Go home now Header Background Image
Submission Procedure
share: |
Follow us
Articles by Topics
Topic L. - Science and Technology of Learning
Topic L.4.0 - Security and Trust

C. Blanco, I. García-Rodríguez de Guzmán, E. Fernández-Medina, J. Trujillo:
Showing the Benefits of Applying a Model Driven Architecture for Developing Secure OLAP Applications
page 79 - 106
Vol.20 / Issue 2
R. Kozik, M. Choras, J. Keller:
Balanced Efficient Lifelong Learning (B-ELLA) for Cyber Attack Detection
page 2 - 15
Vol.25 / Issue 1
Y. Lakhdhar, S. Rekhis, N. Boudriga:
A Context-based Defense Model for Assessing Cyber Systems' Ability To Defend Against Known And Unknown Attack Scenarios
page 1066 - 1088
Vol.25 / Issue 9
S.M. Lee, D.S. Kim, J.S. Park:
Cost-Sensitive Spam Detection Using Parameters Optimization and Feature Selection
page 944 - 960
Vol.17 / Issue 6
A. Mihelič, M. Jevšček, S. Vrhovec, I. Bernik:
Testing the Human Backdoor: Organizational Response to a Phishing Campaign
page 1458 - 1477
Vol.25 / Issue 11
J.R. Mühlbacher, C. Praher:
DS RBAC - Dynamic Sessions in Role Based Access Control
page 538 - 554
Vol.15 / Issue 3
K. Shankar, M. Elhoseny:
Trust Based Cluster Head Election of Secure Message Transmission in MANET Using Multi Secure Protocol with TDES
page 1221 - 1239
Vol.25 / Issue 10
N. Theera-Umpon, K.-H. Han, W.-S. Bae, S. Lee, V.H. Pham:
Verifying Secure Authentication Protocol for Communication between IoT-based Medical Devices
page 1258 - 1270
Vol.24 / Issue 9
S. Vrhovec, D. Fujs, L. Jelovčan, A. Mihelič:
Evaluating Case Study and Action Research Reports: Real-world Research in Cybersecurity
page 827 - 853
Vol.26 / Issue 7
X. Wang, Y. Zhang, B.B. Gupta, H. Zhu, D. Liu:
An Identity-Based Signcryption on Lattice without Trapdoor
page 282 - 293
Vol.25 / Issue 3
F.L. de Mello, J.A.M. Xexéo:
Identifying Encryption Algorithms in ECB and CBC Modes Using Computational Intelligence
page 25 - 42
Vol.24 / Issue 1