doted_line_fade2.gif 

Kitsune An Ensemble of Autoencoders for Online Network Intrusion Detection.pdf

doted_line_fade2.gif 

Replacing Byzantine Participants.pdf

doted_line_fade2.gif 

Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks.pdf

doted_line_fade2.gif 

Runtime Execution Introspection for Security Protection Using Machine Learning.pdf

doted_line_fade2.gif 

Fake News Detection Using Topic Authenticity.pdf

doted_line_fade2.gif 

Advanced Analytics for Connected Cars Cyber Security.pdf

doted_line_fade2.gif 

Detection of Malicious Webmail Attachments Based on Propagation Patterns.pdf

doted_line_fade2.gif 

AntiBotics Ransomware Prevention Using Application Authenticationbased File Access Control.pdf

doted_line_fade2.gif 

Secret Double Octopus.pdf

doted_line_fade2.gif 

Succinct Big Data Representations for Privacy and Efficiency.pdf

doted_line_fade2.gif 

 CIoTA- Collaborative Anomaly Detection via Blockchain.pdf

doted_line_fade2.gif 

Deterring Attacks against Critical IT Infrastructure.pdf

doted_line_fade2.gif 

Securing MapReduce Computations Using Accumulating Automata.pdf

doted_line_fade2.gif  

DROPWAT- An Invisible Network Flow Watermark for Data Exfiltration Traceback.pdf

doted_line_fade2.gif  

Network Flow Watermarking- A Survey.pdf

doted_line_fade2.gif 

INFLOW- Inverse Network Flow Watermarking for Detecting Hidden Servers.pdf

doted_line_fade2.gif

When Replacement Smartphone Components Attack.pdf

doted_line_fade2.gif

A Lightweight Vulnerability Mitigation Framework for IoT Devices.pdf

doted_line_fade2.gif

Customer Data Leakage Prevention.pdf

doted_line_fade2.gif

Handwritten Signature Verification Using Hand-Worn Devices.pdf

doted_line_fade2.gif

Independent Vehicle Authentication Using Non-fixed Attributes.pdf

doted_line_fade2.gif

Know Your Enemy- Characteristics of Cyber Attacks on Medical Imaging Devices.pdf

doted_line_fade2.gif

Context-based Data Leakage Detection.pdf

doted_line_fade2.gif

Cyber-Med- Risk Assessment and Practical Detection Methodology of Cyber Attacks Aimed at Medical Device Ecosystems.pdf

doted_line_fade2.gif

Self-Stabilizing Cloud Infrastructure.pdf

doted_line_fade2.gif

Activity-based Verification Continuous User Verification after Successful Login.pdf

doted_line_fade2.gif

Oops.. I Think I Scanned a Malware.pdf

doted_line_fade2.gif

Socialbots Studies.pdf

doted_line_fade2.gif

Taxonomy of Mobile Users’ Security Awareness.pdf

doted_line_fade2.gif



doted_line_fade2.gif


doted_line_fade2.gif

doted_line_fade2.gif


doted_line_fade2.gif


doted_line_fade2.gif










​​​​Social privacy protector.pdfSocial privacy protector

Organization Mining Using Online Social Networks.pdfOrganization Mining Using Online Social Networks.pdf

Digital Arbitration.pdfDigital Arbitration