![]() Intrusion Detection and CAN Vehicle Networks (Ashraf Saber, Fabio Di Troia, Mark Stamp).Pages 125-154Ĭloud Computing Security: Hardware-Based Attacks and Countermeasures (Reza Montasari, Alireza Daneshkhah, Hamid Jahankhani, Amin Hosseinian-Far).Pages 155-167Īspects of Biometric Security in Internet of Things Devices (Bobby L. Towards a Generic Approach of Quantifying Evidence Volatility in Resource Constrained Devices (Jens-Petter Sandvik, Katrin Franke, André Årnes).Pages 21-45Īpplication of Artificial Intelligence and Machine Learning in Producing Actionable Cyber Threat Intelligence (Reza Montasari, Fiona Carroll, Stuart Macdonald, Hamid Jahankhani, Amin Hosseinian-Far, Alireza Daneshkhah).Pages 47-64ĭrone Forensics: The Impact and Challenges (S. Emulation Versus Instrumentation for Android Malware Detection (Anukriti Sinha, Fabio Di Troia, Philip Heller, Mark Stamp).Pages 1-20
0 Comments
Leave a Reply. |