Resolving Network Defense Conflicts with Zero Trust Architectures and Other End-to-End Paradigms |
William R. Simpson and Kevin E. Foltz |
Volume : 13 volume number : 1 pdf |
Analysis of Machine Learning Algorithms with Feature Selection for Intrusion Detection using UNSW-NB15 Dataset |
Geeta Kocher and Gulshan Kumar |
Volume : 13 volume number : 1 pdf |
Designing a Cyber-security Culture Assessment Survey Targeting Critical Infrastructures During Covid-19 Crisis |
Anna Georgiadou, Spiros Mouzakitis and Dimitris Askounis |
Volume : 13 volume number : 1 pdf |
Defeating MITM Attacks on Cryptocurrency Exchange Accounts with Individual User Keys |
Cheman Shaik |
Volume : 13 volume number : 1 pdf |
Game Theory Application Resources Management and Distribution in Blockchain Network |
Cong Hung Tran, Dien Tam Le, Thanh Hieu Huynh |
Volume : 13 volume number : 1 pdf |