Abstract is missing.
- ICScope: Detecting and Measuring Vulnerable ICS Devices Exposed on the InternetYixiong Wu, Shangru Song, Jianwei Zhuge, Tingting Yin, Tianyi Li, JunMin Zhu, Guannan Guo, Yue Liu, Jianju Hu. 1-24 [doi]
- Zero Update Encryption Adjustment on Encrypted Database QueriesMaryam Almarwani, Boris Konev, Alexei Lisitsa 0001. 25-47 [doi]
- Evaluating Consumer Understanding and Awareness of Connected and Autonomous Vehicle Data PrivacyFlora Barber, Steven Furnell. 48-71 [doi]
- Improving Data Security and Privacy for Ontology Based Data AccessÖzgü Can, Murat Osman Ünalir. 72-90 [doi]
- Experimentally Obtained Differential-Linear Distinguishers for Permutations of ASCON and DryGASCONAslí Basak Civek, Cihangir Tezcan. 91-103 [doi]
- A Game Theoretic Approach to the Design of Mitigation Strategies for Generic RansomwareRudra Prasad Baksi, Shambhu J. Upadhyaya. 104-124 [doi]