2018-12-27
|
|
Mohamed Faisal Elrawy, Ali Ismail Awad, and Hesham F. A. Hamed
|
Intrusion detection systems for IoT-based smart en...
|
|
2018-12-27
|
|
Shelly L Clevenger, Jordana N. Navarro, and Mia Gilliam
|
Technology and the endless "cat and mouse" game: A...
|
|
2018-12-20
|
|
Cassandra Cross
|
Expectations vs reality: Responding to online frau...
|
|
2018-12-20
|
|
Mario Ron, Walter Fuertes, Marco Bonilla, Theofilos Toulkeridis, and Javier Diaz
|
Cybercrime in Ecuador, an Exploration, which allow...
|
|
2018-12-19
|
|
Abdulghani Ali Ahmed, and Yee Wai Kit
|
Collecting and Analyzing Digital Proof Material to...
|
|
2018-12-07
|
|
Hsiangting Shatina Chen, and Joseph Fiscus
|
The inhospitable vulnerability: A need for cyberse...
|
|
2018-12-07
|
|
Xiao-Si Wang, Ian Herwono, Francesco Di Cerbo, Paul Kearney, and Mark Shackleton
|
Enabling Cyber Security Data Sharing for Large-sca...
|
|
2018-12-07
|
|
Silas Formunyuy Verkijika
|
Understanding smartphone security behaviors: An ex...
|
|
2018-12-07
|
|
David Décary-Hétu; Vincent Mousseau; Ikrame Rguioui
|
The Shift to Online Tobacco Trafficking
|
|
2018-11-20
|
|
Mohd Fazil, Muhammad Abulaish
|
A Hybrid Approach for Detecting Automated Spammers...
|
|