Home
Research Trends
Papers list
Open Access Journals
All Journals
Search in Journals
Contact us
Computers & Security
Title
Publication Date
Language
Citations
Watching what you watch
1998/01/01
English
MITI encryption-technology policy criticized
1997/01/01
English
Contingency planning: What to do when bad things happen to good systems
1995/01/01
English
Labour acts to clean up digital certificate mess
1998/01/01
English
Electronic borders: Defining and protecting national networks
1997/01/01
English
Two-phase cryptographic key recovery system
1997/01/01
English
How secure is security?
1995/01/01
English
From toy rings to sophisticated codes
1998/01/01
English
Where have all the hackers gone?
1997/01/01
English
Public_key cryptosystems based on linear codes
1997/01/01
English
The enemy everywhere
1997/01/01
English
European Parliament Doesn’t Like Anonymity Online
2000/04/01
English
Physical IT security
1998/01/01
English
Privacy-preserving correlation of cross-organizational cyber threat intelligence with private graph intersections
2023/12/01
English
TGPrint: Attack fingerprint classification on encrypted network traffic based graph convolution attention networks
2023/12/01
English
Towards a metrics suite for evaluating cache side-channel vulnerability: Case studies on an open-source RISC-V processor
2023/12/01
English
GONE: A generic O(1) NoisE layer for protecting privacy of deep neural networks
2023/12/01
English
When expectation fails and motivation prevails: the mediating role of awareness in bridging the expectancy-capability gap in mobile identity protection
2023/11/01
English
Bidirectional location privacy protection scheme for epidemiological investigation based on OT
2023/12/01
English
HT2ML: An efficient hybrid framework for privacy-preserving Machine Learning using HE and TEE
2023/12/01
English
ATDAD: One-class adversarial learning for tabular data anomaly detection
2023/11/01
English
A formal approach for the identification of redundant authorization policies in Kubernetes
2023/12/01
English
The role of program analysis in security vulnerability detection: Then and now
2023/12/01
English
MUD-PQFed: Towards Malicious User Detection on model corruption in Privacy-preserving Quantized Federated learning
2023/10/01
English
Model update for intrusion detection: Analyzing the performance of delayed labeling and active learning strategies
2023/11/01
English
AVX-TSCHA: Leaking information through AVX extensions in commercial processors
2023/11/01
English
RDPCF: Range-based differentially private user data perturbation for collaborative filtering
2023/11/01
English
Operations-informed incident response playbooks
2023/11/01
English
On the self-adjustment of privacy safeguards for query log streams
2023/11/01
English
Artificial lizard search optimized fuzzy logic approach to addressing authentication and data security challenges in P2P cloud environments
2023/12/01
English
«
‹ Pervious
Next ›
»