A Cryptography-Powered Infrastructure to Ensure the Integrity of Robot Workflows
(Login to Download)
Blockchain Technology - Emerging Applications and Use Cases for Secure and Trustworthy Smart Systems
(Login to Download)
Enhancing Machine Learning Prediction in Cybersecurity Using Dynamic Feature Selector
(Login to Download)
Journal of Cybersecurity and Privacy: A New Open Access Journal
(Login to Download)
Secure and Privacy-Aware Blockchain Design: Requirements, Challenges and Solutions
(Login to Download)
Sharing Machine Learning Models as Indicators of Compromise for Cyber Threat Intelligence
(Login to Download)
The Cybersecurity Focus Area Maturity (CYSFAM) Model
(Login to Download)
Password Similarity Using Probabilistic Data Structures
(Login to Download)
Refinement Orders for Quantitative Information Flow and Differential Privacy
(Login to Download)
Investigating Anti-Evasion Malware Triggers Using Automated Sandbox Reconfiguration Techniques
(Login to Download)
Journal of Cybersecurity and Privacy: A New Open Access Journal 2
(Login to Download)
CLAP: A Cross-Layer Analytic Platform for the Correlation of Cyber and Physical Security Events Affecting Water Critical Infrastructures
(Login to Download)
Secure Remote Storage of Logs with Search Capabilities
(Login to Download)
Ontology for Cross-Site-Scripting (XSS) Attack in Cybersecurity
(Login to Download)
Developing a Cybersecurity Framework for e-Government Project in the Kingdom of Saudi Arabia
(Login to Download)
Model for Quantifying the Quality of Secure Service
(Login to Download)
Automotive Vulnerability Disclosure: Stakeholders, Opportunities, Challenges
(Login to Download)
Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT
(Login to Download)
Marine Network Protocols and Security Risks
(Login to Download)
Information Security and Cybersecurity Management: A Case Study with SMEs in Portugal
(Login to Download)
Augmented Reality and the Digital Twin: State-of-the-Art and Perspectives for Cybersecurity
(Login to Download)
Tor Hidden Services: A Systematic Literature Review
(Login to Download)
Biometric Systems De-Identification: Current Advancements and Future Directions
(Login to Download)
RSSI-Based MAC-Layer Spoofing Detection: Deep Learning Approach
(Login to Download)
A Methodological Approach to Evaluate Security Requirements Engineering Methodologies: Application to the IREHDO2 Project Context
(Login to Download)
An Empirical Assessment of Endpoint Detection and Response Systems against Advanced Persistent Threats Attack Vectors
(Login to Download)
Ads and Fraud: A Comprehensive Survey of Fraud in Online Advertising
(Login to Download)
Extending the Quality of Secure Service Model to Multi-Hop Networks
(Login to Download)
Polymorphic Adversarial Cyberattacks Using WGAN
(Login to Download)
Users’ Privacy Attitudes towards the Use of Behavioral Biometrics Continuous Authentication (BBCA) Technologies: A Protection Motivation Theory Approach
(Login to Download)
Modeling Correlation between Android Permissions Based on Threat and Protection Level Using Exploratory Factor Plane Analysis
(Login to Download)
The Effect of Countermeasure Readability on Security Intentions
(Login to Download)
New Semi-Prime Factorization and Application in Large RSA Key Attacks
(Login to Download)
Insights into Organizational Security Readiness: Lessons Learned from Cyber-Attack Case Studies
(Login to Download)
CyBERT: Cybersecurity Claim Classification by Fine-Tuning the BERT Language Model
(Login to Download)
A Security and Privacy Scoring System for Contact Tracing Apps
(Login to Download)
Cyber Crime Investigation: Landscape, Challenges, and Future Research Directions
(Login to Download)
Clone Node Detection Attacks and Mitigation Mechanisms in Static Wireless Sensor Networks
(Login to Download)
Assessing Competencies Using Scenario-Based Learning in Cybersecurity
(Login to Download)