Facet browsing currently unavailable
Page 3 of 128 results
Sort by: relevance publication year
Toward A Network-Assisted Approach for Effective Ransomware Detection JOURNAL ARTICLE published 13 July 2018 in ICST Transactions on Security and Safety |
Filtering Nonlinear Feedback Shift Registers using Welch-Gong Transformations for Securing RFID Applications JOURNAL ARTICLE published 8 December 2016 in ICST Transactions on Security and Safety |
WG-8: A Lightweight Stream Cipher for Resource-Constrained Smart Devices JOURNAL ARTICLE published 30 January 2015 in ICST Transactions on Security and Safety |
Salus: Kernel Support for Secure Process Compartments JOURNAL ARTICLE published 30 January 2015 in ICST Transactions on Security and Safety |
MAAT: Multi-Stage Attack Attribution in Enterprise Systems using Software Defined Networks JOURNAL ARTICLE published 7 December 2017 in ICST Transactions on Security and Safety |
How Stakeholders Perceived Security Risks? A New Predictive Functional Level Model and its Application to E-Learning JOURNAL ARTICLE published 15 October 2018 in ICST Transactions on Security and Safety |
NIS directive: The case of Greece JOURNAL ARTICLE published 15 May 2018 in ICST Transactions on Security and Safety |
Comparing Online Surveys for Cybersecurity: SONA and MTurk JOURNAL ARTICLE published 8 February 2022 in ICST Transactions on Security and Safety |
Mitigating Vulnerabilities in Closed Source Software JOURNAL ARTICLE published 4 August 2022 in ICST Transactions on Security and Safety |
Vulnerability Analysis, Intrusion Detection and Privacy Preservation of Modern Communication Systems JOURNAL ARTICLE published 28 December 2017 in ICST Transactions on Security and Safety |
Human-centered strategies for cyber-physical systems security JOURNAL ARTICLE published 15 May 2018 in ICST Transactions on Security and Safety |
A novel intrusion detection method based on OCSVM and K-means recursive clustering JOURNAL ARTICLE published 30 January 2015 in ICST Transactions on Security and Safety |
Do Metadata-based Deleted-File-Recovery (DFR) Tools Meet NIST Guidelines? JOURNAL ARTICLE published 19 August 2019 in ICST Transactions on Security and Safety |
Towards Automating the Assessment of Software Vulnerability Risk JOURNAL ARTICLE published 12 January 2021 in ICST Transactions on Security and Safety |
The performance analysis of public key cryptography-based authentication JOURNAL ARTICLE published 15 May 2018 in ICST Transactions on Security and Safety |
Mapping of the Security Requirements of GDPR and NISD JOURNAL ARTICLE published 13 July 2018 in ICST Transactions on Security and Safety |
A study of user experiences and network analysis on anonymity and traceability of bitcoin transactions JOURNAL ARTICLE published 1 June 2021 in ICST Transactions on Security and Safety |
Privacy-Preserving Multi-Party Directory Services JOURNAL ARTICLE published 29 January 2019 in ICST Transactions on Security and Safety |
Impact of Personality Types and Matching Messaging on Password Strength JOURNAL ARTICLE published 10 September 2021 in ICST Transactions on Security and Safety |
Prevention of crime in B2C E-Commerce: How E-Retailers/Banks protect themselves from Criminal Sctivities JOURNAL ARTICLE published 8 December 2016 in ICST Transactions on Security and Safety |