|
|
|
|
|
 |
Information |
 |
|
You can copy/paste HTML codes anywhere you like, for example in homepage, or even other sites
Cryptanalysis of Modular Operations Marzieh Vahid Dastjerdi *, Majid Rahimi Abstract - Full Text (PDF)
Analysis of frameworks, standards, platforms, and coalitions supporting the development of cyber threat intelligence in organizations Amin Chahardoli, Abouzar Arabsorkhi *Abstract - Full Text (PDF)
A secure and privacy-preserving electronic invoice based on blockchain technology Vahideh Ghanooni Shishavan, Shaban Elahi *, Sadegh Dorri Nogoorani, Ali Yazdian Varjani Abstract - Full Text (PDF)
A systematic review of the literature on security and privacy and improving an onymity in the blockchain network Fatemeh Charlank Bakhtiari *, Abbas Ghaemi Bafghi Abstract - Full Text (PDF)
A comprehensive review of cyber deception concepts, comparative analysis of deception platforms, and proposal of three exemplary implementations for deceiving attackers Seyed Ali Samouti *, Sajad Tarhani, Mohsen Babakhani Abstract - Full Text (PDF)
Back to Original Issue
|
|
|
|
|
|
|
|
|
|
|