Nome |
# |
Embedded Fuzzing: a Review of Challenges, Tools, and Solutions, file ee40233b-5e41-4e02-83b3-cfe409ccc889
|
461
|
Modelling human threats in security ceremonies, file e089ea4d-90cb-4a14-ae6a-ce693884a040
|
66
|
Perceptions of Beauty in Security Ceremonies, file 028b8729-aaf9-4a5e-a9a9-836cf6950b7e
|
47
|
Inductive Study of Confidentiality: for Everyone, file dfe4d227-2050-bb0a-e053-d805fe0a78d9
|
30
|
Multi-service Threats: Attacking and Protecting Network Printers and VoIP Phones alike, file 69c461d7-bbc1-4682-927b-0cc306bd28e0
|
28
|
A Double Assessment of Privacy Risks Aboard Top-Selling Cars, file 79a30c19-ec7c-44e5-9683-882d82a1e779
|
26
|
Poster: are you secure in your car?, file 89cbe302-08c4-4963-bd3b-0b2cccfb65fb
|
20
|
PETIoT: PEnetration Testing the Internet of Things, file 84318f18-3d01-42af-ae04-dd0e63c23bc7
|
19
|
Alexa versus Alexa: Controlling Smart Speakers by Self-Issuing Voice
Commands, file b685ae62-6e42-426a-838f-9ff51067ab90
|
19
|
What Are The Threats? (Charting The Threat Models Of Security Ceremonies), file dfe4d22d-6750-bb0a-e053-d805fe0a78d9
|
17
|
Invalid certificates in modern browsers: A socio-technical analysis, file dfe4d22d-1fca-bb0a-e053-d805fe0a78d9
|
11
|
Embedded Fuzzing: a Review of Challenges, Tools, and Solutions, file 83ae43bd-95d2-441b-9196-6cef6a4a412b
|
10
|
Towards Grammatical Tagging for the Legal Language of Cybersecurity, file a10e301c-47e5-42ac-b82f-4dc00e7310ec
|
10
|
Distributed Backup through Information Dispersal, file dfe4d227-0669-bb0a-e053-d805fe0a78d9
|
9
|
An Investigation into the Beautification of Security Ceremonies, file dfe4d22d-0856-bb0a-e053-d805fe0a78d9
|
9
|
Perceptions of Beauty in Security Ceremonies, file 4ae62e35-5efa-4aa6-8f62-b95df711279f
|
8
|
Designing and implementing an AUTOSAR-based Basic Software Module for enhanced security, file 7b6350dc-aba4-4fc6-be28-179dc8cc4f60
|
8
|
null, file d454d112-c5e5-42a8-b801-2234656cb4be
|
7
|
Inductive Verification of Smartcard Protocols, file dfe4d226-f4be-bb0a-e053-d805fe0a78d9
|
7
|
Verifying the SET Registration Protocols, file dfe4d226-f4bf-bb0a-e053-d805fe0a78d9
|
7
|
What is Correctness of Security Protocols?, file dfe4d226-f87f-bb0a-e053-d805fe0a78d9
|
7
|
Augmented Risk Analysis, file dfe4d226-f97c-bb0a-e053-d805fe0a78d9
|
7
|
A Secure Exam Protocol Without Trusted Parties, file dfe4d22d-09f7-bb0a-e053-d805fe0a78d9
|
7
|
Towards an Integrated Penetration Testing Environment for the CAN Protocol, file d6b5cdef-acff-4214-9068-0feadb5c3b44
|
6
|
Verifying the SET Purchase Protocols, file dfe4d226-fcdf-bb0a-e053-d805fe0a78d9
|
6
|
The Principle of Guarantee Availability for Security Protocol Analysis, file dfe4d226-fd3d-bb0a-e053-d805fe0a78d9
|
6
|
Multi-Attacker Protocol Validation, file dfe4d226-fe2a-bb0a-e053-d805fe0a78d9
|
6
|
Accountability Protocols: Formalized and Verified, file dfe4d226-fbfd-bb0a-e053-d805fe0a78d9
|
5
|
Enhancing DSR maintenance with power awareness, file dfe4d227-2601-bb0a-e053-d805fe0a78d9
|
4
|
An Overview of the Verification of SET, file dfe4d227-277e-bb0a-e053-d805fe0a78d9
|
4
|
An Ontological Approach to Compliance Verification of the NIS 2 Directive, file 6d100d68-a7de-4e94-98a8-8b2a2ac6be39
|
3
|
The ontology for agents, systems and integration of services: OASIS version 2, file 79d1c8ed-0cad-4bb4-93a5-6dc76c3160e3
|
3
|
Service Security and Privacy as a Socio-Technical Problem, file dfe4d226-fedd-bb0a-e053-d805fe0a78d9
|
3
|
Enforcing Privacy in E-Commerce by Balancing Anonimity and Trust, file dfe4d227-27f0-bb0a-e053-d805fe0a78d9
|
3
|
Towards an Integrated Penetration Testing Environment for the CAN Protocol, file dda0f2eb-8776-4f65-b693-5a6c15722cf7
|
2
|
Retaliation Against Protocol Attacks, file dfe4d226-fa05-bb0a-e053-d805fe0a78d9
|
2
|
Evaluating the Device Reputation through Full Observation in MANETs, file dfe4d226-fa44-bb0a-e053-d805fe0a78d9
|
2
|
A Behaviouristic Approach to Representing Processes and Procedures in the OASIS 2 Ontology, file a32397f9-8a12-4239-9a5e-3e1b35f542ec
|
1
|
Papyrus-Based Safety Analysis Automatization, file b2a0606a-6aa4-4687-aa69-c8e10ce858aa
|
1
|
An Automated Method for the Ontological Representation of Security Directives, file d39bef43-9ecd-4f43-9376-9d6b8b314efb
|
1
|
Information Assurance for Security Protocols, file dfe4d226-f8d6-bb0a-e053-d805fe0a78d9
|
1
|
Soft Constraint Programming to Analysing Security Protocols, file dfe4d227-3445-bb0a-e053-d805fe0a78d9
|
1
|
Formal Correctness of Security Protocols, file dfe4d227-5efc-bb0a-e053-d805fe0a78d9
|
1
|
TOUCAN: A proTocol tO secUre Controller Area Network, file dfe4d22d-09f6-bb0a-e053-d805fe0a78d9
|
1
|
Cybersecurity's Way Forward: to get Beautiful or Invisible, file dfe4d22d-673f-bb0a-e053-d805fe0a78d9
|
1
|
Idea: A unifying theory for evaluation systems, file dfe4d22d-68fe-bb0a-e053-d805fe0a78d9
|
1
|
Security is Beautiful, file dfe4d22e-2443-bb0a-e053-d805fe0a78d9
|
1
|
Totale |
905 |