IoT devices are present in many, especially corporate and sensitive, net...
In a global economy with many competitive participants, licensing and
tr...
In this paper, we address the inefficient handling of traditional securi...
Modern single page web applications require client-side executions of
ap...
Empirical sciences and in particular psychology suffer a methodological
...
Users of Internet of Things (IoT) devices are often unaware of their sec...
Protocol reverse engineering based on traffic traces infers the behavior...
Distributed denial of service (DDoS) attacks are a constant threat for
s...
Distributed Reflective Denial of Service (DRDoS) attacks are an immanent...
For preserving privacy, blockchains can be equipped with dedicated mecha...
Privacy in block-chains is considered second to functionality, but a vit...
Purchase decisions for devices in high-throughput networks as well as
sc...
The purpose of multi-source fusion is to combine information from more t...
Slow-running attacks against network applications are often not easy to
...
Vehicular networks are networks of communicating vehicles, a major enabl...
Payment channel networks are supposed to overcome technical scalability
...