Stop the war!
Остановите войну!
for scientists:
default search action
Journal of Cybersecurity and Privacy, Volume 4
Volume 4, Number 1, March 2024
- Christian DeLozier:
How Close Is Existing C/C++ Code to a Safe Subset? 1-22 - Mohamad Saalim Wani, Michael Rademacher, Thorsten Horstmann, Mathias Kretschmer:
Security Vulnerabilities in 5G Non-Stand-Alone Networks: A Systematic Analysis and Attack Taxonomy. 23-40 - Anthony Overmars, Sitalakshmi Venkatraman:
Continued Fractions Applied to the One Line Factoring Algorithm for Breaking RSA. 41-54 - Elias Seid, Oliver Popov, Fredrik Blix:
Security Attack Behavioural Pattern Analysis for Critical Service Providers. 55-75 - Ioannis Paspatis, Aggeliki Tsohou:
Experiential Transformation in Privacy Behavior: A New Framework for Privacy Behavior Enhancement. 76-104 - Stefan Kutschera, Wolfgang Slany, Patrick Ratschiller, Sarina Gursch, Patrick Deininger, Håvard D. Johansen:
Incidental Data: A Survey towards Awareness on Privacy-Compromising Data Incidentally Shared on Social Media. 105-125 - Yousef Alghamdi, Arslan Munir:
Image Encryption Algorithms: A Survey of Design and Evaluation Metrics. 126-152
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.