no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
A deeper look at Ariadne: a privacy-preserving network layer protocol
|
Fressancourt, Antoine |
|
|
79 |
11-12 |
p. 745-762 |
article |
2 |
A revocable attribute-based access control with non-monotonic access structure
|
Ashouri-Talouki, Maede |
|
|
79 |
11-12 |
p. 833-842 |
article |
3 |
CSNet 2023 special issue—the resilient networked systems
|
Fung, Carol |
|
|
79 |
11-12 |
p. 707-709 |
article |
4 |
Digital credentials management system using rejectable soulbound tokens
|
Pericàs-Gornals, Rosa |
|
|
79 |
11-12 |
p. 843-855 |
article |
5 |
E-Watcher: insider threat monitoring and detection for enhanced security
|
Wei, Zhiyuan |
|
|
79 |
11-12 |
p. 819-831 |
article |
6 |
Fixed-text keystroke dynamics authentication data set—collection and analysis
|
Risto, Halvor Nybø |
|
|
79 |
11-12 |
p. 731-743 |
article |
7 |
Implementing the principle of least administrative privilege on operating systems: challenges and perspectives
|
Billoir, Eddie |
|
|
79 |
11-12 |
p. 857-880 |
article |
8 |
Inferring the confidence level of BGP-based distributed intrusion detection systems alarms
|
Silva, Renato S. |
|
|
79 |
11-12 |
p. 901-912 |
article |
9 |
Large language models and unsupervised feature learning: implications for log analysis
|
Karlsen, Egil |
|
|
79 |
11-12 |
p. 711-729 |
article |
10 |
Mirage: cyber deception against autonomous cyber attacks in emulation and simulation
|
Kouremetis, Michael |
|
|
79 |
11-12 |
p. 803-817 |
article |
11 |
NestedChain: “Blockchain-inside-a-Blockchain” new generation prototype
|
Maldonado-Ruiz, Daniel |
|
|
79 |
11-12 |
p. 881-899 |
article |
12 |
Personal data filtering: a systematic literature review comparing the effectiveness of XSS attacks in web applications vs cookie stealing
|
Rodríguez-Galán, Germán |
|
|
79 |
11-12 |
p. 763-802 |
article |