-
Ivan Pustogarov
information systems security, cryptographic protocols, privacy
-
Carol Fung
network management, cybersecurity, network security
-
Lingyu Wang
network security, privacy, security metrics
-
Suryadipta Majumdar
cybersecurity, information systems security, data security
-
Martin A. French
risk, surveillance, privacy
top associated keywords A-Z
- network security12
- data security7
- information systems security12
- cloud computing18
- detection of vulnerabilities3
- internet of things (IoT) security2
- mobile platform security3
- software-defined network security2
- anonymity modeling1
- anti-surveillance tools2
- artificial intelligence (AI)52
- attack graphs1
- auditing virtual network isolation1
- big data31
- biopolitics10
- blockchain2
- botnet defence4
- cloud security auditing1
- coding theory1
- collaborative intrusion detection1
- cryptocurrency4
- cryptographic protocols6
- cryptography5
- cyberforensics5
- cyberphysical systems12
- DDoS defense1
- deanonymization1
- digital games22
- embedded systems9
- ethnography32
- financialization8
- FinTech4
- formal methods6
- gambling4
- game theory16
- healthcare information systems4
- HIV/AIDS5
- human rights33
- information technologies26
- internet of things (IoT)17
- internet studies23
- intra-flow interference1
- intrusion detection1
- law and society23
- malware analysis3
- network 'softwarization'1
- network management2
- networks27
- P2P networks1
- proactive security auditing1
- public health policy15