Computer Security. ESORICS 2021 International Workshops - CyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT&SECOMANE, Darmstadt, Germany, October 4-8, 2021, Revised Selected Papers | 0 | 0.34 | 2022 |
Launching Adversarial Label Contamination Attacks Against Malicious URL Detection | 0 | 0.34 | 2021 |
Computer Security - ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26-27, 2019 Revised Selected Papers | 0 | 0.34 | 2020 |
Cloud Computing Framework for e-Health Security Requirements and Security Policy Rules Case Study: A European Cloud-Based Health System. | 0 | 0.34 | 2020 |
Computer Security - ESORICS 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, Guildford, UK, September 14-18, 2020, Revised Selected Papers. | 0 | 0.34 | 2020 |
GDPR Compliance - Proposed Guidelines for Cloud-Based Health Organizations. | 0 | 0.34 | 2020 |
Compatibility Of A Security Policy For A Cloud-Based Healthcare System With The Eu General Data Protection Regulation (Gdpr) | 0 | 0.34 | 2020 |
Microtargeting or Microphishing? Phishing Unveiled. | 0 | 0.34 | 2020 |
Testing And Hardening IoT Devices Against the Mirai Botnet | 0 | 0.34 | 2020 |
Standardizing Security Evaluation Criteria for Connected Vehicles: A Modular Protection Profile | 0 | 0.34 | 2019 |
A Proposed Privacy Impact Assessment Method Using Metrics Based on Organizational Characteristics. | 0 | 0.34 | 2019 |
Towards the Creation of a Threat Intelligence Framework for Maritime Infrastructures. | 0 | 0.34 | 2019 |
Computer Security - ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6-7, 2018, Revised Selected Papers | 0 | 0.34 | 2019 |
Dypermin: Dynamic permission mining framework for android platform. | 1 | 0.35 | 2018 |
The General Data Protection Regulation (GDPR) Era: Ten Steps for Compliance of Data Processors and Data Controllers. | 0 | 0.34 | 2018 |
Transparency-Enabling Systems for Open Governance: Their Impact on Citizens' Trust and the Role of Information Privacy. | 0 | 0.34 | 2017 |
The Far Side of Mobile Application Integrated Development Environments. | 0 | 0.34 | 2016 |
Literature Review of Trust Models for Cloud Computing | 0 | 0.34 | 2016 |
Till All Are One: Towards a Unified Cloud IDS | 4 | 0.46 | 2015 |
Behaviour reflects personality: detecting co-residence attacks on Xen-based cloud environments | 4 | 0.41 | 2015 |
Privacy Principles: Towards a Common Privacy Audit Methodology | 2 | 0.37 | 2015 |
Cloud Computing Security Requirements and a Methodology for Their Auditing. | 0 | 0.34 | 2015 |
A Hierarchical Multitier Approach for Privacy Policies in e-Government Environments. | 0 | 0.34 | 2015 |
Towards a Common Security and Privacy Requirements Elicitation Methodology | 0 | 0.34 | 2015 |
Obscuring users' identity in VoIP/IMS environments. | 2 | 0.40 | 2014 |
If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments | 1 | 0.35 | 2014 |
Empowering Users to Specify and Manage Their Privacy Preferences in e-Government Environments. | 2 | 0.38 | 2014 |
Evaluating and enriching information and communication technologies compliance frameworks with regard to privacy. | 0 | 0.34 | 2013 |
ProCAVE: Privacy-Preserving Collection and Authenticity Validation of Online Evidence. | 0 | 0.34 | 2013 |
Evaluating the Security and Privacy Protection Level of IP Multimedia Subsystem Environments | 3 | 0.37 | 2013 |
A Practical Steganographic Approach for Matroska Based High Quality Video Files | 0 | 0.34 | 2013 |
It's All in the Cloud: Reviewing Cloud Security | 0 | 0.34 | 2013 |
Special Issue on Advanced Information Security for Secure and Trust Computing | 0 | 0.34 | 2013 |
An intrusion detection and prevention system for IMS and VoIP services | 3 | 0.41 | 2013 |
Special issue on next generation communication and network security | 0 | 0.34 | 2012 |
Privacy and Traceability in Social Networking Sites | 3 | 0.40 | 2012 |
Special issue on security in cloud computing | 1 | 0.35 | 2012 |
IS IP Multimedia Subsystem Affected by ‘Malformed Message' Attacks? - An Evaluation of OpenIMS. | 1 | 0.35 | 2011 |
Privacy-preserving storage and access of medical data through pseudonymization and encryption | 4 | 0.69 | 2011 |
A Cross Layer Spoofing Detection Mechanism for Multimedia Communication Services | 1 | 0.35 | 2011 |
Privacy preserving context transfer schemes for 4G networks | 3 | 0.40 | 2011 |
Privacy requirements engineering for trustworthy e-government services | 2 | 0.38 | 2010 |
A call conference room interception attack and its detection | 4 | 0.42 | 2010 |
Transforming the Greek e-government environment towards the e-Gov 2.0 era | 5 | 0.52 | 2010 |
A Security Standards' Framework to Facilitate Best Practices' Awareness and Conformity | 5 | 0.44 | 2010 |
Utilizing bloom filters for detecting flooding attacks against SIP based services | 28 | 1.08 | 2009 |
Exploring Trust, Security and Privacy in Digital Business | 0 | 0.34 | 2009 |
Trust, Privacy and Security in Digital Business, 6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009. Proceedings | 14 | 1.37 | 2009 |
A First Order Logic Security Verification Model for SIP | 2 | 0.37 | 2009 |
A Hierarchical Model for Cross-Domain Communication of Health Care Units | 0 | 0.34 | 2009 |