Synthesis Lectures on Information Security, Privacy, and Trust
Anisetti / Ardagna / Damiani
A Journey into Security Certification
A Journey into Security Certification
From the Cloud to Artificial Intelligence
Bertino / Bhardwaj / Cicala
Machine Learning Techniques for Cybersecurity
Machine Learning Techniques for Cybersecurity
Fischer-Hübner / Karegar
The Curious Case of Usable Privacy
The Curious Case of Usable Privacy
Challenges, Solutions, and Prospects
Fischer-Hübner / Karegar
The Curious Case of Usable Privacy
The Curious Case of Usable Privacy
Challenges, Solutions, and Prospects
Bertino / Bhardwaj / Cicala
Machine Learning Techniques for Cybersecurity
Machine Learning Techniques for Cybersecurity
Naskar / Chakraborty
Reversible Digital Watermarking
Reversible Digital Watermarking
Theory and Practices
Domingo-Ferrer / Sánchez / Soria-Comas
Privacy Models, Data Utility, and Microaggregation-based Inter-model Connections
Judmayer / Stifter / Krombholz
Introduction to Bitcoin, Cryptocurrencies, and Their Consensus Mechanisms
Yao / Shu / Cheng
Anomaly Detection as a Service
Anomaly Detection as a Service
Challenges, Advances, and Opportunities
Wachsmann / Sadeghi
Physically Unclonable Functions (PUFs)
Physically Unclonable Functions (PUFs)
Applications, Models, and Future Directions