ATTACK SCENARIOS
Experts
- Naser Damer
- Meiling Fang
- Christoph Busch
- Arjan Kuijper
- Peng Ning
- Igor V. Kotenko
- Fadi Boutros
- Raghavendra Ramachandra
- Sushil Jajodia
- Anoop Singhal
- Zhitang Li
- Henrik Sandberg
- Lingyu Wang
- Dingbang Xu
- Mauro Conti
- Elham Kashefi
- Haoliang Li
- Luka Music
- Sukumar Nandi
- Florian Kirchbuchner
- Li Wang
- Raouf Boutaba
- Kiran B. Raja
- Adam Czajka
- Elena Doynikova
- Sébastien Marcel
- Huy Kang Kim
- Peng Liu
- Noureddine Boudriga
- Kanad Basu
- Wenke Lee
- Fabio Roli
- Marco Huber
- Gang Wang
- Santosh Biswas
- Céline Chevalier
- Abraham Peedikayil Kuruvila
- Alessandro Armando
- David K. Y. Yau
Venues
- CoRR
- Comput. Secur.
- IEEE Access
- IACR Cryptol. ePrint Arch.
- Secur. Commun. Networks
- IEEE Trans. Inf. Forensics Secur.
- ICC
- RAID
- Sensors
- Wirel. Pers. Commun.
- AsiaCCS
- Comput. Commun.
- GLOBECOM
- ACSAC
- CCS
- ARES
- IEEE Trans. Dependable Secur. Comput.
- USENIX Security Symposium
- IEEE Internet Things J.
- MILCOM
- SAC
- SIN
- J. Netw. Comput. Appl.
- IJCB
- Inf. Sci.
- COMPSAC
- Microprocess. Microsystems
- CNS
- Future Internet
- J. Inf. Secur. Appl.
- IAS
- NOMS
- Clust. Comput.
- Concurr. Comput. Pract. Exp.
- Expert Syst. Appl.
- Security Protocols Workshop
- SecureComm
- IET Inf. Secur.
- IEEE Syst. J.
Related Topics
Related Keywords
Popularity
No popularities found. Try to change the filters.
Popularity Trend