Loading…
Integrating artificial intelligence in cyber security for cyber-physical systems
Alowaidi, Majed, Sharma, Sunil Kumar, AlEnizi, Abdullah, Bhardwaj, Shivam
Published in Electronic research archive (01.01.2023)
Published in Electronic research archive (01.01.2023)
Get full text
Journal Article
Loading…
Construction of nonlinear component of block cipher using coset graph
Waheed, Adil, Subhan, Fazli, Suud, Mazliham Mohd, Malik, Muhammad Yasir Hayat, Mirza, Alina, Afzal, Farkhanda
Published in AIMS mathematics (01.01.2023)
Published in AIMS mathematics (01.01.2023)
Get full text
Journal Article
Loading…
Loading…
DTSAC: Smart Contract-based Access Control with Delegation and Trust Management
Liao, Junguo, Wu, Qiong
Published in Proceedings - International Conference on Parallel and Distributed Systems (17.12.2023)
Published in Proceedings - International Conference on Parallel and Distributed Systems (17.12.2023)
Get full text
Conference Proceeding
Loading…
DoubleStrokeNet: Bigram-Level Keystroke Authentication
Neacsu, Teodor, Poncu, Teodor, Ruseti, Stefan, Dascalu, Mihai
Published in Electronics (Basel) (01.10.2023)
Published in Electronics (Basel) (01.10.2023)
Get full text
Journal Article
Loading…
The Privacy Paradox in Discovery
Stuart, Allyson Haynes
Published in Vanderbilt journal of entertainment and technology law (22.09.2024)
Get full text
Published in Vanderbilt journal of entertainment and technology law (22.09.2024)
Journal Article
Loading…
Loading…
Loading…
Data security strategies to avoid data breaches in modern information systems
Chukwudi Tabitha Aghaunor, Patience Eshua, Tawo Obah, Oluwatoyin Aromokeye
Published in World Journal of Advanced Research and Reviews (30.12.2023)
Published in World Journal of Advanced Research and Reviews (30.12.2023)
Get full text
Journal Article
Loading…
Loading…
Loading…
Privacy preserving data visualizations
Avraam, Demetris, Wilson, Rebecca, Butters, Oliver, Burton, Thomas, Nicolaides, Christos, Jones, Elinor, Boyd, Andy, Burton, Paul
Published in EPJ data science (01.01.2021)
Published in EPJ data science (01.01.2021)
Get full text
Journal Article
Loading…
Loading…
Designing a security incident response process for self-sovereign identities
Ziegler, Leonhard, Grabatin, Michael, Pöhn, Daniela, Hommel, Wolfgang
Published in EURASIP Journal on Information Security (20.03.2025)
Published in EURASIP Journal on Information Security (20.03.2025)
Get full text
Journal Article
Loading…
Loading…