Facet browsing currently unavailable
Page 2 of 128 results
Sort by: relevance publication year
Adaptive Noise Injection against Side-Channel Attacks on ARM Platform JOURNAL ARTICLE published 29 January 2019 in ICST Transactions on Security and Safety |
Attacker Capability based Dynamic Deception Model for Large-Scale Networks JOURNAL ARTICLE published 19 August 2019 in ICST Transactions on Security and Safety |
Threats, Countermeasures and Attribution of Cyber Attacks on Critical Infrastructures JOURNAL ARTICLE published 11 December 2018 in ICST Transactions on Security and Safety |
Towards Automating the Assessment of Software Vulnerability Risk JOURNAL ARTICLE published 12 January 2021 in ICST Transactions on Security and Safety |
The performance analysis of public key cryptography-based authentication JOURNAL ARTICLE published 15 May 2018 in ICST Transactions on Security and Safety |
Mapping of the Security Requirements of GDPR and NISD JOURNAL ARTICLE published 13 July 2018 in ICST Transactions on Security and Safety |
A study of user experiences and network analysis on anonymity and traceability of bitcoin transactions JOURNAL ARTICLE published 1 June 2021 in ICST Transactions on Security and Safety |
Privacy-Preserving Multi-Party Directory Services JOURNAL ARTICLE published 29 January 2019 in ICST Transactions on Security and Safety |
Impact of Personality Types and Matching Messaging on Password Strength JOURNAL ARTICLE published 10 September 2021 in ICST Transactions on Security and Safety |
Prevention of crime in B2C E-Commerce: How E-Retailers/Banks protect themselves from Criminal Sctivities JOURNAL ARTICLE published 8 December 2016 in ICST Transactions on Security and Safety |
Introduction to special issue on information privacy and trust in social media JOURNAL ARTICLE published 27 September 2011 in ICST Transactions on Security and Safety |
Dynamic Risk Assessment and Analysis Framework for Large-Scale Cyber-Physical Systems JOURNAL ARTICLE published 13 July 2018 in ICST Transactions on Security and Safety |
UAuth: A Strong Authentication Method from Personal Devices to Multi-accounts JOURNAL ARTICLE published 5 October 2015 in ICST Transactions on Security and Safety |
Decision-making and emotions in the contested information environment JOURNAL ARTICLE published 3 May 2013 in ICST Transactions on Security and Safety |
Image encryption algorithm using chaotic maps and cellular automata JOURNAL ARTICLE published 30 October 2020 in ICST Transactions on Security and Safety |
Authenticating Video Feeds using Electric Network Frequency Estimation at the Edge JOURNAL ARTICLE published 13 July 2018 in ICST Transactions on Security and Safety |
User Identity Linkage Method Based on User Online Habit JOURNAL ARTICLE published 30 October 2020 in ICST Transactions on Security and Safety |
Assessing Security, Capacity and Reachability of a Heterogeneous Industrial Network during Planning Phase JOURNAL ARTICLE published 8 December 2016 in ICST Transactions on Security and Safety |
A secure and lightweight multicast communication system for Smart Grids JOURNAL ARTICLE published 11 December 2018 in ICST Transactions on Security and Safety |
Mouse Underlaying: Global Key and Mouse Listener Based on an Almost Invisible Window with Local Listeners and Sophisticated Focus JOURNAL ARTICLE published 15 October 2018 in ICST Transactions on Security and Safety |