Recent Innovations and Comparison of Deep Learning Techniques in Malware Classification: A Review.Published in:International Journal of Information Security Science, 2020, v. 9, n. 4, p. 230By:Yadav, Balram;Tokekar, SanjivPublication type:Article
Self Sovereign Identity Based E-petition Scheme.Published in:International Journal of Information Security Science, 2020, v. 9, n. 4, p. 213By:Karatas, Ridvan;Sertkaya, IsaPublication type:Article
Requirement Analysis of Some Blockchain-based E-voting Schemes.Published in:International Journal of Information Security Science, 2020, v. 9, n. 4, p. 188By:Buyukbaskin, Latif Anil;Sertkaya, IsaPublication type:Article