UNAUTHORIZED ACCESS
Experts
- Frédéric Cuppens
- Nora Cuppens-Boulahia
- Lujo Bauer
- David A. Basin
- Ninghui Li
- Ravi S. Sandhu
- Bruno Crispo
- Erez Zadok
- Indrakshi Ray
- Trent Jaeger
- Sharad Mehrotra
- Amit Sahai
- Giovanni Russello
- Matthias Hollick
- Konstantin Beznosov
- Stefan Mangard
- Young Ik Eom
- Mark M. Tehranipoor
- Pierangela Samarati
- Jianting Ning
- Simon N. Foley
- Yves Le Traon
- Mihaela Ion
- Randal C. Burns
- Vasily Tarasov
- Mahesh V. Tripunitara
- Elisa Bertino
- Jason Crampton
- Sabrina De Capitani di Vimercati
- Qihua Wang
- Kaiping Xue
- Sanjam Garg
- Yanchao Zhang
- Muhammad Rizwan Asghar
- Sushil Jajodia
- Kim-Kwang Raymond Choo
- Robert H. Deng
- Huy Kang Kim
- Régine Laleau
Venues
- CoRR
- IACR Cryptol. ePrint Arch.
- IEEE Access
- Comput. Secur.
- CCS
- IEEE Internet Things J.
- SACMAT
- Sensors
- ACSAC
- ICC
- USENIX Security Symposium
- AMCIS
- CNS
- DBSec
- ARES
- ACM SIGOPS Oper. Syst. Rev.
- IEEE Trans. Inf. Forensics Secur.
- IEEE Symposium on Security and Privacy
- Int. J. Inf. Sec.
- INFOCOM
- NDSS
- FAST
- Comput. Networks
- IEEE Trans. Dependable Secur. Comput.
- Comput. Commun.
- Wirel. Pers. Commun.
- Future Gener. Comput. Syst.
- IEICE Trans. Inf. Syst.
- AsiaCCS
- GLOBECOM
- IEEE Trans. Serv. Comput.
- J. Comput. Secur.
- Concurr. Comput. Pract. Exp.
- SAC
- ACM Trans. Storage
- DSN
- Inf. Secur. J. A Glob. Perspect.
- COMPSAC
- POLICY
Related Topics
Related Keywords
Popularity
No popularities found. Try to change the filters.
Popularity Trend