How Bad It It Really? An Analysis of Severity Scores for Vulnerabilities |
|
Using Object Capabilities and Effects to Build an Authority-Safe Module System |
|
Quantifying the Security Effectiveness of Network Diversity |
|
Toward Extraction of Security Requirements From Text |
|
Understanding Privacy Concerns of WhatsApp Users in India |
|
Cryptography in a Post-Quantum World |
|
Indirect Cyber Attacks by Perturbation of Environment Control: a Data-Driven Attack Model |
|
An Expert-based Bibliometric for a Science of Security |
|
Hourglass-shaped Architecture for Model-based Development of Safe and Secure Cyber-physical Systems |
|
Investigating Tensorflow for Airport Facial Identification |
|
Ethics, Values, and Personal Agents |
|
What Proportion of Vulnerabilities Can Be Attributed to Ordinary Coding Errors? |
|
Quantitative Underpinnings of Secure Graceful Degradation |
|
A Comparative Analysis of Manual Methods for Analyzing Security Requirements in Regulatory Documents |
|
Integrating Historical and Real-Time Anomaly Detection to Create a More Resilient Smart Grid Architecture |
|
Detecting Monitor Compromise Using Evidential Reasoning |
|