| A First Look at Identity Management Schemes on the Blockchain |
30 |
| Blockchain Access Privacy: Challenges and Directions |
21 |
| Cybersecurity in an Era with Quantum Computers Will We Be Ready? |
13 |
| Ethics and Privacy in Al and Big Data: Implementing Responsible Research and Innovation |
12 |
| Enslaving the Algorithm: From a Right to an Explanation to a Right to Better Decisions? |
10 |
| Privacy-Preserving Machine Learning: Threats and Solutions |
9 |
| Toward Fairness of Cryptocurrency Payments |
9 |
| IoT Goes Nuclear: Creating a Zigbee Chain Reaction |
9 |
| Toward a Cybersecurity Certification Framework for the Internet of Things |
6 |
| Cyber Deception: Overview and the Road Ahead |
6 |
| Privacy and Civilian Drone Use: The Need for Further Regulation |
6 |
| Privacy-Aware Restricted Areas for Unmanned Aerial Systems |
5 |
| How Deep Learning Is Making Information Security More Intelligent |
5 |
| Public Auditing for Trusted Cloud Storage Services |
5 |
| When the Crypto in Cryptocurrencies Breaks: Bitcoin Security under Broken Primitives |
4 |
| The Internet of Things Promises New Benefits and Risks A Systematic Analysis of Adoption Dynamics of IoT Products |
4 |
| Protecting against Ransomware: A New Line of Research or Restating Classic Ideas? |
4 |
| Scoping the Cyber Security Body of Knowledge |
4 |
| Making Multivariant Programming Practical and Inexpensive |
4 |
| Defending from Stealthy Botnets Using Moving Target Defenses |
4 |
| Safe Machine Learning and Defeating Adversarial Attacks |
3 |
| AI and the Ethics of Automating Consent |
3 |
| Cyberphysical Security for the Masses A Survey of the Internet Protocol Suite for Internet of Things Security |
3 |
| The KISS Principle in Software-Defined Networking: A Framework for Secure Communications |
3 |
| The Privacy Paradox of Adolescent Online Safety: A Matter of Risk Prevention or Risk Resilience? |
3 |
| Digital Investigation of PDF Files Unveiling Traces of Embedded Malware |
3 |
| Self-Sovereign Digital Identity A Paradigm Shift for Identity |
3 |
| Did App Privacy Improve After the GDPR? |
3 |
| A Cognitive Protection System for the Internet of Things |
2 |
| Emerging Threats in Internet of Things Voice Services |
2 |
| Blockchain-Based Distributed Cloud Storage Digital Forensics: Where's the Beef? |
2 |
| PQChain: Strategic Design Decisions for Distributed Ledger Technologies against Future Threats |
2 |
| Tyranny of the Majority: On the (Im)possibility of Correctness of Smart Contracts |
2 |
| When Is an Algorithm Transparent? Predictive Analytics, Privacy, and Public Policy |
2 |
| A Harm-Reduction Framework for Algorithmic Fairness |
2 |
| What Can Political Philosophy Teach Us about Algorithmic Fairness? |
2 |
| Stealing, Spying, and Abusing: Consequences of Attacks on Internet of Things Devices |
2 |
| Quantum Computing: Codebreaking and Beyond |
2 |
| Mechanical Phish: Resilient Autonomous Hacking |
2 |
| Quantum Key Distribution and Its Applications |
2 |
| Xandra: An Autonomous Cyber Battle System for the Cyber Grand Challenge |
2 |
| Individualizing Cybersecurity Lab Exercises with Labtainers |
2 |
| The Mayhem Cyber Reasoning System |
1 |
| Effects of a Honeypot on the Cyber Grand Challenge Final Event |
1 |
| Quantum Cryptanalysis: Shor, Grover, and Beyond |
1 |
| Flow-Based Compromise Detection:Lessons Learned |
1 |
| Arya: Operating System Support for Securely Augmenting Reality |
1 |
| Verifiable Classroom Voting in Practice |
1 |
| Toward Continual Measurement of Global Network-Level Censorship |
1 |
| Proactively Protecting Against the Singularity: Ethical Decision Making in AI |
1 |