| How Bad It It Really? An Analysis of Severity Scores for Vulnerabilities |
|
| Using Object Capabilities and Effects to Build an Authority-Safe Module System |
|
| Quantifying the Security Effectiveness of Network Diversity |
|
| Toward Extraction of Security Requirements From Text |
|
| Understanding Privacy Concerns of WhatsApp Users in India |
|
| Cryptography in a Post-Quantum World |
|
| Indirect Cyber Attacks by Perturbation of Environment Control: a Data-Driven Attack Model |
|
| An Expert-based Bibliometric for a Science of Security |
|
| Hourglass-shaped Architecture for Model-based Development of Safe and Secure Cyber-physical Systems |
|
| Investigating Tensorflow for Airport Facial Identification |
|
| Ethics, Values, and Personal Agents |
|
| What Proportion of Vulnerabilities Can Be Attributed to Ordinary Coding Errors? |
|
| Quantitative Underpinnings of Secure Graceful Degradation |
|
| A Comparative Analysis of Manual Methods for Analyzing Security Requirements in Regulatory Documents |
|
| Integrating Historical and Real-Time Anomaly Detection to Create a More Resilient Smart Grid Architecture |
|
| Detecting Monitor Compromise Using Evidential Reasoning |
|