-
Suryadipta Majumdar
cybersecurity, information systems security, data security
-
Lingyu Wang
network security, privacy, security metrics
-
Ivan Pustogarov
information systems security, cryptographic protocols, privacy
-
Ayda Basyouni
software quality and best practices, information systems security, networks
top associated keywords A-Z
- network security12
- data security7
- privacy10
- cloud computing17
- cryptographic protocols6
- cryptography5
- detection of vulnerabilities3
- networks27
- anonymity modeling1
- anti-surveillance tools2
- attack graphs1
- auditing virtual network isolation1
- blockchain2
- botnet defence4
- CDMA20001
- cloud security auditing1
- coding theory1
- complex dynamic systems19
- cross-layer design2
- cryptocurrency4
- cyberforensics5
- cyberphysical systems12
- deanonymization1
- embedded systems8
- FinTech3
- formal methods6
- ICT29
- internet of things (IoT)17
- internet of things (IoT) security2
- intra-flow interference1
- intrusion detection1
- malware analysis3
- mobile ad hoc networks11
- mobile platform security3
- network resource allocation3
- P2P networks1
- proactive security auditing1
- runtime security enforcement1
- security metrics1
- smart grids11
- software engineering26
- software quality and best practices11
- software security6
- software-defined network security2
- stealthy probing-based verification1
- usable security3
- wireless communications5
- wireless mesh networking1
- wireless networks19