| Formal Verification of the W3C Web Authentication Protocol |
|
| Tutorial: CyberSecurity Framework |
|
| Compliance as Code: Policy Governed Automated Security Checkpoints |
|
| Ransomware Detection using RNN |
|
| RansomAir Filled with Clouds |
|
| The Threat of Ransomware in Energy Delivery Systems |
|
| Ransomware Analysis as Dialog for Attribution and Reconnaissance (RADAR) |
|
| Understanding the Ransomware Landscape through System Dynamics Modeling |
|
| An Evidence-Based Ecological Approach for Disrupting Ransomware Spread |
|
| An Approach to Ransomware Effects Mitigation |
|