ATTACK SCENARIOS
Experts
- Naser Damer
- Christoph Busch
- Meiling Fang
- Arjan Kuijper
- Peng Ning
- Igor V. Kotenko
- Fadi Boutros
- Anoop Singhal
- Raghavendra Ramachandra
- Sushil Jajodia
- Henrik Sandberg
- Dingbang Xu
- Zhitang Li
- Lingyu Wang
- Fabio Roli
- Huy Kang Kim
- Mauro Conti
- Luka Music
- Adam Czajka
- Raouf Boutaba
- Elham Kashefi
- Marco Huber
- Sukumar Nandi
- Wenke Lee
- Haoliang Li
- Sébastien Marcel
- Florian Kirchbuchner
- Kanad Basu
- Li Wang
- Elena Doynikova
- Céline Chevalier
- Santosh Biswas
- Gang Wang
- Peng Liu
- Kiran B. Raja
- Noureddine Boudriga
- Jaime S. Cardoso
- Sencun Zhu
- Martin Henze
Venues
- CoRR
- Comput. Secur.
- IACR Cryptol. ePrint Arch.
- IEEE Access
- Secur. Commun. Networks
- RAID
- ICC
- IEEE Trans. Inf. Forensics Secur.
- Comput. Commun.
- Wirel. Pers. Commun.
- ACSAC
- Sensors
- CCS
- AsiaCCS
- MILCOM
- GLOBECOM
- IEEE Trans. Dependable Secur. Comput.
- USENIX Security Symposium
- IEEE Internet Things J.
- ARES
- SIN
- J. Inf. Secur. Appl.
- COMPSAC
- Security Protocols Workshop
- CNS
- SecureComm
- Expert Syst. Appl.
- IAS
- J. Netw. Comput. Appl.
- SAC
- Inf. Sci.
- Soft Comput.
- WISA
- IJCB
- Appl. Soft Comput.
- Concurr. Comput. Pract. Exp.
- Microprocess. Microsystems
- DSC
- SN Comput. Sci.
Related Topics
Related Keywords
Popularity