Latest
- Comparison of Multilingual and Bilingual Models for Satirical News Detection of Arabic and English
- Comparison of Multilingual and Bilingual Models for Satirical News Detection of Arabic and English
- Unveiling Usability Challenges in Web Privacy Controls
- BotSSCL: Social Bot Detection with Self-Supervised Contrastive Learning
- Navigating the Gray Interventions: The Impact of Soft Moderation Techniques Across Social Media Platforms
- A Comprehensive Threat Modelling Analysis for Distributed Energy Resources
- DEMO : Passive Identification of WiFi Devices in Real-Time
- Single-Sensor Sparse Adversarial Perturbation Attacks Against Behavioral Biometrics
- Privacy Preserving Release of Mobile Sensor Data
- SoK: False Information, Bots and Malicious Campaigns: Demystifying Elements of Social Media Manipulations
- Don't Be a Victim during a Pandemic! Analysing Security and Privacy Threats in Twitter during COVID-19
- False Information, Bots and Malicious Campaigns: Demystifying Elements of Social Media Manipulations
- USABILITY OF PRIVACY CONTROLS IN TOP HEALTH WEBSITES
- A Study of Third-party Resources Loading on Web
- FLAP: Federated Learning with Attack and Privacy Awareness
- Machine Learning-based Automatic Annotation and Detection of COVID-19 Fake News
- A review of computer vision methods in network security
- Measuring and Analysing the Chain of Implicit Trust: A Study of Third-party Resources Loading
- Security Apps under the Looking Glass: An Empirical Analysis of Android Security Apps
- The chain of implicit trust: An analysis of the web third-party resources loading
- Incognito: A method for obfuscating web data
- EACF: extensible access control framework for cloud Environments
- POSTER: TouchTrack: How Unique are your Touch Gestures?
- DB-SECaaS: a cloud-based protection system for document-oriented NoSQL databases
- Distributed intrusion detection system using mobile agents in cloud computing environment
- Cloud authorization: exploring techniques and approach towards effective access control framework
- MagicNET: Mobile agents data protection system
- Realization of FGAC model using XACML policy specification
- Secure identity management system for federated Cloud environment
- Taxonomy for trust models in cloud computing
- Cloud identity management security issues & solutions: a taxonomy
- Evaluation and establishment of trust in cloud federation
- Fine-Grained Access Control in Object-Oriented Databases
- Security of sharded NoSQL databases: A comparative analysis
- Assessment criteria for cloud identity management systems
- Assessment criteria for trust models in cloud computing
- Intrusion detection system in cloud computing: Challenges and opportunities
- Securing the virtual machine images in Cloud computing
- Security aspects of virtualization in cloud computing
- Comparative analysis of access control systems on cloud
- Usage control model specification in XACML policy language XACML policy engine of UCON
- SWAM: Stuxnet worm analysis in Metasploit