Computers & Security

Title Publication Date Language Citations
Watching what you watch1998/01/01English
MITI encryption-technology policy criticized1997/01/01English
Contingency planning: What to do when bad things happen to good systems1995/01/01English
Labour acts to clean up digital certificate mess1998/01/01English
Electronic borders: Defining and protecting national networks1997/01/01English
Two-phase cryptographic key recovery system1997/01/01English
How secure is security?1995/01/01English
From toy rings to sophisticated codes1998/01/01English
Where have all the hackers gone?1997/01/01English
Public_key cryptosystems based on linear codes1997/01/01English
The enemy everywhere1997/01/01English
European Parliament Doesn’t Like Anonymity Online2000/04/01English
Physical IT security1998/01/01English
Privacy-preserving correlation of cross-organizational cyber threat intelligence with private graph intersections2023/12/01English
TGPrint: Attack fingerprint classification on encrypted network traffic based graph convolution attention networks2023/12/01English
Towards a metrics suite for evaluating cache side-channel vulnerability: Case studies on an open-source RISC-V processor2023/12/01English
GONE: A generic O(1) NoisE layer for protecting privacy of deep neural networks2023/12/01English
When expectation fails and motivation prevails: the mediating role of awareness in bridging the expectancy-capability gap in mobile identity protection2023/11/01English
Bidirectional location privacy protection scheme for epidemiological investigation based on OT2023/12/01English
HT2ML: An efficient hybrid framework for privacy-preserving Machine Learning using HE and TEE2023/12/01English
ATDAD: One-class adversarial learning for tabular data anomaly detection2023/11/01English
A formal approach for the identification of redundant authorization policies in Kubernetes2023/12/01English
The role of program analysis in security vulnerability detection: Then and now2023/12/01English
MUD-PQFed: Towards Malicious User Detection on model corruption in Privacy-preserving Quantized Federated learning2023/10/01English
Model update for intrusion detection: Analyzing the performance of delayed labeling and active learning strategies2023/11/01English
AVX-TSCHA: Leaking information through AVX extensions in commercial processors2023/11/01English
RDPCF: Range-based differentially private user data perturbation for collaborative filtering2023/11/01English
Operations-informed incident response playbooks2023/11/01English
On the self-adjustment of privacy safeguards for query log streams2023/11/01English
Artificial lizard search optimized fuzzy logic approach to addressing authentication and data security challenges in P2P cloud environments2023/12/01English