-
Mohammad Mannan
anti-surveillance tools, web authentication, trusted computing
-
Suryadipta Majumdar
cybersecurity, information systems security, data security
-
Ivan Pustogarov
information systems security, cryptographic protocols, privacy
-
Amr Youssef
cryptography, cyberphysical systems, cryptographic algorithms
-
Lingyu Wang
network security, privacy, security metrics
top associated keywords A-Z
- information systems security12
- privacy10
- cloud computing17
- cryptographic protocols6
- cyberphysical systems12
- cybersecurity16
- anti-surveillance tools2
- botnet defence4
- cryptography5
- cyberforensics5
- detection of vulnerabilities3
- malware analysis3
- mobile platform security3
- networks27
- software security6
- anonymity modeling1
- attack graphs1
- auditing virtual network isolation1
- blockchain2
- Boolean functions1
- cloud security auditing1
- coding theory1
- cryptocurrency4
- cryptographic algorithms1
- data hiding/embedding1
- deanonymization1
- email security2
- embedded systems8
- FH-CDMA sequence design1
- FinTech3
- formal methods6
- identity theft1
- information technologies25
- internet of things (IoT)17
- internet of things (IoT) security2
- intra-flow interference1
- intrusion detection1
- online banking1
- P2P networks1
- phishing1
- PIN security1
- proactive security auditing1
- runtime security enforcement1
- security metrics1
- side channel attacks1
- smart grids11
- social networks21
- software-defined network security2
- speech recognition technology5
- stealthy probing-based verification1
- text to speech synthesizers3