]
- Horizontal network for a better cybersecurityKhaldoun Al Agha, Pauline Loygue, Guy Pujolle. 1-4 [doi]
- A Review On Lexical Based Malicious Domain Name Detection MethodsCherifa Hamroun, Ahmed Amamou, Kamel Haddadou, Hayat Haroun, Guy Pujolle. 1-7 [doi]
- A Distributed Platform for Intrusion Detection System Using Data Stream Mining in a Big Data EnvironmentFábio César Schuartz, Mauro Fonseca, Anelise Munaretto. 1-7 [doi]
- Assessing Software-Defined Radio Security and Performance in Virtualized Environments for Cloud Radio Access NetworksGovinda Mohini G. Bezerra, Tadeu N. Ferreira, Diogo M. F. Mattos. 1-7 [doi]
- The Impact of the Interest Flooding Attack on the Pending Interest Table of CCN routersDiego Canizio Lopes, André Luiz Nasserala Pires, Igor Monteiro Moraes. 1-5 [doi]
- Cyber Deception, the Ultimate Piece of a Defensive Strategy - Proof of ConceptWiem Tounsi. 1-5 [doi]
- Estimating Speedup Factor For Personal HSMs Based On Secure ElementsPascal Urien. 1-4 [doi]
- ICpSAF - Integrated Cross-platform Security Assessment FrameworkJoão Pedro De Lima Cassiano, Sérgio Ribeiro, Alana Almeida. 1-2 [doi]
- A Survey on the Security Issues of QUICY. A. Joarder, Carol Fung. 1-8 [doi]
- Securing CoAP with DTLS and OSCOREEmil Suleymanov, Erkin Kirdan, Marc-Oliver Pahl. 1-7 [doi]
- Demonstration of Standalone Intelligent WiFi Sensing for Real-Time Occupancy MonitoringJunye Li 0003, Aryan Sharma, Deepak Mishra 0001, Aruna Seneviratne. 1-2 [doi]
- Blockchain Meets Formal Logic: Semantics Level Cybersecurity ChallengesNouredine Tamani, Saad El Jaouhari. 1-6 [doi]
- Feature Extraction for Intrusion Detection in IEC-61850 Communication NetworksVagner E. Quincozes, Silvio E. Quincozes, Célio Vinicius N. de Albuquerque, Diego G. Passos 0001, Daniel Mossé. 1-7 [doi]
- Performance Analysis of a Privacy-Preserving Frame Sniffer on a Raspberry PiFernando Dias de Mello Silva, Abhishek Kumar Mishra, Aline Carneiro Viana, Nadjib Achir, Anne Fladenmuller, Luís Henrique M. K. Costa. 1-7 [doi]
- ASOP: A Sovereign and Secure Device Onboarding Protocol for Cloud-based IoT ServicesKhan Reaz, Gerhard Wunder. 1-3 [doi]