All Articles
Articles Showing 46 results
Sort by
Criticality assessment and cascading effects: impacts of COVID-19 disruptions in public transport on marginalized groups in Dortmund, Germany, São Paulo, Brazil, and Cape Town, South Africa
Open Access Original Article 17 Jul 2024
Views: Downloads:
Crafting organizational security policies for critical infrastructures: an architectural approach
Open Access Original Article 5 May 2024
Views: Downloads:
A taxonomy for cybersecurity standards
Open Access Original Article 27 Apr 2024
Views: Downloads:
TENNER: intrusion detection models for industrial networks based on ensemble learning
Open Access Original Article 19 Apr 2024
Views: Downloads:
Improved differential fault analysis of Grain-128AEAD
Open Access Original Article 29 Mar 2024
Views: Downloads:
A survey on wireless-communication vulnerabilities of ERTMS in the railway sector
Open Access Original Article 24 Feb 2024
Views: Downloads:
A TPRF-based pseudo-random number generator
Open Access Original Article 27 Jan 2024
Views: Downloads:
Bias and fairness in software and automation tools in digital forensics
Open Access Original Article 25 Jan 2024
Views: Downloads:
Privacy preserving vertical distributed learning for health data
Open Access Original Article 31 Dec 2023
Views: Downloads:
EFAW: a new mining attack model combining FAW attacks with the Eclipse attack
Open Access Original Article 20 Dec 2023
Views: Downloads:
Zero knowledge registration of PKI authentication for symbiotic security in FIDO IoT
Open Access Original Article 14 Dec 2023
Views: Downloads:
Towards a cryptography encyclopedia: a survey on attribute-based encryption
Open Access Survey 12 Dec 2023
Views: Downloads:
Blockchain distributed identity management model for cross-border data privacy protection
Open Access Original Article 10 Dec 2023
Views: Downloads:
On the additive differential probability of ARX construction
Open Access Original Article 28 Nov 2023
Views: Downloads:
Split keys for station-to-station (STS) protocols
Open Access Original Article 21 Sep 2023
Views: Downloads:
Graph neural network based function call graph embedding for malware classification
Open Access Original Article 29 Jun 2023
Views: Downloads:
Resist the type of BWH attack: through introducing discount factor and withdrawal threshold into Bitcoin
Open Access Original Article 10 May 2023
Views: Downloads:
Adaptive mining difficulty for blockchain to resist selfish mining attack
Open Access Original Article 8 May 2023
Views: Downloads:
- 1
- 2
- 3