Found: 7
Select item for more details and to access through your institution.
How Close Is Existing C/C++ Code to a Safe Subset?
- Published in:
- Journal of Cybersecurity & Privacy, 2024, v. 4, n. 1, p. 1, doi. 10.3390/jcp4010001
- By:
- Publication type:
- Article
Security Vulnerabilities in 5G Non-Stand-Alone Networks: A Systematic Analysis and Attack Taxonomy.
- Published in:
- Journal of Cybersecurity & Privacy, 2024, v. 4, n. 1, p. 23, doi. 10.3390/jcp4010002
- By:
- Publication type:
- Article
Continued Fractions Applied to the One Line Factoring Algorithm for Breaking RSA.
- Published in:
- Journal of Cybersecurity & Privacy, 2024, v. 4, n. 1, p. 41, doi. 10.3390/jcp4010003
- By:
- Publication type:
- Article
Security Attack Behavioural Pattern Analysis for Critical Service Providers.
- Published in:
- Journal of Cybersecurity & Privacy, 2024, v. 4, n. 1, p. 55, doi. 10.3390/jcp4010004
- By:
- Publication type:
- Article
Experiential Transformation in Privacy Behavior: A New Framework for Privacy Behavior Enhancement.
- Published in:
- Journal of Cybersecurity & Privacy, 2024, v. 4, n. 1, p. 76, doi. 10.3390/jcp4010005
- By:
- Publication type:
- Article
Incidental Data: A Survey towards Awareness on Privacy-Compromising Data Incidentally Shared on Social Media.
- Published in:
- Journal of Cybersecurity & Privacy, 2024, v. 4, n. 1, p. 105, doi. 10.3390/jcp4010006
- By:
- Publication type:
- Article
Image Encryption Algorithms: A Survey of Design and Evaluation Metrics.
- Published in:
- Journal of Cybersecurity & Privacy, 2024, v. 4, n. 1, p. 126, doi. 10.3390/jcp4010007
- By:
- Publication type:
- Article