Go home now Header Background Image
Submission Procedure
share: |
Follow us
Articles by Topics
Topic L. - Science and Technology of Learning
Topic L.4.0 - Security and Trust

C. Blanco, I. García-Rodríguez de Guzmán, E. Fernández-Medina, J. Trujillo:
Showing the Benefits of Applying a Model Driven Architecture for Developing Secure OLAP Applications
page 79 - 106
Vol.20 / Issue 2
R. Kozik, M. Choras, J. Keller:
Balanced Efficient Lifelong Learning (B-ELLA) for Cyber Attack Detection
page 2 - 15
Vol.25 / Issue 1
S.M. Lee, D.S. Kim, J.S. Park:
Cost-Sensitive Spam Detection Using Parameters Optimization and Feature Selection
page 944 - 960
Vol.17 / Issue 6
J.R. Mühlbacher, C. Praher:
DS RBAC - Dynamic Sessions in Role Based Access Control
page 538 - 554
Vol.15 / Issue 3
N. Theera-Umpon, K.-H. Han, W.-S. Bae, S. Lee, V.H. Pham:
Verifying Secure Authentication Protocol for Communication between IoT-based Medical Devices
page 1258 - 1270
Vol.24 / Issue 9
X. Wang, Y. Zhang, B.B. Gupta, H. Zhu, D. Liu:
An Identity-Based Signcryption on Lattice without Trapdoor
page 282 - 293
Vol.25 / Issue 3
F.L. de Mello, J.A.M. Xexéo:
Identifying Encryption Algorithms in ECB and CBC Modes Using Computational Intelligence
page 25 - 42
Vol.24 / Issue 1