Cited By
View all- Shiriaev EKucherov NMovzalevskaya VKhamidov M(2024)Modification and Adaptation of Methods and Algorithms of the Active Security Concept for Fog SystemsAISMA-2024: International Workshop on Advanced Information Security Management and Applications10.1007/978-3-031-72171-7_28(277-285)Online publication date: 16-Oct-2024
- Alshaya AKardorff AFacundus CBaggili IRichard III G(2023)Memory Forensics of the OpenDaylight Software-Defined Networking (SDN) ControllerProceedings of the 18th International Conference on Availability, Reliability and Security10.1145/3600160.3600196(1-8)Online publication date: 29-Aug-2023
- Frik AKim JSanchez JMa J(2022)Users’ Expectations About and Use of Smartphone Privacy and Security SettingsProceedings of the 2022 CHI Conference on Human Factors in Computing Systems10.1145/3491102.3517504(1-24)Online publication date: 29-Apr-2022
- Show More Cited By