Found: 11
Select item for more details and to access through your institution.
Stochastic Modelling of Selfish Mining in Proof-of-Work Protocols †.
- Published in:
- Journal of Cybersecurity & Privacy, 2022, v. 2, n. 2, p. 292, doi. 10.3390/jcp2020016
- By:
- Publication type:
- Article
Checked and Approved? Human Resources Managers' Uses of Social Media for Cybervetting.
- Published in:
- Journal of Cybersecurity & Privacy, 2022, v. 2, n. 2, p. 402, doi. 10.3390/jcp2020021
- By:
- Publication type:
- Article
An Accuracy-Maximization Approach for Claims Classifiers in Document Content Analytics for Cybersecurity †.
- Published in:
- Journal of Cybersecurity & Privacy, 2022, v. 2, n. 2, p. 418, doi. 10.3390/jcp2020022
- By:
- Publication type:
- Article
Towards Agile Cybersecurity Risk Management for Autonomous Software Engineering Teams.
- Published in:
- Journal of Cybersecurity & Privacy, 2022, v. 2, n. 2, p. 276, doi. 10.3390/jcp2020015
- By:
- Publication type:
- Article
Improved Detection and Response via Optimized Alerts: Usability Study.
- Published in:
- Journal of Cybersecurity & Privacy, 2022, v. 2, n. 2, p. 379, doi. 10.3390/jcp2020020
- By:
- Publication type:
- Article
The State of Ethereum Smart Contracts Security: Vulnerabilities, Countermeasures, and Tool Support.
- Published in:
- Journal of Cybersecurity & Privacy, 2022, v. 2, n. 2, p. 358, doi. 10.3390/jcp2020019
- By:
- Publication type:
- Article
SoK: An Evaluation of the Secure End User Experience on the Dark Net through Systematic Literature Review.
- Published in:
- Journal of Cybersecurity & Privacy, 2022, v. 2, n. 2, p. 329, doi. 10.3390/jcp2020018
- By:
- Publication type:
- Article
Using Blockchain for Data Collection in the Automotive Industry Sector: A Literature Review.
- Published in:
- Journal of Cybersecurity & Privacy, 2022, v. 2, n. 2, p. 257, doi. 10.3390/jcp2020014
- By:
- Publication type:
- Article
Getting Rid of the Usability/Security Trade-Off: A Behavioral Approach.
- Published in:
- Journal of Cybersecurity & Privacy, 2022, v. 2, n. 2, p. 245, doi. 10.3390/jcp2020013
- By:
- Publication type:
- Article
Defending against OS-Level Malware in Mobile Devices via Real-Time Malware Detection and Storage Restoration †.
- Published in:
- Journal of Cybersecurity & Privacy, 2022, v. 2, n. 2, p. 311, doi. 10.3390/jcp2020017
- By:
- Publication type:
- Article
Unsupervised Machine Learning Techniques for Detecting PLC Process Control Anomalies.
- Published in:
- Journal of Cybersecurity & Privacy, 2022, v. 2, n. 2, p. 220, doi. 10.3390/jcp2020012
- By:
- Publication type:
- Article